Contact us
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
ISSN 2278-6856
Frequency : 6 Issues/Year
E-mail: editor@ijettcs.org

Volume 3, Issue 1, January- February 2014
S. No. | TITLE | PAGE NO. |
---|---|---|
01 |
---
--- --- |
--- |
02 |
An Advanced Database SecurityApproach for
Enhancing the Data Storage and Sharing
Bireswar Dutta Taipei Medical University,
250, Wu-Hsing Street, Taipei City, TAIWAN 110 |
006-017 [PDF] |
03 |
A New Approach to Find Minimum Spanning Tree
for Undirected Graphs
Marriswamy.R1, Dr.Ravikumar H.Roogi2 and Dr.S.V.Shindhe3 1,2,3Karnatak University, Dept of Computer Science,
Dharwad, India |
018-020 [PDF] |
04 |
New Disk Scheduling Algorithm for Higher
Performance
Unnati A. Patel Assistant Professor, M.Sc. (IT) Department, ISTAR, V.V.Nagar, Gujarat, India |
021-024 [PDF] |
05 |
Knowledge representation in Semantic Web and
Development of Academic Ontology using Web
Ontology Language& SWRL
Dr. Priya R. Swaminarayan Professor & Head, MCA Department
Institute of Science and Technology for Advanced Studies and Research (ISTAR)
Vallabh Vidyanagar â 388120, Anand, Gujarat, India |
025-028 [PDF] |
06 |
SHARING SECURE DATA IN THE CLOUD
FOR THE MULTIUSER GROUP
1S.Ramamoorthy 2 R.Saravanan 1 Assistant Professor, Dept. of CSE SCSVMV University, Enathur Kanchipuram.
2 Programmer, Dept. of IT SCSVMV University, Enathur Kanchipuram. |
029-031 [PDF] |
07 |
Requirement Engineering â Monitoring
Elicitation Technique for End Product Software
|
032-037 [PDF] |
08 |
Image Classification Using K-mean Algorithm
Haval M. SIDQI1 and Jamal F. KAKBRA21Master in Computer Science, Sulaimani Polytechnic University Qirga St., Sulaimani, Kurdistan Region of Iraq 2 Master in Information and Communication Technology, Sulaimani Polytechnic University Qirga St., Sulaimani, Kurdistan Region of Iraq |
038-041 [PDF] |
09 |
Smart Electronic Examination System using
Multi-Agent Platform
Assist.prof.Dr. Yossra Hussain Ali1, Zahraa Faiz Hussain2 1University of Technology, computer sciences dept,
Al-Sina'a Street , Iraq ,Capital Baghdad
2University of Technology, computer sciences dept. master student |
042-046 [PDF] |
10 |
Network-based IDS for Distributed Denial of
Service Attacks
Dileep Kumar G1, Dr CV Guru Rao2, Dr Manoj Kumar Singh3and Mohammed Kemal4 1Research Scholar, Faculty of Computer Science, Jawaharlal Nehru Technological University, Hyderabad, AP, India
2Professor, Department of Computer Science and Engineering, SR Engineering College, Warangal, AP, India
3Asst Professor, Department of Computing, Adama Science & Technology University, Adama, Ethiopia
4Asst Professor, Department of Computing, Adama Science & Technology University, Adama, Ethiopia |
047-051 [PDF] |
11 |
Randomized Memetic Artificial Bee Colony
Algorithm
Sandeep Kumar1, Dr. Vivek Kumar Sharma2 and Rajani Kumari31,2 & 3 Faculty of Engineering and Technology, Jagannath University, Chaksu, Jaipur, Rajasthan 303901, India |
052-062 [PDF] |
12 |
Pollution Information Retrieval System for
