Contact us
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
ISSN 2278-6856
Frequency : 6 Issues/Year
E-mail: editor@ijettcs.org
Volume 2, Issue 6, November- December 2013
S. No. | TITLE | PAGE NO. |
---|---|---|
01 |
A Data Locality for Z-Curve Cache Oblivious
Matrix Multiplication Algorithms
korde P.S.1, Khanale P.B2 1Department of Computer Science Shri Shivaji College,Parbhani (M.S.) India
2Department of Computer Science Dnyopasak College Parbhani (M.S.) India |
001-005 |
02 |
A Comparative Study of Tree based Vs. Mesh
based Multicast Routing Protocols in Mobile Ad
hoc Networks
E.Suresh Babu1, C.Nagaraju2, MHM Krishna Prasad3 1Associate Professor & Research Scholar, PACE Institute of Technology & Sciences Ongole.
2Associate Professor YSR College of Engineering of YV University, Kadapa.
3Associate Professor JNTU College of Engineering, Kakinada |
006-011 [PDF] |
03 |
Intelligent Strategy of Task Scheduling in Cloud
Computing for Load Balancing
Arabi E. keshk, Ashraf El-Sisi, Medhat A. Tawfeek, F. A. Torkey Menoufia University, Faculty of Computers and Information, Egypt |
012-022 [PDF] |
04 |
DESIGN AND DEVELOPMENT OF Y-SHAPE
POWER DIVIDER USING IMPROVED DGS
1Samdeesh Singh, 2 Sunisha Rani 1Asst. Prof, IILM, Greater Noida, India
2 M.Tech Research Scholar, SLIET, Longowal, Punjab, India |
023-026 [PDF] |
05 |
Data hiding in audio by using image
steganography technique
1 Budda Lavanya, 2 Yangala Smruthi, 3 Srinivasa Rao Elisala 1,2Assistant Professor in Vignan Bharathi Institute of Technology, Hyderabad
3M.Tech (SE) in Gayathri Vidya Parishad College of Engineering, Visakhapatnam |
027-030 [PDF] |
06 |
Implementation of Second Order Switched
Capacitors Filters with Feedback Signal
U. N. Chavan1, G. N. Shinde2 1Department of Physics, Yeshwant Mahavidyalaya, Nanded, Maharashtra
2 Indira Gandhi (SR) College, CIDCO, Nanded, Maharashtra, India |
031-033 [PDF] |
07 |
MEMS Based Lateral Mode Free-Free Beam
Resonator
|
034-039 [PDF] |
08 |
Java for Mechanical Design Computation:
Dimensions of the Various Flange Couplings
D.Harsha Vardhan1 M.HariPrasad2 D. Mahammad Rafi3 Manu Ravuri41Samskruti College of Engineering & Technology, Ghatkesar, RR Dist. A.P, India 4Madanapalle Institute of Technology & Science, Madanapalle, Chittoor Dist. A.P, India |
040-043 [PDF] |
09 |
Solar Energy- The Ultimate Renewable Energy
Mrs.R.R.Thorat1, Dr. L. K. Ragha2 1,2Terna Engg.College , Nerul(W), Navi Mumbai , Mumbai University, India |
044-047 [PDF] |
10 |
Performance Enhancement for MIPv6 using An
Efficient Handover Mechanism
Ben Bella S. Tawfik1, Mohammed A. El-Shrkawey2 1,2 Suez Canal University, Faculty of Computers & Informatics, Information System Department
Ismailia 41522, Egypt |
048-053 [PDF] |
11 |
The Objective Properties of the Projector
Magnetic Lenses
Mohammed Jawad YaseenDepartment of Physics, College of Education, the University of Mustansiriyah, Baghdad, Iraq |
054-059 [PDF] |
12 |
Diabetes Patient’s Risk through Soft Computing
Model
Sabibullah M 1, Shanmugasundaram V2 , Raja Priya K3 1Prof. & Head, Dept. of Comp. Applns. (DoCA), J.J. College of Engg. & & Tech., Tiruchy-620009.
2Asst. Prof., Dept. of Comp. Applns., JJCET, Trichy- 620009.
3Head, Marssitech Pvt., Ltd., Tiruchirappalli, Tamilnadu- India |
060-065 [PDF] |
13 |
AMENITY MAMMIESH WINNING
EXHAUSTING ACQUAINTANCE
UNEARTHING
C. Bala Savannan, A.Singston Chandar, G.Shanmugasundaram, S.Surya VelTech MultiTech DR.Rangarajan DR.Sakunthala Engineering College, Chennai |
066-068 |
14 |
An Agent Oriented approach with Proposed
Cultural Algorithm in Healthcare for
Acquisition of Knowledge and Integration
Subiksha K.P Research Scholar, Madurai Kamaraj University,
Madurai, Tamil Nadu, India |
069-076 [PDF] |
15 |
Ant Colony Optimization for Effective Load
Balancing In Cloud Computing
1Shagufta khan 2Niresh Sharma 1M-TECH(CSE) RKDFIST BHOPAL (M.P.)
