Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Call For Paper : Vol. 9, Issue 1 , 2022

Volume4, August-2017

REDUCING LEAKAGE POWER IN CMOS CIRCUITS

Authors : Arul V ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid19023

Review on Glucose Biosensors

Authors : Dr. Sanjay Kumar || Gitanjali Mehta
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid49356

Wireless Battery Charger: Architecture

Authors : Ashok Kumar Yadav || Ganana Jeba Das
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid42930

Review of Quantum Cryptography

Authors : Arvindhan M ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid23608

The Air Taxi: A Futuristic Travel System Nearing Reality

Authors : Gagnesh Sharma ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid94538

A Review of Recent Research on Nanosensors

Authors : D Saravan ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid43182

An Article on Understanding Quantum Theory

Authors : Anurag Singh ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid64518

REDUCING LEAKAGE POWER IN CMOS CIRCUITS

Authors : Ruqaiya Khanam ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid81560

Review on Glucose Biosensors

Authors : Dr. Sanjay Kumar || Gitanjali Mehta
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid68497

Wireless Battery Charger: Architecture

Authors : Dr. Sakkaravarthi R || Ganana Jeba Das
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid73405

Design of Location Based Tracking Device

Authors : Dr. Rizwan Patan || Divya Sharma
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid05726

Review of Quantum Cryptography

Authors : Dr. M Sivaram ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid42370

The Relationship between Law and Morals

Authors : Dr. Bhagyashree Manohar. Deshpande ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid53976

Case study of Crisis of Leadership in Fast Changing World

Authors : Dr R B Kulkarni ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid38624

Drishti - IoT based Blind Stick

Authors : Jayant Benjamin || Hiten Chaglani,Hardik Chodvadiya,Divakar Yadav, Ninad Modak
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid61582

Batch Normalization and Its Optimization Techniques: Review

Authors : Niveditha Kumaran || Ashlesha Vaidya
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid40216

Mitigating denial of service attacks in search engines using OLSR Method

Authors : G.Geetha || Dr.B.Mukunthan
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid41982

A Exposure Based Technique With Dwt To Enhance The Image

Authors : Abhay Verma || Manish Dixit
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid42196

Advanced communication Through Fleshredtacton

Authors : Haritha K Sankari || B.S.Vignesh, K.R.Pooja, S.Kousika
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid04537

A Modernization Approach to Software Engineering

Authors : K.Nirmal Raju || Ch.Sowjanya, N.Susmitha,Ch.Ambedkar,M.Rithvik
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid49078

Encountering Evidence of a Node with Proximity based Mobile Opportunistic Social Network

Authors : Dr.S.Chakaravarthi || D.Saranya, T.Shanmuga Priya
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid28095

Instant Medical Insurance Claims Through Aadhaar Based Authentication

Authors : Mohamed Esoof || Moh’d Radaideh,Mohamed Raseen
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid26973

Automatic Follow-up Actions for Medical Treatment

Authors : Mohamed Esoof || Mohamed Raseen
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid84536

Avoiding Intrusion and Privacy Protection for Cloudlet-based Medical Data Sharing

Authors : Karthika.J || Lavanya.S, JayaSankari.J, Mariya sushmitha.T.F, kanimozhi.R
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid87923

Image Processing: A New Step to Security

Authors : Dr.S.Chakaravarthi || Nevedha P,Sruthi Nath C
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid31694

Simple & Secure Mechanism for establishing connection between D2D Communication in 5G Scenario

Authors : Rajakumar Arul || Gunasekaran Raja, Ramkumar Jayaraman
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid93450

Dr. House - Warehouse Manager

Authors : Jayant Benjamin || Milan Dave
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid35280

An Improved Genetic Algorithm in C for Knapsack Problem

Authors : Manpreet Kaur ||
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid80976

An Investigation on Nearest Neighbor Search Techniques

Authors : Upinder Kaur || (Dr.) Pushpa R Suri
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid37982

Preventing Obfuscated Malware via Differential Fault Analysis

Authors : Shubhangi.D.C || Amena Roohi
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid74612

Simulation of Special Mathematical Functions

Authors : Sangeeth Sadanand || Divya K. Shah, Vishwesh A. Vyawahare
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid30928

Parallel Computing of Fractional Integral Operators

Authors : Sameer S. Chikane || Mukesh D. Patil, Vishwesh A. Vyawahare
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid30427

Enhanced Forensics Enabled Cloud through Secured Logging as a Service

Authors : Ms.D.Gomathi || Dr.B.Mukunthan
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid06128

