Volume & Issue no: Volume 6, Issue 2, March - April 2017
____________________________________________________________________________________________________
S.No. | Title | Page No |
---|---|---|
1
|
Title: Design and Implementation of Automotive Security System by ARM Processor using Gabor Wavelet filter Authors: P. BHAVANI SANKAR, K. KALYANI DOI:https://doi.org/10.2749/IJETTCS.606.1488 Full Text [PDF]| Abstract ![]() |
001-005
|
2
|
Title: Heterogeneous Network Resource Allocation using Improved 0-1 Knapsack Problem Authors: Asst. Prof. Dr. Maha A. Alrawi, Dr. Israa Tahseen Ali, Olaa Amer Saied DOI:https://doi.org/10.2749/IJETTCS.607.1489 Full Text [PDF]| Abstract ![]() |
006-009
|
3
|
Title: Improving Usability of Narrative Educational Software: An analysis of gender differences Authors: Mohammed Alameer, Thamer Alhussain DOI:https://doi.org/10.2749/IJETTCS.608.1490 Full Text [PDF]| Abstract ![]() |
010-014
|
4
|
Title: A Survey of Intelligent Surveillance Systems Authors: Dr. Abdulamir A. Karim, Narjis Mezaal Shati DOI:https://doi.org/10.2749/IJETTCS.609.1492 Full Text [PDF]| Abstract ![]() |
015-020
|
5
|
Title: Microcontroller based Automated Attendance System for Employees using Zigbee Module Authors: Dr. Madhukar S. Chavan, Mr. Sunil A. Patil DOI:https://doi.org/10.2749/IJETTCS.610.1494 Full Text [PDF]| Abstract ![]() |
021-025
|
6
|
Title: Experimental Study on GFRC Beam Reinforced With GFRP Rebar Under Flexure Authors: Yuvasankar.R, Dr.Nandini Devi.G DOI:https://doi.org/10.2749/IJETTCS.611.1505 Full Text [PDF]| Abstract ![]() |
026-035
|
7
|
Title: AFM(Adaptive focus measure) with B-spline polynomial for Image Depth estimation Authors: K.Kanthamma , Dr.S.A.K.Jilani DOI:https://doi.org/10.2749/IJETTCS.612.1497 Full Text [PDF]| Abstract ![]() |
036-039
|
8
|
Title: Comparative Study of Various CPU Scheduling Algorithm Authors: Sumit Kumar Nager, Nasib Singh Gill DOI:https://doi.org/10.2749/IJETTCS.613.1498 Full Text [PDF]| Abstract ![]() |
040-045
|
9
|
Title: ANALYZING AND PERFORMING PRIVACY PRESERVING DATA MINING ON ELECTRONIC HEALTH RECORDS Authors: Mrs. G Jayalakshmi (Ph.D), V.N.V. Srikanth, V. Ramya Devi, T. Kalyan Babu, V. Rajitha DOI:https://doi.org/10.2749/IJETTCS.614.1499 Full Text [PDF]| Abstract ![]() |
046-050
|
10
|
Title: Fortified HoneyWall: Virtual Honeypots to Detect and Prevent Distributed Denial of Services Attack Authors: Sonal Sinha DOI:https://doi.org/10.2749/IJETTCS.615.1500 Full Text [PDF]| Abstract ![]() |
051-054
|
11
|
Title: Combining keystroke and mouse dynamics for user authentication Authors: Swati Gurav, Rutuja Gadekar, Snehal Mhangore DOI:https://doi.org/10.2749/IJETTCS.616.1506 Full Text [PDF]| Abstract ![]() |
055-058
|
12
|
Title: Outsourced Revocation for Security Mechanism in Cloud Computing Using Identity-Based Encryption Authors: K.Durgacharan, R.Bhanu Tejaswini, P.Dharmaja, U.Sai Kowshik, V.Yeseswi DOI:https://doi.org/10.2749/IJETTCS.617.1541 Full Text [PDF]| Abstract ![]() |
059-061
|
13
|
Title: Analyzing Youtube Data Using K Means Clustering Authors: G. Ravali, P.Swathi Moulika, A.A parna, J.Abhinaya, T.Anuradha DOI:https://doi.org/10.2749/IJETTCS.618.1519 Full Text [PDF]| Abstract ![]() |
062-066
|
14
|
Title: Primary User Emulation Attack (PUEA) Analysis in Cognitive Radio Network.
