Volume: 5 | Issue: 10

Published: 2017-12-30 07:25:00


Secured Icmp Based Ip Traceback Scheme To Trace The Spoofed Ip Locations

V. Mariyammal , Dr.K.Thamodaran
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

A Novel approach to prevent launching of attacks in MANETS using Bait tracing setup

Sushma K R Mrs.Renuka malge
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Comparative Analysis of Soft Computing Based Load Balancing Techniques in Cloud Environment: A Review

Sapna Pooja Nagpal
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Intrusion Detection System Using Machine Learning Approach

P.Akshaya, .
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Optimized Secure Image Transmission approach Lossless Secret Image Recovery Based on Secret Fragmented Mosaic Images

Ankoji Pavan , K. Ramanjaneyulu
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

An Efficient Approach for Secure Data Hiding Using Cryptography

Reetu, Ms.Mamta Mr. Satish Dhull
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

MATLAB/Simulink of a Solar Photovoltaic System through Cuk Converter

Prinkesh Soni, Ankush Yadav , Rakesh Singh Lodhi, Amit Solanki
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

An Efficient and Scalable Technique for Texture Analysis to Obtain in IR Model

Akanxa Mishra, Namrata Sharma .
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Reinforcement of Event Streams by Obfuscation over Multitudinous Correlations

N. Pavani , P. Pothuraju
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

An Enhanced Secure Image Cryptography based on RC6 and RSA to Minimize Entropy and Improve Correlation

Pooja Chaturvedi, Chetan Gupta
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Emotion Speech Recognition System For Isolated Words In Marathi Language

Asmita Gajarishi Shital Sukre, Dhanashri Rachetti Pratik Kurzekar
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Publish/Subscribe Systems Security through Distinct Identity Encryiption

R. Kiranmayi, P. Pothuraju
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Fixed Point Theorem in Weakly Compatible Self Mappings on Complete

Dr.M.RamanaReddy, .
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Filter Bubble: How to burst your filter bubble

Sneha Prakash .
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Simulation of Steerable Gaussian Smoothers using VHDL

Sharanabasava, Syed Gilani Pasha
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Study of Unified Power Quality Conditioner for Power Quality Improvement

Anupam Ojha , Amit Solanki, Rakesh Singh Lodhi
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Loss Less Data Embedding In the Motion Predicted Vectors for Video Sequences

K.Sridhar Dr. Syed Abdul Sattar Dr. M.Chandra Mohan
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Privacy Preserving in Data Mining to Protect Privileged information in Ad-hoc Network

Dillip Kumar Swain , Sarojananda Mishra , Sasmita Mishra
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Cone metric spaces and fixed point theorems of contractive mappings

C Vijender .
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Characterization of Advanced Encryption Standard (AES) for Textual and Image data

S. Rehman *, S.Q. Hussain , W.Gul and Israr
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Automated diagnosis of Lungs Tumor Using Segmentation Techniques

S.Piramu Kailasam ,Dr. M. Mohammed Sathik
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Mobile Printer with Bluetooth Compatibility Using Raspberry PI

G.Jhansi, S.Saraswathi .
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Enhanced Way of Association Rule Mining With Ontology

T.Bharathi, Dr. A.Nithya .
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Scheduling Virtual Machines across Data Centres in accordance to availability of Renewable Sources of Energy

G Krishna Vasudeva Rao, K Premchand
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Vein Pattern Recognition: A secured way of Authentication

Navjot Kaur , Paritosh Chopra
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Modelling and Design Analysis for Nonlinear 3D Dynamic Simulation of Triangular Microspring for MEMS based SAM

Swati Rastogi, Surya Prakash , S.P.Duttagupta, H.Muthurajan
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Speech Recognition using e-Speaking: A Review

Anju Bisen, Krishna Hirpara Madhu, Roshani Rathore
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Visual Crypto-Steganography in Images

Pranav Swaminathan, Tejas Dani, Ronak Bhatia, Shubhankur Jain, Paulami shah
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Enhancing the Security of Data Using DES Algorithm along with Substitution Technique

Yashwant kumar, Rajat joshi Tameshwar mandavi, Simran bharti Miss Roshni Rathour
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

An Efficient Method for Finding Closed Subspace Clusters for High Dimensional Data

S. Anuradha, K.B. Madhuri B. Jaya Lakshmi
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Effect of Nano Fluids in Solar Flat Plate Collector Systems

S. Arockiaraj, P. Jidhesh
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Finite Element Analysis Of Linear Elastic Torsion For Regular Polygons

H.T. Rathod*, K. Sugantha Devi , C.S.Nagabhushana , H.M.Chudamani
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Cloud Key Bank: Privacy and Owner Approval Of Required Primary Management Scheme

Aarti Bhoi Ashwini Madan , Tejal Khandave
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Pulsed Latches Methodology to Attain Reduced Power and Area Based On Shift Register

Cheekati Sirisha K. Prakash
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Optimized Test compression bandwidth management for Ultra-large-Scale System-on-Chip Architectures performing Scan Test Bandwidth Management

Vengala Abhilash , J. Pushparani
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

A Study on Performance Modelling and Analysis of Network on Chip under M-Port N-Tree Bursty Traffic

A.Malathi *, M.Theinmozhi
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Stochastic Modeling for Analyzing Scalability Impact of Lottery Scheduling using Proportion Reformation

Manish Vyas , Dr. Saurabh Jain
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Turbo Diesel Engine Exhaust: Advancement at the cost of health –A Review