2professor(CSE) RKDFIST Bhopal(M.P) |
077-082 [PDF] |
16 |
A Novel Hybrid Approach to Enhance the
Localization Accuracy of Vehicular Adhoc
Network (Vanet) Using RFID and GPS
Sunita S.Shinde1, Ravi M. Yadahalli2 1Department of Electronics & Telecommunication Engineering,
Annasaheb Dange College of Engineering & Technology, Ashta (India)
2 Department of Electronics and Communication Engineering,
PES Institute of Technology & Management, Shivamogga (India), |
083-088 [PDF] |
17 |
Evaluate Performance of DSR and AODV in
MANET
Umang Rastogi1, Rajveer Singh2 1,2ABESEC, Ghaziabad (UP) |
089-093 [PDF] |
18 |
Analysis of Clustering Algorithm Based on
Number of Clusters, Error Rate, Computation
Time and Map Topology on Large Data Set
Amanpreet Kaur Toor1, Amarpreet Singh 2 1Research Scholar (M.Tech, C.S.E),
Amritsar College of Engineering & Technology, Manawala, Amritsar, Punjab, India
2 Associate Professor
Amritsar College of Engineering & Technology, Manawala, Amritsar, Punjab, India |
094-098 [PDF] |
19 |
ADAPTIVE NEURO-FUZZY CONTROLLER
FOR THERMAL POWER PLANT
OPTIMIZATION
|
099-102 [PDF] |
20 |
Image Fusion Using Manual Segmentation
Venkateswara Rao.N1, Veeraswamy.K2, Himabindu.CH31PG Student, Electronics and Communication Engineering Department, QIS College of Engg & Tech.,Ongole, India 2Professor & Principal, QIS College of Engg & Tech., Ongole, India 3Assoc.Prof., QIS College of Engg & Tech., Ongole, India |
103-106 [PDF] |
21 |
The Enhancement of Communication
Technologies and Networks for Smart Grid
Applications
Saida Elyengui1, Riadh Bouhouchi2, Tahar Ezzedine3 1,2, 3 Université de Tunis El Manar, Ecole Nationale d'Ingénieurs de Tunis, LR99ES21 Laboratoire de Systèmes de
Communications, 1002, Tunis, Tunisie. |
107-115 [PDF] |
22 |
Single-pass Interesting Frequent Pattern
Mining: without Support Threshold
Parag Moteria1, Dr Y R Ghodasara2 1Gujarat Technological University, ISTAR College, MCA Department,
Mota Bazar, Vallabh Vidyanagar 388 120, India
2AIT Department, Anand Agricultural University,
Anand 388 110, India |
116-117 |
23 |
Analysis of Open Source Computing Techniques &
Comparison on Cloud-based ERP
1D.Krishna, 2Rajasekhar, 3K.Murali Krishna Associate Professor, HOD of CSE Dept, Jawaharlal Nehru Institute of Technology, Ibrahimpatnam, Hyderabad, A.P.
Associate Professor, HOD of IT Dept, Jawaharlal Nehru Institute of Technology, Ibrahimpatnam, Hyderabad, A.P.
Assistant Professor, in CSE Dept, Jawaharlal Nehru Institute of Technology, Ibrahimpatnam, Hyderabad, A.P. |
118-124 [PDF] |
24 |
Intelligent System for Automated Traffic Signal
Control Using Fuzzy Mamdani Model
Shilpa Mehta 1, K. Soundararajan2, U Eranna3, Bharathi SH 4 1 Senior Associate Professor, ECE Department, Reva ITM,
Bangalore India.
2 Retired Professor and Former Rector, JNTU Anantapur,
Andhra Pradesh, India.
3 Principal, BITM Bellary, VTU Belgaum,
Karnataka, India.
4Professor, ECE Department, Reva ITM,
Bangalore India. |
125-129 [PDF] |
25 |
Mining Association Rule by Multilevel
Relationship Algorithm: An Innovative
Approach for Cooperative Learning
D.A. Vidhate1, Dr. Parag Kulkarni2 1Padmashri Dr. Vithalrao Vikhe Patil College of Engineering,
Vilad Ghat, PO MIDC, Ahmednagar
2EKLaT Research Lab, Pune |
130-137 [PDF] |
26 |
Concurrent Great Deluge Algorithms for
Preemptive Scheduling Problems
Souhail Dhouib Associate Professor of Management Information System,
Faculty of Administrative and Financial Sciences,
Al- Baha University, Kingdom Saudi Arabia |
138-142 [PDF] |
27 |
E-Learning nodes estimation for NAAC
Indian Universities
Mr.Srinatha Karur1, Prof. M.V. Ramana Murhty2 1Government Engineering College, Education Technology Center,
Muscat Road, POST BOX NO 327, Ibra, Sultanate of Oman.