Authors: P.S Dinesh, S. Dinesh, S. Tephillah, A.M. Balamurugan. DOI:https://doi.org/10.2749/IJETTCS.619.1507 Full Text [PDF]| Abstract ![]() |
067-071
|
15
|
Title: USING MATLAB BASED SIMULATION IN ORDER TO IMPLEMENT BIOMETRIC SECRUTIY PALM PRINT RECOGNITION Authors: Monika Kumari, Dr. Balkishan DOI:https://doi.org/10.2749/IJETTCS.620.1513 Full Text [PDF]| Abstract ![]() |
072-076
|
16
|
Title: Facial Expression emoticons based on real time video Authors: Mr.Kushal Palli, Prof.Zakir Shaikh DOI:https://doi.org/10.2749/IJETTCS.621.1514 Full Text [PDF]| Abstract ![]() |
077-079
|
17
|
Title: COLLISION AVOIDANCE AND DRIVE SAFE SYSTEM Authors: P.Koteswara Rao, Y.Murali Phani Krishna, D.S.Sairam, I.A.V.Adithya, Sk.Mastanvalli DOI:https://doi.org/10.2749/IJETTCS.622.1520 Full Text [PDF]| Abstract ![]() |
080-083
|
18
|
Title: E-commerce And Brick-and-mortar Retail – A Study for online purchase of Smartphones
Authors: Chitrao Pradnya , Debgupta Sanchari , Bhandarkar Rashmi , Phirke Disha DOI:https://doi.org/10.2749/IJETTCS.623.1521 Full Text [PDF]| Abstract ![]() |
084-086
|
19
|
Title: INTRA VEHICULAR COMMUNICATION BY USING LIFI FOR PRE-EMPITIVE COLLISION AVODIANCE Authors: P.KOTESWARA RAO, M.PRATHIBHA, K.SAI PRASANNA,I .SOWJANYA DOI:https://doi.org/10.2749/IJETTCS.624.1523 Full Text [PDF]| Abstract ![]() |
087-091
|
20
|
Title: AN ASYNCHRONOUS LOW POWER VITERBI DECODER Authors: KANDULA RAMA RAO,R.JAHNAVI, CH.JAYASRI, B.KUNDANA VALLI, K.TRIVENI DOI:https://doi.org/10.2749/IJETTCS.628.1527 Full Text [PDF]| Abstract ![]() |
092-096
|
21
|
Title: Online Feedback Analysis Using Sentiment Analyzer Authors: Abhishek Redekar, Sanket Metker, Harshada Shirole, Gayatri Pawar, Prof. Ms. S.S.Pophale DOI:https://doi.org/10.2749/IJETTCS.629.1532 Full Text [PDF]| Abstract ![]() |
097-101
|
22
|
Title: Towards An Approach of Ontological Coreference Resolution for Sentiment Analysis Authors: Le Thi Thuy, Vo Thanh Hung, Mai Duc Trung, Quan Thanh Tho, Phan Thi Tuoi DOI:https://doi.org/10.2749/IJETTCS.630.1533 Full Text [PDF]| Abstract ![]() |
102-112
|
23
|
Title: Fog Computing: Characteristics and Challenges Authors: Shabnam Kumari, Surender Singh, Radha DOI:https://doi.org/10.2749/IJETTCS.631.1524 Full Text [PDF]| Abstract ![]() |
113-117
|
24
|
Title: Design Trends in Cyber Security with Combined Approach Authors: Sandeep Kulkarni , Dr. K. P. Yadav DOI:https://doi.org/10.2749/IJETTCS.632.1529 Full Text [PDF]| Abstract ![]() |
118-120
|
25
|
Title: Integrating the IoT with Cloud Authors: D Arun Kumar Reddy, N Venkata Vinod Kumar, G Sailaja DOI:https://doi.org/10.2749/IJETTCS.633.1530 Full Text [PDF]| Abstract ![]() |
121-123
|
26
|
Title: Key-Aggregate Cryptosystem for Data Sharing In Cloud Storage Authors: Vasundhara Karale, Kiran Shelar, Monika Ganjewar, Akhtar Shaikh, Prof.Ms.S.S.Pophale DOI:https://doi.org/10.2749/IJETTCS.634.1537 Full Text [PDF]| Abstract ![]() |
124-128
|
27
|
Title: Design of 16 bit 180nm CMOS Fully Segmented DAC Authors: Neha Gulati DOI:https://doi.org/10.2749/IJETTCS.635.1543 Full Text [PDF]| Abstract ![]() |
129-131
|
28
|
Title: Spark Streaming through Dynamic Batch Sizing Authors: Unnati Tandel, Shyam Deshmukh, Vatika Sharma DOI:https://doi.org/10.2749/IJETTCS.636.1550 Full Text [PDF]| Abstract ![]() |