Bhaskar Chaturvedi,Uttkarsh Rawat,, Tanish Aggarwal,Shriyash Mohril, Mahipal Singh Sankhla, Dr. Rajeev Kumar
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

Mobile Apps Fraud Detection Using Raking

D.Uma Maheswari, S.Jassica Saritha
International Journal of Engineering and Computer Science  |  Published: 2 May 2016
Full text PDF

MongoDB for Read Intensive Cases Using YCSB

Adarsh Kumar , Anita Ganpati
International Journal of Engineering and Computer Science  |  Published: 2 August 2016
Full text PDF

A Review on Feature Extraction Techniques for Speech Processing

Amandeep Singh Gill .
International Journal of Engineering and Computer Science  |  Published: 3 September 2016
Full text PDF

Personalized Web Search with Custom Privacy Preservation

Swapna Desale ,Jyothi Rao
International Journal of Engineering and Computer Science  |  Published: 28 October 2016
Full text PDF

Black Hole Attack Detection Using HlA with Optimized Link State Routing Protocol In Wanet

J.JenoMactaline Pears ,Dr.D.C.Joy Winnie Wise
International Journal of Engineering and Computer Science  |  Published: 28 October 2016
Full text PDF

Implementation of Automatic Retina Exudates Segmentation Algorithm for Early Detection with Low Computational Time

B. SUMANJALI , K. NAGAIAH , B. ANITHA
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

A Concise Study about Data Mining Methods, Tools and Its Trendy Applications

C.Thangamalar, R.Ramya R.Lavanya
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

An Enhanced Light-weight Proactive Source Routing Protocol using DIFT-BFHS for MANET

Dr. N. Rama, Justin Sophia. I
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Offline Handwriting Character Recognition (for use of medical purpose) Using Neural Network

Sanjay Kumar, Narendra Sahu Aakash Deep , Khushboo Gavel Miss Rumi Ghosh
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

A Review on Prediction of User Action Interpretation for Online Content Optimization

Mr. Pratik V. Pande , Dr. M.A.Pund
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Fusion Layer Topological Space Query Indexing For Uncertain Data Mining

M. Kalavathi, Dr. P. Suresh
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Blood group Detection and RBC, WBC Counting: An Image Processing Approach

Akshaya P. Sahastrabuddhe , Dr. Sayyad D. Ajij
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Fixed points of -generalized contraction selfmapings in D*-metric space

Dr C Vijender .
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Sentiment Analysis Through Text Mining-A Review

Anupriya Pandey Rakhi Verma, Deepika Bariha Varsha Dewangan
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Analysis of Bigdata Using Visualizing Technique

Aalia Qureshi , Dr. Tripti Arjariya
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Efficient Cloud Server Job Scheduling using NN and ABC in cloud computing

Amandeep Kaur , Pooja Nagpal
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Preventing Social Sites from Publishing Malicious Content

Deepak Ranjan , Dr. Tripti Arjariya
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Fruit Recognition and its Calorie Measurement: An Image Processing Approach

Manpreetkour Basantsingh Sardar Dr. Sayyad D. Ajij
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Mobile Application Testing: Tools & Challenges

PPallavi Bhuarya, Shruti Nupur Anuradha Chatterjee, Rajesh Singh Thakur
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Various audio Steganography techniques for audio signals

Rubby Garg , Dr.Vijay Laxmi
International Journal of Engineering and Computer Science  |  Published: 2 January 2018
Full text PDF

Impact of Security Risk on Cloud Computing Adoption

Shashank Mishra, Manju. Pandey
International Journal of Engineering and Computer Science  |  Published: 3 January 2018
Full text PDF

A New Hybrid Prediction Approach For Enhance Prediction Accuracy of Complex Data

Akash Sharma , Nikita Jain
International Journal of Engineering and Computer Science  |  Published: 3 January 2018
Full text PDF

Critical Evaluation of Prince2 and Agile Project Management Methodologies for a complex project

Priyanka ,
International Journal of Engineering and Computer Science  |  Published: 3 January 2018
Full text PDF

A Secure Pin Authentication Method against Shoulder Surfing Attacks

K.Kiruthika, D.Jennifer K.Sangeetha Jackulin.C, R.Shalini
International Journal of Engineering and Computer Science  |  Published: 3 January 2018
Full text PDF

Multilevel and Biometric-Graphical Secure Authentication System Using Pattern Matching and Gene Based Data Extraction

Soriful Hoque
International Journal of Engineering and Computer Science  |  Published: 3 January 2018
Full text PDF

Trusted and Energy Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks

R. Sai Sandhya, R. Padmini
International Journal of Engineering and Computer Science  |  Published: 3 January 2018
Full text PDF

Providing Privateness via Transaction Splitting Using PFP Growth Algorithm

M. Jhansi Rani, K. Venkatagurunath Naidu
International Journal of Engineering and Computer Science  |  Published: 3 January 2018
Full text PDF

Time Sequence Scheme for Ideal Transmit In Remote Systems

K. Surekha, N. Padmaja
International Journal of Engineering and Computer Science  |  Published: 3 January 2018
Full text PDF

Performance of Multi Server Validation and Key Association with User Protection in Network Security

R. Padmini .
International Journal of Engineering and Computer Science  |  Published: 3 January 2018
Full text PDF

Texture Classification with Motif Shape Patterns on Local Directional Pattern

Dr. P Chandra Sekhar Reddy
International Journal of Engineering and Computer Science  |  Published: 3 January 2018
Full text PDF

← View all issues

Author Resources