Archived Papers for Journal
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) >>
Vol.4, No.6
Publisher: Navneet Singh Sikarwar
Publishing Date: 2016-01-08
- A Survey Paper OnAutomated Attendance SystemAuthors: Mayank Rahate; Priyanka Auti; Bhargav Kulkarni; Suraj Mayande
- IMPACT OF TRUST, PRIVACY AND SECURITY IN FACEBOOK INFORMATION SHARINGAuthors: JithiKrishna P P; Suresh Kumar R; Sreejesh V K
- Adjoint Operators of Fourier-Finite Mellin TransformAuthors: V. D. Sharma; A. N. Rangari
- SURVEY ON EYE WITNESS TRACKING USING APIAuthors: GANESH GOURSHETTE; NISARG KAHANE; SUSHRUT KAMATH; VISHAKH NARKAR; SIDDHANT SANKHE
- Analysis of Technological FactorsInfluencing Adoption of ICT in Public Secondary Schools in KenyaAuthors: Bernard G. Gakenga; Joyce W. Gikandi; John W. Kamau
- THE STUDY OF GENERAL MAINTENANCE AND SAFETY PRACTICES IN INDUSTRIES OF KERALAAuthors: Beena Puthillath; M. Bhasi; C.A. Babu
- An Edge based 3D Facial Expressions Detection SystemAuthors: A.N.V.Susmitha; K.Srinivas
- PROPOSED ARCHITECTURE ON- A HYBRID APPROACH FOR LOAD BALANCING WITH RESPECT TO TIME IN CONTENT DELIVERY NETWORKAuthors: Prashant Rewagad; Archana Chitte
- A Survey on Detection and Prevention of Black Hole Attack in MANETAuthors: Shridevi.K; Sudha.S
- A Survey on Detection of Packet Dropping Attacks in Wireless Adhoc NetworkAuthors: shridevi K; Naziya Parveen
- Review paper on Cloud ComputingAuthors: Seema Sharma; Jyoti Godara
- Insight into a survey of Security Challenges and Solutions in Cloud ComputingAuthors: K. SATYANARAYANA
- A SURVEY ON SOFTWARE TESTINGAuthors: Kuljeet Kaur; Shilpa Sharma
- Certainty Based Privacy Service Mechanism based on Key Policy Behavioral Based EncryptionAuthors: Neha Mourya; Margi Patel
- A hybrid method of prediction based on Soft Computing TechniquesAuthors: R.K.Srivastava; Atib Khan
- An Insight on Big Data Analytics Using Pig ScriptAuthors: J.Ramsingh; Dr V.Bhuvaneswari
- Image steganography for data hiding using huffman code, Zigzag and OPAPAuthors: Ketaki Bhaskar; Mitali Bakale; Priyanka Chaure; Priti Shirke
- COGNITIVE RADIO NETWORKS: A SURVEYAuthors: Anusha M; V. Srikanth
- Enhanced Face Detection and Tracking In Video Sequence Using Fuzzy Face Model and Sparse Representation TechniqueAuthors: Manjunatha Hiremath; P. S. Hiremath
- A Study of Knowledge Seeking through Electronic Knowledge Repositories among Sri Lankan IT ProfessionalsAuthors: Khwaja M. Abdul-Cader; Gapar Johar
- A Comparison of Factors Influencing Knowledge Sharing through EKR among Sri Lankan and Singaporean Knowledge WorkersAuthors: Khwaja M. Abdul-Cader; Gapar Johar
- Security Analysis of NFC Technology Compared with other Mobile Wireless TechnologiesAuthors: Ahmed H. Ali; Reham Abdellatif Abouhogail; Ibrahim F. Tarrad; Mohamed I. Youssef
- Architecture of Mobile Cloud Computing and MiddlewareAuthors: Chanky Swami; Nishant Anand
- A study of WAN design, routing protocols and connectivity between Head office to Branch officeAuthors: Anil Kumar Singh
- Novel Method for the Detection of Wormhole Attack in Delay Tolerant NetworkAuthors: Jyothi D G; Ajay Kumar S N; Dr.Chandra shekara S N
- CROSS DATABASE MANIPULATOR USING COMMON INTERFACEAuthors: Omkar Singh; S. K. Singh; Pranoti Hatkar; Tanvi Sawant; Siddhi Satam
- Review on Scheduling and Resource Allocation Management Techniques in Ad-hoc and Wimax networksAuthors: Mohamed Ahmed; W. Jeberson
- ANALYTICAL STUDY ON INTRUSION DETECTION AND PREVENTION SYSTEMAuthors: Sonal Paliwal; Rajesh Shyam Singh; H. L. Mandoria
- Searching issues: a survey on data exploration techniquesAuthors: Anna Lisa Guido; Roberto Paiano; Andrea Pandurino; Stefania Pasanisi
- UPDRS tracking using linear regression and neural network for Parkinson’s disease predictionAuthors: Elmehdi BENMALEK; Jamal ELMHAMDI; Abdelilah JILBAB
- Visual semantic web based image Re-ranking for effective search engineAuthors: Sandesh Keshav Pawaskar
- Simulation Study on Direct Torque Control of Induction Motor using Neural NetworkAuthors: Siraj Ahmed T; Dr.S Sao; Anjaneyulu K S R
- Comparative analysis of protocols used for improving performance of TCP over AD-HOC networksAuthors: Aniket Deshpande; Ashok Kaushal
- Segment based watermarking in 3D triangular meshAuthors: Lokendra Kumar Sharma; D. B. Ojha
- Cloud security through Intrusion Detection System (IDS): Review of Existing SolutionsAuthors: Yakuta tayyebi; Dr D.S Bhilare
- A Study of Privacy Preserving Methods for kNN Computation on Encrypted DataAuthors: Gaikwad Vijayendra Sanjay; Khan Rahat Afreen
- Assessment of Noise Removal Methods in Image - A SurveyAuthors: Swati Khaira