IJRECE_D324

Download Paper

The Study of Various Applications and several datasets in Elliptic curve cryptography
Saumya Rajvanshi, Gurleen Kaur, Gurjot Singh Sodhi

IJRECE_D320

Download Paper

IMPROVEMENT OF THE OFFLOADING DECISION IN MOBILE CLOUD COMPUTING
Ishali Jain, Rekha Bhatia

To Design Vehicular Ad-hoc Network using Sybil Attack and Optimization Technique
Samiksha, Iqbaldeep Kaur, Dr. Amit Verma

IJRECE_D327

Download Paper

Balanced Image Restoration with ADMM-B Algorithm

Dr.AMIT VERMA, AARTI DOGRA, ISHA VATS

IJRECE_D338

Download Paper

Reduction of chances of Link Failure by Enhancement in AOMDV Protocol in Mobile Ad-hoc Network
Harmandeep Singh, Sukhpreet Kaur

IJRECE_D326

Download Paper

IJRECE_D336

Download Paper

A Survey on Emerging Sensor Technologies for Groundwater Detection
Dr. AMIT VERMA, JASLEEN KAUR, BHARTI CHHABRA

IJRECE_D301

Download Paper

Dissemination of Agile Tools: A Review
Preetika Sharma, Ms. Jagpuneet Kaur Bajwa

Resources Allocation Optimization for Real Time Traffic in LTE Cellular Network
Angelique Mukasine, Faustin Ahishakiye, Richard Musabe, Gaurav Bajpai

IJRECE_D325

Download Paper

Agile technique: Review and Assessment
Harjeet Kaur, Asst Prof Jagpuneet Kaur Bajwa​

ISSN (Online): 2348-2281
ISSN (Print): 2393-9028

IJRECE_D328

Download Paper

Survey of Content Based Image Retrieval Architecture, Advantages and Disadvantages
Sukhman Kaur, Rupinder Kaur

A Hybrid Aproach Toward Improving Performance of Load Balancing in Cloud Computing
Natasha, Kamaljit Kaur Mangat

Development of an n-I/O PLC Ladder Diagram Translator 
Engr. Conrad A. Populi, Engr. Shearyl Arenas

Race to the top- 4G handset market in India

Navdeep Singh

IJRECE_D309

Download Paper

IJRECE_D319

Download Paper

The Study of Distributed Denial of Services Fact, Figures and Issues
Gurleen Kaur, Saumya Rajvanshi, Gurjot Singh Sodhi

IJRECE_D306

Download Paper

IJRECE_D337

Download Paper

IJRECE_D340

Download Paper

Study Leukemia Detection Techniques using Acute Myelogenous Leukemia Detection in Blood Microscopic Images
RumeetKour Raina, Deepinder Kaur

IJRECE_D333

Download Paper

Survey of Hand Gesture Recognition System based on Methods and Uses
Tulsi Joshi, Rupinder Kaur

A Review of Virtual Side Channel attack in Cloud Computing Architecture

AMIT VERMA, MEGHA MITTAL, BHARTI CHHABRA

IJRECE_D307

Download Paper

Cloud Integration of E-Health Wireless Sensor Networks for Data Privacy

Dr. AMIT VERMA, MADHU, AMANDEEP KAUR

Video Steganography using hybrid approach bacterial foraging technique and classification using Multi-Layer Neural Network | Anuradha, Amandeep Verma

IJRECE_D344

Download Paper

Hybrid Process Using Principal Component Analysis and Knowledge Based System for Facial Emotion Detection
Reetika, Rekha Bhatia

Review on Image Processing Techniques to Measure Dimensions of an Object

Komalpreet Kaur, Naveen Kumari

IJRECE_D335

Download Paper

IJRECE_D316

Download Paper

IJRECE_D342

Download Paper

IJRECE_D321

Download Paper

IJRECE_D339

Download Paper

An Efficient Scheduling Approach for Reducing Energy Consumption in Cloud Computing
Pearlpreet Sidhu, Er. Rasneet Kaur

Effect of Access Control Policy on Resource Utilization in Cloud Computing – A Comparative study between RBAC and RiskBAC Policy | Iqbalinder Singh Sohal, Amardeep Kaur

IJRECE_D318

Download Paper

IJRECE_D308

Download Paper

Extraction of Sentimental Analysis using Vector Techniques and Feed Forward Neural Network

Sakshi Gupta, Rasbir Singh

The Survey of Combination of Steganography and Cryptography in LSB and Encryption Techniques
Vishal Garg, Vanita Rani

IJRECE_D329

Download Paper

A  Survey of the Elliptic curve cryptography attacks, advantages and Disadvantages
Dr. AMIT VERMA, KANWALPREET SINGH, BHARTI CHHABRA

Security Survey and Study of DDos Attack on LTE (4G) Network
Lakhbir Kaur, Chitender Kaur

IJRECE_D302

Download Paper

An approach of image segmentation technique using Improved K-means Clustering Algorithm
Monika Nagpal, Ms. Naveen Kumari

IJRECE_D303

Download Paper

The User Authentication and Key Arrangement Techniques using Advanced Encryption standard in Wireless Sensor Network
Jasmine Kaur, Sukwinder Sharma

IJRECE_D331

Download Paper

IJRECE_D317

Download Paper

IJRECE_D304

Download Paper

IJRECE_D310

Download Paper

Enhanced and optimized data de-duplication technique to eliminate duplicate data with Hybrid hashing in cloud environment | Navdesh kaur, Amandeep Verma

International Journal of Research in Electronics AND Computer Engineering (IJRECE)

A Unit of I2OR

Security Challenges in Big Data
G.L.Anand Babu, Dr. K.S. Reddy, G.Sekhar Reddy

IJRECE_D312

Download Paper

Study of Different Approaches in Cloud Computing for Improving Load Balancing
Natasha, Kamaljit Kaur Mangat

Biometric Authentication System for Landline Users
Borse Madhavi A., Dr. S.D.Markande

IJRECE_D305

Download Paper