Contact us
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
ISSN 2278-6856
Frequency : 6 Issues/Year
E-mail: editor@ijettcs.org
Volume 1, Issue 1, May - June, 2012
S. No. | TITLE | PAGE NO. |
---|---|---|
01 |
Neural Network Based Emergent Feedback Interface for Articulation of Language Sounds
S.M. Krishna GaneshLecturer in Department of Computer Science and Engineering, St.Joseph University, TANZANIA |
001-005 |
02 |
Multi Mobile Agent Itinerary for Wireless Sensor Networks
Mostefa BENDJIMA1, Mohamed FEHAM21,2 STIC Laboratory, University of Tlemcen, ALGERIA. |
006-011 [PDF] |
03 |
POS Tagger for Kannada Sentence Translation
Mallamma V Reddy1, Dr. M. Hanumanthappa21,2Department of Computer Science and Applications,Bangalore University, Bangalore,INDIA. |
012-015 [PDF] |
04 |
Authentication Method Based on Hashes Fingerprint For fast retrieval
Ismael Abdulsattar Jabber,Department of Computer Science, University of Delhi, Delhi, INDIA. |
016-021 [PDF] |
05 |
Optimizing the Performance of Fuzzy Implemented Radial Basis Function Channel Equalizer with Subset Centre Selection
M.S.Chavan1, R.H.Chile2 and S.R.Sawant3 1 Department of Electronics and Telecommunication Engineering, P.V.P.I.T. Budhgaon, Sangli, Maharashtra, INDIA. |
022-026 [PDF] |
06 |
RFID: Severe Threat to Secrecy
Dr. Venkatesh. J1, Priya. S, Aarthy. C 2, Thenmozhi. S 3 and Dr. Balasubramanie. P 4, 1Associate Professor, School of Management Studies,
Anna University of Technology Coimbatore, Jothipuram Post,
Coimbatore - 641 047. Tamil Nadu, INDIA. |
027-032 [PDF] |
07 |
Comparative Study of Motion Estimation & Motion Compensation for Video Compression
|
033-037 |
08 |
A Study on Signature Verification - A Behavioral Biometric Identification
Yogita Punjabi 1, Megha Gupata 2 and Priyanka Punjabi 31 Jaipur Engineering College and Research Center, Jaipur, Rajasthan, INDIA. |
038-041 [PDF] |
09 |
E-Banking: Perspective for Survival in Current Market
Pooja Vashishta 1 and Sumiti Kapoor 21,2 Research Scholar, Pacific University, Udaipur, Rajasthan, INDIA. |
042-046 [PDF] |
10 |
Resource Allocation and Scheduling in the Cloud
Ms. Shubhangi D. Patil 1 and Dr. S. C. Mehrotra 21 Department of IT Government Polytechnic, Jalgaon, INDIA |
047-052 [PDF] |
11 |
Static IP Address based Asymmetric Algorithms
M.Jayakumar 1 and Dr. T.Christopher 21Dept. of Computer Science Government Arts College, Udumalpet , INDIA. |
053-056 [PDF] |
12 |
Storage Optimization in Cloud Environment using Compression Algorithm
K.Govinda 1 and Yuvaraj Kumar 21,2 School of Computing Science and Engineering, VIT University, Vellore, INDIA. |
057-061 [PDF] |
13 |
Experimental Analysis of Effort Estimation Using Artificial Neural Network
Anjana Bawa 1 and Mrs. Rama Chawla 21,2 Computer Science Department, Doon Valley Institute of Engineering and Technology, Karna, INDIA. |
062-068 [PDF] |
14 |
Exploration of Wireless Sensor Networks Technology and development
1,2,3,4 Institute of Computer Science, Vikram University, Ujjain (M. P.), INDIA. |
069-072 [PDF] |
15 |
Cluster Analysis on Complex Structured and high Dimensional Data Objects using K-means and EM Algorithms
Satheelaxmi.G1, M.Ramakrishna Murty2, JVR Murty3 and Prasad Reddy PVGD41GMR Institute of Technology , Rajam, Srikakulam(Dist), Andhra Pradesh , INDIA. |
073-076 [PDF] |
16 |
The Role of Content Distribution Networks in the Future Media Networks
Fernando Almeida1 and Catalin Calistru 21School of Computer Science and Engineering, Higher Institute of Gaya, ISPGaya, PORTUGA. |
077-085 [PDF] |
17 |
An Overview of Mining Frequent Itemsets Over Data Streams Using Sliding Window Model
K Jothimani 1 and Dr Antony Selvadoss Thanamani 21,2 Research Department of Computer Science, NGM College,Pollachi, Coimbatore District, Tamilnadu , INDIA. |
086-089 [PDF] |
18 |
Analysis of Secret Sharing & Review on Extended Visual Cryptography Scheme
B. Sreenivas Rao1, Chindam Sambasiva Rao2, P Divya3 and SM Riyazoddin41,4CMR Institute of Technology, Hyderabad, INDIA. |
090-095 [PDF] |
19 |
Security of Cloud Service Provisioning using Attribute Based Encryption
Phyo Thandar ThantUniversity of Computer Studies, YANGON. |
096-100 [PDF] |
20 |
Data Consistency on Private Cloud Storage System
Yin Nyein AyeUniversity of Computer Studies, YANGON. |
101-105 [PDF] |
21 |
Fault-tolerant Management for Private Cloud System
Win Win NaingUniversity of Computer Studies, YANGON. |
106-109 [PDF] |