Anand District Area through ArcGIS Map
Dr. Mijal Mistry1, Pritesh Patel2 1,2Institute of Science and Technology for Advanced Studies and Research (ISTAR),
Vallabh Vidyanagar, Gujarat, India |
063-065 [PDF] |
13 |
GroceryHub â A Cloud Based App -
Shared Grocery Lists for iOS
Adnan Shaout and Shahzeb Khan The University of Michigan â Dearborn
The Electrical and Computer Engineering Department
Dearborn, Michigan - Dearborn |
066-074 |
14 |
Secure Password Authentication System Using
Smart Card
Sattar J. Aboud Computer Science Department, University of Bedfordshire, UK |
075-079 [PDF] |
15 |
Group Representative Based Mobility in Mobile
AD HOC Networks
Vishant Kumar1, Ankit Kumar2, Varun Bansal3 1,2,3Department of Computer Science & Engineering
Shobhit University, Gangoh, Saharanpur (U.P.) |
080-081 [PDF] |
16 |
NETWORK SECURITY USING A
SYMMETRIC KEY CRYPTOGRAPHY
Mrinmoy Saha1, Mr. Tarak Nandy2 1M.Tech Student, Department of CSE, Narula Institute of Technology, Agarpara,
West Bengal, INDIA
2Assistant professor, Department of CSE, Narula Institute of Technology, Agarpara,
West Bengal, INDIA |
082-083 [PDF] |
17 |
Comparative Analysis and Enhancement of
Leader Election Algorithms through Shared
Memory in Mobile Ad-hoc Networks
1Sonal Sinha, 2Namita Yadav 1,2Computer Science & Engineering, ITM Integrated Technical Campus
GIDA, GORAKHPUR |
084-089 [PDF] |
18 |
Image Compression using Discrete Cosine
Transform and Adaptive Huffman Coding
Deepak Kumar Jain1, Devansh Gaur2, Kavya Gaur3, Neha Jain4 1,2 Central Electronics Engineering Research Institute,
Pilani, Rajasthan, India, 333031
3 Rajasthan Institute of Engineering and Technology,
Jaipur, Rajasthan, India, 302026
4 GICTS Group of Institution,
Gwalior, M.P., India, 474002 |
090-094 [PDF] |
19 |
Data Mining: Past, Present and Future Scenario
|
095-099 [PDF] |
20 |
A Study of various Address Allocation Schemes
for Mobile Ad Hoc Networks
Roshan Rohit, Dinesh Singh(Assistant Professor)Department of Computer Science & Engineering, Parul Institute of Engineering & Technology,Vadodara,Gujarat,India. |
100-105 [PDF] |
21 |
Design and implementation of an Efficient
Scheduling algorithm for load balancing in
Cloud Computing
1Amritpal Singh, 2 Rajeev Kumar Bedi, 3 Sunil Kumar Gupta 1Assistant Professor, Global Institute of Management, Amritsar
2Assistant Professor, BCET, Gurdaspur
3Associate Professor, BCET, Gurdaspur |
106-109 [PDF] |
22 |
COST-BENEFIT ANALYSIS: A STUDY OF
SELECTED NATIONALIZED BANK IN
INDIA
Dr. Atul Bansal, Professor Department of Management & Research, INTEGRAL University,
Lucknow- 226026. Uttar Pradesh |
110-115 |
23 |
Integration between Geo-Information Neural
Systems and Architectural Information Systems
for Predicting Remaining Life of Heritage
Buildings Assets
1Hana Mohamed, 2Ahmed Abou E-lfetouh Saleh, 3Sherif Barakat, 4Mona Gamal Mansoura University, Faculty of Computer Science and Information Systems, Mansoura, Egypt
Information Systems Department |
116-125 [PDF] |
24 |
Protecting VoIP Communications in a
