Call of Papers for Current Volume ********************OnLine Paper Submission for Current Volume

Volume & Issue no: Volume 4, Issue 6, November - December 2015

____________________________________________________________________________________________________

S.No. Title Page No
1
Title: A Survey Paper OnAutomated Attendance System
Authors: Mayank Rahate, Priyanka Auti, Bhargav Kulkarni, Suraj Mayande
Full Text [PDF]| Abstract                                        
001-004
2
Title: IMPACT OF TRUST, PRIVACY AND SECURITY IN FACEBOOK INFORMATION SHARING
Authors: JithiKrishna P P, Suresh Kumar R, Sreejesh V K
Full Text [PDF]| Abstract                                        
005-009
3
Title: Adjoint Operators of Fourier-Finite Mellin Transform
Authors: V. D. Sharma, A. N. Rangari
Full Text [PDF]| Abstract                                        
010-013
4
Title: SURVEY ON EYE WITNESS TRACKING USING API
Authors: PROF. GANESH GOURSHETTE , NISARG KAHANE, SUSHRUT KAMATH , VISHAKH NARKAR, SIDDHANT SANKHE
Full Text [PDF]| Abstract                                        
014-016
5
Title: Analysis of Technological FactorsInfluencing Adoption of ICT in Public Secondary Schools in Kenya
Authors: Bernard G. Gakenga, Joyce W. Gikandi, John W. Kamau
Full Text [PDF]| Abstract                                        
017-031
6
Title: THE STUDY OF GENERAL MAINTENANCE AND SAFETY PRACTICES IN INDUSTRIES OF KERALA
Authors: Beena Puthillath, Dr. M. Bhasi, Dr. C.A. Babu
Full Text [PDF]| Abstract                                        
032-038
7
Title: An Edge based 3D Facial Expressions Detection System
Authors: A.N.V.Susmitha, Mr. K.Srinivas
Full Text [PDF]| Abstract                                        
039-043
8
Title: PROPOSED ARCHITECTURE ON- A HYBRID APPROACH FOR LOAD BALANCING WITH RESPECT TO TIME IN CONTENT DELIVERY NETWORK
Authors: Prof. Prashant Rewagad, Miss Archana Chitte
Full Text [PDF]| Abstract                                        
044-046
9
Title: A Survey on Detection and Prevention of Black Hole Attack in MANET
Authors: Shridevi.K , Sudha.S
Full Text [PDF]| Abstract                                        
047-051
10
Title: A Survey on Detection of Packet Dropping Attacks in Wireless Adhoc Network
Authors: shridevi K , Naziya Parveen
Full Text [PDF]| Abstract                                        
052-057
11
Title: Review paper on Cloud Computing
Authors: Seema Sharma, Jyoti Godara
Full Text [PDF]| Abstract                                        
058-061
12
Title: Insight into a survey of Security Challenges and Solutions in Cloud Computing
Authors: K. SATYANARAYANA
Full Text [PDF]| Abstract                                        
062-067
13
Title: A SURVEY ON SOFTWARE TESTING
Authors: Kuljeet Kaur , Shilpa Sharma
Full Text [PDF]| Abstract                                        
068-071
14
Title: Certainty Based Privacy Service Mechanism based on Key Policy Behavioral Based Encryption
Authors: Neha Mourya, Margi Patel
Full Text [PDF]| Abstract                                        
072-076
15
Title: A hybrid method of prediction based on Soft Computing Techniques
Authors: R.K.Srivastava, Atib Khan
Full Text [PDF]| Abstract                                        
077-083
16
Title: An Insight on Big Data Analytics Using Pig Script
Authors: J.Ramsingh, Dr V.Bhuvaneswari
Full Text [PDF]| Abstract                                        
084-090
17
Title: Image steganography for data hiding using huffman code, Zigzag and OPAP
Authors: Ketaki Bhaskar, Mitali Bakale, Priyanka Chaure, Priti Shirke
Full Text [PDF]| Abstract                                        
091-093
18
Title: COGNITIVE RADIO NETWORKS: A SURVEY
Authors: Anusha M, Dr. V. Srikanth
Full Text [PDF]| Abstract                                        
094-098
19
Title: Enhanced Face Detection and Tracking In Video Sequence Using Fuzzy Face Model and Sparse Representation Technique
Authors: Manjunatha Hiremath, P. S. Hiremath
Full Text [PDF]| Abstract                                        
099-104
20
Title: A Study of Knowledge Seeking through Electronic Knowledge Repositories among Sri Lankan IT Professionals
Authors: Khwaja M. Abdul-Cader, Gapar Md. Johar
Full Text [PDF]| Abstract                                        
105-114
21
