Title: Personalized Web Search with Custom Privacy Preservation

Author(s): Swapna Desale1, Prof. Jyothi Rao2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.01



Title: Secured Icmp Based Ip Traceback Scheme To Trace The Spoofed Ip Locations

Author(s): V. Mariyammal1,  Dr.K.Thamodaran2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.02



Title: A Novel approach to prevent launching of attacks in MANETS using Bait tracing setup

Author(s): Sushma K R, Mrs.Renuka malge

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.03



Title: Comparative Analysis of Soft Computing Based Load Balancing Techniques in Cloud Environment: A Review

Author(s): Sapna1, Pooja Nagpal2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.04



Title: Intrusion Detection System Using Machine Learning Approach

Author(s): P.Akshaya

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.05



Title: Optimized Secure Image Transmission approach Lossless Secret Image Recovery Based on Secret Fragmented Mosaic Images

Author(s): Ankoji Pavan (M.Tech.)1 K. Ramanjaneyulu M.Tech, Associate Professor2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.06



Title: An Efficient Approach for Secure Data Hiding Using Cryptography

Author(s): Reetu1, Ms.Mamta2, Mr. Satish Dhull3

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.07



Title: MATLAB/Simulink of a Solar Photovoltaic System through Cuk Converter

Author(s): Prinkesh Soni1, Ankush Yadav2, Rakesh Singh Lodhi3, Amit Solanki4

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.08



Title: An Efficient and Scalable Technique for Texture Analysis to Obtain in IR Model

Author(s): Akanxa Mishra, Namrata Sharma

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.09



Title: Reinforcement of Event Streams by Obfuscation over Multitudinous Correlations

Author(s): #1 N. Pavani , #2 P. Pothuraju

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.10



Title: An Enhanced Secure Image Cryptography based on RC6 and RSA to Minimize Entropy and Improve Correlation

Author(s): Pooja Chaturvedi, Chetan Gupta

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.11



Title: Emotion Speech Recognition System For Isolated Words In Marathi Language

Author(s): Asmita Gajarishi1, Shital Sukre2, Dhanashri Rachetti3, Pratik Kurzekar4

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.12



Title: Publish/Subscribe Systems Security through Distinct Identity Encryiption

Author(s): #1 R. Kiranmayi,  #2 P. Pothuraju

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.13



Title: Fixed Point Theorem in Weakly Compatible Self Mappings on Complete Metric Space

Author(s): Dr.M.Ramana Reddy,

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.14



Title: Filter Bubble: How to burst your filter bubble

Author(s): Sneha Prakash

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.15



Title: Simulation of Steerable Gaussian Smoothers using VHDL

Author(s): Sharanabasava, Syed Gilani Pasha

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.16



Title: Study of Unified Power Quality Conditioner for Power Quality Improvement

Author(s): Anupam Ojha1, Amit Solanki2, Rakesh Singh Lodhi3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.17



Title : Loss Less Data Embedding In the Motion Predicted Vectors for Video Sequences

Author(s): K.Sridhar 1, Dr. Syed Abdul Sattar2, Dr. M.Chandra Mohan3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.18



Title: Privacy Preserving in Data Mining to Protect Privileged information in Ad-hoc Network

Author(s): Dillip Kumar Swain1, Sarojananda Mishra2, Sasmita Mishra3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.19



Title: Cone metric spaces and fixed point theorems of contractive mappings

Author(s): C Vijender

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.20



Title: Characterization of Advanced Encryption Standard (AES) for Textual and Image data

Author(s): S. Rehman 1*, S.Q. Hussain 1 , W.Gul 2 and Israr 3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.21



Title: Automated diagnosis of  Lungs Tumor Using Segmentation Techniques

Author(s): S.Piramu Kailasam1,Dr. M. Mohammed Sathik 2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.22



Title: Mobile Printer with Bluetooth Compatibility Using Raspberry PI

Author(s): G.Jhansi, S.Saraswathi

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.23



Title: Enhanced Way of Association Rule Mining With Ontology

Author(s): T.Bharathi, Dr. A.Nithya

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.24



Title: Scheduling Virtual Machines across Data Centres in accordance to availability of Renewable Sources of Energy