Multipath Environment using Modified Secret
Sharing Algorithm
Dr.K.Maheswari Associate Professor, Department of MCA
SNR Sons College, Coimbatore, Tamilnadu,India |
126-131 [PDF] |
25 |
ENERGY EFFICIENT NOVEL CIPHER
SECURITY MECHANISM FOR WIRELESS
B.T.Geetha1, M.V.Srinath2 1Research Scholar,Sathyabama University, Chennai, India
2Head â Content Development, Efuture Soft, Chennai,India, |
132-136 [PDF] |
26 |
Performance Evaluation of EIGRP and OSPF
Routing Protocols in Real Time Applications
Komal Gehlot1, N.C. Barwar2 1J.N.V. University, M.B.M. Engineering College,
Department of Computer Science & Engineering, Jodhpur, India
2J.N.V. University, M.B.M. Engineering College,
Faculty of Computer Science & Engineering, Jodhpur, India |
137-143 [PDF] |
27 |
A HYBRID TRUST BASED SECURE MODEL
FOR WIRELESS SENSOR NETWORK
Mohan Kumar S¹, Thenmozhi R2, Inian Lourde Alex A3, Malarvizhi M4 1,2,3,4Pondicherry University, Sri Manakula Vinayagar Engineering College,
Madagadipet, Puducherry |
144-147 [PDF] |
28 |
Contextual information search based on domain
using Query Expansion
|
148-151 [PDF] |
29 |
EVALUATING THE PERFORMANCE OF
INTEGRATED LANE COLORIZATION
USING HOUGH TRANSFORMATION AND
BILATERAL FILTER
Rajandeep Singh1, Prabhdeep Singh21 Department of Computer Science and Engineering, GIMET, Amritsar 2 Assistant Professor, Department of Computer Science and Engineering, GIMET, Amritsar |
152-157 [PDF] |
30 |
An Efficient Prediction Based Lossless
Compression Scheme for Bayer CFA Images
M.Moorthi1, Dr.R.Amutha2 1, Research Scholar, Sri Chandrasekhardendra Saraswathi Viswa Mahavidyalaya University, Kanchipuram, Assistant
Professor, PITAM, India.
2. Professor /ECE Department
SSN college of Engineering, Chennai, India. |
158-163 [PDF] |
31 |
Structural and Electrical Characterization of
ZnO and ZnO:Co Nanoparticles Grown on p-Si
Prepared by PLD
Ali Ahmed Yousif Department of Physics, College of Education, University of Al-Mustansiriyah, Baghdad, Iraq |
164-169 [PDF] |
32 |
A Fault Tolerant Scheduler with Dynamic
Replication in Desktop Grid Environment
Jyoti Bansal 1,Dr. Shaveta Rani2,Dr. Paramjit Singh3 1Research Scholar,PTU, Kapurthala
2,3Punjab Technical University Giani Zail Singh Campus, Bathinda-151001 |
170-175 |
33 |
Implementation of Fault Aware Scheduling for
Reliable Execution on Desktop Grids
Geeta Arora1, Dr. Shaveta Rani2, Dr. Paramjit Singh3 1Research Scholar,PTU, Kapurthala.
2,3Computer Sc. & Engg., PTUGZS Campus ,Bathinda. |
176-180 [PDF] |
34 |
An Enhance LSB Watermark Approach for
Robustness and Security in uncompressed AVI
Video
Sunil Sharma1, Mahendra Kumar Rai2 and Tanvi Sharma3 1Shri Ram Institute of Technology, Jabalpur, MP
2Head of Department (ITE) Shri Ram Institute of Technology, Jabalpur
3Asst Professor, Department of CSE, JK Institute of Engineering, Bilaspur |
181-185 [PDF] |
35 |
Review on Privacy and Utility in High
Dimensional Data Publishing
Deepa B. Mane 1, Prof. Emmanuel M. 2 1 Pune Institute of Computer Technology, IT Department
