Title : Using Image Processing In Security

Author(s):  Pallavi R. Wahane, M. I. Talib, Vishal R. Parate

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.01 



Title : Fuzzy And Level Sets Based Design Approch Fof Brain Tumor Segmentation

Author(s):  Ms.Ashwini Thool1, Prof. Prashant R. Indurkar 2, Prof.S.M.Sakhare3

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.02 



Title : Text clustering for computer investigation with search optimization

Author(s):  Jameer Kotwal, Prajkta Varhade, Komal Koli, Roshni Gawande, Varsha Andhale

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.03 



Title : Digital Library: Using Hybrid Book Recommendation Engine

Author(s):  Prof. Sulbha Ghadling1, Kanchan Belavadi2, Shubhangi Bhegade3, Pradnya Ghojage4,Supriya Kamble5

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.04 



Title : Re-Ranking Based Image Categorization Using Saliency Driven Nonlinear Diffusion Filtering -A Review

Author(s):  Ms. Nisha Barsagade1, Prof. Mr. Mayur Dhait2

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.05 



Title : Review of Social Collaborative Filtering Recommender System’s Methods

Author(s):  1Pratibha Yadav, 2 Kumari Seema Rani, 3Sonia Kumari

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.06 



Title : Fast File Downloading Using Network Coding in Distributed System 

Author(s):  Prof. Ashvini Jadhav1, Pratik P. Raut2, Rohan S. Ghorpade3 , Vishal K. Raut4 , Chinmay Y. Kale5

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.07 



Title : A Survey-Decentralized Access Control with Anonymous Authentication and Deduplication of Data Stored in Clouds

Author(s):  Mr. Imran D. Tamboli1, Prof. Ranjana R. Badre2, Prof. Rajeshwari M. Goudar3

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.08 



Title : Position Based On Refining Aggregate Recommendation Assortment

Author(s): 1L. Pravin Kumar, 2Ramesh Krishnan

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.09 



Title : Bigdata Analysis In Health Care

Author(s): 1L. Pravin Kumar, 2Ramesh Krishnan

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.10 



Title : A Survey paper on An Effective Analytical Approaches for Detecting  Outlier in Continuous Time Variant Data Stream.

Author(s): Mr. Raghav M. Purankar 1 ,  Prof. Pragati Patil 2

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.11 



Title : Stability Analysis of A Non Vaccinated Sir Epidemic Model

Author(s): Prof. Dr. Sumit Kumar Banerjee

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.12 



Title : Programming Paradigms in the Context of the Programming Language

Author(s): 1Sonia Kumari, 2 Pratibha Yadav, 3 Kumari Seema Rani

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.13 



Title : A Survey Of Ontology Evaluation Techniques For Data Retrieval

Author(s): Harsh Shah, Parth Shah, Khushali Deulkar, Assistant Prof

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.14 



Title : A Review Of Inferring Latent Attributes From Twitter

Author(s): Surabhi Singh Ludu

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.15 



Title : The Interdisciplinary Nature Of Knowledge Discovery Databases And Data Mining

Author(s): T.Bharathi

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.16 



Title : Comparative Study Of Semantic Search Engines

Author(s): Vidhi Shah1, Akshat Shah 2and Asst. Prof. Khushali Deulkar3

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.17 



Title : Cognitive Perspective Of Attribute Hiding Factor Complexity Metric

Author(s): Francis Thamburaj1, A. Aloysius2

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.18 



Title : Ontology-Based Multi-Document Summarization.

Author(s): Bhakti Mehta ,Varsha Marathe ,Priyanka Padvi and Manjusha Shewale

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.19 



Title : Lung cancer detection and classification using Support Vector Machine

Author(s): Niranjan Shukla* Aakash Narayane*  Aniket Nigade* Krishnakumar Yadav* Mrs Harshada Mhaske*

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.20 



Title : Third Party Auditing of Data on Cloud With Fine Grained Updates

Author(s): Ajinkya Sabale1, Rohit Prajapati2,  Sameer Pathan3, Sanket Prabhu4 Prof .Sanjay Agrawal5

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.21 



Title : The Future Generation Intelligent System Need For Human Memory To Detect Crime Using Virtual Brain Technology.

