Title: Personalized Web Search with Custom Privacy Preservation

Author(s): Swapna Desale1, Prof. Jyothi Rao2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.01

Title: Secured Icmp Based Ip Traceback Scheme To Trace The Spoofed Ip Locations

Author(s): V. Mariyammal1,  Dr.K.Thamodaran2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.02

Title: A Novel approach to prevent launching of attacks in MANETS using Bait tracing setup

Author(s): Sushma K R, Mrs.Renuka malge

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.03

Title: Comparative Analysis of Soft Computing Based Load Balancing Techniques in Cloud Environment: A Review

Author(s): Sapna1, Pooja Nagpal2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.04

Title: Intrusion Detection System Using Machine Learning Approach

Author(s): P.Akshaya

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.05

Title: Optimized Secure Image Transmission approach Lossless Secret Image Recovery Based on Secret Fragmented Mosaic Images

Author(s): Ankoji Pavan (M.Tech.)1 K. Ramanjaneyulu M.Tech, Associate Professor2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.06

Title: An Efficient Approach for Secure Data Hiding Using Cryptography

Author(s): Reetu1, Ms.Mamta2, Mr. Satish Dhull3

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.07

Title: MATLAB/Simulink of a Solar Photovoltaic System through Cuk Converter

Author(s): Prinkesh Soni1, Ankush Yadav2, Rakesh Singh Lodhi3, Amit Solanki4

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.08

Title: An Efficient and Scalable Technique for Texture Analysis to Obtain in IR Model

Author(s): Akanxa Mishra, Namrata Sharma

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.09

Title: Reinforcement of Event Streams by Obfuscation over Multitudinous Correlations

Author(s): #1 N. Pavani , #2 P. Pothuraju

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.10

Title: An Enhanced Secure Image Cryptography based on RC6 and RSA to Minimize Entropy and Improve Correlation

Author(s): Pooja Chaturvedi, Chetan Gupta

 DOI : http://dx.doi.org/10.18535/ijecs/v5i10.11

Title: Emotion Speech Recognition System For Isolated Words In Marathi Language

Author(s): Asmita Gajarishi1, Shital Sukre2, Dhanashri Rachetti3, Pratik Kurzekar4

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.12

Title: Publish/Subscribe Systems Security through Distinct Identity Encryiption

Author(s): #1 R. Kiranmayi,  #2 P. Pothuraju

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.13

Title: Fixed Point Theorem in Weakly Compatible Self Mappings on Complete Metric Space

Author(s): Dr.M.Ramana Reddy,

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.14

Title: Filter Bubble: How to burst your filter bubble

Author(s): Sneha Prakash

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.15

Title: Simulation of Steerable Gaussian Smoothers using VHDL

Author(s): Sharanabasava, Syed Gilani Pasha

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.16

Title: Study of Unified Power Quality Conditioner for Power Quality Improvement

Author(s): Anupam Ojha1, Amit Solanki2, Rakesh Singh Lodhi3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.17

Title : Loss Less Data Embedding In the Motion Predicted Vectors for Video Sequences

Author(s): K.Sridhar 1, Dr. Syed Abdul Sattar2, Dr. M.Chandra Mohan3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.18

Title: Privacy Preserving in Data Mining to Protect Privileged information in Ad-hoc Network

Author(s): Dillip Kumar Swain1, Sarojananda Mishra2, Sasmita Mishra3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.19

Title: Cone metric spaces and fixed point theorems of contractive mappings

Author(s): C Vijender

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.20

Title: Characterization of Advanced Encryption Standard (AES) for Textual and Image data

Author(s): S. Rehman 1*, S.Q. Hussain 1 , W.Gul 2 and Israr 3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.21

Title: Automated diagnosis of  Lungs Tumor Using Segmentation Techniques

Author(s): S.Piramu Kailasam1,Dr. M. Mohammed Sathik 2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.22

Title: Mobile Printer with Bluetooth Compatibility Using Raspberry PI

Author(s): G.Jhansi, S.Saraswathi

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.23

Title: Enhanced Way of Association Rule Mining With Ontology

Author(s): T.Bharathi, Dr. A.Nithya

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.24

Title: Scheduling Virtual Machines across Data Centres in accordance to availability of Renewable Sources of Energy

