Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Call For Paper : Vol. 9, Issue 1 , 2022

Volume4, June-2017

GSM Based Home Automation System

Authors : Amit Kumar || Ankur Sinha
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid40826

Review of Cryptography: Encryption and Decryption

Authors : Ajay Shanker Singh || Dheeraj Tripathi
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid75238

Design of Hydraulic Ram Pumps for Irrigation

Authors : Etkaf Hasan Khan ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid39208

Design of a Hybrid Power System

Authors : Kaushalendra Kumar Dubey ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid36170

A Literature Survey of Hexapod Robots

Authors : Dr. Sudhir Kumar Singh ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid87612

HAWK EYE TECHNOLOGY

Authors : HAWK EYE TECHNOLOGY ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid80193

Literature Review on Home Automation System

Authors : Lokesh Varshney ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid98421

ANALYSING BLUETOOTH SECURITY SYSTEM

Authors : Baibaswata Mohapatra ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid12756

GSM Based Home Automation System

Authors : Abhineet Anand || Ankur Sinha
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid26180

Review of Cryptography: Encryption and Decryption

Authors : Muruganandam. K || Dheeraj Tripathi
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid48301

Design of Hydraulic Ram Pumps for Irrigation

Authors : Etkaf Hasan Khan ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid91465

Design of a Hybrid Power System

Authors : Dr. P. Tamilchelvan ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid67819

A Literature Survey of Hexapod Robots

Authors : Dr. Sudhir Kumar Singh ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid01786

HAWK EYE TECHNOLOGY

Authors : Mukesh Kumar Verma ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid07812

Literature Review on Home Automation System

Authors : Lokesh Varshney ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid02756

ANALYSING BLUETOOTH SECURITY SYSTEM

Authors : Baibaswata Mohapatra ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid15392

Legal and Social Issues Related to the Environment

Authors : Dr. Bhagyashree Manohar Deshpande ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid15687

Network Aggregation using MapReduce in Big Data Application

Authors : Sayali C Ambulkar ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid48513

LPG Gas Sensor

Authors : Dr. Manoj Priyatham M || Nayana Dinesh.K, D. Sruthi reddy, Brunda.N, Priya B.C
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid82940

A Novel Approach to Control Speed of an Automobile

Authors : Dr.Manoj Priyatham M || Aishwarya. B, Aishwarya. K, Lakshmi Mache, Likitha. A
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid34702

On-road Night-time Smart Vehicle Light Detection

Authors : Dr. Manoj Priyatham M || Keerthana H
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid05491

Microcontroller Based Car Parking Automation

Authors : Dr.Manoj Priyatham M || Shilpa Mandal.S, Lakshmi.M.S, Ashwani.L, Sandhya.B.M
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid03295

A Novel Approach to Street Light Automation

Authors : Dr. Manoj Priyatham M || B.R.Pallavi, Shruthi A.S, Pallavi R
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid95732

Automatic Door Locking System

Authors : Dr. Manoj Priyatham || Rashmi.K.G, Meghana.R, Likitha Prakash.K, Rashmitha.H.R
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid32845

Home Automation using Bluetooth and IOT Modules

Authors : Dr. Manoj Priyatham M || Madhu.J
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid40296

IOT Based Noise Pollution Monitoring

Authors : Dr.Manoj Priyatham.M || A.Swathi, Chaithra.R, Sridhar.P
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid08375

Design of Credit Approval System using Artificial Neural Network: A Case Study

Authors : Anupam Shukla || Apoorva Mishra, Sanjeev Sharma
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid09467

Shape and Content Aware Image Retargeting

Authors : Sunanda Maheswaran || Prof L. Nanda Kumar
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid38961

Identification and Verification of Source Camera using DCT Filtering Technique

Authors : PrajwalaAnantharamu || Dr. Purohit Shrinivasacharya
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid70461

An Investigation on Nearest Neighbor Search Techniques

Authors : Upinder Kaur || (Dr.) Pushpa R Suri
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid87291

