ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) >>

Vol.5, No.4

Publisher: Navneet Singh Sikarwar

Publishing Date: 2016-09-08

  1. Suvey report on search engine optimisation

    Authors: Anindya Jyoti Pal; Unmesha Banerjee; Kanchandeep Ghosh; Hemanta De

  2. A Novel Technique for Finding Influential Nodes

    Authors: Mini Singh Ahuja

  3. A Survey for Efficient and Trustworthy Methods for Detection of Dishonest Recommenders in OSN

    Authors: Madhura Khandare; B. D. Phulpagar

  4. REVIEW PAPER ON HOME AUTOMATION USING INTERNET OF THINGS

    Authors: Aarti; Pooja Mittal

  5. Cloud Computing and its Applications: A Review

    Authors: Vipin Kumar Choudhary

  6. Sharing Educational Information Based on Blogging Platform

    Authors: Rana Riad K. AL-Taie

  7. Pseudonymization Techniques for Providing Privacy and Security in EHR

    Authors: Bipin Kumar Rai; A. K. Srivastava

  8. Semantic Analysis of Tweets using LSA and SVD

    Authors: S. G. Chodhary; Rajkumar S. Jagdale; Sachin N. Deshmukh

  9. A FRAMEWORK FOR SOFTWARE DEVELOPMENT PRODUCT METHODOLOGY MANAGEMENT

    Authors: Abid Thyab Al Ajeeli

  10. CLBR-Co-operative Load Balancing in Robust Duty Cycle MAC Protocol for Energy Efficient WSNs

    Authors: Ananda Babu J; Siddaraju

  11. Data Analytics on Television Dataset using Hadoop for Effective Management

    Authors: M Siva Rama Krishna; Sumithra Devi K A

  12. THE FUTURISTIC SCOPE OF MATHEMATICAL MORPHOLOGY AS WELL AS SOFT MORPHOLOGY--personnel view

    Authors: M.Sampath Kumar; Dr.Kompella Venkata Ramana

  13. WEB MULTIMEDIA CLASSIFICATION USING DT AND SVM MODELS

    Authors: Siddu P. Algur; Basavaraj A. Goudannavar; Prashant Bhat

  14. A New Approach to Detect Clone Attack in WSN

    Authors: Swati Raimule; Anjali Chandavale

  15. Smart Office Automation System

    Authors: Renuka bhuyar; Saniya Ansari

  16. The Melanoma Skin Cancer Detection and Feature Extraction through Image Processing Techniques

    Authors: S.Gopinathan; S. Nancy Arokia Rani

  17. HIGH PERFORMANCE SEQUENCE MINING OF BIG DATA USING HADOOP MAPREDUCE IN CLOUD

    Authors: Dr.B.LAVANYA; G.LALITHA

  18. Comparative study on Fault tolerant routing Protocols in Mobile Ad hoc Networks

    Authors: Suneel Kumar Duvvuri; S Ramakrishna; Dayalan M

  19. Automatic load frequency control of Three-area power System using ANN controller with Parallel Ac/Dc Link

    Authors: Emad Ali Daood; A.K. Bhardwaj

  20. A Comparison of the Vein Patterns in Hand Images with other image enhancement techniques

    Authors: PL.Chithra; A. Kalaivani

  21. A comparative study of continuous multimodal global optimization using PSO, FA and Bat Algorithms

    Authors: Radha A. Pimpale; P.K. Butey

  22. Centerline Extraction: A Review

    Authors: ZahraaNajiRazuqi; Assist prof Yossra H. Ali

  23. Secured Transmission of a Real Time Image and Text using Advance Encryption Standard for Military Purpose

    Authors: Kundankumar Rameshwar Saraf; Kushal Namdeo Mandge; Pratik Dilip Shah; Komal Shivaji Mule; Manishkumar Horilal Patel