Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Call For Paper : Vol. 9, Issue 1 , 2022

Volume3, April-2016

Efficient Cluster based Communication with Plausibility Checks in VANET

Authors : Manisha.A || Lekshmi.E, Pavithra.K, Muthumanickam.S
View Abstract Download Paper

Doi : 01.1617/vol3/iss4/pid64892

Survey of various Query Mapping Techniques from SQL to No SQL

Authors : Piyush Nikam || Tushar Patil, [3] Gayatri Hungund, [4] Ankit Pagar, [5] Aditi Talegaonkar, [5] Ms. Soudamini Pawar
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid334

A Secure and Authentication Based Mechanism in Zone Routing Protocol

Authors : B.Kusuma Kumari || U.D.Prasan
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid333

Preparation of Plan and Analysis of a Multistoried Medical College

Authors : Sreedevi Lekshmi || Jintu Sara John , Josmy Jose, Karthi M .S ,Reeba Mary Cherian
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid332

Detecting Malicious Apps on OSN Face-book Wall

Authors : Ashutosh Lande || Akshay Patil, Pankaj Bondre , Akshata Phawde, Pradip Laturkar
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid331

“Context-Based Diversification for Keyword Queries over XML Data”

Authors : Snehal Ingole || DR. S.S.Prabhune
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid329

Automatic Parking Reservation Application for Smartphone Using IR Sensors

Authors : Reema Dongardive || Komal Umale, Deepshikha Mishra, Shraddha Patode, Prof. Shubhangi Borkar
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid328

Confidential Image Sharing Using Visual Secret Sharing Scheme

Authors : Chaitanya Khoje || Akhil Bhosale , Vedang Bhide , Abhishek Bhavsar ,S.P. Pattanaik
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid326

Quadruped-Walker

Authors : P.Subha shree || V.Praveena kumari , R.Sandhiya, G.Mythili
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid325

Recommenders System for Effective ICT Based Learning

Authors : Mrs.G Akshaya || Rohit Reddy , Reddy Supriya , Akhileshwar Reddy , Vishnu Varma
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid324

Resolve the Classification Problem over Encrypted data Using K-Nearest Neighbour

Authors : C Deepika || S Deepak, Jestina Thomas, Akansha Singh
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid323

Disease Inference System based on Health-Related Question Answer system

Authors : Paresh Karande || Manoj Khairavkar, Vinayak Lokhande, Khemchand Mahajan , Rupali Umbare
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid322

Implementation Of Efficient Privacy Preserving Classification Techniques With Outsource Data

Authors : Avinash Thube || Aniket Patil, Vinayak Shinde, Chetan Mohite
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid321

Privacy Preserving Association Rules Mining In Horizontally Distributed Databases

Authors : Nikhil Puri || Swapnil Patke, Vishwajeet Godage, Yogesh Sherkar, Asst.prof.Sunil Kale
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid320

Crop Field Analyzer

Authors : Athawale Kiran M. || Shikhare Abhilash D., Dhotre Akash S. , Dhawale Sudarshan U
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid319

A Secure Parallel Network File System using Protocols

Authors : Digambar Waghole || Jabbar Tamboli, Shrutika Chintal , Supriya Vinode , VaishaliShinde
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid318

New Approach for Parallel Graph Computation Using Partition Aware Engine

Authors : Prashant Patne || Vivek Takawale , Akash Tilak ,Chandan Tiwari
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid317

Web Crawler: A Crawler for Efficiently Retrieving Relevant Data

Authors : Prabhu Alamkare || ShrikantGiri , Shubham Bardiya , PradeepGite
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid316

User Authentication using Digital Signature and Biometric Factor

Authors : Aakansha S Wani || Komal Vanjari , Deepika Shinde , Prof . Rajasree R.S
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid315

Security in Searching Shared and Encrypted Data in Multi Party Environment

Authors : Amarja Jagtap-Patil || Pranav Chavan , Ashish Chaturvedi , Nagraj Kiwade , Jyoti Kshirsagar
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid314

Enhancing Scalable Reverse Dictionary Using Text Rank

Authors : Shailesh Raskar || Saurabh Nagpal , Shubham Das, Sharif Sayyed
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid313

Strengthening Authentication System Using Mindmetrics

Authors : Abhishek Karkamkar || Pawnesh Kumar , Rohit Sharma , Saurav Modi
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid312

Stock Market Prediction and Analysis using Hadoop

Authors : Pawar Manali V. || Pathwe PrajaktaK , Pawar Suhas S , Thakre Sanjay , Poman Sushant S
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid311

Fuzzy Authorization on Cloud Computing By Using Merging Technique

Authors : Rohit Thakur || Jitendra Korda , Datta Kadam , Pritesh Dhawre
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid310

