Call of Papers for Current Volume ********************OnLine Paper Submission for Current Volume

Volume & Issue no: Volume 4, Issue 2, March - April 2015

____________________________________________________________________________________________________

S.No. Title Page No
1
Title: Optimization Design of Band Pass Filter in The Infrared Region
Authors: Saeed N. Turki
Full Text [PDF]| Abstract                                        
001-005
2
Title: Intelligence Techniques for e-government applications
Authors: HANAA. M. SAID, MOHAMED HAMDY, RANIA El GOHARY, ABDEL-BADEEH M. SALEM
Full Text [PDF]| Abstract                                        
006-020
3
Title: An improved HMF with PDE for Cellular Images
Authors: Garima Goyal
Full Text [PDF]| Abstract                                        
021-023
4
Title: A Survey on Various Broadcast Techniques for MANET
Authors: AKSHEET SADARSANIYA, ROHIT SRIVASTAVA
Full Text [PDF]| Abstract                                        
024-027
5
Title: DCT Based Grey Scale Still Image Watermarking Using 1-D Walsh Code and Biometric Protection
Authors: B.P.Mishra, Dr.H.N.Pratihari, Dr.P.Das
Full Text [PDF]| Abstract                                        
028-032
6
Title: PERFORMANCE EVALUATION AND EMISSION CHARACTERISTICS OF A WASTE TRANSFORMER OIL AS AN ALTERNATIVE FUEL FOR DIESEL ENGINE
Authors: E SAIDULU , G.S.GURU DATTATREYA
Full Text [PDF]| Abstract                                        
033-041
7
Title: IEAACK Implementation of A New Security Intrusion Detection System by Using Hybrid Cryptographic Algorithm for MANET
Authors: Ms Priyanka P Kulkarni , Prof G.M.Bhandari
Full Text [PDF]| Abstract                                        
042-048
8
Title: Assessing ICT Policy Development and Implementation in Developing Countries: a case study from Morocco
Authors: Dr. Driss Kettani
Full Text [PDF]| Abstract                                        
049-054
9
Title: A stochastic model for feature extraction in Time Series Data Mining and its Engineering applications using remote sensing technique
Authors: R.K Singh, Sunil Bhaskarn
Full Text [PDF]| Abstract                                        
055-059
10
Title: S R S for responsive design environment: Generic Medicine Mobile Website -A portal to facilitate updated information about generic medicine
Authors: Prof.Chaitali Gadekar
Full Text [PDF]| Abstract                                        
060-063
11
Title: NEOTERIC INNOVATION IN GI-FI TECHNOLOGY
Authors: Nandhakumar P, Abhishek Pratap Singh
Full Text [PDF]| Abstract                                        
064-069
12
Title: Modify Speech Cryptosystem Based on Shuffling Overlapping Blocks Technique
Authors: Dr. Hala B.Abdul Wahab, Sundus I. Mahdi
Full Text [PDF]| Abstract                                        
070-075
13
Title: FLASHBACK & ARTIFACTS IN IMAGE CLASSIFICATION DESCRIPTORS
Authors: Parul Prashar, Amit Kumar
Full Text [PDF]| Abstract                                        
076-078
14
Title: Modified Rc4 Dual Key algorithm based on Irreducible Polynomial
Authors: Prof. Dr. Abdul Monem Saleh Rahma , Zainab Mohammed Hussein
Full Text [PDF]| Abstract                                        
079-085
15
Title: Avoid Women Harassment through Web Browser
Authors: Prof.Aniruddha Madhav Phadke
Full Text [PDF]| Abstract                                        
086-088
16
Title: The Impact of Mobile and Internet Based Social Network Technologies on Student Education
Authors: Mahabaleshwar. S. Kabbur, Savitri K
Full Text [PDF]| Abstract                                        
089-092
17
Title: A Novel Biometric Authentication for ATM Security
Authors: SWATHY.G .S, RASMI .P .S
Full Text [PDF]| Abstract                                        
093-097
18
Title: Digital Signature based secure XML emails
Authors: Srushti Arekar, Prajakta Jagtap, Priyanka Jagtap, Sharanya Shivakumar
Full Text [PDF]| Abstract                                        
098-102
19
Title: Machine learning In E- Technologies
Authors: HANAA. M. SAID, ABDEL-BADEEH M. SALEM
Full Text [PDF]| Abstract                                        
103-108
20
Title: Review on various Cyber Crime, Hacker, and Authorities
Authors: Ms Divya Sharma
Full Text [PDF]| Abstract                                        
109-113
21
Title: NOTES ON AVERAGE QUERY RESPONSE TIME IN DBMS
Authors: SARIKA SAINI
Full Text [PDF]| Abstract                                        
114-116
22
Title: Image Search Re-ranking based on Prototype
Authors: Ms. Deepali.M.Jalkote , Mr.Pravin P.Kalyankar
Full Text [PDF]| Abstract                                        
117-120
23
Title: Exploring Different Aspects of Social Network Analysis Using Web Mining Techniques
