Volume & Issue no: Volume 4, Issue 2, March - April 2015
____________________________________________________________________________________________________
S.No. | Title | Page No |
---|---|---|
1
|
Title: Optimization Design of Band Pass Filter in The Infrared Region Authors: Saeed N. Turki DOI:https://doi.org/10.2749/IJETTCS.221.541 Full Text [PDF]| Abstract ![]() |
001-005
|
2
|
Title: Intelligence Techniques for e-government applications Authors: HANAA. M. SAID, MOHAMED HAMDY, RANIA El GOHARY, ABDEL-BADEEH M. SALEM DOI:https://doi.org/10.2749/IJETTCS.222.542 Full Text [PDF]| Abstract ![]() |
006-020
|
3
|
Title: An improved HMF with PDE for Cellular Images Authors: Garima Goyal DOI:https://doi.org/10.2749/IJETTCS.223.544 Full Text [PDF]| Abstract ![]() |
021-023
|
4
|
Title: A Survey on Various Broadcast
Techniques for MANET
Authors: AKSHEET SADARSANIYA, ROHIT SRIVASTAVA DOI:https://doi.org/10.2749/IJETTCS.224.547 Full Text [PDF]| Abstract ![]() |
024-027
|
5
|
Title: DCT Based Grey Scale Still Image Watermarking Using
1-D Walsh Code and Biometric Protection Authors: B.P.Mishra, Dr.H.N.Pratihari, Dr.P.Das DOI:https://doi.org/10.2749/IJETTCS.225.558 Full Text [PDF]| Abstract ![]() |
028-032
|
6
|
Title: PERFORMANCE EVALUATION AND EMISSION CHARACTERISTICS OF A WASTE TRANSFORMER OIL AS AN ALTERNATIVE FUEL FOR DIESEL ENGINE Authors: E SAIDULU , G.S.GURU DATTATREYA DOI:https://doi.org/10.2749/IJETTCS.226.564 Full Text [PDF]| Abstract ![]() |
033-041
|
7
|
Title: IEAACK Implementation of A New Security Intrusion Detection System by Using Hybrid Cryptographic Algorithm for MANET Authors: Ms Priyanka P Kulkarni , Prof G.M.Bhandari DOI:https://doi.org/10.2749/IJETTCS.227.400 Full Text [PDF]| Abstract ![]() |
042-048
|
8
|
Title: Assessing ICT Policy Development and Implementation in Developing Countries: a case study from Morocco Authors: Dr. Driss Kettani DOI:https://doi.org/10.2749/IJETTCS.228.555 Full Text [PDF]| Abstract ![]() |
049-054
|
9
|
Title: A stochastic model for feature extraction in Time Series Data Mining and its Engineering applications using remote sensing technique Authors: R.K Singh, Sunil Bhaskarn DOI:https://doi.org/10.2749/IJETTCS.229.561 Full Text [PDF]| Abstract ![]() |
055-059
|
10
|
Title: S R S for responsive design environment: Generic Medicine Mobile Website -A portal to facilitate updated information about generic medicine Authors: Prof.Chaitali Gadekar DOI:https://doi.org/10.2749/IJETTCS.230.566 Full Text [PDF]| Abstract ![]() |
060-063
|
11
|
Title: NEOTERIC INNOVATION IN GI-FI TECHNOLOGY Authors: Nandhakumar P, Abhishek Pratap Singh DOI:https://doi.org/10.2749/IJETTCS.231.567 Full Text [PDF]| Abstract ![]() |
064-069
|
12
|
Title: Modify Speech Cryptosystem Based on Shuffling Overlapping Blocks Technique Authors: Dr. Hala B.Abdul Wahab, Sundus I. Mahdi DOI:https://doi.org/10.2749/IJETTCS.232.579 Full Text [PDF]| Abstract ![]() |
070-075
|
13
|
Title: FLASHBACK & ARTIFACTS IN IMAGE CLASSIFICATION DESCRIPTORS Authors: Parul Prashar, Amit Kumar DOI:https://doi.org/10.2749/IJETTCS.233.582 Full Text [PDF]| Abstract ![]() |
076-078
|
14
|
