Contact us
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
ISSN 2278-6856
Frequency : 6 Issues/Year
E-mail: editor@ijettcs.org
Volume 3, Issue 2, March-April 2014
S. No. | TITLE | PAGE NO. |
---|---|---|
01 |
Segmentation Of Medical Image Using
Fuzzy Neuro Logic
P.Priyadharsini1, I .Rexiline Sheeba2 1PG scholar, Sathyabama University, Chennai, India.
2Assistant Professor /ECE Department, Sathyabama University, Chennai, India. |
001-003 |
02 |
Analysis of various possible threats in VoIP in
order to design network security mechanism
Navneet Kumar Verma1 and Rahul Saxena2 1&2School of Computer & Systems Sciences, Jaipur National University,
Near New RTO, Jagatpura, Jaipur |
004-006 [PDF] |
03 |
A More Robust Text Based CAPTCHA For
Security in Web Applications
Mumtaz M. Ali AL-Mukhtar1 and Rana Riad K. AL-Taie2 1&2AL-Nahrain University, Information Engineering College,
Baghdad, Iraq |
007-012 [PDF] |
04 |
RF Attendance System Framework for
Faculties of Higher Education
Ms. Unnati A. Patel1 Dr. Swaminarayan Priya R2 1Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India
2Head & ProfessorHH, MCA Department, ISTAR, V.V.Nagar-388120, India |
013-017 [PDF] |
05 |
Fine-Tuned Content-Based Recommender
System Based on Apache Lucene.
Umar Bashir Mir1, Mubbashir Nazir2 and Anuj Yadav3 1,2M.Tech Scholar Department of Computer Science & Information Technology DIT University Dehradun
3Assistant Professor Department of Computer Science & Information Technology DIT University Dehradun |
018-020 [PDF] |
06 |
Research Paper Has been deleted
|
021-022 |
07 |
MAXTRADE SUITE FOR TRADE WITH
DATA PRIVACY ACCESS
|
023-025 [PDF] |
08 |
Network Security Comparision between
IPSec and GRE
1Sridevi, 2Dr.Manjaiah.D.H1Assistant Professor, Department of Computer Science, Karnatak University,Dharwad. 2Professor, Department of Computer Science, Managalore Univeristy,Mangalore. |
026-031 [PDF] |
09 |
Using Persuasive Technology in Click Based
Graphical Passwords
Ms. Shilpa Veerasekaran 1, Prof. Alka Khade 2, Prof. V.B Gaikwad 3 1,2&3Dept of Computer Engineering, Terna Engineering College
Nerul, Navi-Mumbai-400706, India |
032-035 [PDF] |
10 |
A Fuzzy Logic based Human Behavioural
Analysis model using Facial Feature Extraction
with Perceptual Computing
T. R. Chandrashekhar1, Dr. K B ShivaKumar2, D R Shashikumar3, Arvind K. Gautam4 and Rupam Das5 1Research Scholar, Mewar University, India
2Professor, Department of Telecommunication, SSIT, Tumkur, India
3Professor, Cambridge Institute of Technology, Bangalore, India
4Principal, S D College of Eneering, Muzzaffarnagar, India
5Technical Head, Integrated Ideas, India |
036-041 [PDF] |
11 |
Performance of Various Sense Amplifier
Topologies in sub100nm Planar MOSFET
Technology
Parita Patel1, Sameena Zafar2 and Hemant Soni31Rajiv Gandhi Proudyogiki Vishwavidyalaya, Patel College Of Science & Technology, Ratibad, 462044,India 2,3Patel College Of Science & Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Ratibad, 462044,India |
042-049 [PDF] |
12 |
Study and Analysis of Performance of Spatial
Multiplexing equalizer for Transmit-Receive
Diversity
Rajvirsinh. C Rana1, Dr.Jagdish M Rathod2 1School of Engineering, RK University, Rajkot, India
2Birla Vishvakarma Mahavidyalaya, Electronics Dept.,
V.V.Nagar, Gujarat 388120, India |
050-053 [PDF] |
13 |
Performance Evaluation of Web Search Result
Clustering and Labeling
B R Prakash1 and Hanumanthappa M 2 1Research Scholar, Department of Computer Science & Applications,
Bangalore University, Bangalore. INDIA.