Author(s): G Krishna Vasudeva Rao, K Premchand

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.25

Title: Vein Pattern Recognition: A secured way of Authentication

Author(s): Navjot Kaur1, Paritosh Chopra2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.26

Title: Modelling and Design Analysis for Nonlinear 3D Dynamic Simulation of Triangular Microspring for MEMS based SAM

Author(s): Swati Rastogi1, Surya Prakash1, S.P.Duttagupta1, H.Muthurajan2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.27

Title: Speech Recognition using e-Speaking: A Review

Author(s): Anju Bisen1 , Krishna Hirpara2, Madhu3, Roshani Rathore4

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.28

Title: Visual Crypto-Steganography in Images

Author(s): Pranav Swaminathan, Tejas Dani, Ronak Bhatia, Shubhankur Jain, Paulami Shah

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.29

Title: Enhancing the Security of Data Using DES Algorithm along with Substitution Technique

Author(s): Yashwant kumar1, Rajat joshi2, Tameshwar mandavi3, Simran bharti4, Miss Roshni Rathour5

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.30

Title: An Efficient Method for Finding Closed Subspace Clusters for High Dimensional Data

Author(s): S. Anuradha1, K.B. Madhuri2, B. Jaya Lakshmi3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.31

Title: Finite Element Analysis Of Linear Elastic Torsion For Regular Polygons

Author(s): H.T. Rathoda*, K. Sugantha Devi b,  C.S.Nagabhushana c , H.M.Chudamani d

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.33

Title: Cloud Key Bank: Privacy and Owner Approval Of Required Primary Management Scheme

Author(s): Aarti Bhoi , Ashwini Madan , Tejal Khandave

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.34

Title: Pulsed Latches Methodology to Attain Reduced Power and Area Based On Shift Register

Author(s): Cheekati Sirisha (M.Tech), Department of ECE (VLSI& Es) 1, K. Prakash M.Tech., Assistant Professor 2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.35

Title: Optimized Test compression bandwidth management for Ultra-large-Scale System-on-Chip Architectures performing Scan Test Bandwidth Management

Author(s): Vengala Abhilash (M.Tech), Department of ECE (VLSI& Es) 1 J. Pushparani M.Tech., Assistant Professor 2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.36

Title: A Review on Feature Extraction Techniques for Speech Processing

Author(s): Amandeep Singh Gill

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.37

Title: A Study on Performance Modelling and Analysis of Network on Chip under M-Port N-Tree Bursty Traffic

Author(s): A.Malathi1*, M.Theinmozhi2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.38

Title: MongoDB for Read Intensive Cases Using YCSB

Author(s): Adarsh Kumar1, Anita Ganpati2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.39

Title: Stochastic Modeling for Analyzing Scalability Impact of Lottery Scheduling using Proportion Reformation

Author(s): Manish Vyas1, Dr. Saurabh Jain2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.40

Title: Turbo Diesel Engine Exhaust: Advancement at the cost of health –A Review

Author(s): Bhaskar Chaturvedi1, Uttkarsh Rawat1, Tanish Aggarwal1, Shriyash Mohril2, Mahipal Singh Sankhla3, Dr. Rajeev Kumar4

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.41

Title: Implementation of Automatic Retina Exudates Segmentation Algorithm for Early Detection with Low Computational Time

Author(s): B. Sumanjali (M.Tech.)1 K. Nagaiah Professor Ph.D 2 B. Anitha Associate Professor3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.42

Title: A Concise Study about Data Mining Methods, Tools and Its Trendy Applications

Author(s): C.Thangamalar1, R.Ramya2, R.Lavanya3

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.43

Title: Mobile Apps Fraud Detection Using Raking

Author(s): D.Uma Maheswari, S.Jassica Saritha

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.44

Title: An Enhanced Light-weight Proactive Source Routing Protocol using DIFT-BFHS for MANET

Author(s): 1Dr. N. Rama, 2 Justin Sophia. I

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.45

Title: Offline Handwriting Character Recognition (for use of medical purpose) Using Neural Network

Author(s): Sanjay Kumar1, Narendra Sahu 2, Aakash Deep 3, Khushboo Gavel4, Miss Rumi Ghos