university of Pune, India
2Prof& head of the IT department at Pune Institute of Computer Technology
university of Pune India |
186-191 [PDF] |
36 |
Different Contrast Enhancement Techniques
for Remote Sensing Images and Their
Comparison in Matlab
A. Kalpana1, I. Krishna Rao2 1Department of ECE, Vignanâs Institute of Information Technology, Vizag, A.P, India.
2Associate professor in Department of Electronics and Communication Engineering, Vignanâs Institute of Information
Technology, Vizag, A.P, India. |
192-196 [PDF] |
37 |
Comparative analysis of proposed algorithm
with existing load balancing scheduling
algorithms in Cloud Computing
1Amritpal Singh, 2 Sunil Kumar Gupta, 3 Rajeev Kumar Bedi 1Assistant Professor, Global Institute of Management, Amritsar
2,3Associate Professor, BCET, Gurdaspur |
197-200 [PDF] |
38 |
Improving System Model Lexicon using
Semantic and Tag Based Information Retrieval
and Traceability
|
201-209 [PDF] |
39 |
An Information Dissemination Framework for
Location Based Services
Preeti Saxena1 and Raj Kamal2School of Computer Science and Information Technology, DAVV, Indore |
210-216 [PDF] |
40 |
Analysis of various attacks on P2P networks
Avinash Chaudhari1 and Pradeep Gamit2 1L.D. College of Engineering, Information Technology,
Ahmedabad India
2L.D. College of Engineering, Assistant professor,
Computer Engineering department,
Ahmedabad, India |
217-220 [PDF] |
41 |
Software project planning using genetic
algorithm
*Deepak Kumar, Assistant Professor Directorate of Distance Education, Kurukshetra University Kurukshetra |
221-222 [PDF] |
42 |
Confluent Analysis of Challenges and Scalability of
Efforts for Deep Web Data Retrieval
Dr. Brijesh Khandelwal1, Dr. S. Q. Abbas2 1Research Scholar, Shri Venkateshwara University, Gajraula, UP., India
2Director, Ambalika Institute of Management and Technology, Lucknow, U.P., India |
223-227 |
43 |
Fuzzy Keyword Search over Encrypted Data in
MultiCloud
Deepaklal. K. B KMCT College of Engineering,Master in Technology,Computer Science,
Kozhikode,Kerala, India |
228-232 [PDF] |
44 |
Bring Your Own Device (BYOD) in Higher
Education: Opportunities and Challenges
Rahat Afreen Course Coordinator (MCA), Millennium Institute of Management,
Dr. Rafiq Zakaria Campus, Aurangabad. |
233-236 [PDF] |
45 |
The Systematic Survey on Influential Users in a
Blog Network
Azaim Khan1, Ms Richa Sapra2 1,2Lovely Professional University, School of technology and sciences,
NH-1, Punjab, India |
237-239 [PDF] |
46 |
A Hybrid Approach for Classification Tree
Generation
Srishti Taneja1, Ms. Richa Sapra2 1,2Lovely Professional University, School of technology and sciences,
NH-1, Punjab, India |
240-242 [PDF] |
47 |
Design of A Web-Based System to Support CSA
Instruction
Yukon Chang1 and Chi-Chang Chen2* 1,2Information Engineering Department, I-Shou University,
Kaohsiung, Taiwan
*corresponding author |
243-250 [PDF] |
48 |
A Study of Various Routing Protocols in
MANETS
|
251-255 [PDF] |
49 |
Survey paper on Vehicle Theft Detection
through Face Recognition System
Mr. Raj Rai1, Prof. Dinesh Katole2, Miss. Nayan Rai31(Dept. of Computer science & Engineering, Nagpur Institute of Technology, Nagpur, India) 2(Lecturer, Dept. of Electronics & Tele Communication, Nagpur Institute of Technology, Nagpur, India) 3(Lecture, Dept. of Information Technology, Manoharbhai Patel Institute of Engg. &Technology, Bhandara, India) |
256-258 [PDF] |
50 |
A generic agent-oriented design approach
applied to a collaborative system
Sara Maalal1, Wafaa Dachry2 and Malika Addou3 1Hassan II University, Higher National School of Electricity and Mechanics ENSEM,