2School of Matheamatics & Computer Science, Osmania University,
Hyderabad,Andhra Pradesh,India |
143-159 [PDF] |
28 |
Effectiveness of mobile voting as a
supplementary method to ballot casting: Case of
Bindura University of Science Education.
|
160-172 [PDF] |
29 |
Student Management System based on RFID
Technology
Unnati A. Patel11Assistant Professor, M.Sc. (IT) Department, ISTAR, V.V.Nagar, Gujarat, India |
173-178 [PDF] |
30 |
GNP-Based Fuzzy Class-Association Rule
Mining in IDS
Manjunath Suryavanshi1, Bahubali Akiwate2 and Mallappa Gurav3 1, 2, 3Dept. Of Computer Science and Engineering,
K. L. E College of Engineering & Technology, Chikodi-591 201, Karnataka, India |
179-183 [PDF] |
31 |
Discussion of Trust Model in Peer to Peer
Systems (P2P): A Review of Security in P2P
Shraddha Shirke1 and Ravi Chaure2 1,2University of Pune, P. k. technical campus, Chakan, Pune, India |
184-187 [PDF] |
32 |
AXIOMS OF CLOUD COMPUTING
Vinti Parmar1 ,Meenakshi Chawla2 , Rajender Singh31,3Department of Computer Science and Applications, First Lady Teacher Mata Savitri Bai Phoole Government Girls College Rewari , P.O. Rewari 123401,Haryana , India 2Department of Computer Science, The Technological Institute of Textile & Sciences , P.O Bhiwani-127021 Haryana , INDIA |
188-191 [PDF] |
33 |
A Review on Spoofing Attack Detection in
Wireless Adhoc Network
Mukesh Barapatre1, Prof. Vikrant Chole2, Prof. L. Patil3 1 Department of CSE, GHRAET,RTM Nagpur University,
2 Department of CSE, GHRAET,RTM Nagpur University,
3 Department of CSE, PIET,RTM Nagpur University. |
192-195 [PDF] |
34 |
A Comprehensive Review of Mobile Adhoc
Networks (MANETS)
Manjot Kaur1, Anand Nayyar2 1M.Tech (CSE) Research Scholar
Punjab Institute of Technology (PIT), Punjab Technical University, Jalandhar
2Assistant Professor
Department of Computer Applications & IT
KCL Institute of Management and Technology, Jalandhar |
196-210 |
35 |
UNMASKING OF PACKET DROP
ATTACK IN MANET
P. Swetha1, Vinod Bhupathi2 1Associate Professor, Department of CSE, JNTUH College of Engineering, Jagityal, Andhra Pradesh, India,
2Department of IT, JNTUH College of Engineering, Jagityal, Andhra Pradesh, India |
211-214 [PDF] |
36 |
On an Algorithm for Isomorphism-Free
Generations of Combinatorial Objects
Krasimir Yordzhev Faculty of Mathematics and Natural Sciences
South-West University, Blagoevgrad, Bulgaria |
215-220 [PDF] |
37 |
Enhanced Dynamic Algorithm of Genome
Sequence Alignments
Arabi E. keshk Menoufia University, Faculty of Computers and Information, Egypt |
221-226 [PDF] |
38 |
Actionable Web Analytics: Customer
Segmentation Approach Based on Behavioral
Patterns in E-Commerce Industry
Mubbashir Nazir1, Umar Mir2 1,2M.Tech Scholar Department of Computer Science & Information Technology DIT University Dehradun |
227-229 [PDF] |
39 |
Online Telugu Handwritten Password
Authentication Using
HMM Based Technique
C. V. Chakradhar 1, C. Shoba Bindu2 1Dept. Of Computer Science & Engineering, JNTUA, Anantapuramu (515002),
Andhra Pradesh, India
2Assoc. Prof, CSE Department, JNTUA, Anantapuramu (515002),
Andhra Pradesh, India |
230-236 [PDF] |
40 |
Study on self organizing approach for moving
object detection and tracking for visual
surveillance
|
237-239 [PDF] |
41 |
Implementation of a Vibration monitoring system
of a steam turbine for optimization of the
maintenance
Hassane Elmaati1, Abdelkader Benbouaza2, Bachir Elkihel3, Fabienne Delaunois41,2,3Department Mathematic and Mechanic, National School of Applied Sciences, Oujda, Morocco 4 Department of Metallurgy, Mons University, Mons, Belgium |
240-245 [PDF] |
42 |
Optic Disc Segmentation Based on Independent
Component Analysis and K-Means Clustering
Arumugam G1 and Nivedha S2 1Nielsen India Pvt. Ltd.,
Chennai, Tamilnadu, India.
