Title : An Approach to Utilize Memory Streams for efficient Memory Management

Author(s): Manish(Student), Sunil Dhankar (Reader)

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.01

Title : Dynamic parallel K-Means Algorithm Based On Dunn’s Index Method

Author(s): Hitesh Kumari Yadav (Student), Sunil Dhankar (Reader)

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.02

Title : “Tourist App”- to find a locations

Author(s): Ms.Swati Kute, Ms.Shrutika Dhawane, Ms.Swati Kaware, Ms. Yogita Kale, Prof. Shinde S.R

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.03

Title : “Formation of E-Commerce Recommendation (E-Shop)”

Author(s): Ms.Bawake  Shraddha N , Ms.Barse Stella N , Ms. Chechre Pritam , Mr. Chaudhari Suraj , Prof. Kote G.B 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.04

Title : Real-Time Carpooling Application for Android Platform

Author(s): Nayana M. Nale, Shilpa R. Landge, Shradha A. Darekar, Suvarna B. Gadhave, Yogesh S. Jorwekar

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.05

Title : Review On- Efficient Data Transfer For Mobile Devices  By Using Ad-Hoc Network

Author(s): Gunjal Sarla.P., Mandlik Rupali.M., Bhalerao Vrushali.B., Prof. Butkar.U.D 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.06

Title : Anonymization in Social Networks: A Survey on the issues of Data Privacy in Social Network Sites

Author(s):  A.Praveena, Dr.S.Smys

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.07

Title : Optimization of Dynamic Packet Length in Wireless Sensor Network

Author(s):  Mr. Sudip Tembhurne 1, Mr. Sachin Deshpande 2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.08

Title : Modified Random Walk Algorithm to Improve the Efficiency of Word Sense Disambiguation (WSD)

Author(s):  Rashmi S1, Hanumanthappa M2 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.09

Title : Homomorphic authenticable ring signature mechanism for Public Auditing on shared data in the Cloud

Author(s):  MS. Gayatri D Patwardhan, Prof.B. W. Balkhande 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.10

Title : Boundless Communication

Author(s):  Kanika Sluja1, Satinder Kaur2

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.11

Title : A review: Issues and Challenges in Big Data from Analytic and Storage perspectives

Author(s): Zaharaddeen Karami Lawal, Rufai Yusuf Zakari,Mansur Zakariyya Shuaibu and Alhassan Bala

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.12

Title : Insights to Sensor Technology and it’s Applications

Author(s): Prof. Mayuri Bapat

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.13

Title : Security Ecosystem in IoT & Cloud

Author(s): Pokuri Rajani, Parupally Anuja Reddy

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.14

Title : Power performance analysis on secure and efficient authentication protocols in mobile devices

Author(s): S Kharthikeyana, K Azarudeenb, S Samsudeenc

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.15

Title : Overview of Classification and Risk Evaluation in Multi-dimensional Datasets

Author(s): Dr. K.Kavitha

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.16

Title : Inferring User Search Goals with feedback Sessions using Fuzzy K-Means Algorithm

Author(s): Mr.Gajanan Patil, Miss.Sonal Patil 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.17

Title : Medium Valuation Method for Massive MIMO Using Gaussian Mixture Bayesian Learning

Author(s): M.Sakthivel1 P.Agila2 P.Anitha3

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.18

Title : Web Search Result Clustering using IFCWR Algorithm

Author(s): Arun Kumar Pal1, Ashwini Londhe2, Nitin Patil3, Vinod Bankar4

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.19

Title : Secure Data Hiding in Audio-Video Steganalysis by Anti-Forensic Technique

Author(s): Dimple Lalwani1, Manasi Sawant2, Mitali Rane3, Vandana Jogdande4, S.B.Ware5

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.20

Title : Copy Detection of Multimedia Contents in Cloud

Author(s): R. Amirtharathna1, Mrs. P.Vijayasarathy2 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.21

Title : Bluetooth Technology

Author(s): Jagjeet Kaur1, Ramandeep Kaur2, Manpreet Kaur3 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.22

Title : Multi Criteria Recommendation System for Material Management 

Author(s): Mr. Rahul Samant 1, Mr. Sachin Deshpande 2, Mr. Anil Jadhao 3

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.23

Title : Fog Computing: Securing the cloud and preventing insider attacks in the cloud

Author(s): Aatish B. Shah1, Jai Kannan2, Deep Utkal Shah3 Prof. S.B.Ware4, Prof. R.S.Badodekar5 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.24

Title : Variants of Resource Allocation problem 

Author(s): Vijaya Goel 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.25

Title : A Review of Damaged Manuscripts Using Binarization Techniques

Author(s): Prajakta. S. Jadhav1, Preeti. P. Dapkekar2, Shubhangi. M. Jadhav3, Kartik. K. Kondalkar 4,Shabnam S. Shaikh5

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.26

Title : Patient Parameter Monitoring System using Raspberry Pi

Author(s): Pooja Navdeti1, Sumita Parte2, Prachi Talashilkar3, Jagruti Patil4, Dr. Vaishali Khairnar5 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.27

Title : Sanative Chatbot For Health Seekers

Author(s): V.Manoj Kumar1, A.Keerthana2, M.Madhumitha3, S.Valliammai4, V.Vinithasri 5

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.28

Title : Multipurpose Card Using Rfid Technology

Author(s): J.Subhash M.E., S. Gayathri, D. Gayathri 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.29

Title : System Automation And Production  Monitoring In Industries Using Arduino With IoT Technology

Author(s): Ms. Nithya.S1, Mr.Arjun.C2, Mr.Ashok.M3, Mr.Jeevanantham.B4 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.30

Title : Advanced Secure Voting System with IoT

Author(s): Ms. Nithya.S1, Mr.Ashwin.C2, Mr.Karthikeyan.C3, Mr.Ajith kumar.M4 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.31

Title : Advance Dynamic Malware Analysis Using Api Hooking

Author(s): Ajay Kumar, Shubham Goyal 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.32

Title : Comparison: Wireshark on different parameters

Author(s): Ajay Kumar, Jai Bhagwan Yadav

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.33

Title : Analysis of Security threats in ad hoc cloud.

Author(s): 1Mrs. Salini Suresh, 2Dr.L.Manjunath Rao 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.34

Title : File Encryption System Based on Symmetric Key Cryptography

Author(s): Ajay Kumar, Ankit Kumar 

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.35

Title : Smart Energy Meter Using Android Application And Gsm Network

Author(s): Diya Elizabeth Paul ,  Prof . Alpha Vijayan

 DOI : http://dx.doi.org/10.18535/ijecs/v5i3.36



About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology


Address : LIG 73 megdoot Nagar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (822) 260 24 694

Email: editor@ijecs.in

Go to top