Architecture System Team â LISER, Eljadida Road, BP 8118 Oasis, Casablanca, Morocco
2Hassan II University, Faculty of Sciences,
Department of Mathematics and Computer, Casablanca, Morocco
3Hassan II University, Hassania School of Public Works EHTP,
Architecture System Team â LISER, Eljadida Road, BP 8108 Oasis, Casablanca, Morocco |
259-269 [PDF] |
51 |
New Area in Optical communication: Optical
Burst Switching (OBS) Networks
Reza Poorzare1, Shahram Jamali2 and Asgarali Bouyer3 1Young Researchers Club, Ardabil Branch, Islamic Azad University, Ardabil, Iran
2Department of Computer Engineering
University of Mohaghegh Ardabili, Ardebil, Iran
3Azarbaijan Shahid Madani University
Faculty of computer engineering and Information technology |
270-273 [PDF] |
52 |
A Survey on MANET Security Challenges,
Attacks and its Countermeasures
J. Godwin Ponsam1, Dr. R.Srinivasan2 1Research Scholar, SRM University
2 Professor Emeritus, Directorate of Research, SRM University |
274-279 [PDF] |
53 |
Smart Traffic Control System Using Image Processing
Vismay Pandit1, Jinesh Doshi2, Dhruv Mehta3 Ashay Mhatre4 and Abhilash Janardhan5 1,2,3,4D. J Sanghvi College of Engineering , Mumbai Unviersity
5 St. John College of Engineering and Technology, Mumbai Unviersity
|
280-283 [PDF] |
54 |
Computational Intelligence Approaches For
Manipulating Vagueness Petroleum Data
1Senan A. Ghallab , 2N.L.BAdr, 3Abdel Badeeh Salem and 4M.F Tolba 1,2,3,4 Ain Shams University, Faculty of Computer and Information Sciences, Egypt |
284-289 [PDF] |
55 |
Pollution Monitoring using Energy efficient
routing in Wireless Sensor Networks
R.A.Roseline1, Dr. M.Devapriya2, Dr.P.Sumathi3 1,2,3 Postgraduate and Research Department of Computer Science, Government Arts College, Coimbatore, Tamilnadu, India |
290-294 [PDF] |
56 |
PERFORMANCE ANALYSIS OF
DATAMINIG TECHNIQUE IN RBC , WBC
and PLATELET CANCER DATASETS
Mayilvaganan M 1 and Hemalatha 2 1Associate Professor, Department of Computer Science, PSG College of arts and science,
Coimbatore,TamilNadu,India
2Assistant Professor, Department of computer science, Tiruppur kumaran college for women
Tiruppur, Tamil Nadu, India. |
295-299 [PDF] |
57 |
ANALYSIS OF DENDROGRAM
REPRESENTATION IN RBC,WBC AND
PLATELET CANCER DATASET’S
Mayilvaganan M 1 and Hemalatha 2 1Associate Professor, Department of Computer Science, PSG College of arts and science,
Coimbatore,TamilNadu,India
2Assistant Professor, Department of computer science, Tiruppur kumaran college for women
Tiruppur, Tamil Nadu, India. |
300-304 [PDF] |
58 |
HUMAN BLOOD PRESSURE
CLASSIFICATION ANALYSIS USING
FUZZY LOGIC CONTROL SYSTEM IN
DATAMINING
Mayilvaganan M 1 and K.Rajeswari 2 1Associate Professor, Department of Computer Science, PSG College of arts and science,
Coimbatore,TamilNadu,India
2 Associate Professor, Department of computer science, Tiruppur kumaran college for women
Tiruppur, Tamil Nadu, India. |
305-306 [PDF] |
59 |
M-Learning: Innovative E-Learning, Strategic
Model for Adoption
Anil Rajput1, Vibha Thakur2 1C. S. A. P.G. Govt. College, Sehore, Barkattullah University, India,
2Career College, Bhopal, Barkattullah University, India. |
307-310 [PDF] |
60 |
PASSWORD MANAGEMENT SYSTEM
USING CRYPT OGRAPHY USING SALT
TECHNIQUE
T.Rajesh1, P.Shyamala Madhuri2, V .Venkanna3 1Associate Professor, Bhimavaram Institute of Engg & Tech, Bhimavaram.
2Assistant Professor, Bhimavaram Institute of Engg & Tech, Bhimavaram.
3Assistant Professor, Srinivasa Institute of Engg & Tech, Amalapuram. |
311-313 [PDF] |