Author(s): G Krishna Vasudeva Rao, K Premchand

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.25



Title: Vein Pattern Recognition: A secured way of Authentication

Author(s): Navjot Kaur1, Paritosh Chopra2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.26



Title: Modelling and Design Analysis for Nonlinear 3D Dynamic Simulation of Triangular Microspring for MEMS based SAM

Author(s): Swati Rastogi1, Surya Prakash1, S.P.Duttagupta1, H.Muthurajan2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.27



Title: Speech Recognition using e-Speaking: A Review

Author(s): Anju Bisen1 , Krishna Hirpara2, Madhu3, Roshani Rathore4

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.28



Title: Visual Crypto-Steganography in Images

Author(s): Pranav Swaminathan, Tejas Dani, Ronak Bhatia, Shubhankur Jain, Paulami Shah

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.29



Title: Enhancing the Security of Data Using DES Algorithm along with Substitution Technique

Author(s): Yashwant kumar1, Rajat joshi2, Tameshwar mandavi3, Simran bharti4, Miss Roshni Rathour5

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.30



Title: An Efficient Method for Finding Closed Subspace Clusters for High Dimensional Data

Author(s): S. Anuradha1, K.B. Madhuri2, B. Jaya Lakshmi3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.31



Title: Finite Element Analysis Of Linear Elastic Torsion For Regular Polygons

Author(s): H.T. Rathoda*, K. Sugantha Devi b,  C.S.Nagabhushana c , H.M.Chudamani d

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.33



Title: Cloud Key Bank: Privacy and Owner Approval Of Required Primary Management Scheme

Author(s): Aarti Bhoi , Ashwini Madan , Tejal Khandave

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.34



Title: Pulsed Latches Methodology to Attain Reduced Power and Area Based On Shift Register

Author(s): Cheekati Sirisha (M.Tech), Department of ECE (VLSI& Es) 1, K. Prakash M.Tech., Assistant Professor 2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.35



Title: Optimized Test compression bandwidth management for Ultra-large-Scale System-on-Chip Architectures performing Scan Test Bandwidth Management

Author(s): Vengala Abhilash (M.Tech), Department of ECE (VLSI& Es) 1 J. Pushparani M.Tech., Assistant Professor 2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.36



Title: A Review on Feature Extraction Techniques for Speech Processing

Author(s): Amandeep Singh Gill

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.37



Title: A Study on Performance Modelling and Analysis of Network on Chip under M-Port N-Tree Bursty Traffic

Author(s): A.Malathi1*, M.Theinmozhi2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.38



Title: MongoDB for Read Intensive Cases Using YCSB

Author(s): Adarsh Kumar1, Anita Ganpati2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.39



Title: Stochastic Modeling for Analyzing Scalability Impact of Lottery Scheduling using Proportion Reformation

Author(s): Manish Vyas1, Dr. Saurabh Jain2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.40



Title: Turbo Diesel Engine Exhaust: Advancement at the cost of health –A Review

Author(s): Bhaskar Chaturvedi1, Uttkarsh Rawat1, Tanish Aggarwal1, Shriyash Mohril2, Mahipal Singh Sankhla3, Dr. Rajeev Kumar4

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.41



Title: Implementation of Automatic Retina Exudates Segmentation Algorithm for Early Detection with Low Computational Time

Author(s): B. Sumanjali (M.Tech.)1 K. Nagaiah Professor Ph.D 2 B. Anitha Associate Professor3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.42



Title: A Concise Study about Data Mining Methods, Tools and Its Trendy Applications

Author(s): C.Thangamalar1, R.Ramya2, R.Lavanya3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.43



Title: Mobile Apps Fraud Detection Using Raking

Author(s): D.Uma Maheswari, S.Jassica Saritha

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.44



Title: An Enhanced Light-weight Proactive Source Routing Protocol using DIFT-BFHS for MANET

Author(s): 1Dr. N. Rama, 2 Justin Sophia. I

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.45



Title: Offline Handwriting Character Recognition (for use of medical purpose) Using Neural Network

Author(s): Sanjay Kumar1, Narendra Sahu 2, Aakash Deep 3, Khushboo Gavel4, Miss Rumi Ghos

