ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) >>

Vol.4, No.6

Publisher: Navneet Singh Sikarwar

Publishing Date: 2016-01-08

  1. A Survey Paper OnAutomated Attendance System

    Authors: Mayank Rahate; Priyanka Auti; Bhargav Kulkarni; Suraj Mayande

  2. IMPACT OF TRUST, PRIVACY AND SECURITY IN FACEBOOK INFORMATION SHARING

    Authors: JithiKrishna P P; Suresh Kumar R; Sreejesh V K

  3. Adjoint Operators of Fourier-Finite Mellin Transform

    Authors: V. D. Sharma; A. N. Rangari

  4. SURVEY ON EYE WITNESS TRACKING USING API

    Authors: GANESH GOURSHETTE; NISARG KAHANE; SUSHRUT KAMATH; VISHAKH NARKAR; SIDDHANT SANKHE

  5. Analysis of Technological FactorsInfluencing Adoption of ICT in Public Secondary Schools in Kenya

    Authors: Bernard G. Gakenga; Joyce W. Gikandi; John W. Kamau

  6. THE STUDY OF GENERAL MAINTENANCE AND SAFETY PRACTICES IN INDUSTRIES OF KERALA

    Authors: Beena Puthillath; M. Bhasi; C.A. Babu

  7. An Edge based 3D Facial Expressions Detection System

    Authors: A.N.V.Susmitha; K.Srinivas

  8. PROPOSED ARCHITECTURE ON- A HYBRID APPROACH FOR LOAD BALANCING WITH RESPECT TO TIME IN CONTENT DELIVERY NETWORK

    Authors: Prashant Rewagad; Archana Chitte

  9. A Survey on Detection and Prevention of Black Hole Attack in MANET

    Authors: Shridevi.K; Sudha.S

  10. A Survey on Detection of Packet Dropping Attacks in Wireless Adhoc Network

    Authors: shridevi K; Naziya Parveen

  11. Review paper on Cloud Computing

    Authors: Seema Sharma; Jyoti Godara

  12. Insight into a survey of Security Challenges and Solutions in Cloud Computing

    Authors: K. SATYANARAYANA

  13. A SURVEY ON SOFTWARE TESTING

    Authors: Kuljeet Kaur; Shilpa Sharma

  14. Certainty Based Privacy Service Mechanism based on Key Policy Behavioral Based Encryption

    Authors: Neha Mourya; Margi Patel

  15. A hybrid method of prediction based on Soft Computing Techniques

    Authors: R.K.Srivastava; Atib Khan

  16. An Insight on Big Data Analytics Using Pig Script

    Authors: J.Ramsingh; Dr V.Bhuvaneswari

  17. Image steganography for data hiding using huffman code, Zigzag and OPAP

    Authors: Ketaki Bhaskar; Mitali Bakale; Priyanka Chaure; Priti Shirke

  18. COGNITIVE RADIO NETWORKS: A SURVEY

    Authors: Anusha M; V. Srikanth

  19. Enhanced Face Detection and Tracking In Video Sequence Using Fuzzy Face Model and Sparse Representation Technique

    Authors: Manjunatha Hiremath; P. S. Hiremath

  20. A Study of Knowledge Seeking through Electronic Knowledge Repositories among Sri Lankan IT Professionals

    Authors: Khwaja M. Abdul-Cader; Gapar Johar

  21. A Comparison of Factors Influencing Knowledge Sharing through EKR among Sri Lankan and Singaporean Knowledge Workers

    Authors: Khwaja M. Abdul-Cader; Gapar Johar

  22. Security Analysis of NFC Technology Compared with other Mobile Wireless Technologies

    Authors: Ahmed H. Ali; Reham Abdellatif Abouhogail; Ibrahim F. Tarrad; Mohamed I. Youssef

  23. Architecture of Mobile Cloud Computing and Middleware

    Authors: Chanky Swami; Nishant Anand

  24. A study of WAN design, routing protocols and connectivity between Head office to Branch office

    Authors: Anil Kumar Singh

  25. Novel Method for the Detection of Wormhole Attack in Delay Tolerant Network

    Authors: Jyothi D G; Ajay Kumar S N; Dr.Chandra shekara S N

  26. CROSS DATABASE MANIPULATOR USING COMMON INTERFACE

    Authors: Omkar Singh; S. K. Singh; Pranoti Hatkar; Tanvi Sawant; Siddhi Satam

  27. Review on Scheduling and Resource Allocation Management Techniques in Ad-hoc and Wimax networks

    Authors: Mohamed Ahmed; W. Jeberson

  28. ANALYTICAL STUDY ON INTRUSION DETECTION AND PREVENTION SYSTEM

    Authors: Sonal Paliwal; Rajesh Shyam Singh; H. L. Mandoria

  29. Searching issues: a survey on data exploration techniques

    Authors: Anna Lisa Guido; Roberto Paiano; Andrea Pandurino; Stefania Pasanisi

  30. UPDRS tracking using linear regression and neural network for Parkinson’s disease prediction

    Authors: Elmehdi BENMALEK; Jamal ELMHAMDI; Abdelilah JILBAB

  31. Visual semantic web based image Re-ranking for effective search engine

    Authors: Sandesh Keshav Pawaskar

  32. Simulation Study on Direct Torque Control of Induction Motor using Neural Network

    Authors: Siraj Ahmed T; Dr.S Sao; Anjaneyulu K S R

  33. Comparative analysis of protocols used for improving performance of TCP over AD-HOC networks

    Authors: Aniket Deshpande; Ashok Kaushal

  34. Segment based watermarking in 3D triangular mesh

    Authors: Lokendra Kumar Sharma; D. B. Ojha

  35. Cloud security through Intrusion Detection System (IDS): Review of Existing Solutions

    Authors: Yakuta tayyebi; Dr D.S Bhilare

  36. A Study of Privacy Preserving Methods for kNN Computation on Encrypted Data

    Authors: Gaikwad Vijayendra Sanjay; Khan Rahat Afreen

  37. Assessment of Noise Removal Methods in Image - A Survey

    Authors: Swati Khaira