A Data Centric Access Control Solution with Role Based Expressiveness for Protecting User Data on Cloud

Authors : Nisha Ranjan Sah || Tejashwini P, Veeresh S, Yathish, Mrs. Prema.
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid35681

Reduced Instruction Set Computer Processor for Cryptographic application

Authors : Vijayalaxmi P || Chandrakumar H S, Mohankumar B N
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid57089

Analyzing tweets for Real-Time Event Detection and Development of Earthquake Reporting System

Authors : Sumanth V || Aman A. Saxena, Jeevan B, P. Vinay, [Vageesha N. J.
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid39640

Simulation of Mitigating Node Isolation Attacks Using DCFM

Authors : Shruthi H.K, || Poornima U.S, Dr. B.R. Prasad Babu
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid25841

Recommendation Engine in E-Commerce

Authors : Shrinivas S Hegde || Soumya Lakshmi G, Vellaki Kiran Kumar,Neelu L, Pramodchakravarthy Patil
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid37214

Resisting Shoulder Surfing Attacks Using Secured Graphical Pass Matrix Authentication Scheme

Authors : Rashmi B.K || Manisha Singh, Mranali Gupta, Surya R, Sushmitha Narayan
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid40783

An Intelligent Appliance with Multimedia Capability

Authors : Pooja.N || Ramya Sai.M,Rekha.P,Radha.S
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid54802

Cyberbullying Detection in light of Semantic Enhanced Marginalized Denoising Auto-Encoder

Authors : Cyberbullying Detection in light of Semantic Enhanced Marginalized Denoising Auto-Encoder || Rashmi S Shetty, Sushmitha S Siddanagoudar, Vidyashree.G, Asha.N.
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid23751

Plant identification system using leaf feature Plant

Authors : Ms. Vinutha B T || Arvind Kumar, Chauhan Akash, Nithin M E, Prashanth G D
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid42615

An Efficient and Reliable Diverse Keyword Ranked Search Scheme Over Ciphered Cloud Data

Authors : Ms. Shruthi || Mehul Bhatt, Pushpa J, Sobin Baby, Akhil K. Manoj
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid56284

Implementing Cold-Start Product Recommendation System by using Micro blogging Information

Authors : Marjana Khathima || Mr. Ravindra Prasad S
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid24365

Conjunctive catchword scan with Designated analyser and timing enabled proxy re-encryption method for e-health clouds

Authors : Koustuba A || Lakshmi N,Leelavathi S, Salma Arifa Farzana, Ravindra Prasad S
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid36954

Comparison of Keyword Search and Ranked keyword Search in Cloud Computing

Authors : Kavya H || Prashanth Putta P, Chethan R, Divya D,Vani Saptasagar
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid71830

Efficient Access and Revocation System for Dynamic Groups in the Cloud

Authors : Dr.B R Prasad Babu || Kavya.H, Nimisha Antony,Sneha.P
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid68230

Verifying search result correctness of frequently occured item set in Data mining for online Customers

Authors : Dr. B R Prasad Babu || Saurabh Sharma, Haroon Ali, Nandini B J, Anusha S
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid17406

Eliminating Duplicate Data in Cloud Storage with Dynamic Ownership and Security

Authors : Dhananjaya M K || Krishna Mohan Shah, Gaurav Bhusal, Kirti Lata,J Meghana Patel
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid94715

Dynamic Secret Key Generation for Multi Data User in Cloud Computing

Authors : Chethan R || Divya D, Kavya H, Prashanth,Vani Saptasagar
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid35472

Cloud Computing and Semantic web: An Interplay

Authors : Chethan R || Divya D, Kavya H, Prashanth,Vani Saptasagar
View Abstract Download Paper

Doi : 01.1617/vol4/iss9/pid35472

Wearable Technology Regarding Air Pollution

Authors : Anmol Sancheti || Sreyoshee Dey
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid31876

IoT Based Smart Inverter Using Raspberry Pi

Authors : Megha A Joshi || Kavyashree S
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid38479