2Professors, Department of Computer Science & Applications,
Bangalore University, Bangalore. INDIA. |
054-060 |
14 |
Robust and Fast Iris Localization Using
Contrast Stretching and Leading Edge
Detection
Iman A. Saad1,2 , Loay E. George3 1Department of Mathematics, College of Science, University of Alepo, Alepo, Syria
2Electronic Computer Center, Al-Mustansiriyah University, Baghdad, Iraq
3Department of Computer Science, College of Science, University of Baghdad, Baghdad, Iraq |
061-067 [PDF] |
15 |
Computer Virus Detection Based on Artificial
Immunity Concept
Hamza A. ali1 and Duaa Jawad Hussain2 1Faculty of Information Technology, Isra University, Queen Alia Airport Road, Amman, Jordan
2College of Engineering, University of Basrah, Garmet Ali, Basrah, Iraq. |
068-074 [PDF] |
16 |
Review of Cloud Computing Environment
Amandeep Kaur1, Jasjit Kaur2 1&2Dept. of Computer Science & Engineering, Guru Nanak Dev
University Amritsar, Punjab, 143001, India |
075-080 [PDF] |
17 |
Automatic Resistance detection and Abrasion
testing of copper wire used in transformer or
motor windings by ARM 7 processor
Amruta Patil and Prof. R. M. Khaire Department of E&TC Engg., BVDUCOE, Pune |
081-084 [PDF] |
18 |
Improved Visibility Restoration Using Edge
Preserving Guided Filter
Harjot Singh, Prabhpreet Kaur Department of Computer Science engineering, Guru Nanak Dev University, Amritsar (Pb.) India |
085-090 [PDF] |
19 |
Mint-Route to Avoid Congestion in
Wireless Sensor Network
|
091-094 [PDF] |
20 |
A Comparative Study of Data Analysis
Techniques
Prateek Bihani1 and S. T. Patil21&2Pune University, Vishwakarma Institute of Technology, Bibewadi, Pune 411037, India |
095-101 [PDF] |
21 |
Improved Aggressive Update Propagation
Technique in Cloud Data Storage
Mohammed Radi Computer science department, Faculty of applied science,
Alaqsa University Gaza |
102-106 [PDF] |
22 |
Implementation of Speech Synthesis system
using Neural Networks
Dr. Aishwarya P Professor, Dept.of CSE, Atria Institute of Technology,
Bangalore |
107-110 |
23 |
Cloud Computing Security: Risks and Threats
GD Makkar1, Vivek Panwar2 1&2GRDIMT, Deptartment of CSE,
Dehradun 248001, India |
111-116 |
24 |
Performance Evaluation of CMA Blind Channel
Equalization for 4-QAM Modulation
Joshua Madhukar Singh1, Alisha Khan2, Akansha Gupta3, Vipul Pathak4 and Rohit Sindhvani5 1Assistant Professor Teerthankar Mahaveer University, India
2,3,4,5 M.Tech Scholars Teerthankar Mahaveer University, India |
117-120 |
25 |
Handling node self-centeredness in replica
allocation over MANET
1Prof. Shobha Lolge, 2Neha Baheti 1Lecturer, Department of Computer Engineering,
Lokmanya Tilak College of Engineering, Koparkhairne,
Navi Mumbai, India
2Lokmanya Tilak College of Engineering, Koparkhairne,
Navi Mumbai, India |
121-122 [PDF] |
26 |
Signal Attenuation in Powerline
Communication Channel
Dipashree Duche, Prof.Vidya Gogate Shah And Anchor Kutchhi Engineering College Mumbai University
W.T. Patil Marg , Next to Dukes Co., Chembur, Mumbai,
Maharashtra 400088, India. |
123-130 [PDF] |
27 |
A Novel Hybrid Approach for Multi-focus Image
Fusion using Fuzzy Logic and Wavelets
Myna.A.N.1, J.Prakash2 1M.S..Ramaiah Institute of Technology,
Research Scholar, Bangalore Institute of Technology
2Bangalore Institute of Technology, Bangalore |
131-138 [PDF] |
28 |
Modified Dynamic MANET On-demand
(DYMO) Routing protocol
Sumanta Kumar Deb1, Himadri Nath Saha2, Dr. Debika Bhattacharya3, Dr. P K Banerjee4 1University of Engineering & Management, Dept. of Computer Science & Engineering,
Jaipur, Rajasthan, India
2&3Institute of Engineering & Management, Dept. of Computer Science & Engineering,
