Archived Papers for Journal
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) >>
Vol.5, No.2
Publisher: Navneet Singh Sikarwar
Publishing Date: 2016-05-07
- EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONSAuthors: Dr.T.Hemalatha; Dr.G.Rashita Banu; Dr.Murtaza Ali
- Clustering of users based on Browsing BehaviorAuthors: M. Sree Vani
- A Survey : Medical Augmented RealityAuthors: Ikhlas Watan Ghindawi; Asst. Abdul Ameer Abdulla; Asst. Prof Yossra Hussain Ali
- Survey of the P2P botnet detection methodsAuthors: Atef A. Obeidat; Mohmmad J. Bawaneh
- SURVEY ON HYBRID RECOMMENDATION MECHANISM TO GET EFFECTIVE RANKING RESULTS FOR MOBILE QUERYAuthors: Ashvini A. Yendhe; Anita T. Shinde; Suraj S. Ligade; Deepa B. Mane
- An Overview of Human Computer Interaction and Its Research TrendsAuthors: Mrs.Priyanka G. Jaiswal
- Integration of PHP & MySQL database in Cross-platform Mobile ApplicationsAuthors: Ravindran. Vishal; A. Prakash
- A customized Approach For Automated Test Case Generation and Optimization for system based software TestingAuthors: Krishnachandra .M
- A lightweight RFID authentication protocol based on Rabin cryptosystemAuthors: Zhicai Shi
- STUDY AND SIMULATION OF OSPF ROUTING PROTOCOL USING CISCO PACKET TRACER:Authors: Gujarathi Thrivikram
- TRACKING OWNER DETAILS BY AUTOMATIC NUMBER PLATE RECOGNITIONAuthors: R.Shandiya; R.Suvetha; R.B.Shalini; N.Shanmuga Sundari
- SEISMIC DEMAND STUDY OF SOFT STOREY BUILDING AND ITS STRENGTHENING FOR SEISMIC RESISTANCEAuthors: S.Arunkumar; G. Nandini Devi
- Comparative Study of Different Cryptographic AlgorithmsAuthors: Ankita Verma; Paramita Guha; Sunita Mishra
- A Systematic Analysis on the Components of Software Process Layered ArchitectureAuthors: Jogannagari Malla Reddy; S.V.A.V. Prasad; SambasivaRao Baragada
- Predicting Bihar Vidhan Sabha Elections Election Results with Twitter Using Bayesian ClassifierAuthors: Varsha D. Jadhav; Sachin N. Deshmukh
- Factor Analysis Assisted Classification of Ear Images Based on GLCM FeaturesAuthors: Prashanth G.K.; M.A.Jayaram
- AN IOT APPLICATION BASED SEARCHING TECHNIQUE WSN LOCALIZATION ALGORITHMAuthors: Dr G Vijay Kumar
- Survey on Serial and Parallel Computing approaches for Real-Time Object Detection, Recognition and Tracking SystemsAuthors: K.Sivakumar; P.Shanmugapriya
- DETECTION AND PERVENTION OF MALCIOUS NODE USING DATA CENTRIC TECHNIQUESAuthors: Aditi; Dalveer kaur
- Contemplation of Tone Mapping Operators in High Dynamic Range ImagingAuthors: Khursheed Ahmad; Sumit Mittal; Rashidah F. Olanrewaju
- Survey on Paper Currency Recognition SystemAuthors: O.Rama Devi; J.Rajendra Prasad; B.V.Subba Rao; M.Sundara Babu; L.Ravi Kumar; P.Ravi Prakash; S.Sai Kumar; J.Sirisha; K.Swarupa Rani
- Extraction of key topics from online text reviewsAuthors: BHASKARJYOTI DAS; PRATHIMA V R
- Machine Learning Algorithm For Sentimental Analysis of Twitter FeedsAuthors: Mane Mayur R.; Kalambate Akshay R.; Rane Zilu Ramkrishna; Gamare P. S.
- A Study of Knowledge Contribution through Electronic Knowledge Repositories among Sri Lankan IT ProfessionalsAuthors: Khwaja M. Abdul-Cader; Gapar Johar
- ULTRA-NARROW BANDPASS INTERFERENCE FILTER FOR INFRARED APPLICATIONAuthors: Jamal F. Mohammad; Faisal H. Antar; Shireen M. Abed
- CAD based implementation of RADAR using Direct Sequence Spread Spectrum techniqueAuthors: Ravi Gautam; Harshita Sahu; Swarnika kumar; Divya Singh; Nandita Pradhan
- Multiple Techniques Analysis on Video SynopsisAuthors: M.Shanmugapriya; K.Selvakumar
- Web Image Re-Ranking With Feedback MechanismAuthors: Rutuja N. Patil; Prof.Sandeep B.Vanjale
- Inferring User Search Goals with Weakly Supervised MethodologyAuthors: Pratima Kadam; Prof.Sandeep B.Vanjale
- First Survey Effort on Translation SystemsAuthors: Pramod Salunkhe; Aniket Kadam; Rutuja patil
- Cluster Based Wireless Sensor Network: Security Using SHA1 and Authentication using Election AlgorithmAuthors: Scholar.Jubber Nadaf; Prof.Dr.Shuhas Patil
- SET for CWSN Using Election Algorithm for Authentication and Security Using SHA512Authors: Scholar.Jubber Nadaf; Prof.Dr.Shuhas Patil
- A NOVEL FUZZY PCA BASED IMAGE PROCESSING APPROACH ON PCB DEFECT DETECTIONAuthors: S. Kanimozhi; K. Gopalakrishnan
- UBIQUITOUS LEARNING ENVIRONMENTAuthors: Prafulla Chougale; Swapnil Desai
- Enhancement of Data Security in Cloud Computing by Generating OTPAuthors: N.Neelima; Sasidhar Velpula; Dorababu Gudapati; Hasan Baig; Kambala Venu Gopal
- A Routing Approach for Constructing Braided Multipath to Alleviate Congestion in WSNsAuthors: Chorng-Horng Yang; Long-Wei Lin; Chao-Wei Chou
- Exploring Networks Using Mobile AgentsAuthors: Balaraju J.; S. Rahamat Basha
- A Robust Method For Completely Blind Image Quality Evaluator With Enriched FeaturesAuthors: Sushilkumar N. Holambe; Priyanka M. Kshirsagar
- A Rapid Data Retrieval in Big Data Environment using HummingBird AlgorithmAuthors: S. Selvakanmani; C. Kanchana
- Implementation of 6-W based precisiation structure for text summarization using V B .netAuthors: Piyush Pratap Singh; Prof Jayashri Vajpai; Prof V S Bansal RETD.
- Url = http://www.ijettcs.org/Volume5Issue2/IJETTCS-2016-04-21-84.pdfAuthors: Rina
- Image Classification Techniques- A SurveyAuthors: Priya Pradip Naswale; P. E. Ajmire
- An Improved Binarization Technique for Degraded Document Images Using Adaptive Image ContrastAuthors: Prof.Sushilkumar N Holamber; Ulhas B Shinde; Bhagyashree S Choudhari
- A Novel Design on Wireless Communication & Emergence of Generation TechniquesAuthors: A Srujani; Dr P Chandrasekhar Reddy