Title : An Approach to Utilize Memory Streams for efficient Memory Management

Author(s): Manish(Student), Sunil Dhankar (Reader)

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.01



Title : Dynamic parallel K-Means Algorithm Based On Dunn’s Index Method

Author(s): Hitesh Kumari Yadav (Student), Sunil Dhankar (Reader)

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.02



Title : “Tourist App”- to find a locations

Author(s): Ms.Swati Kute, Ms.Shrutika Dhawane, Ms.Swati Kaware, Ms. Yogita Kale, Prof. Shinde S.R

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.03



Title : “Formation of E-Commerce Recommendation (E-Shop)”

Author(s): Ms.Bawake  Shraddha N , Ms.Barse Stella N , Ms. Chechre Pritam , Mr. Chaudhari Suraj , Prof. Kote G.B 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.04



Title : Real-Time Carpooling Application for Android Platform

Author(s): Nayana M. Nale, Shilpa R. Landge, Shradha A. Darekar, Suvarna B. Gadhave, Yogesh S. Jorwekar

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.05



Title : Review On- Efficient Data Transfer For Mobile Devices  By Using Ad-Hoc Network

Author(s): Gunjal Sarla.P., Mandlik Rupali.M., Bhalerao Vrushali.B., Prof. Butkar.U.D 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.06



Title : Anonymization in Social Networks: A Survey on the issues of Data Privacy in Social Network Sites

Author(s):  A.Praveena, Dr.S.Smys

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.07



Title : Optimization of Dynamic Packet Length in Wireless Sensor Network

Author(s):  Mr. Sudip Tembhurne 1, Mr. Sachin Deshpande 2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.08



Title : Modified Random Walk Algorithm to Improve the Efficiency of Word Sense Disambiguation (WSD)

Author(s):  Rashmi S1, Hanumanthappa M2 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.09



Title : Homomorphic authenticable ring signature mechanism for Public Auditing on shared data in the Cloud

Author(s):  MS. Gayatri D Patwardhan, Prof.B. W. Balkhande 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.10



Title : Boundless Communication

Author(s):  Kanika Sluja1, Satinder Kaur2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.11



Title : A review: Issues and Challenges in Big Data from Analytic and Storage perspectives

Author(s): Zaharaddeen Karami Lawal, Rufai Yusuf Zakari,Mansur Zakariyya Shuaibu and Alhassan Bala

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.12



Title : Insights to Sensor Technology and it’s Applications

Author(s): Prof. Mayuri Bapat

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.13



Title : Security Ecosystem in IoT & Cloud

Author(s): Pokuri Rajani, Parupally Anuja Reddy

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.14



Title : Power performance analysis on secure and efficient authentication protocols in mobile devices

Author(s): S Kharthikeyana, K Azarudeenb, S Samsudeenc

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.15



Title : Overview of Classification and Risk Evaluation in Multi-dimensional Datasets

Author(s): Dr. K.Kavitha

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.16



Title : Inferring User Search Goals with feedback Sessions using Fuzzy K-Means Algorithm

Author(s): Mr.Gajanan Patil, Miss.Sonal Patil 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.17



Title : Medium Valuation Method for Massive MIMO Using Gaussian Mixture Bayesian Learning

Author(s): M.Sakthivel1 P.Agila2 P.Anitha3

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.18



Title : Web Search Result Clustering using IFCWR Algorithm

Author(s): Arun Kumar Pal1, Ashwini Londhe2, Nitin Patil3, Vinod Bankar4

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.19



Title : Secure Data Hiding in Audio-Video Steganalysis by Anti-Forensic Technique

Author(s): Dimple Lalwani1, Manasi Sawant2, Mitali Rane3, Vandana Jogdande4, S.B.Ware5

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.20



Title : Copy Detection of Multimedia Contents in Cloud

Author(s): R. Amirtharathna1, Mrs. P.Vijayasarathy2 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.21



Title : Bluetooth Technology

Author(s): Jagjeet Kaur1, Ramandeep Kaur2, Manpreet Kaur3 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.22



Title : Multi Criteria Recommendation System for Material Management 

Author(s): Mr. Rahul Samant 1, Mr. Sachin Deshpande 2, Mr. Anil Jadhao 3

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.23



Title : Fog Computing: Securing the cloud and preventing insider attacks in the cloud

Author(s): Aatish B. Shah1, Jai Kannan2, Deep Utkal Shah3 Prof. S.B.Ware4, Prof. R.S.Badodekar5 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.24



Title : Variants of Resource Allocation problem 

Author(s): Vijaya Goel 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.25



Title : A Review of Damaged Manuscripts Using Binarization Techniques

Author(s): Prajakta. S. Jadhav1, Preeti. P. Dapkekar2, Shubhangi. M. Jadhav3, Kartik. K. Kondalkar 4,Shabnam S. Shaikh5

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.26



Title : Patient Parameter Monitoring System using Raspberry Pi

Author(s): Pooja Navdeti1, Sumita Parte2, Prachi Talashilkar3, Jagruti Patil4, Dr. Vaishali Khairnar5 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.27



Title : Sanative Chatbot For Health Seekers

Author(s): V.Manoj Kumar1, A.Keerthana2, M.Madhumitha3, S.Valliammai4, V.Vinithasri 5

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.28



Title : Multipurpose Card Using Rfid Technology

Author(s): J.Subhash M.E., S. Gayathri, D. Gayathri 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.29



Title : System Automation And Production  Monitoring In Industries Using Arduino With IoT Technology

Author(s): Ms. Nithya.S1, Mr.Arjun.C2, Mr.Ashok.M3, Mr.Jeevanantham.B4 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.30



Title : Advanced Secure Voting System with IoT

Author(s): Ms. Nithya.S1, Mr.Ashwin.C2, Mr.Karthikeyan.C3, Mr.Ajith kumar.M4 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.31



Title : Advance Dynamic Malware Analysis Using Api Hooking

Author(s): Ajay Kumar, Shubham Goyal 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.32



Title : Comparison: Wireshark on different parameters

Author(s): Ajay Kumar, Jai Bhagwan Yadav

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.33



Title : Analysis of Security threats in ad hoc cloud.

Author(s): 1Mrs. Salini Suresh, 2Dr.L.Manjunath Rao 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.34



Title : File Encryption System Based on Symmetric Key Cryptography

Author(s): Ajay Kumar, Ankit Kumar 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.35



Title : Smart Energy Meter Using Android Application And Gsm Network

Author(s): Diya Elizabeth Paul ,  Prof . Alpha Vijayan

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.36


Call For Paper

VOLUME 06. ISSUE 05 [May 2017]

IJECS invites authors to submit manuscripts Reporting original engineering research, computer science , original article, research article, case report, systematic reviews, or educational Innovations for publication for the Current issues. Types of manuscripts suitable for IJECS include: Engineering Science, Computer Science, Educational Innovation, Brief Report, Reviews on Teaching In keeping with high quality scholarship

Read More

Online Submission

If any difficulty you can also submit to: This email address is being protected from spambots. You need JavaScript enabled to view it..in

GettyImages.pngace.pngarx.pngcit.pngcomp.pngcross.pngdoaj.pngicn.pngino.pnglogo_wcmasthead_en.pngres.pngresbib.pngsci.pngscic.pngscics.pngulrich.pngur.png

FaceBook

About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology

Address

Address : LIG 73 megdoot Nagar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (822) 260 24 694

Email: editor@ijecs.in

Go to top