Salt Lake City, Sector V, Kolkata, West-Bengal, India
4JadavpurUniversity, Dept. of Computer Science & Engineering,
Jadavpur, Kolkata, West-Bengal, India |
139-144 [PDF] |
29 |
Review on Exploring User’s Surfing Behavior
for Recommended Based System
Mr. Ajeetkumar S. Patel1, Prof. Anagha P. Khedkar2 1Department of Computer Engineering,
Matoshri College of Engineering and Research Center,
Nashik, India
2Department of Information Technology,
Matoshri College of Engineering and Research Center,
Nashik, India |
145-150 [PDF] |
30 |
Survey on Job Scheduling algorithms in Cloud
Computing
|
151-154 [PDF] |
31 |
Classification of Breast Cancer using
Differential Evolution and LeastSquares
Support Vector Machine
1Omar S.Soliman, 2Eman AboElHamd1,2Faculty of Computers and Information,Cairo University, Egypt |
155-161 [PDF] |
32 |
Enhanced Image Compression using
modified Color Filter Array
Sanjeev Singla1 , Abhilasha2 1&2GZS PTU Campus, CSE Deptt. Bathinda, Punjab |
162-169 [PDF] |
33 |
Implementation and Analysis of Network
Security using HASBE
Rajesh Gaikwad1, Prof. Dhananjay M. Dakhane2 and Prof. Ravindra L. Pardhi3 1 Viva College, University of Mumbai, Dept. of Computer Science
M. B. Estate, Rammandir Road, Virar 401303 India
2&3 Associate Professor, Dept. of Computer Science and Engineering,
Sipna College of Engineering and Technology, Amravati, Maharashtra, India. |
170-174 [PDF] |
34 |
EOSRWQOS: An Energy Efficient Secured
Routing for MANETs
1 K Sreenivasulu, 2 Dr.E V Prasad, 3 Dr. A. Subramanyam 1 Department of Computer Science & Engineering,
Madina Engineering College, Kadapa, A.P. India.
2 Director & Professor of CSE, Lakireddy Balireddy College of Engineering
Mylavaram, VijayawadaA..P India.
3 Principal & Professor of CSE,
AITS, Rajampet, Kadapa. A.P India |
175-179 |
35 |
ELECTRONIC TOLL COLLECTION SYSTEM
USING BARCODE LASER TECHNOLOGY
Sanchit Agarwal, Shachi Gupta, Nidheesh Sharma Dr. K.N.Modi Institute Of Engineering & Technology,
Modinagar, Ghaziabad U.P. India |
180-182 [PDF] |
36 |
Comparative Study of Various Graph Layout
Algorithms
Mayur Narkhede1, Dr. S. T. Patil2 and Vrushali Inamdar3 1M.Tech CSE/IT, Vishwakarma Institute of Technology, Pune, India
2Prof., Vishwakarma Institute of Technology, Pune, India
3Team Lead, Persistent Labs, Pune, India |
183-188 [PDF] |
37 |
DNA based Cryptography in Multi-Cloud:
Security Strategy and Analysis
Richa H. Ranalkar1, Prof. B.D. Phulpagar2 1&2Pune University, Department of Computer Engineering,
Modern College of Engineering, Shivajinagar, Pune – 05, India |
189-192 [PDF] |
38 |
“WEEE Recycling: Impact on Life and the
Environment in INDIA”
Pooja Vashishta1, Sumiti Kapoor2 1DIT University, Dehradun 248009, India
2IMS Unison University, Dehradun 248009, India |
193-199 [PDF] |
39 |
Comparative Analysis of Classification
Techniques on Soil Data to Predict Fertility
Rate for Aurangabad District
Vrushali Bhuyar Assistant Professor, Dept. of MCA, Marathwada Institute of Technology,
Aurangabad, Maharashtra, INDIA |
200-203 [PDF] |
40 |
Improvement In The Usability Of GIS Based
Services By Applying Semantic Ontology
|
204-207 [PDF] |
41 |
ANTRANK: AN ANT COLONY ALGORITHM
FOR RANKING WEB PAGES
G. Anuradha 1, G. Lavanya Devi 2 and M.S Prasad Babu31Research Scholar, Dept. of CS&SE, Andhra University, Visakhapatnam, India 2Assistant Professor, Dept. of CS&SE, Andhra University, Visakhapatnam, India 3 Professor, Dept. of CS&SE, Andhra University, Visakhapatnam, India |
208-212 [PDF] |
42 |
EMBEDDED IMAGE CAPTURING SYSTEM
USING RASPBERRY PI SYSTEM
G.Senthilkumar1, K.Gopalakrishnan2 , V. Sathish Kumar3 1Associate Professor & Head, Department of Electronics S.N.R Sons College, Coimbatore, India.