132-135
|
29
|
Title: DISTANCE k-DOMINATION PARAMETER OF SOME GRAPHS AND ITS REALISATION Authors: B.Stephen John, C.T.Brigitha DOI:https://doi.org/10.2749/IJETTCS.637.1522 Full Text [PDF]| Abstract ![]() |
136-138
|
30
|
Title: Role of COOJA Simulator in IoT Authors: B. Sobhan babu, P. Lakshmi Padmaja, T. Ramanjaneyulu, I. Lakshmi Narayana, K.Srikanth DOI:https://doi.org/10.2749/IJETTCS.638.1554 Full Text [PDF]| Abstract ![]() |
139-143
|
31
|
Title: ANALYSIS OF BLACK HOLE ATTACK ON AD HOC NETWORKS USING VARIOUS MOBILE AD HOC NETWORK ROUTING PROTOCOLS Authors: Dr. CHANDRA NAIK M, Dr.G.SAMBASIVA RAO DOI:https://doi.org/10.2749/IJETTCS.639.1557 Full Text [PDF]| Abstract ![]() |
144-149
|
32
|
Title: Improving Resource Management & Solving Scheduling Problem in Data Warehouse Using OLAP & OLTP Authors: Rekha, Dr. Rajendar Singh Chhillar DOI:https://doi.org/10.2749/IJETTCS.640.1559 Full Text [PDF]| Abstract ![]() |
150-154
|
33
|
Title: Enhancing Clustering Mechanism by Implementation of EM Algorithm for Gaussian Mixture Model
Authors: Jyoti, Dr. Rajendar Singh Chhillar DOI:https://doi.org/10.2749/IJETTCS.641.1560 Full Text [PDF]| Abstract ![]() |
155-158
|
34
|
Title: Designing of an Adaptive Filter in Digital Hearing-Aids for Noise Cancellation Authors: J.Anit Presencia, Dr.K.Meena Alias Jeyanthi DOI:https://doi.org/10.2749/IJETTCS.642.1561 Full Text [PDF]| Abstract ![]() |
159-162
|
35
|
Title: Predictive Model for Accident Management System Authors: Ramya V , Pratyasha , Priyanka K , Padmavati Badiger DOI:https://doi.org/10.2749/IJETTCS.643.1564 Full Text [PDF]| Abstract ![]() |
163-169
|
36
|
Title: Traffic Flow Modeling for Heterogeneous Conditions on Urban Road - A Case Study of selected stretches of Ahmadabad city Authors: A.A.Amaliyar, Dr.H.R.Varia DOI:https://doi.org/10.2749/IJETTCS.644.1565 Full Text [PDF]| Abstract ![]() |
170-175
|
37
|
Title: EDM: A field Of Data Analysis To Improve Education Authors: Rishi Kumar Dubey, Umesh Kumar Pandey DOI:https://doi.org/10.2749/IJETTCS.645.1570 Full Text [PDF]| Abstract ![]() |
176-183
|
38
|
Title: Perspective Analysis Recommendation System in Machine Learning Authors: Ayush Khare , Dr. Naveenkumar Jayakumar DOI:https://doi.org/10.2749/IJETTCS.646.1574 Full Text [PDF]| Abstract ![]() |
184-187
|
39
|
Title: Image Annotation by Using Dictionary Learning Approach Authors: Chetan Jagdale, Akshay dani,Ramanand Kshirsagar, Harshal Chitte, Prof. R. G. Raut DOI:https://doi.org/10.2749/IJETTCS.647.1539 Full Text [PDF]| Abstract ![]() |
188-191
|
40
|
Title: Design Testing Algorithms for Sign Language System Authors: Dr. Asmaa M. Hamandi DOI:https://doi.org/10.2749/IJETTCS.648.1569 Full Text [PDF]| Abstract ![]() |
192-197
|
41
|
Title: Optimal Specifications for a Secure Image Steganography Method Authors: Abdulgader Almutairi DOI:https://doi.org/10.2749/IJETTCS.649.1571 Full Text [PDF]| Abstract ![]() |
198-202
|
42
|
Title: Voice Controlling Linux Systems Authors: Brijesh K R, Mahantesh S M, Abhishek Roy, Debanga P Bora, Ms Suriya Refai Begum DOI:https://doi.org/10.2749/IJETTCS.650.1572 Full Text [PDF]| Abstract ![]() |
203-204
|