2RVS College of Engineering and Technology,
Coimbatore, Tamilnadu, India. |
246-251 [PDF] |
43 |
A REVIEW ON MANET ROUTING
PROTOCOLS AND ITS VULNERABILITIES
Himadri Nath Saha1, Dr. Debika Bhattacharyya2 Bipasha Banerjee3 Sulagna Mukherjee4 Rohit Singh5 and Debopam Ghosh6 1,2,3,4,5&6Institute of Engg & Management, Department of Computer Science,
Y-12, Block -EP, Sector-V, Salt Lake Electronics Complex
Kolkata - 700 091, West Bengal, India |
252-262 |
44 |
Analysis and Investigation of Nearest Neighbor
Algorithm for Load Balancing
JavedHussain1, DurgeshKumar Mishra2 1Research Scholar, Mewar University, Chittorgarh(Raj.), India
andComputer Centre, Vikram University, Ujjain(M.P.), India.
2 Department of Computer Science and Engineering,
ShriAurobindo Institute of Technology,Indore(M.P.), India |
263-265 [PDF] |
45 |
Retail Forecasting using Neural Network and
Data Mining Technique: A Review and
Reflection
Archana Kumari1, Umesh Prasad2, Pradip Kumar Bala3 1,2Department of Computer Science & Engineering, BIT Ext Lalpur,
Ranchi-834001, India
3Indian Institute of Management, Ranchi
Ranchi-834001; India |
266-269 [PDF] |
46 |
Efficiency of Modern Encryption Algorithms in
Cloud Computing
1Omer K. Jasim, 2Safia Abbas, 3El-Sayed M. El-Horbaty and 4Abdel-Badeeh M. Salem 1Ma’arif University College, Computer Science Department,
Anabr, Iraq
2, 3, 4 Faculty of Computer and Information Sciences, Ain Shams University
Cairo, Egypt |
270-274 [PDF] |
47 |
Classification of Gait- Phases for FES using
Neuro-Fuzzy approach
Swaroop R1, Pradip Kumar Sadhu2 1Amity University-Dubai Campus,
Department of Electronics and Telecommunication,
DIAC, UAE
2Department of Electrical Engineering, Indian School of Mines
Dhanbad, India. |
275-279 [PDF] |
48 |
Enhanced Learning and Retention of Course
Content among Global Education using
Multimedia Aids
Gaurav Kumar 1 and Kuldeep Singh 2 1,2Institute of Mass communication and Media Technology, Kurukshetra University,
Kurukshetra, Haryana, India |
280-287 [PDF] |
49 |
Factors affected to 3D image in Digital
Watermarking
|
288-290 [PDF] |
50 |
Probability of Failure-free Operations with
Software for Defect Management
A.Vivek Yoganand1, G. Premnath2, R. Sathya3, S. Velmurugan41, 2, 3, 4 Assistant Professor, Computer Science & Engineering Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai-600 062 |
291-301 [PDF] |
51 |
A COGNITIVE APPROACH TO MOBILE
APPLICATION IN GREEN COMMERCE
Dr. S. Manimekalai1 Asst. Professor in School of Computer Science,
Thanthai Hans Roever College, Perambalur- 621 212
Tamilnadu, India |
302-304 [PDF] |
52 |
A Comparative analysis of ETL and Hyper ETL
A. Prema1, N.Sujatha 2, A.Pethalakshmi 3 1Ph.D Research scholar, Department of Computer Science,
Bharathiar University, Coimbatore, Tamil Nadu, India.
2Assistant Professor, Raja doraisingam Govt Arts College,
Sivagangai, Tamilnadu, India.
3Associate Professor, Department of Computer Science,
MVM Government Arts College for Women,
Dindigul, Tamilnadu, India. |
305-311 [PDF] |
53 |
A rapid comparative assessment for cybersecurity
threat characterization
Rania El-Gohary 1, Hanaa Saied2, Abdelbadeeh M.Salm3 1,2,3Ain Shams University, Faculty of Computer and Information Sciences,, Abbasia, Cairo, Egypt |
312-321 [PDF] |
54 |
Incremental Intrusion Detection System for
Wireless Sensor Networks
Priyanka Shah1, Dr. Atul Patel2 1,2Smt. Chandaben Mohanbhai Patel Institute of Computer Applications,
Faculty of Computer Science and Applications, CHARUSAT, CHANGA. |
322-326 [PDF] |
55 |
Analysis of Metadata Process Algorithms & Study on
Web Text Mining
M. Vijaya Kamal1, G. Aditya Rao2 1Asst. Prof. CIT, UPES Dehradun, U.K., India
2B.Tech. 3rd Year, CIT, UPES Dehradun, U.K., India |
327-331 [PDF] |