Call of Papers for Current Volume ********************OnLine Paper Submission for Current Volume

Volume & Issue no: Volume 4, Issue 2, March - April 2015

____________________________________________________________________________________________________

S.No. Title Page No
1
Title: Optimization Design of Band Pass Filter in The Infrared Region
Authors: Saeed N. Turki
Full Text [PDF]| Abstract                                        
001-005
2
Title: Intelligence Techniques for e-government applications
Authors: HANAA. M. SAID, MOHAMED HAMDY, RANIA El GOHARY, ABDEL-BADEEH M. SALEM
Full Text [PDF]| Abstract                                        
006-020
3
Title: An improved HMF with PDE for Cellular Images
Authors: Garima Goyal
Full Text [PDF]| Abstract                                        
021-023
4
Title: A Survey on Various Broadcast Techniques for MANET
Authors: AKSHEET SADARSANIYA, ROHIT SRIVASTAVA
Full Text [PDF]| Abstract                                        
024-027
5
Title: DCT Based Grey Scale Still Image Watermarking Using 1-D Walsh Code and Biometric Protection
Authors: B.P.Mishra, Dr.H.N.Pratihari, Dr.P.Das
Full Text [PDF]| Abstract                                        
028-032
6
Title: PERFORMANCE EVALUATION AND EMISSION CHARACTERISTICS OF A WASTE TRANSFORMER OIL AS AN ALTERNATIVE FUEL FOR DIESEL ENGINE
Authors: E SAIDULU , G.S.GURU DATTATREYA
Full Text [PDF]| Abstract                                        
033-041
7
Title: IEAACK Implementation of A New Security Intrusion Detection System by Using Hybrid Cryptographic Algorithm for MANET
Authors: Ms Priyanka P Kulkarni , Prof G.M.Bhandari
Full Text [PDF]| Abstract                                        
042-048
8
Title: Assessing ICT Policy Development and Implementation in Developing Countries: a case study from Morocco
Authors: Dr. Driss Kettani
Full Text [PDF]| Abstract                                        
049-054
9
Title: A stochastic model for feature extraction in Time Series Data Mining and its Engineering applications using remote sensing technique
Authors: R.K Singh, Sunil Bhaskarn
Full Text [PDF]| Abstract                                        
055-059
10
Title: S R S for responsive design environment: Generic Medicine Mobile Website -A portal to facilitate updated information about generic medicine
Authors: Prof.Chaitali Gadekar
Full Text [PDF]| Abstract                                        
060-063
11
Title: NEOTERIC INNOVATION IN GI-FI TECHNOLOGY
Authors: Nandhakumar P, Abhishek Pratap Singh
Full Text [PDF]| Abstract                                        
064-069
12
Title: Modify Speech Cryptosystem Based on Shuffling Overlapping Blocks Technique
Authors: Dr. Hala B.Abdul Wahab, Sundus I. Mahdi
Full Text [PDF]| Abstract                                        
070-075
13
Title: FLASHBACK & ARTIFACTS IN IMAGE CLASSIFICATION DESCRIPTORS
Authors: Parul Prashar, Amit Kumar
Full Text [PDF]| Abstract                                        
076-078
14
Title: Modified Rc4 Dual Key algorithm based on Irreducible Polynomial
Authors: Prof. Dr. Abdul Monem Saleh Rahma , Zainab Mohammed Hussein
Full Text [PDF]| Abstract                                        
079-085
15
Title: Avoid Women Harassment through Web Browser
Authors: Prof.Aniruddha Madhav Phadke
Full Text [PDF]| Abstract                                        
086-088
16
Title: The Impact of Mobile and Internet Based Social Network Technologies on Student Education
Authors: Mahabaleshwar. S. Kabbur, Savitri K
Full Text [PDF]| Abstract                                        
089-092
17
Title: A Novel Biometric Authentication for ATM Security
Authors: SWATHY.G .S, RASMI .P .S
Full Text [PDF]| Abstract                                        
093-097
18
Title: Digital Signature based secure XML emails
Authors: Srushti Arekar, Prajakta Jagtap, Priyanka Jagtap, Sharanya Shivakumar
Full Text [PDF]| Abstract                                        
098-102
19
Title: Machine learning In E- Technologies
Authors: HANAA. M. SAID, ABDEL-BADEEH M. SALEM
Full Text [PDF]| Abstract                                        
103-108
20
Title: Review on various Cyber Crime, Hacker, and Authorities
Authors: Ms Divya Sharma
Full Text [PDF]| Abstract                                        
109-113
21
Title: NOTES ON AVERAGE QUERY RESPONSE TIME IN DBMS
Authors: SARIKA SAINI
Full Text [PDF]| Abstract                                        
114-116
22
Title: Image Search Re-ranking based on Prototype
Authors: Ms. Deepali.M.Jalkote , Mr.Pravin P.Kalyankar
Full Text [PDF]| Abstract                                        
