ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) >>

Vol.4, No.4

Publisher: Navneet Singh Sikarwar

Publishing Date: 2015-09-07

  1. Combination of the “Data Encryption Standard” algorithm (DES) and the “Public-key encryption” algorithm (RSA) on the key-generation stage

    Authors: Abdalilah G. Alhalangi; Galal Eldin A. Eltayeb

  2. Network Security: ARDUINO Yun Based IDS

    Authors: Y.SENHAJI; H.MEDROMI

  3. Preventions and Features of Camera Based Attacks on Smart Phones

    Authors: Prof.Mahip Bartere; Anushree Pore

  4. ENERGY EFFICIENT OUTLIER DETECTION IN WSN

    Authors: Gaurav Goyal; Rajiv Munjal

  5. OUTLIER DETECTION AND SYSTEM ANALYSIS USING MINING TECHNIQUE OVER KDD

    Authors: Manoj Mishra; Nitesh Gupta

  6. Self Generative Passcode for Triple-Stegging using Discrete Wavelet Transform (DWT) and Elliptic Curve Cryptography (ECC)

    Authors: Shvianand S Gornale; Nutan A C

  7. A Novel Clustering Algorithm for Color Image Segmentation using Rough set and Fuzzy Set

    Authors: Venkateswara Reddy Eluri; M.Ramesh; Mare Jane Aragon

  8. UNIT POWER CONTROL AND FEEDER FLOW CONTROL STRATEGIES FOR A GRID-CONNECTED HYBRID SYSTEM

    Authors: E.V.C.Sekhara Rao

  9. Network Security: Software IDPS versus Embedded IDPS

    Authors: Y. SENHAJI; H. MEDROMI

  10. E-commer Security Issues and Proposed Security Model For Online Transaction

    Authors: Prashant P. Pittalia

  11. Automatic / Smart Question Generation System for Academic Purpose

    Authors: Deepshree S. Vibhandik; Rucha C. Samant

  12. Contrast Enhancement Using Dominant Brightness Level Analysis and Adaptive Intensity Transformation for Remote Sensing Images

    Authors: Prafullita Patil; A. M. Patil

  13. PRIVACY-PRESERVING DATA AGGREGATION IN COMMUNICATION NETWORKS

    Authors: A .Mallareddy; P . Sravanthi; Rasakonda Raju

  14. Network Lifetime Improvement Using Energy Efficient Multipath ad hoc on demand distance vector routing

    Authors: Madhvi saxena; Neha Jain

  15. Microaneurysms Detection from Retinal Image and Diabetic Retinopathy Grading

    Authors: Kanchan Nemade; K. S. Bhagat

  16. A SURVEY: DATA SHARING APPROACH USING PARALLEL PROCESSING TECHNIQUES

    Authors: Suruchi Shrivastava; S. Sathappan

  17. Digital signal processing: Roles of Z-transform & Digital Filters

    Authors: Nwagu Kenneth Chikezie; Okonkwo Obikwelu R.

  18. PERFORMANCE EVALUATION OF IMPROVED IMAGE SEGMENTATION USING FUZZY BASED MODIFIED MEAN SHIFT AND MST

    Authors: Sandeep Kaur; Shikha Chawla

  19. Online Signature Recognition using Neural Network

    Authors: Babita Pegu; Aditya Bihar Kandali

  20. Enhanced Cuckoo Search Based Intercluster Data Aggregation for WSNs

    Authors: Rubina Sharma; Richa Sharma

  21. Combined Mining Approach to Generate Informative Patterns

    Authors: Priyanka Wani Kapadia

  22. Face Recognition Using Principal Component Analysis and Artificial Neural Network of Facial Images Datasets in Soft Computing

    Authors: Suhas S.Satonkar; Vaibhav M.Pathak; Prakash B. Khanale

  23. ROBUST DECISION MAKING SYSTEM BASED ON FACIAL EMOTIONAL EXPRESSIONS

    Authors: D.Sharad Mani; C. Naga Raju

  24. Analysis of Dynamic Data Placement Strategy for Heterogeneous Hadoop Cluster

    Authors: Richa Jain; Amit Saxena; Manish Manoriya

  25. Routing protocol for intermittent connected VANET by using real time traffic information system

    Authors: Rahul Ranjan; Mohammad Arif; Mohammad Suaib

  26. Implementation of Effective , Robust and BPCS Data Embedding using LSB innovative Steganograpy Method

    Authors: B. H. Barhate; R. J. Ramteke

  27. Enhancing supportive and healthy environment for adolescents by doing away with Corporal Punishment: A Reflection

    Authors: Amita Puri; Chhaya Tomar

  28. PRIVACY PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

    Authors: V. L. Pavani; A. Mallareddy; I. Satyanarayana

  29. Design and implementation of GDI based compressor

    Authors: A.Rajitha; Rani Rajesh; C.V.Keerthilatha

  30. DDOS Attacks and its Prevention at ISP Level

    Authors: A. D. Talole; S. R. Todmal

  31. Importance of Industry Training for Engineering Undergraduate students-case study

    Authors: Veena Patki; Manasi Patki

  32. HETEROGENEOUS DATA STORAGE OF DIFFERENT CLOUD SERVICES

    Authors: Deepika Verma; Hemant Kumar Pathak

  33. Proposed Model for the Smart Accident Detection System for Smart Vehicles using Arduino board, Smart Sensors, GPS and GSM

    Authors: Pratiksha R. Shetgaonkar; Vijay Kumar Naik Pawar; Rajesh Gauns

  34. : IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM

    Authors: FENWA O.D; AJALA F.A; ALO O.O

  35. Performance Analysis of Buffer management for live streaming in P2P VOD systems for mesh based non-cluster and cluster environment

    Authors: Nemi Chand Barwar; Rajesh Bhadada

  36. A Survey of Similarity Measures in Web Image Search

    Authors: Yossra H. Ali; Wathiq N. Abdullah

  37. Advances of Computer Science Technology ? Proposal of 3D-Electrode Structures Based on a Stereolithography-Based 3D-Printer ?

    Authors: Advances of Computer Science Technology