Volume & Issue no: Volume 3, Issue 6, November - December 2014
____________________________________________________________________________________________________
S.No. | Title | Page No |
---|---|---|
1
|
Title: STUDY THE REFLECTANCE OF DIELECTRIC COATING FOR THE VISIBLESPECTRUM
Authors: ZenaE.Slaiby and Saeed N. Turki DOI:https://doi.org/10.2749/IJETTCS.113.268 Full Text [PDF]| Abstract ![]() |
001-004
|
2
|
Title: Comparison of Ant-Net, Honeybee and SRAAA Protocols in MANETs Authors: Capt. Dr. S. Santhosh Baboo, V J Chakravarthy DOI:https://doi.org/10.2749/IJETTCS.114.270 Full Text [PDF]| Abstract ![]() |
005-013
|
3
|
Title: Low Power Transmission of Images over Wireless Channel Authors: Sarala Shirabadagi , G C Somashekar DOI:https://doi.org/10.2749/IJETTCS.115.273 Full Text [PDF]| Abstract ![]() |
014-018
|
4
|
Title: Intrusion Detection System by Cascading K-Means Clustering & C4.5, FNN, SVM Classifier Authors: Miss Meghana Solanki, Prof. Mrs. Vidya Dhamdhere DOI:https://doi.org/10.2749/IJETTCS.116.274 Full Text [PDF]| Abstract ![]() |
019-023
|
5
|
Title: Providing Privacy for Composition Results in Web Service Using Data Anonymization Authors: T.Manikandan and K.Palanivel DOI:https://doi.org/10.2749/IJETTCS.117.278 Full Text [PDF]| Abstract ![]() |
024-028
|
6
|
Title: Shortest Path in WSN to detect the Abnormal Packet for saving Energy and Efficient Data Collection using AODV Authors: Rajan kakkar, Surender Singh DOI:https://doi.org/10.2749/IJETTCS.118.280 Full Text [PDF]| Abstract ![]() |
029-032
|
7
|
Title: Study of Low Rate Denial of Service (LDoS) attacks on Random Early Detection (RED) Authors: Prashant Viradiya, Divyarajsinh Vaghela and Dharmesh Dhangar DOI:https://doi.org/10.2749/IJETTCS.119.282 Full Text [PDF]| Abstract ![]() |
033-035
|
8
|
Title: A Survey on Dimensionality Reduction Technique Authors: V. Arul Kumar, N. Elavarasan, DOI:https://doi.org/10.2749/IJETTCS.120.297 Full Text [PDF]| Abstract ![]() |
036-041
|
9
|
Title: Image Denoising for different noise models by various filters: A Brief Survey Authors: Vijayalakshmi. A, Titus.C and Lilly Beaulah.H DOI:https://doi.org/10.2749/IJETTCS.121.310 Full Text [PDF]| Abstract ![]() |
042-045
|
10
|
Title: Security Issues and Key Management in WiMAX Authors: Ravinder Kumar, Veepin Kumar DOI:https://doi.org/10.2749/IJETTCS.122.312 Full Text [PDF]| Abstract ![]() |
046-051
|
11
|
Title: CAMPUS NETWORK SECURITY AND MANAGEMENT Authors: S. Sudharsan, M. Naga Srinivas, G. Sai Shabareesh, P.Kiran Rao DOI:https://doi.org/10.2749/IJETTCS.123.317 Full Text [PDF]| Abstract ![]() |
052-056
|
12
|
Title: Periodic Cargo balancing for multifarious entity network Authors: FARZEEN BASITH DOI:https://doi.org/10.2749/IJETTCS.124.319 Full Text [PDF]| Abstract ![]() |
057-060
|
13
|
Title: Dimension Modeling Techniques in Business Intelligence Authors: Divya Sharma DOI:https://doi.org/10.2749/IJETTCS.125.322 Full Text [PDF]| Abstract ![]() |
061-064
|
14
|
Title: Top-K Dominating Queries Using Multidimensional Data Authors: Ms. M. Sivakani , Ms. M. Pabitha and Ms. K. Sumithra Devi DOI:https://doi.org/10.2749/IJETTCS.126.324 Full Text [PDF]| Abstract ![]() |
065-069
|
15
|
Title: An analysis of Wireless Sensor Networks Scheduled Based MAC Protocol for Assign Transmission & Reception Opportunities Authors: Amitesh Jaiswal , Swati Jaiswal, Bhagyashree Patle DOI:https://doi.org/10.2749/IJETTCS.127.326 Full Text [PDF]| Abstract ![]() |