Title: A Comparison of Factors Influencing Knowledge Sharing through EKR among Sri Lankan and Singaporean Knowledge Workers
Authors: Khwaja M. Abdul-Cader, Gapar Md. Johar
Full Text [PDF]| Abstract                                        
115-121
22
Title: Security Analysis of NFC Technology Compared with other Mobile Wireless Technologies
Authors: Ahmed H. Ali, Reham Abdellatif Abouhogail, Ibrahim F. Tarrad, Mohamed I. Youssef
Full Text [PDF]| Abstract                                        
122-129
23
Title: USING TIME SERIES TO PREDICT STOCK PRICES ON THE STOCKGHANA EXCHANGE
Authors: Emmanuel Kwame Mensah, Joseph Kweku Arthur
Full Text [PDF]| Abstract                                        
130-141
24
Title: Architecture of Mobile Cloud Computing and Middleware
Authors: Chanky Swami, Nishant Anand
Full Text [PDF]| Abstract                                        
142-144
25
Title: A study of WAN design, routing protocols and connectivity between Head office to Branch office
Authors: Dr. Anil Kumar Singh
Full Text [PDF]| Abstract                                        
145-152
26
Title: Novel Method for the Detection of Wormhole Attack in Delay Tolerant Network
Authors: Jyothi D G, Ajay Kumar S N, Dr.Chandra shekara S N
Full Text [PDF]| Abstract                                        
153-157
27
Title: CROSS DATABASE MANIPULATOR USING COMMON INTERFACE
Authors: Mr. Omkar Singh, Dr. S. K. Singh, Pranoti Hatkar,Tanvi Sawant,Siddhi Satam
Full Text [PDF]| Abstract                                        
158-163
28
Title: Review on Scheduling and Resource Allocation Management Techniques in Ad-hoc and Wimax networks
Authors: Mohamed Ahmed, Dr. W. Jeberson
Full Text [PDF]| Abstract                                        
164-176
29
Title: ANALYTICAL STUDY ON INTRUSION DETECTION AND PREVENTION SYSTEM
Authors: Sonal Paliwal, Rajesh Shyam Singh, H. L. Mandoria
Full Text [PDF]| Abstract                                        
177-182
30
Title: Searching issues: a survey on data exploration techniques
Authors: Anna Lisa Guido, Roberto Paiano, Andrea Pandurino, Stefania Pasanisi
Full Text [PDF]| Abstract                                        
183-188
31
Title: UPDRS tracking using linear regression and neural network for Parkinson’s disease prediction
Authors: Elmehdi BENMALEK, Jamal ELMHAMDI, Abdelilah JILBAB
Full Text [PDF]| Abstract                                        
189-193
32
Title: Visual semantic web based image Re-ranking for effective search engine
Authors: Mr.Sandesh Keshav Pawaskar
Full Text [PDF]| Abstract                                        
194-196
33
Title: Simulation Study on Direct Torque Control of Induction Motor using Neural Network
Authors: Siraj Ahmed T, Dr.S Sao, Dr. Anjaneyulu K S R
Full Text [PDF]| Abstract                                        
197-201
34
Title: Comparative analysis of protocols used for improving performance of TCP over AD-HOC networks
Authors: Aniket Deshpande, Dr. Ashok Kaushal
Full Text [PDF]| Abstract                                        
202-206
35
Title: Segment based watermarking in 3D triangular mesh
Authors: Lokendra Kumar Sharma, Dr. D. B. Ojha
Full Text [PDF]| Abstract                                        
207-212
36
Title: Cloud security through Intrusion Detection System (IDS): Review of Existing Solutions
Authors: Yakuta tayyebi, Dr D.S Bhilare
Full Text [PDF]| Abstract                                        
213-215
37
Title: A Study of Privacy Preserving Methods for kNN Computation on Encrypted Data
Authors: Gaikwad Vijayendra Sanjay, Dr. Khan Rahat Afreen
Full Text [PDF]| Abstract                                        
216-221
38
Title: Assessment of Noise Removal Methods in Image - A Survey
Authors: Swati Khaira
Full Text [PDF]| Abstract                                        
222-225

NOTE: Authors note that paper cannot be withdrawn at any condition once it is accepted. The Team of IJETTCS advise you, do not submit same article to the multiple journals simultaneously. This may create a problem for you. Please wait for review report which will take maximum 01 to 02 week. 

 

Contact us


International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
ISSN 2278-6856
Frequency : 6 Issues/Year


E-mail: editor@ijettcs.org