2Professor of Electronics, Bharath University, Chennai-73, India
3Asst. Prof in Electronics, S.N.R Sons College, Coimbatore , India |
213-215 [PDF] |
43 |
E-Commerce: an Emerging era of Business
using Technology in India
Parul Shri Baba Mastnath Engineering College, Rohtak |
216-217 [PDF] |
44 |
An Approach for Information Retrieval:
Kay’s Algorithm
Karanbir Singh1, Richa Sapra2 1Lovely Professional University, Department of Computer Science and Engineering,
Jalandhar-Phagwara Road, Punjab, India
2School of Computer Science and Engineering, Lovely Professional University,
Jalandhar-Phagwara Road, Punjab, India |
218-222 |
45 |
KOMKAR: An Efficient Algorithm for ERecommendation
Komal Gupta1, Karanvir Kaur2 1Lovely Professional University, Department of Computer Science and Engineering,
Jalandhar-Phagwara Road, Punjab, India
2School of Computer Science and Engineering, Lovely Professional University,
Jalandhar-Phagwara Road, Punjab, India |
223-227 [PDF] |
46 |
Significance of DOI Model for Adoption of
Cloud Computing
Suman Kishore Mathur1, Harsh V Verma2 1Dr. V. N. Bedekar Institute of Management Studies,
Thane,(Mumbai)- Maharashtra.
2Faculty of Management Studies (FMS),
Delhi University- Delhi. |
228-232 [PDF] |
47 |
Video Processing Based Water Surface Velocity
Measurement Using Spatial Cross Correlation
Technique
Nitika Sharma1, Selva Balan2, A. A. Naik 3 1Electronics and Telecomm. Engineering Dept.,Maharashtra Institute of Technology,Pune, India
2Instrumentation and Control Dept.,Central Water and Power Research Station,Pune, India
3Electronics and Telecomm. Engineering Dept.,Maharashtra Institute of Technology,Pune, India |
233-236 [PDF] |
48 |
RELATIVE STUDY OF MULTIPATH
EXTENSIONS OF AODV
Vishal Patel1, Prof. Amit Lathigara2 1RK University, School of Engineering, CE Department
Bhavnagar Road, Rajkot 360002, India
2 RK University, School of Engineering, HOD CE Department
Bhavnagar Road, Rajkot 360002, India |
237-239 [PDF] |
49 |
Comparison and Analysis of Various Clustering
Methods in Data mining On Education data set
Using the weak tool
Suman 1 and Mrs.Pooja Mittal2 1 Student of Masters of Technology,
Department of Science and Application M.D. University, Rohtak, Haryana, India
2Assistant Professor
Department of Computer Science and Application M.D. University, Rohtak, Haryana, India |
240-244 |
50 |
Measuring Software Security using MACOQR
(Misuse and Abuse Case Oriented Quality
Requirements) Metrics: Attacker’s Perspective
C. Banerjee1, Arpita Banerjee2 and P. D. Murarka3 1Amity Institute of Information Technology, Amity University,
Jaipur, Rajasthan, India
2Department of Computer Science, St. Xavier’s College, Rajasthan University,
Jaipur, Rajasthan, India
3Department of Computer Science Engineering, Arya College of Engineering and Technology
Jaipur, Rajasthan, India
|
245-250 [PDF] |
51 |
Secure Replication management in
cloud storage
Subeg Singh1, Richa Sapra2 1Lovely Professional University, Department of Computer Science
and Engineering, Jalandhar-Phagwara Road,
Punjab, India
2School of Computer Science and Engineering, Lovely Professional
University, Jalandhar-Phagwara Road,
Punjab, India |
251-254 [PDF] |
52 |
E-Governance in Southern States of India -
Towards Whole-of-Government (WoG)
Lakshmi Devasena C1 and Punitha Lakshmi Balraj2 1IBS Hyderabad, IFHE University,India
2Independent Researcher in E-Governance, India |
255-262 [PDF] |
53 |
Online handwritten signature verification
system: A Review
Prathiba M.K.1 and Dr. L. Basavaraj2 1Visvesvaraya technological University,
ATME College of Engineering, Mysore-570 028, India.
