Research & Analysis on Hybrid Storage: Combining SSDs and HDDs Drive

DOI®: doi.org/10.21276/ijre.2019.6.2.5 CITATION: Dayalan, M. (2019). Research & Analysis on Hybrid Storage: Combining SSDs and HDDs Drive. International Journal Of Research And Engineering, 6(2), 603-606. doi:10.21276/ijre.2019.6.2.5 Author(s): 1Muthu Dayalan Affiliation(s): 1Senior Software Developer, ANNA University, Chennai, India Abstract: The traditional Hard Read More …

  • 1.4K
    Shares

Temporary Climate Variability for The Period 1965-2016 in The Pedro Moncayo Canton, Ecuador

DOI®: doi.org/10.21276/ijre.2019.6.2.4 CITATION: Quinteros-Carabalí, J., Gallo, O., Cuesta, A., Falcones, L., & Arciniegas, S. (2019). Temporary Climate Variability for The Period 1965-2016 in The Pedro Moncayo Canton, Ecuador. International Journal Of Research And Engineering, 6(2), 596-602. doi:10.21276/ijre.2019.6.2.4 Author(s): 1Joffre Quinteros-Carabalí, 2Omar Read More …

  • 1.4K
    Shares

Performance Comparison between Two Interpretations of Missing Data using Matrix-Characterized Approximations

DOI®: doi.org/10.21276/ijre.2019.6.2.3 CITATION: Min, M., & Soe, T. (2019). Performance Comparison between Two Interpretations of Missing Data using Matrix-Characterized Approximations. International Journal Of Research And Engineering, 6(2), 589-595. doi:10.21276/ijre.2019.6.2.3 Author(s): 1Myat Myat Min, 2Thin Thin Soe Affiliation(s): 1Faculty of Computer Science, University Read More …

  • 1.4K
    Shares

Action Recognition Framework using Saliency Detection and Random Subspace Ensemble Classifier

DOI®: doi.org/10.21276/ijre.2019.6.2.2 CITATION: Zaw, S., & Aye, H. (2019). Action Recognition Framework using Saliency Detection and Random Subspace Ensemble Classifier. International Journal Of Research And Engineering, 6(2), 580-588. doi:10.21276/ijre.2019.6.2.2 Author(s): 1Sai Maung Maung Zaw, 2Hnin Mya Aye Affiliation(s): 1Faculty of Computer Systems Read More …

  • 1.4K
    Shares

An Analysis on Security Threats of Black-Hole and Jellyfish Attacks in Mobile Ad-Hoc Network using HTTP Traffic

DOI®: doi.org/10.21276/ijre.2019.6.2.1 CITATION: Ahmed, F., Juel Rahman, D., & Rashid, S. (2019). An Analysis on Security Threats of Black-Hole and Jellyfish Attacks in Mobile Ad-Hoc Network using HTTP Traffic. International Journal Of Research And Engineering, 6(2), 575-579. doi:10.21276/ijre.2019.6.2.1 Author(s): 1Faisal Read More …

  • 1.4K
    Shares

Low Enriched Uranium based Nuclear Rocket Propulsion Technology: Mars Exploration Mission

DOI®: doi.org/10.21276/ijre.2019.6.1.4 CITATION: Neupane, G. (2019). Low Enriched Uranium based Nuclear Rocket Propulsion Technology: Mars Exploration Mission. International Journal Of Research And Engineering, 6(1), 569-574. doi:10.21276/ijre.2019.6.1.4 Author(s): 1Gaurab Neupane Affiliation(s): 1Department of Mechanical Engineering, SRM Institute of Science and Technology, Kattankulathur, Read More …

  • 1.4K
    Shares

Performance of Combined Vertical and Horizontal Flow Sub-Surface Constructed Wetlands

DOI®: doi.org/10.21276/ijre.2019.6.1.3 CITATION: Kumar, R., & Ojha, A. (2019). Performance of Combined Vertical and Horizontal Flow Sub-Surface Constructed Wetlands. International Journal Of Research And Engineering, 6(1), 563-568. doi:10.21276/ijre.2019.6.1.3 Author(s): 1R. Kumar, 2A. R. Ojha Affiliation(s): 1National Environment Engineering Research Institute, Mumbai Zonal Read More …

  • 1.4K
    Shares

New Insights of Background Estimation and Region Localization

DOI®: doi.org/10.21276/ijre.2019.6.1.2 CITATION: Lin, H. (2019). New Insights of Background Estimation and Region Localization. International Journal Of Research And Engineering, 6(1), 556-562. doi:10.21276/ijre.2019.6.1.2 Author(s): 1Htet Htet Lin Affiliation(s): 1Software Department Computer University (BanMaw), Myanmar Abstract: Subtraction of background in a crowded Read More …

  • 1.4K
    Shares