Authors: Hilal Ahmad Khanday, Dr. Rana Hashmy
Full Text [PDF]| Abstract                                        
121-125
24
Title: FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE
Authors: Bhuvaneswari Thangaraj, S.Umarani , D.Sharmila
Full Text [PDF]| Abstract                                        
126-132
25
Title: EFFICIENT INTRUSION DETECTION SYSTEM WITH REDUCED DIMENSIONALITY
Authors: Nupur N. Majethiya , Prof. Dipak C. Patel
Full Text [PDF]| Abstract                                        
133-136
26
Title: Data Cleaning Using Clustering Based Data Mining Technique
Authors: Sujata Joshi, Usha T.
Full Text [PDF]| Abstract                                        
137-140
27
Title: A Study on the Behavior of MANET: Along with Research Challenges, Application and Security Attacks
Authors: Anil Lamba, Sohan Garg
Full Text [PDF]| Abstract                                        
141-146
28
Title: Hindi-English Translation Memory System
Authors: Nandita Srivastava, Priya Singh, Sukanya Chauhan, Shashi Pal Singh, Ajai Kumar, Dr. Hemant Darbari
Full Text [PDF]| Abstract                                        
147-152
29
Title: Cut Detection and Re-routing in wireless sensor networks
Authors: Mrs.Dipali Sonawane , Prof. Alka Khade , Prof. Seema Biday
Full Text [PDF]| Abstract                                        
153-157
30
Title: Survey on Different Techniques in SQL to Prepare Dataset for Data Mining
Authors: Shaila Eksambekar , Prof. Suhasini Itkar
Full Text [PDF]| Abstract                                        
158-162
31
Title: A NEW APPROACH TO SECURITY IN AD HOC NETWORKS
Authors: Rashmi Hegde , Dr. H.D.Phaneendra
Full Text [PDF]| Abstract                                        
163-169
32
Title: Text Hiding Based On Hue Content In HSV Color Space
Authors: Ahmed S. Abdalluh
Full Text [PDF]| Abstract                                        
170-173
33
Title: GRAPHICAL BASED PASSWORD USING KEYSTROKE DYNAMIC AUTHENTICATION SYSTEM FOR BANKING APPLICATION
Authors: Kajal Birdawade, Varsha Ingale, Manisha Lole, Vrushali Mande, Prof. Mrs. Deepti Nirwal
Full Text [PDF]| Abstract                                        
174-176
34
Title: Data Protection in Mac OS X
Authors: Neha Setia, Tarun Dalal
Full Text [PDF]| Abstract                                        
177-180
35
Title: Active Queue Management in MANETs – A Primer on Network Performance optimization
Authors: Shallu Bedi, Gagangeet Singh Aujla, Sahil Vashist
Full Text [PDF]| Abstract                                        
181-188
36
Title: A Policy-Based Framework for Managing Information Security and Privacy Risks in BYOD Environments
Authors: Abubakar Bello Garba, Jocelyn Armarego, David Murray
Full Text [PDF]| Abstract                                        
189-198
37
Title: A Survey On Detection Of Mining Service Information Discovery Using SASF Crawler
Authors: Suganiya.R, Asst.Prof. Haripriya.K
Full Text [PDF]| Abstract                                        
199-202
38
Title: NATURAL LANGUAGE PROCESSING USING ARTIFICIAL INTELLIGENCE
Authors: Unnati Dhavare , Prof. Umesh Kulkarni
Full Text [PDF]| Abstract                                        
203-205
39
Title: A Synthesize Virtual Machine Provisioning Mechanism for Cloud Data Center
Authors: Ganesh Kumar Vishwakarma, Prof. Neelam Sain, Prof. Anjul K S Rai
Full Text [PDF]| Abstract                                        
206-208
40
Title: Automated Self-Billing System Using RFID Technology
Authors: Prachi Bhatwal, Onish Chamoli
Full Text [PDF]| Abstract                                        
209-212
41
Title: Implementation of Storage Tiering Using OpenStack to Improve Data dynamics on Cloud Computing
Authors: Bhagyashri Kulkarni, Varsha Bhosale
Full Text [PDF]| Abstract                                        
213-216
42
Title: Sub-band Coding of Speech Signals using Multirate Signal Processing and comparing the various parameter of different speech signals by corrupting the same speech signal
Authors: Lalitha R Naik, Devaraja Naik R L
Full Text [PDF]| Abstract                                        
217-221
43
Title: A Review On Modern Secure Mosaic Video Generation For Secure Video Transmission
Authors: Mr.Swapnil Patil , Prof.A.A Deshmukh
Full Text [PDF]| Abstract                                        
222-226

NOTE: Authors note that paper cannot be withdrawn at any condition once it is accepted. The Team of IJETTCS advise you, do not submit same article to the multiple journals simultaneously. This may create a problem for you. Please wait for review report which will take maximum 01 to 02 week. 

 

Contact us


International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
ISSN 2278-6856
Frequency : 6 Issues/Year


E-mail: editor@ijettcs.org