Title : Using Image Processing In Security

Author(s):  Pallavi R. Wahane, M. I. Talib, Vishal R. Parate

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.01 

Title : Fuzzy And Level Sets Based Design Approch Fof Brain Tumor Segmentation

Author(s):  Ms.Ashwini Thool1, Prof. Prashant R. Indurkar 2, Prof.S.M.Sakhare3

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.02 

Title : Text clustering for computer investigation with search optimization

Author(s):  Jameer Kotwal, Prajkta Varhade, Komal Koli, Roshni Gawande, Varsha Andhale

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.03 

Title : Digital Library: Using Hybrid Book Recommendation Engine

Author(s):  Prof. Sulbha Ghadling1, Kanchan Belavadi2, Shubhangi Bhegade3, Pradnya Ghojage4,Supriya Kamble5

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.04 

Title : Re-Ranking Based Image Categorization Using Saliency Driven Nonlinear Diffusion Filtering -A Review

Author(s):  Ms. Nisha Barsagade1, Prof. Mr. Mayur Dhait2

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.05 

Title : Review of Social Collaborative Filtering Recommender System’s Methods

Author(s):  1Pratibha Yadav, 2 Kumari Seema Rani, 3Sonia Kumari

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.06 

Title : Fast File Downloading Using Network Coding in Distributed System 

Author(s):  Prof. Ashvini Jadhav1, Pratik P. Raut2, Rohan S. Ghorpade3 , Vishal K. Raut4 , Chinmay Y. Kale5

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.07 

Title : A Survey-Decentralized Access Control with Anonymous Authentication and Deduplication of Data Stored in Clouds

Author(s):  Mr. Imran D. Tamboli1, Prof. Ranjana R. Badre2, Prof. Rajeshwari M. Goudar3

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.08 

Title : Position Based On Refining Aggregate Recommendation Assortment

Author(s): 1L. Pravin Kumar, 2Ramesh Krishnan


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.09 

Title : Bigdata Analysis In Health Care

Author(s): 1L. Pravin Kumar, 2Ramesh Krishnan

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.10 

Title : A Survey paper on An Effective Analytical Approaches for Detecting  Outlier in Continuous Time Variant Data Stream.

Author(s): Mr. Raghav M. Purankar 1 ,  Prof. Pragati Patil 2

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.11 

Title : Stability Analysis of A Non Vaccinated Sir Epidemic Model

Author(s): Prof. Dr. Sumit Kumar Banerjee


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.12 

Title : Programming Paradigms in the Context of the Programming Language

Author(s): 1Sonia Kumari, 2 Pratibha Yadav, 3 Kumari Seema Rani


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.13 

Title : A Survey Of Ontology Evaluation Techniques For Data Retrieval

Author(s): Harsh Shah, Parth Shah, Khushali Deulkar, Assistant Prof


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.14 

Title : A Review Of Inferring Latent Attributes From Twitter

Author(s): Surabhi Singh Ludu

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.15 

Title : The Interdisciplinary Nature Of Knowledge Discovery Databases And Data Mining

Author(s): T.Bharathi

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.16 

Title : Comparative Study Of Semantic Search Engines

Author(s): Vidhi Shah1, Akshat Shah 2and Asst. Prof. Khushali Deulkar3


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.17 

Title : Cognitive Perspective Of Attribute Hiding Factor Complexity Metric

Author(s): Francis Thamburaj1, A. Aloysius2

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.18 

Title : Ontology-Based Multi-Document Summarization.

Author(s): Bhakti Mehta ,Varsha Marathe ,Priyanka Padvi and Manjusha Shewale

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.19 

Title : Lung cancer detection and classification using Support Vector Machine

Author(s): Niranjan Shukla* Aakash Narayane*  Aniket Nigade* Krishnakumar Yadav* Mrs Harshada Mhaske*

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.20 

Title : Third Party Auditing of Data on Cloud With Fine Grained Updates

Author(s): Ajinkya Sabale1, Rohit Prajapati2,  Sameer Pathan3, Sanket Prabhu4 Prof .Sanjay Agrawal5

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.21 

Title : The Future Generation Intelligent System Need For Human Memory To Detect Crime Using Virtual Brain Technology.