Title: Modified Rc4 Dual Key algorithm based on Irreducible Polynomial Authors: Prof. Dr. Abdul Monem Saleh Rahma , Zainab Mohammed Hussein DOI:https://doi.org/10.2749/IJETTCS.234.586 Full Text [PDF]| Abstract ![]() |
079-085
|
15
|
Title: Avoid Women Harassment through Web Browser Authors: Prof.Aniruddha Madhav Phadke DOI:https://doi.org/10.2749/IJETTCS.235.587 Full Text [PDF]| Abstract ![]() |
086-088
|
16
|
Title: The Impact of Mobile and Internet Based Social Network Technologies on Student Education Authors: Mahabaleshwar. S. Kabbur, Savitri K DOI:https://doi.org/10.2749/IJETTCS.236.576 Full Text [PDF]| Abstract ![]() |
089-092
|
17
|
Title: A Novel Biometric Authentication for ATM Security Authors: SWATHY.G .S, RASMI .P .S DOI:https://doi.org/10.2749/IJETTCS.237.589 Full Text [PDF]| Abstract ![]() |
093-097
|
18
|
Title: Digital Signature based secure XML emails Authors: Srushti Arekar, Prajakta Jagtap, Priyanka Jagtap, Sharanya Shivakumar DOI:https://doi.org/10.2749/IJETTCS.238.591 Full Text [PDF]| Abstract ![]() |
098-102
|
19
|
Title: Machine learning In E- Technologies Authors: HANAA. M. SAID, ABDEL-BADEEH M. SALEM DOI:https://doi.org/10.2749/IJETTCS.239.593 Full Text [PDF]| Abstract ![]() |
103-108
|
20
|
Title: Review on various Cyber Crime, Hacker, and Authorities Authors: Ms Divya Sharma DOI:https://doi.org/10.2749/IJETTCS.240.598 Full Text [PDF]| Abstract ![]() |
109-113
|
21
|
Title: NOTES ON AVERAGE QUERY RESPONSE TIME IN DBMS Authors: SARIKA SAINI DOI:https://doi.org/10.2749/IJETTCS.241.599 Full Text [PDF]| Abstract ![]() |
114-116
|
22
|
Title: Image Search Re-ranking based on Prototype Authors: Ms. Deepali.M.Jalkote , Mr.Pravin P.Kalyankar DOI:https://doi.org/10.2749/IJETTCS.242.600 Full Text [PDF]| Abstract ![]() |
117-120
|
23
|
Title: Exploring Different Aspects of Social Network Analysis Using Web Mining Techniques Authors: Hilal Ahmad Khanday, Dr. Rana Hashmy DOI:https://doi.org/10.2749/IJETTCS.243.607 Full Text [PDF]| Abstract ![]() |
121-125
|
24
|
Title: FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE Authors: Bhuvaneswari Thangaraj, S.Umarani , D.Sharmila DOI:https://doi.org/10.2749/IJETTCS.244.608 Full Text [PDF]| Abstract ![]() |
126-132
|
25
|
Title: EFFICIENT INTRUSION DETECTION SYSTEM WITH REDUCED DIMENSIONALITY Authors: Nupur N. Majethiya , Prof. Dipak C. Patel DOI:https://doi.org/10.2749/IJETTCS.245.615 Full Text [PDF]| Abstract ![]() |
133-136
|
26
|
Title: Data Cleaning Using Clustering Based Data Mining Technique Authors: Sujata Joshi, Usha T. DOI:https://doi.org/10.2749/IJETTCS.246.616 Full Text [PDF]| Abstract ![]() |
137-140
|
27
|
Title: A Study on the Behavior of MANET: Along with Research Challenges, Application and Security Attacks Authors: Anil Lamba, Sohan Garg DOI:https://doi.org/10.2749/IJETTCS.247.609 Full Text [PDF]| Abstract ![]() |
141-146
|
28
|
Title: Hindi-English Translation Memory System Authors: Nandita Srivastava, Priya Singh, Sukanya Chauhan, Shashi Pal Singh, Ajai Kumar, Dr. Hemant Darbari DOI:https://doi.org/10.2749/IJETTCS.248.574 Full Text [PDF]| Abstract ![]() |
147-152
|
29
|
Title: Cut Detection and Re-routing in wireless sensor networks Authors: Mrs.Dipali Sonawane , Prof. Alka Khade , Prof. Seema Biday DOI:https://doi.org/10.2749/IJETTCS.249.639 Full Text [PDF]| Abstract ![]() |