Dual Cryptography Based Data Security in Cloud Computing

Authors : Nisha Chaube || Dushyant Singh, Ayush Kr. Shrivastava, Sachin Kathuria
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid309

A New Differential Evolutionary Algorithm

Authors : Aparna Potbhare || Rutuja Deogade , Prof. Amit Khaparde
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid308

An Alternative Approach to Resolve Load Balancing Problems in Cloud Computing

Authors : Pooja Anjee || Rishab Nagaraj, Samiksha M, Nithya Ganesan
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid307

Time to Change the World around You “Intellectual Controller

Authors : Prajwala R Reddy || Pragathi, A. Vignesh, Arshitha R, T K Pradeep Kumar
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid306

Table Complexity Measurement of Database Systems

Authors : Rachna Kumari || Jayant Kr Joyti, Nivedita
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid305

Augmentation of Apriori Algorithm

Authors : Nivedita || Jhelum Dasgupta, Razauddin
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid304

3D Brain Tumor Detection

Authors : Chinchu Davis || Gayathry C S, Milbin Milton , Sinu Simon C, Diana Davis
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid303

Automatic Detection of Leukemia Using Blood Smear Sample

Authors : Churchill Kapoor || Himani Deshmukh, Priyanka Patre, T.Lavanya, Pavan Kumar Mishra
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid302

Active Feature Description in Animals Footprint Identification

Authors : Certainly Pathaw || P.C.Godlina , Paul T Sheeba
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid301

Iot – Based Information System for Emergency Medical Services

Authors : Vishal Chaudhary || Pratik Mishra , Karan Pardeshi , Yashodhar Upadhyay , Rahul Solanki
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid299

Information Security by Embedding Of QR Code into Color Image

Authors : Vishwadeep R Yadav || Sagar R Chaniyara , Karan P Vakharia , Manish R Mistry
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid298

Data Hiding in Encrypted H.264/AVC Video Streams by Code word Substitution

Authors : Shraddha Arun Dangare || Meenal Ravindra Pathak , Sayali Narayan Mahamulkar , Chandrama Thorat
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid297

Collaborative Data Publishing Using Privacy Preserving Technique

Authors : Varsha Gaikwad || Nikita R. Khare, Chaitanya N. Kalantri
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid295

Cloud Gaming: A Green Future

Authors : Moulavi Shadaab || Rajput Rashmi, Sarode Shrikant , PatilPallavi , Ms. BarkadeVaishali M
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid294

Optimizing SDN Performance for Small Networks by Enhancing Open Flow

Authors : Rakshith K Salian || Dr.C.T.Manimegalai
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid293

Secure Query Processing Over Encrypted Data via Location Based Service Provider

Authors : Dr. R.Rajalakshmi || K.L. Nikhitha, Rekha. D , Vaishali. C
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid292

An Efficient Cost-A ware Secure Routing (CASER) Protocol for Wireless Sensor Network

Authors : R. Rajeshwari || R.Arul Jothi , S.Bhuvaneswari , P. Jayamary Fathima , A.Ajin Brabasher
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid291

Trustworthy URI: Enhancing the Data’s On the Web Reliable and Immutable

Authors : A.Amalesh || D.Rajesh , Sanju Mathew Philip , Mrs.D.Lavanya
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid290

Machine Learning Methods for Medical Diagnosis VIA Web Application

Authors : Anz Joseph || Ashik Mohamed K , Venvas Emmanuvel A , Mrs. Paul T Sheeba
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid289

Social Recommendation with Cross-Domain Transferable Knowledge

Authors : Ajin Brabasher A || MadhanKumar M, VeeraKumar M , Krishna Moorthi R
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid288

Improving Security and QOS in Device-To-Device Communication Using Elliptic Curve DIFFIE Hellman Algorithm

Authors : DR. D. Karunkuzhali || G. Vidhya Sri, D. Thilagavathi, S. Suvetha, M. Aswini
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid287

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

Authors : D.Malavika || A.Amrutha, N.Nalini, Ms.D.Vinodha
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid286

Analysis of Request over Possible Clouds without Merged Duplicates

Authors : R.Shanthi || V.Raghavi, B.Revathy, D.Sharon Sharmishtha, D.Shunmugapriya
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid285

Reservation Based Smart Parking System

Authors : Aiswariya Kumar N || Akshaya M A, Amina Sattar, Arya K S, Lakshmi R Krishnan, Dileep V K
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid284

Webcam Based Remote Authentication via Biometrics over Insecure Channels Using Steganography

Authors : Devika Mohan || Devika J H, Athira S Nair, Devika R, Lailathun Nasooha, Dileep V K
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid283

Flow Mobility Modeling In VANETS

Authors : Sandeep Kaur || Nikita Arora, Deepti Tara
View Abstract Download Paper

Doi : 01.1617/vol3iss4pid281