070-074
|
16
|
Title: Improved Method for License Plate Recognition for Indian Road Conditions Authors: Poonam SKolhe, Geeta Salunke DOI:https://doi.org/10.2749/IJETTCS.128.332 Full Text [PDF]| Abstract ![]() |
075-079
|
17
|
Title: Fast Generation of Video Panorama Authors: Saif Salah Abood, Abdulamir Abdullah Karim DOI:https://doi.org/10.2749/IJETTCS.129.334 Full Text [PDF]| Abstract ![]() |
080-084
|
18
|
Title: Hierarchical Clustering Approach for Monitoring and Securing the Data in E-Government Systems
Authors: Hanaa. M. Said, Mohamed Hamdy, Rania El Gohary and Abdel-Badeeh M. Salem DOI:https://doi.org/10.2749/IJETTCS.130.338 Full Text [PDF]| Abstract ![]() |
085-091
|
19
|
Title: BUILDING ENCRYPTED DATA OVER MAS BY ACHIEVING DATA CONFIDENTIALITY Authors: V.MUTHURANI, A.Lourdes Mary DOI:https://doi.org/10.2749/IJETTCS.131.342 Full Text [PDF]| Abstract ![]() |
092-097
|
20
|
Title: HARMONIC ANALYSIS AND THD
CALCULATION OF TRAPEZOIDAL PWM
TECHNIQUE BY FFT TOOLS Authors: Jayanta Kumar Sahu , Prafulla Kumar Sahoo, Chinmayee Bhoi DOI:https://doi.org/10.2749/IJETTCS.132.343 Full Text [PDF]| Abstract ![]() |
098-100
|
21
|
Title: Classification of Microarray Samples using Attribute Clustering Authors: K. R. SARANYAA, N. SUNDARAM DOI:https://doi.org/10.2749/IJETTCS.133.347 Full Text [PDF]| Abstract ![]() |
101-103
|
22
|
Title: A Review on Various Techniques for automatic Question Generation Authors: Ramandeep Kaur, Shilpy Bansal DOI:https://doi.org/10.2749/IJETTCS.134.348 Full Text [PDF]| Abstract ![]() |
104-106
|
23
|
Title: Performance Evaluation of Decision Trees for
Uncertain Data Mining Authors: Ms. Kiran Dhandore, Dr. Lata Ragha DOI:https://doi.org/10.2749/IJETTCS.135.351 Full Text [PDF]| Abstract ![]() |
107-111
|
24
|
Title: PERFORMANCE ANALYSIS OF VARIOUS TRANSFORM CODING TECHNIQUES USING PSNR VALUES Authors: Dr.S.Narayanan DOI:https://doi.org/10.2749/IJETTCS.136.352 Full Text [PDF]| Abstract ![]() |
112-114
|
25
|
Title: RECOMMENDATION WITH DATA MINING ALGORITHMS FOR E-COMMERCE AND M-COMMERCE APPLICATIONS Authors: Ashfaq Amir Shaikh, Dr. Gulabchand K. Gupta DOI:https://doi.org/10.2749/IJETTCS.137.357 Full Text [PDF]| Abstract ![]() |
115-118
|
26
|
Title: Cyber Crime: Challenges and its Classification Authors: Dr. Ajeet Singh Poonia DOI:https://doi.org/10.2749/IJETTCS.138.360 Full Text [PDF]| Abstract ![]() |
119-121
|
27
|
Title: A survey of various algorithms in congestion detection in vanet Authors: Disha Shrivastava , Arun Agrawal DOI:https://doi.org/10.2749/IJETTCS.139.364 Full Text [PDF]| Abstract ![]() |
122-126
|
28
|
Title: A Digital Certification Technique to Message
Authentication and Source Privacy in Wireless
Sensor Networks Authors: Sri Divya Chinta, Satyanarayana Gandi And Amarendra Kothalanka DOI:https://doi.org/10.2749/IJETTCS.140.368 Full Text [PDF]| Abstract ![]() |
127-130
|
29
|
Title: OBJECT TRACKING BACKGROUND SUBSTRACTION TECHNIQUES FOR ROBUST SCENES
Authors: A. Mallareddy, G.Raghavendra , R.Chandra Shekar DOI:https://doi.org/10.2749/IJETTCS.141.327 Full Text [PDF]| Abstract ![]() |
131-133
|
30
|
Title: Perspectives in Multi-cloud Computing Emerging Framework and Multi-domain Services
Authors: A. Mallareddy, T. Vighneshwar, D Deepika Rani DOI:https://doi.org/10.2749/IJETTCS.142.328 Full Text [PDF]| Abstract ![]() |