Reversible Data hiding by Reversible image Transformation Algorithm for Encrypted Images

Authors : Bharati S Pochal || Gayatri Prasanna
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid93658

Dictionary Learning Arrangement for Multi-Label Image Annotation

Authors : Yogini B. Bhadane || Prof. Nitin N. Patil
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid59167

“An automated brain tumour detection and severity analysis using ANN”

Authors : Prof. Vrushali Borase || Prof. Gayatri Naik, Prof. Vaishali Londhe
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid78065

“Malicious Misbehavior Activity Detection Using Probabilistic Threat Propagation in Network Security”

Authors : Tejaswini S. Akulwar || Associate Prof. P. S. Kulkarni
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid98710

Improve Performance of Crawler Using K-means Clustering

Authors : Swati G. Bhoi || Prof. Ujwala M. Patil
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid05613

Health Care in Smart Cities: A Survey based on IoT data analytics

Authors : Swapnaja Rajesh Hiray || Dr. Brahmaramba Ravi
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid19876

A Multi-Authority Access Control System in Cloud Computing Using Network Security

Authors : Ms. Vibhute Shubhangi Prakash || Prof. Mr. Kale Navnath D.
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid71086

DWT & SVD Based Watermarking Scheme for Copyright Protection In Medical Images

Authors : Ms. Shubhangi D. Mashalkar || Prof. S. S. Shirgan
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid98721

Meet-O-Mania (Meeting Scheduler)

Authors : Mrs. S.R. Idate || Sinchita Deb, Pankhuri Srivastava, Vaibhav Singh,Shubham Mahajan
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid01945

Color and Texture Based Image Retrieval Based on Quadtree Segmentation Technique

Authors : Shradha Naik || Prof. Umesh A. Bapat
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid06274

“Security privacy preserving for content leaks”

Authors : Shradha V. Raghorte || Dr . Rahila Sheikh
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid31409

“Implementation of file level and block level deduplication and detecting attacks in cloud environment.”

Authors : Prof. Samita Mokal || Prof. Nilima Nikam, Prof. Vaishali Londhe
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid68257

Reversible Data Hiding using Context free Reversible Grammar

Authors : Samiksha Velip || Dr. J. A. Laxminarayana
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid61874

Hiding Sensitive Association Rule Constructed from Table

Authors : Ruchi . P. Kanekar || Professor Rachel Dhanaraj
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid25467

Hemorrhages Detection in Retinal Color Fundus Image

Authors : Priyanka kale || Prof. N. Janwe
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid65083

Multiclass Sentiment Classification On Product Reviews

Authors : Milan Gaonkar || Prof. Amit Patil
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid76234

An Intuitive Architecture for Next Generation Digital Personal Assistants

Authors : Mehul Jain || Utkarsh Bhatia
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid97634

“Hybrid technique of Image Encryption to Enhance Security”

Authors : Kalyani D. Kadukar || Prof.R. Krishna
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid52768

A Novel Approach For Image Security

Authors : Jyoti T. G. Kankonkar || Nitesh Naik
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid08915

Searching Comparatively Better Result From Agglomerative algorithm

Authors : Dipalee Prakash More || Prof. Ujawala M Patil
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid90541

Improve the Efficiency of Real World Entity Set Using Progressive Methods

Authors : Dipalee A. More || Prof. Nitin N. Patil
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid52389

Exploring Big Data Analytics for Satellite Imagery Data Using Hadoop Technique

Authors : Ch.Rajya Lakshmi || Dr.K.RammohanRao, Dr.R.RajeswaraRao
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid56971

Cluster Based Data Centric Trust Management in VANET

Authors : S.V.Saboji || Bhagyashree K.L
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid35648

Fault Tolerance Approach in Distributed Sensor Networks using Genetic Algorithm

Authors : Anagha Nanoti || Prof. R. K. Krishna
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid78926

Hybrid Crypto-System Approach use in Secure Intrusion Detection System for MANET

Authors : Mr. Ajit N. Gedam || Prof. M. P. Wankhade
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid30981

Automatic Image Annotation-A Proposed Method

Authors : Sayantani Ghosh || Prof. Samir Kumar Bandyopadhyay
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid90546

Detection of Red Lesions For Diabetic Retinopathy In Telemedicine Context

Authors : Kazi Syed Naseeruddin Mustafa || Prof.SushilKumar N. Holambe
View Abstract Download Paper

Doi : 01.1617/vol4/iss8/pid68754