Author(s): R.Uma1, S.Kavitha2,V.Ilakkiya3

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.22 

Title : Surveying Smartphone Security for Linux Powered Devices

Author(s): Sharan Shetty,Nitin Ranjan, Aditya Sharma Aman Prakash Singh,Rahul Koti, Mrs. D.A. Phalke(Guide) & Mr. Rahul Pawar(Co-Guide)

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.23 

Title : Gamma Corrected Bright Channel Filtering Based Fast Single Image De-hazing

Author(s): Navjot Kaur, Dr. Lalita Bhutani

 Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.24 

Title : Survey on Credit Card Fraud Detection Techniques 

Author(s): Priya Ravindra Shimpi, Prof. Vijayalaxmi Kadroli

 Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.25 

Title : Robust Construction Of Multiday Itinerary Planning

Author(s): Ms.P.Jayapriya #1, Mr.S.Gunasekaran *2, Ms.S.Nathiya*3


 Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.26 

Title : Secure data management system for patients and their doctor.

Author(s): Miss.Revati Wahul1, Miss.Eshaa Sood2, Miss.Julie Yohannan3, Miss.Zahra Budhwani4

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.27 

Title : Detection of Black Hole Attack in DTN with Authentication

Author(s): D.Humera1, M.VeereshBabu2


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.28 

Title : Energy Efficient Data Transfer In Mobile Wireless Sensor Network

Author(s): T . Mary RincyMol & Mrs.A.SahayaPrincyM.Tech


 Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.29 

Title : Performance Analysis of JPEG2000 for Different Wavelets Transforms in satellite images

Author(s): P.Krishnamoorthy1, V.P.Ajay2

  Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.30 

Title : Privacy And Detecting Malicious Packet Dropping In Wireless Ad Hoc Network

Author(s): M. Sindhuja & Mrs A.Sahaya Princy M.Tech


  Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.31 

Title : Providing Lifetime Optimization and Security in Wireless Sensor Network

Author(s): Sindhuja.R, Mrs.Vidhya.S


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.32 

Title : Secured Data in Cloud by Using LFSR

Author(s): Sumalatha Potteti1, Ravi Kumar Goura2


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.33 

Title : P – TSP Seasonal Constrained Model

Author(s): Vijayalakshmi R1, Gurava Raju P2, Sundara Murthy3


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.34 

Title : Dynamic and intelligent classifier for efficient retrieval from web mining

Author(s): M.Parvathi MCA, M.Phil1, .S.Thabasu Kannan,  M.TECh, Ph.D, MBA2


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.35 

Title : Hybrid visual servoing for tracking multiple targets with a swarm of mobile robots 

Author(s): Gossaye Mekonnen Alemu


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.36 

Title : A Survey of Commonly Used Cryptographic Algorithms in Information Security

Author(s): Manjula G.1  and Dr. Mohan H.S.2


Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.37 

Title : Study of Classification of Diseases by Genetic Algorithm for Multiclass Support Vector Machine Using Hadoop

Author(s): Mr.Ankit R. Deshmukh 1, Prof.S.P.Akarte 2

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.38 


Author(s): Fasiha ShereenB A Sharath Manohar2 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.39 

Title : Performance Measures for a three-unit compact circuit

Author(s): Ashish Namdeo1 ,V.K. Pathak2 & Anil Tiwari3 

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.40 

Title : Comparisons Of Restored Blurred-Noisy Dental Images Using Wiener Filter And Lucy-Richardson Technique

Author(s): Aanchal JosephMr. Sandeep B. Pati

Cross Ref DOI : http://dx.doi.org/10.18535/ijecs/v4i11.41 

Call For Paper

Submissions open for VOLUME 06. ISSUE 01. You may submit your research / review / survey papers from today.

Last  Submission Date: Jan 24, 2017

Issue Publication last Date: Jan 30, 2017

Article Publication: with in 6 Day 

Submit Online : Click Here to Submit

Read More



About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology


Address : 20 manglam vihar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (777) 189 36 00

Email: editor@ijecs.in

Go to top