134-140
|
31
|
Title: Enabling public verification and privacy preserving audit for secure cloud storage
Authors: A. Mallareddy, U.Venkateshwarlu, D Deepika Rani DOI:https://doi.org/10.2749/IJETTCS.143.329 Full Text [PDF]| Abstract ![]() |
141-146
|
32
|
Title: Feature Analysis using Spiking Neurons with Improved PCA appoach for Hand Gesture Recognition Authors: Nisha Kumari, Roopali Garg, Inderdeep Aulakh DOI:https://doi.org/10.2749/IJETTCS.144.344 Full Text [PDF]| Abstract ![]() |
147-150
|
33
|
Title: A Novel Approach to Secure Browser API in Cloud Computing Using HTTPS, MD5 and RSA Authors: Harsha Dewani, Randeep Kaur DOI:https://doi.org/10.2749/IJETTCS.145.355 Full Text [PDF]| Abstract ![]() |
151-155
|
34
|
Title: An Assessment of the Usability of the Africa University Digital Library, Mutare, Zimbabwe Authors: Prof Nelson Jagero (PhD) , Collen Nhendo , Nevermore Sithole , Collence Takaingenhamo Chisita and Nelson Guvava DOI:https://doi.org/10.2749/IJETTCS.146.356 Full Text [PDF]| Abstract ![]() |
156-161
|
35
|
Title: Development of MBP for AVR Based Controlled Autonomous Vehicle Authors: Ms.D.S.Nikam, Dr.S.T.Gandhe , Ms.J.N.Phasale DOI:https://doi.org/10.2749/IJETTCS.147.370 Full Text [PDF]| Abstract ![]() |
162-166
|
36
|
Title: MEASURING SEMANTIC SIMILARITY BETWEEN WORDS AND IMPROVING WORD SIMILARITY BY AUGMENTING PMI Authors: KAMATCHI. M, SUNDARAM. N DOI:https://doi.org/10.2749/IJETTCS.148.371 Full Text [PDF]| Abstract ![]() |
167-171
|
37
|
Title: Research Challenges and Performance of Clustering Techniques to Analyze NSL-KDD Dataset Authors: Dr Y.P. Raiwani and Shalesh Singh Panwar DOI:https://doi.org/10.2749/IJETTCS.149.375 Full Text [PDF]| Abstract ![]() |
172-177
|
38
|
Title: Design and Analysis of Microwave Planar Band Pass Filter for WiMAX Application Authors: Avishek Das, Avisankar Roy, Kushal Roy, Amit Bhattacharyya, Dibyendu Chowdhury DOI:https://doi.org/10.2749/IJETTCS.151.383 Full Text [PDF]| Abstract ![]() |
185-188
|
39
|
Title: Design and Study of Security Model for Core Financial System Authors: Vaibhav R. Bhedi, Shrinivas P. Deshpande and Ujwal A. Lanjewar DOI:https://doi.org/10.2749/IJETTCS.152.384 Full Text [PDF]| Abstract ![]() |
189-193
|
40
|
Title: Two Algorithms for Minimizing Crosstalk in Two-Layer Channel Routing Authors: Achira Pal, Tarak Nath Mandal, Abhinandan Khan, Rajat Kumar Pal, Alak Kumar Datta, and Atal Chaudhuri DOI:https://doi.org/10.2749/IJETTCS.153.387 Full Text [PDF]| Abstract ![]() |
194-204
|
41
|
Title: Enhanced Online Signature Verification System Authors: Joslyn Fernandes, Nishad Bhandarkar DOI:https://doi.org/10.2749/IJETTCS.154.402 Full Text [PDF]| Abstract ![]() |
205-209
|
42
|
Title: Realization of Balanced Current Conveyor Based Voltage mode Universal Filter Authors: Amit Bhattacharyya, Avishek Das, Avisankar Roy, Suman Paul, Dipak Samanta DOI:https://doi.org/10.2749/IJETTCS.155.404 Full Text [PDF]| Abstract ![]() |
210-212
|
43
|
Title: Spoofing Attacks Detection and Localizing Multiple Adversaries in Wireless Networks: A Review
Authors: Pallavi D.Sontakke, Prof.Dr.C.A.Dhote DOI:https://doi.org/10.2749/IJETTCS.156.405 Full Text [PDF]| Abstract ![]() |
213-220
|
44
|
Title: Study of Mining and Hiding of Sensitive Association Rule Authors: Shintre Sonali Sambhaji, Prof. Kalyankar Pravin P. DOI:https://doi.org/10.2749/IJETTCS.157.406 Full Text [PDF]| Abstract ![]() |