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.46



Title: A Review on Prediction of User Action Interpretation for Online Content Optimization

Author(s): Mr. Pratik V. Pande1, Dr. M.A.Pund2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.47



Title: Fusion Layer Topological Space Query Indexing For Uncertain Data Mining

Author(s): M. Kalavathi, Dr. P. Suresh

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.48



Title: Blood group Detection and RBC, WBC Counting: An Image Processing Approach

Author(s): Akshaya P. Sahastrabuddhe1, Dr. Sayyad D. Ajij 2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.49



Title: Fixed points of λ -generalized contraction selfmapings in D*-metric space

Author(s): Dr C Vijender

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.50



Title: Black Hole Attack Detection Using HlA with Optimized Link State Routing Protocol In Wanet

Author(s): J.JenoMactaline Pears1, Dr.D.C.Joy Winnie Wise2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.51



Title: Sentiment Analysis Through Text Mining-A Review

Author(s): Anupriya Pandey1, Rakhi Verma1, Deepika Bariha1, Varsha Dewangan2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.52



Title: Analysis of Bigdata Using Visualizing Technique

Author(s): Aalia Qureshi, Dr. Tripti Arjariya

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.53



Title: Efficient Cloud Server Job Scheduling using NN and ABC in cloud computing

Author(s): Amandeep Kaur1, Pooja Nagpal2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.54



Title: Preventing Social Sites from Publishing Malicious Content

Author(s): Deepak Ranjan, Dr. Tripti Arjariya

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.55



Title: Fruit Recognition and its Calorie Measurement: An Image Processing Approach

Author(s): Manpreetkour Basantsingh Sardar1, Dr. Sayyad D. Ajij2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.56



Title: Mobile Application Testing: Tools & Challenges

Author(s): Pallavi Bhuarya1, Shruti Nupur2, Anuradha Chatterjee3, Rajesh Singh Thakur4

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.57



Title: Various audio Steganography techniques for audio signals

Author(s): Rubby Garg1, Dr.Vijay Laxmi2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.58



Title: Impact of Security Risk on Cloud Computing Adoption

Author(s): Shashank Mishra1, Manju. Pandey2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.59



Title: A New Hybrid Prediction Approach For Enhance Prediction Accuracy of Complex Data

Author(s): Akash Sharma1, Nikita Jain2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.60



Title: Critical Evaluation of Prince2 and Agile Project Management Methodologies for a complex project

Author(s): Priyanka

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.61


Title: A Secure Pin Authentication Method against Shoulder Surfing Attacks

Author(s): K.Kiruthika1, D.Jennifer2, K.Sangeetha3 , Jackulin.C4, R.Shalini5

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.62


Title: Multilevel and Biometric-Graphical Secure Authentication System Using Pattern Matching and Gene Based Data

Author(s): Soriful Hoque

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.63


Title: Trusted and Energy Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks

Author(s): R. Sai Sandhya1, R. Padmini2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.64


Title: Providing Privateness via Transaction Splitting Using PFP Growth Algorithm

Author(s): M. Jhansi Rani1, K. Venkatagurunath Naidu2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.65


Title: Time Sequence Scheme for Ideal Transmit In Remote Systems

Author(s): K. Surekha1, N. Padmaja2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.66


Title: Performance of Multi Server Validation and Key Association with User Protection in Network Security

Author(s): R. Padmini

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.67


Title: Texture Classification with Motif Shape Patterns on Local Directional Pattern

Author(s): Dr. P Chandra Sekhar Reddy


Call For Paper

Submissions open for VOLUME 06. ISSUE 02. You may submit your research / review / survey papers from today.

Last  Submission Date: Feb 24, 2017

Issue Publication last Date: Feb 28, 2017

Article Publication: with in 6 Day 

Submit Online : Click Here to Submit

Read More

ace.pngarx.pngcit.pngcomp.pngcross.pngdoaj.pngicn.pngino.pngres.pngresbib.pngsci.pngscic.pngscics.pngulrich.pngur.png

FaceBook

About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology

Address

Address : 20 manglam vihar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (777) 189 36 00

Email: editor@ijecs.in

Go to top