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.46

Title: A Review on Prediction of User Action Interpretation for Online Content Optimization

Author(s): Mr. Pratik V. Pande1, Dr. M.A.Pund2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.47

Title: Fusion Layer Topological Space Query Indexing For Uncertain Data Mining

Author(s): M. Kalavathi, Dr. P. Suresh

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.48

Title: Blood group Detection and RBC, WBC Counting: An Image Processing Approach

Author(s): Akshaya P. Sahastrabuddhe1, Dr. Sayyad D. Ajij 2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.49

Title: Fixed points of λ -generalized contraction selfmapings in D*-metric space

Author(s): Dr C Vijender

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.50

Title: Black Hole Attack Detection Using HlA with Optimized Link State Routing Protocol In Wanet

Author(s): J.JenoMactaline Pears1, Dr.D.C.Joy Winnie Wise2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.51

Title: Sentiment Analysis Through Text Mining-A Review

Author(s): Anupriya Pandey1, Rakhi Verma1, Deepika Bariha1, Varsha Dewangan2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.52

Title: Analysis of Bigdata Using Visualizing Technique

Author(s): Aalia Qureshi, Dr. Tripti Arjariya

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.53

Title: Efficient Cloud Server Job Scheduling using NN and ABC in cloud computing

Author(s): Amandeep Kaur1, Pooja Nagpal2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.54

Title: Preventing Social Sites from Publishing Malicious Content

Author(s): Deepak Ranjan, Dr. Tripti Arjariya

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.55

Title: Fruit Recognition and its Calorie Measurement: An Image Processing Approach

Author(s): Manpreetkour Basantsingh Sardar1, Dr. Sayyad D. Ajij2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.56

Title: Mobile Application Testing: Tools & Challenges

Author(s): Pallavi Bhuarya1, Shruti Nupur2, Anuradha Chatterjee3, Rajesh Singh Thakur4

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.57

Title: Various audio Steganography techniques for audio signals

Author(s): Rubby Garg1, Dr.Vijay Laxmi2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.58

Title: Impact of Security Risk on Cloud Computing Adoption

Author(s): Shashank Mishra1, Manju. Pandey2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.59

Title: A New Hybrid Prediction Approach For Enhance Prediction Accuracy of Complex Data

Author(s): Akash Sharma1, Nikita Jain2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.60

Title: Critical Evaluation of Prince2 and Agile Project Management Methodologies for a complex project

Author(s): Priyanka

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.61

Title: A Secure Pin Authentication Method against Shoulder Surfing Attacks

Author(s): K.Kiruthika1, D.Jennifer2, K.Sangeetha3 , Jackulin.C4, R.Shalini5

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.62

Title: Multilevel and Biometric-Graphical Secure Authentication System Using Pattern Matching and Gene Based Data

Author(s): Soriful Hoque

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.63

Title: Trusted and Energy Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks

Author(s): R. Sai Sandhya1, R. Padmini2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.64

Title: Providing Privateness via Transaction Splitting Using PFP Growth Algorithm

Author(s): M. Jhansi Rani1, K. Venkatagurunath Naidu2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.65

Title: Time Sequence Scheme for Ideal Transmit In Remote Systems

Author(s): K. Surekha1, N. Padmaja2

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.66

Title: Performance of Multi Server Validation and Key Association with User Protection in Network Security

Author(s): R. Padmini

 DOI : https://dx.doi.org/10.18535/ijecs/v5i10.67

Title: Texture Classification with Motif Shape Patterns on Local Directional Pattern

Author(s): Dr. P Chandra Sekhar Reddy

Call For Paper

VOLUME 06. ISSUE 04 [April 2017]

IJECS invites authors to submit manuscripts Reporting original engineering research, computer science , original article, research article, case report, systematic reviews, or educational Innovations for publication for the Current issues. Types of manuscripts suitable for IJECS include: Engineering Science, Computer Science, Educational Innovation, Brief Report, Reviews on Teaching In keeping with high quality scholarship

Read More

Online Submission

If any difficulty you can also submit to: This email address is being protected from spambots. You need JavaScript enabled to view it..in



About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology


Address : 20 manglam vihar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (777) 189 36 00

Email: editor@ijecs.in

Go to top