Author(s): R.Uma1, S.Kavitha2,V.Ilakkiya3

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.22 



Title : Surveying Smartphone Security for Linux Powered Devices

Author(s): Sharan Shetty,Nitin Ranjan, Aditya Sharma Aman Prakash Singh,Rahul Koti, Mrs. D.A. Phalke(Guide) & Mr. Rahul Pawar(Co-Guide)

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.23 



Title : Gamma Corrected Bright Channel Filtering Based Fast Single Image De-hazing

Author(s): Navjot Kaur, Dr. Lalita Bhutani

 Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.24 



Title : Survey on Credit Card Fraud Detection Techniques 

Author(s): Priya Ravindra Shimpi, Prof. Vijayalaxmi Kadroli

 Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.25 



Title : Robust Construction Of Multiday Itinerary Planning

Author(s): Ms.P.Jayapriya #1, Mr.S.Gunasekaran *2, Ms.S.Nathiya*3

 

 Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.26 



Title : Secure data management system for patients and their doctor.

Author(s): Miss.Revati Wahul1, Miss.Eshaa Sood2, Miss.Julie Yohannan3, Miss.Zahra Budhwani4

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.27 



Title : Detection of Black Hole Attack in DTN with Authentication

Author(s): D.Humera1, M.VeereshBabu2

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.28 



Title : Energy Efficient Data Transfer In Mobile Wireless Sensor Network

Author(s): T . Mary RincyMol & Mrs.A.SahayaPrincyM.Tech

 

 Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.29 



Title : Performance Analysis of JPEG2000 for Different Wavelets Transforms in satellite images

Author(s): P.Krishnamoorthy1, V.P.Ajay2

  Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.30 



Title : Privacy And Detecting Malicious Packet Dropping In Wireless Ad Hoc Network

Author(s): M. Sindhuja & Mrs A.Sahaya Princy M.Tech

 

  Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.31 



Title : Providing Lifetime Optimization and Security in Wireless Sensor Network

Author(s): Sindhuja.R, Mrs.Vidhya.S

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.32 



Title : Secured Data in Cloud by Using LFSR

Author(s): Sumalatha Potteti1, Ravi Kumar Goura2

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.33 



Title : P – TSP Seasonal Constrained Model

Author(s): Vijayalakshmi R1, Gurava Raju P2, Sundara Murthy3

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.34 



Title : Dynamic and intelligent classifier for efficient retrieval from web mining

Author(s): M.Parvathi MCA, M.Phil1, .S.Thabasu Kannan,  M.TECh, Ph.D, MBA2

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.35 



Title : Hybrid visual servoing for tracking multiple targets with a swarm of mobile robots 

Author(s): Gossaye Mekonnen Alemu

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.36 



Title : A Survey of Commonly Used Cryptographic Algorithms in Information Security

Author(s): Manjula G.1  and Dr. Mohan H.S.2

 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.37 



Title : Study of Classification of Diseases by Genetic Algorithm for Multiclass Support Vector Machine Using Hadoop

Author(s): Mr.Ankit R. Deshmukh 1, Prof.S.P.Akarte 2

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.38 



Title : HIGHLY SECURE REVERSIBLE WATERMARKING MECHANISM USING REVERSIBLE DE-IDENTIFICATON

Author(s): Fasiha ShereenB A Sharath Manohar2 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.39 



Title : Performance Measures for a three-unit compact circuit

Author(s): Ashish Namdeo1 ,V.K. Pathak2 & Anil Tiwari3 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.40 



Title : Comparisons Of Restored Blurred-Noisy Dental Images Using Wiener Filter And Lucy-Richardson Technique

Author(s): Aanchal JosephMr. Sandeep B. Pati

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.41 


GettyImages.pngace.pngajdh.pngarx.pngcit.pngcomp.pngcross.pngicn.pngino.pnglogo_wcmasthead_en.pngres.pngresbib.pngsci.pngscic.pngscics.pngsearch_logo.gifulrich.pngur.png

FaceBook

About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology

Address

Address : LIG 73 megdoot Nagar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (822) 260 24 694

Email: editor@ijecs.in

Go to top