117-120
23
Title: Exploring Different Aspects of Social Network Analysis Using Web Mining Techniques
Authors: Hilal Ahmad Khanday, Dr. Rana Hashmy
Full Text [PDF]| Abstract                                        
121-125
24
Title: FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE
Authors: Bhuvaneswari Thangaraj, S.Umarani , D.Sharmila
Full Text [PDF]| Abstract                                        
126-132
25
Title: EFFICIENT INTRUSION DETECTION SYSTEM WITH REDUCED DIMENSIONALITY
Authors: Nupur N. Majethiya , Prof. Dipak C. Patel
Full Text [PDF]| Abstract                                        
133-136
26
Title: Data Cleaning Using Clustering Based Data Mining Technique
Authors: Sujata Joshi, Usha T.
Full Text [PDF]| Abstract                                        
137-140
27
Title: A Study on the Behavior of MANET: Along with Research Challenges, Application and Security Attacks
Authors: Anil Lamba, Sohan Garg
Full Text [PDF]| Abstract                                        
141-146
28
Title: Hindi-English Translation Memory System
Authors: Nandita Srivastava, Priya Singh, Sukanya Chauhan, Shashi Pal Singh, Ajai Kumar, Dr. Hemant Darbari
Full Text [PDF]| Abstract                                        
147-152
29
Title: Cut Detection and Re-routing in wireless sensor networks
Authors: Mrs.Dipali Sonawane , Prof. Alka Khade , Prof. Seema Biday
Full Text [PDF]| Abstract                                        
153-157
30
Title: Survey on Different Techniques in SQL to Prepare Dataset for Data Mining
Authors: Shaila Eksambekar , Prof. Suhasini Itkar
Full Text [PDF]| Abstract                                        
158-162
31
Title: A NEW APPROACH TO SECURITY IN AD HOC NETWORKS
Authors: Rashmi Hegde , Dr. H.D.Phaneendra
Full Text [PDF]| Abstract                                        
163-169
32
Title: Text Hiding Based On Hue Content In HSV Color Space
Authors: Ahmed S. Abdalluh
Full Text [PDF]| Abstract                                        
170-173
33
Title: GRAPHICAL BASED PASSWORD USING KEYSTROKE DYNAMIC AUTHENTICATION SYSTEM FOR BANKING APPLICATION
Authors: Kajal Birdawade, Varsha Ingale, Manisha Lole, Vrushali Mande, Prof. Mrs. Deepti Nirwal
Full Text [PDF]| Abstract                                        
174-176
34
Title: Data Protection in Mac OS X
Authors: Neha Setia, Tarun Dalal
Full Text [PDF]| Abstract                                        
177-180
35
Title: Active Queue Management in MANETs – A Primer on Network Performance optimization
Authors: Shallu Bedi, Gagangeet Singh Aujla, Sahil Vashist
Full Text [PDF]| Abstract                                        
181-188
36
Title: A Policy-Based Framework for Managing Information Security and Privacy Risks in BYOD Environments
Authors: Abubakar Bello Garba, Jocelyn Armarego, David Murray
Full Text [PDF]| Abstract                                        
189-198
37
Title: A Survey On Detection Of Mining Service Information Discovery Using SASF Crawler
Authors: Suganiya.R, Asst.Prof. Haripriya.K
Full Text [PDF]| Abstract                                        
199-202
38
Title: NATURAL LANGUAGE PROCESSING USING ARTIFICIAL INTELLIGENCE
Authors: Unnati Dhavare , Prof. Umesh Kulkarni
Full Text [PDF]| Abstract                                        
203-205
39
Title: A Synthesize Virtual Machine Provisioning Mechanism for Cloud Data Center
Authors: Ganesh Kumar Vishwakarma, Prof. Neelam Sain, Prof. Anjul K S Rai
Full Text [PDF]| Abstract                                        
206-208
40
Title: Automated Self-Billing System Using RFID Technology
Authors: Prachi Bhatwal, Onish Chamoli
Full Text [PDF]| Abstract                                        
209-212
41
Title: Implementation of Storage Tiering Using OpenStack to Improve Data dynamics on Cloud Computing
Authors: Bhagyashri Kulkarni, Varsha Bhosale
Full Text [PDF]| Abstract                                        
213-216
42
Title: Sub-band Coding of Speech Signals using Multirate Signal Processing and comparing the various parameter of different speech signals by corrupting the same speech signal
Authors: Lalitha R Naik, Devaraja Naik R L
Full Text [PDF]| Abstract                                        
217-221
43
Title: A Review On Modern Secure Mosaic Video Generation For Secure Video Transmission
Authors: Mr.Swapnil Patil , Prof.A.A Deshmukh
Full Text [PDF]| Abstract                                        
222-226


 

Contact us


International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
ISSN 2278-6856
Frequency : 6 Issues/Year


E-mail: editor@ijettcs.org