153-157
|
30
|
Title: Survey on Different Techniques in SQL to Prepare Dataset for Data Mining Authors: Shaila Eksambekar , Prof. Suhasini Itkar DOI:https://doi.org/10.2749/IJETTCS.250.641 Full Text [PDF]| Abstract ![]() |
158-162
|
31
|
Title: A NEW APPROACH TO SECURITY IN AD HOC NETWORKS Authors: Rashmi Hegde , Dr. H.D.Phaneendra DOI:https://doi.org/10.2749/IJETTCS.251.643 Full Text [PDF]| Abstract ![]() |
163-169
|
32
|
Title: Text Hiding Based On Hue Content In HSV Color Space Authors: Ahmed S. Abdalluh DOI:https://doi.org/10.2749/IJETTCS.252.646 Full Text [PDF]| Abstract ![]() |
170-173
|
33
|
Title: GRAPHICAL BASED PASSWORD USING KEYSTROKE DYNAMIC AUTHENTICATION SYSTEM FOR BANKING APPLICATION Authors: Kajal Birdawade, Varsha Ingale, Manisha Lole, Vrushali Mande, Prof. Mrs. Deepti Nirwal DOI:https://doi.org/10.2749/IJETTCS.253.648 Full Text [PDF]| Abstract ![]() |
174-176
|
34
|
Title: Data Protection in Mac OS X Authors: Neha Setia, Tarun Dalal DOI:https://doi.org/10.2749/IJETTCS.254.655 Full Text [PDF]| Abstract ![]() |
177-180
|
35
|
Title: Active Queue Management in MANETs – A Primer on Network Performance optimization Authors: Shallu Bedi, Gagangeet Singh Aujla, Sahil Vashist DOI:https://doi.org/10.2749/IJETTCS.255.656 Full Text [PDF]| Abstract ![]() |
181-188
|
36
|
Title: A Policy-Based Framework for Managing Information Security and Privacy Risks in BYOD Environments Authors: Abubakar Bello Garba, Jocelyn Armarego, David Murray DOI:https://doi.org/10.2749/IJETTCS.256.660 Full Text [PDF]| Abstract ![]() |
189-198
|
37
|
Title: A Survey On Detection Of Mining Service Information Discovery Using SASF Crawler Authors: Suganiya.R, Asst.Prof. Haripriya.K DOI:https://doi.org/10.2749/IJETTCS.257.661 Full Text [PDF]| Abstract ![]() |
199-202
|
38
|
Title: NATURAL LANGUAGE PROCESSING USING ARTIFICIAL INTELLIGENCE Authors: Unnati Dhavare , Prof. Umesh Kulkarni DOI:https://doi.org/10.2749/IJETTCS.258.663 Full Text [PDF]| Abstract ![]() |
203-205
|
39
|
Title: A Synthesize Virtual Machine Provisioning Mechanism for Cloud Data Center
Authors: Ganesh Kumar Vishwakarma, Prof. Neelam Sain, Prof. Anjul K S Rai DOI:https://doi.org/10.2749/IJETTCS.259.665 Full Text [PDF]| Abstract ![]() |
206-208
|
40
|
Title: Automated Self-Billing System Using RFID Technology Authors: Prachi Bhatwal, Onish Chamoli DOI:https://doi.org/10.2749/IJETTCS.260.671 Full Text [PDF]| Abstract ![]() |
209-212
|
41
|
Title: Implementation of Storage Tiering Using OpenStack to Improve Data dynamics on Cloud Computing Authors: Bhagyashri Kulkarni, Varsha Bhosale DOI:https://doi.org/10.2749/IJETTCS.261.677 Full Text [PDF]| Abstract ![]() |
213-216
|
42
|
Title: Sub-band Coding of Speech Signals using
Multirate Signal Processing and comparing the
various parameter of different speech signals by
corrupting the same speech signal Authors: Lalitha R Naik, Devaraja Naik R L DOI:https://doi.org/10.2749/IJETTCS.262.678 Full Text [PDF]| Abstract ![]() |
217-221
|
43
|
Title: A Review On Modern Secure Mosaic Video
Generation For Secure Video Transmission
Authors: Mr.Swapnil Patil , Prof.A.A Deshmukh DOI:https://doi.org/10.2749/IJETTCS.263.374 Full Text [PDF]| Abstract ![]() |
222-226
|