221-226
|
45
|
Title: Design And Implementation of a System for Denial of Service Attack Detection Based on Multivariate Correlation Analysis: A Review Authors: Priti G. Harne, Prof.Ms.V.M.Deshmukh DOI:https://doi.org/10.2749/IJETTCS.158.407 Full Text [PDF]| Abstract ![]() |
227-234
|
46
|
Title: Load Balancing and Process Management over Grid Computing Authors: Javed hussain, Durgesh Kumar Mishra DOI:https://doi.org/10.2749/IJETTCS.159.408 Full Text [PDF]| Abstract ![]() |
235-238
|
47
|
Title: A REVIEW OF METHODOLOGIES FOR TESTING AND LOCATING FAULTS IN INTEGRATED CIRCUITS Authors: R. H. Khade, D.S. Chaudhari DOI:https://doi.org/10.2749/IJETTCS.160.409 Full Text [PDF]| Abstract ![]() |
239-241
|
48
|
Title: PRIVACY PRESERVATION AND PUBLIC AUDITING FOR CLOUD DATA USING ASS Authors: Dr. J. SUGANTHI, ANANTHI J, S. ARCHANA DOI:https://doi.org/10.2749/IJETTCS.161.411 Full Text [PDF]| Abstract ![]() |
242-247
|
49
|
Title: Security and Privacy Issues in Healthcare Information
System Authors: Bipin Kumar Rai, A. K. Srivastava DOI:https://doi.org/10.2749/IJETTCS.162.413 Full Text [PDF]| Abstract ![]() |
248-252
|
50
|
Title: EMBEDDED SYSTEM BASED
MONITORING AND CONTROL SYSTEM
OF SUBMERSIBLE PUMP
Authors: N.PRAKASH , D.SWATHIKA DOI:https://doi.org/10.2749/IJETTCS.163.415 Full Text [PDF]| Abstract ![]() |
253-256
|
51
|
Title: Improved approach for Logo Detection and Recognition Authors: Prof. Mrunalinee Patole, Meera Sambhaji Sawalkar DOI:https://doi.org/10.2749/IJETTCS.164.416 Full Text [PDF]| Abstract ![]() |
257-261
|
52
|
Title: Design a New Cryptographic Algorithm for Development of secure real-time password enabled exchange communication for Indian Armed Forces Authors: Arun Singh Chouhan and Bipin Pandey DOI:https://doi.org/10.2749/IJETTCS.165.420 Full Text [PDF]| Abstract ![]() |
262-264
|
53
|
Title: SURVEY ON TYPES OF THREATS DUE TO RAP AND SOLUTIONS IN IEEE 802.11 WLAN Authors: Mr. Ganesh B. Bandal, Prof. Vidya S. Dhamdhere DOI:https://doi.org/10.2749/IJETTCS.166.421 Full Text [PDF]| Abstract ![]() |
265-268
|
54
|
Title: A Survey on Detection of Shill Reviews by Measuring its Linguistic Features Authors: Sarika S. Nalawade, Ms. S. S. Pawar DOI:https://doi.org/10.2749/IJETTCS.167.422 Full Text [PDF]| Abstract ![]() |
269-272
|
55
|
Title: Stress management with Music Therapy Authors: Sougata Das and Ayan Mukherjee DOI:https://doi.org/10.2749/IJETTCS.168.423 Full Text [PDF]| Abstract ![]() |
273-277
|
56
|
Title: Understanding of Energy efficiency in cloud computing Authors: Ms Jayshri Damodar Pagare,Dr. Nitin A Koli DOI:https://doi.org/10.2749/IJETTCS.169.424 Full Text [PDF]| Abstract ![]() |
278-282
|
57
|
Title: Efficiency and Performance Evaluation of IERF MANET Routing Protocol Authors: Dr. P. R. Gundalwar, Dr. V. N. Chavan DOI:https://doi.org/10.2749/IJETTCS.170.425 Full Text [PDF]| Abstract ![]() |
283-286
|
58
|
Title: Simulation of MANET Routing Protocols DSDV, DSR and AODV for different Mobility Models Authors: Manjusha S. Patil Bokade , Prof. M.N.Thakare , Prof. B. J. Chilke DOI:https://doi.org/10.2749/IJETTCS.171.426 Full Text [PDF]| Abstract ![]() |
287-295
|
59
|
Title: Review on Label Refinement of Web Facial Images Authors: Mayuri M. Ejgar, Sonali P. Dhawan , Jalindar N. Ekatpure, Pooja R. Kadam DOI:https://doi.org/10.2749/IJETTCS.172.410 Full Text [PDF]| Abstract ![]() |
296-299
|