A Detailed Study on Security Threat Analysis in Wearable Devices

Authors : Srimanth DS || Sudhanva Krishna V, Vishwajith M V,Venkatesan S
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid32410

A Survey on Security Features Based on Some Interactions and TheirRespective Co-Operation in Handheld Devices for Communication

Authors : Arogia Victor Paul M || Numan Shaikh, Sharon M, Anil Sagar T, S. Venkatesan
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid56708

Role of 4G and 5G Network in Supporting the Connectivity Requirements of Internet of Things

Authors : Sparsha Shetty || Vishalakshi Prabhu H
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid15486

Preserving Individual Seclusion In Social Media

Authors : Sneha Chinivar || Mr.Ramu.S
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid96374

Design and Developmentof Token Generate Toll for Future Phone Technologies

Authors : Shreekant || Salotagi,Shridevi Kembhavi,Zarinabegam K Mundargi
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid84256

Crowd Analysis using Computer Vision Techniques

Authors : Shivashree G || Dr Anuradha S G
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid64520

Survey on Approaches used for Image Quality Assessment

Authors : Ms. Savitri B. Patil || Dr. Shobha. R. Patilc
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid14975

Remote monitoring automatic irrigation system for home gardens using GSM

Authors : GNK Suresh Babu || Sarala D.V, Manjunatha S J, Srivatsa Shashikumar
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid51704

Image Operations in Encrypted Domains

Authors : Sanjana Prasad || Dr.H.S. Jayanna
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid65023

Object Detection and Tracking for Computer- Vision Applications

Authors : Rojasvi G.M || Dr Anuradha S G
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid38941

Speech File Detection by a Rule Based System

Authors : Punnoose A K || Ravishanker M
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid62718

Literature Surveyon Sensors

Authors : Aruna T M || Rajeswari R, Lavanya H V , Meghana B S
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid36194

An Adaptive Method for Multi-Level De- Duplication With the Improved Encryption Techniques in Cloud Environment

Authors : Aruna T M || Rajeswari R, Lavanya H V , Meghana B S
View Abstract Download Paper

Doi : 01.1617/vol4/iss11/pid36194

6*6 Radom Color Grid Authentication (2 Step)

Authors : Sudershan M || Veena Potdar, Madhu B
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid47308

A Secure Deduplication Mechanism for Sensitive Data in Public Cloud Storage

Authors : Deepa P.B || Dr.Rudramurthy M.S
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid69327

Securing And Ensuring Integrity of Steganographic Image using Cloud Computing

Authors : Pallavi R || Nandini P, Darshan kanbargi
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid69381

Secure Sharing of Group Data in Public Clouds

Authors : Anusha C H || Dr.R.Aparna
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid05321

Recommendation On E-commerce based Structural Balance Theory over Big Rating Data

Authors : Ms. Nandini P || Ms. Pallavi R, Kanishka and Anirudh
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid52613

Rapid Action System for Safety Purpose

Authors : Aadil Nawaz || Muhammed Arif Jalil
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid54021

Statistical Stemmer for Roman Konkani

Authors : V. Pugazhenthi || Sagar Naik, Neha Sawant, Raghavendra Gawas, Shradha Vaingankar, Snusha Shirodkar, Charitra Chandekar
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid62139

Part of Speech Tagging for Konkani Corpus

Authors : Meghana Mahesh Pai Kane ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid27014

A Dual Band Microstrip Double Slot Antenna for Wi-Fi and WIMAX Applications

Authors : N.Parthiban || Dr. M. Mohamed Ismail
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid17403

Trust based Novel Secure Data Sharing Policy Framework for Social Networking

Authors : Varun M Deshpande || Dr Mydhili K. Nair
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid63871

Data Gathering and Route Optimization Protocol for Mobile Sink in Wireless Sensor Networks

Authors : B.Bhuvaneshwari || Dr.G.Anna Poorani, V.M.Priyadharshini
View Abstract Download Paper

Doi : 01.1617/vol4/iss6/pid12389