2 Visvesvaraya technological University,
ATME College of Engineering, Mysore-570 028, India. |
263-267 [PDF] |
54 |
Review on implementation of multi touch
interactive display surface
Miss. Medha Joshi1, Prof. Sonal Patil 2 1PG Student, Department of Computer Science and Engineering, G.H.Raisoni Institute of Engineering and Management,
Shirsoli Road, Mohadi, Jalgaon. 425002, Maharashtra
2Asstt.Proffesor, Department of Computer Science and Engineering, G.H.Raisoni Institute of Engineering and Management,
Shirsoli Road, Mohadi, Jalgaon. 425002, Maharashtra |
268-270 [PDF] |
55 |
Simulation and Analysis of DDoS Attacks by
Specialized Simulator using Virtualization
|
271-273 [PDF] |
56 |
Consonance of single video based on
isolated image
Suganyalakshmi1, Berlin21Anna University, Department of computer science and engineering, RMD Engineering college, India 2Department of Computer Science and Engineering, Anna University, RMD Engineering college, India |
274-277 [PDF] |
57 |
Smart Video Stabilization System to Remedy
Complex 2D Camera Movements
Dr. Abdulamir Abdullah Karim1, Noor H. Abdul Ameer2 1,2 University of Technology, School, Computer Science Dept. |
278-281 [PDF] |
58 |
Network Based Intrusion Detection System
using Genetic Algorithm: A Study
1Purushottam Patil, 2Dr. Yogesh Sharma and 3Dr. Manali Kshirsagar 1Research Scholar (Computer Science & Engineering), Faculty of Engineering & Technology,
Jodhpur National University, Jodhpur (RJ), India.
2Professor (Mathematics), Department of Applied Science, Faculty of Engineering & Technology,
Jodhpur National University, Jodhpur(RJ), India
3Professor & Dean (Student Affair), Department of Computer Technology,
Yashwantrao Chavan College of Engineering, Nagpur(MS), India. |
282-286 [PDF] |
59 |
A Secure Framework for Data Security in
Cloud Computing
|
287-291 [PDF] |
60 |
Analysis of Large Web Sequences using
AprioriAll_Set Algorithm
Dr. Sunita Mahajan 1, Prajakta Pawar 2 and Alpa Reshamwala 31 Principal ,Institute of Computer Science, MET, Mumbai University, Bandra, Mumbai, India 2 M.Tech Student , Computer Engineering Department, MPSTME, SVKM’s NMIMS University, Mumbai, India 3 Assistant Professor, Computer Engineering Department, MPSTME, SVKM’s NMIMS University, Mumbai, India |
292-296 [PDF] |
61 |
An Efficient Algorithm For The Diagnosis Of
Alzheimer Disease By Using MATLAB
Mohd. Suhaib Kidwai1, Ayan M. Khan2 1&2Assistant Professor, Department of Electronics and Communication,
Integral University, Lucknow |
297-298 [PDF] |
62 |
Selection and maintenance of software artifacts
during testing to improve the quality of
software
Ankita Dwivedi1 and Navneet Kumar Verma2 1Research Scholoar, Apaji Institute of Mathematics & Applied computer technology, Banasthali Vidyapith
2School of Computer and Systems Sciences, Jaipur National University |
299-303 [PDF] |