IJCTEE

International Journal of Computer Technology and Electronics Engineering (ISO 9001:2008 Certified International Journal, ISSN 2249-6343(Online))

Latest Updates

Conference Published (E-NSPIRE - Mar 2013)

Conference Published (NCETCSIT- Dec 2011)

Volume 7, Issue 1, Published (Click Here)

Calling Papers for Volume 7, Issue 2, Feb 2017

IJCTEE PROVIDES YOU AN INTERNATIONAL PLATFORM WHERE YOU CAN EXPOSE YOUR NEW INNOVATIONS TO THE WORLD


Indexed By Google, Yahoo, UK Index, Entire Web, Amphibia, Tower Search, Exact Seek,Infomine and Many more......

S.No.Title and Authors of Paper ( Volume 1, Issue 2,Oct 2011)Page.No.
1 Digital Finite Impulse Response Filter based on Residue Number System
Authors:Pallab Maji,Girija Sankar Rath
1-5
2 Implementation of Image Denoising using Thresholding Techniques
Authors:Rajesh Kumar Rai,Trimbak R. Sontakke
6-10
3 Performance Evaluation of the PHY & MAC for WLAN Systems and Efficiency Improvement by Application of Convolution Codes
Authors:Sheetal Patil, Gajendra Singh Chandel, Prashant G Patil
11-17
4 Performance Issues of Various K-anonymity Strategies
Authors:Nidhi Maheshwarkar, Kshitij Pathak, Vivekanand Chourey
18-22
5 A Review and Comparative Study of Block based Symmetric Transformation Algorithm for Image Encryption
Authors: Hiral Rathod, Mahendra Singh Sisodia, Sanjay Kumar Sharma
23-30
6 Effective Reducing Memory Latency Using Data Prefetch Mechanisms
Authors: Akhil Khare, Ahmed Khodiar
31-34
7 CFA (color filter array) based Motion Blur detection using lowest directional High-frequency energy
Authors: Geetanjali Dave, Vibha Gupta
35-38
8 A Comprehensive Review of Image Enhancement Techniques
Authors:H. K. Sawant, Mahentra Deore
39-44
9 Object-Oriented Metrics and Models in Software Quality Engineering
Authors: Akhil Khare, Kendre Pallavi H
45-50
10 An Evaluation of Techniques for Adaptive Search Web Mining Framework
Authors: H. K. Sawant, Shah Ashwini V.
51-57
11 Implementation of Automotive Radar Based On Correlation Radar
Authors: Shuruti Bhargava, Snehprabha Lad
58-62
12 An Efficient Neural Network based Algorithm of Steganography for image
Authors: Imran Khan,N.Gupta, B.Verma
63-67
13 An Integrated Encryption Scheme Used in Bluetooth Communication Mechanism
Authors: Bhoopendra Singh Rajput, Prashanna Gupta, Shweta Yadav
68-71
14 IT-BPO : An Emergning Trend
Authors: Dharmendra Chourishi, Chanchal Kumar Buttan, Abhishek Chaurasia
72-76
15 A Single Stage Source Coupled VCO in 0.18µm CMOS Technologies with Low Power Consumption
Authors: Harvinder Singh Saluja, Abhishek Choubey, Abhishek Jain
76-79
16 Balance Key Algorithm for Uniform Coverage in Heterogeneous Wireless Sensor Network
Authors: Harikesh Pandey, Shrikant Lade, Vijay Bhandari
80-85
17 Design and Implementation of DPLL with Phase Frequency Detector Using 45nm CMOS Technology
Authors: Delvadiya Harikrushna, Mukesh Tiwari,Jay Karan Singh,Anubhuti Khare
86-89
18 An Approach to Enhance Web Service Resource Framework using the Improved PLWAP Algorithm for Large Scale Hybrid Data in Distributed Environment
Authors: Ashish Sharma, Niket Bhargava
90-98
19 An Improved Version of Binomial Heap to upgrade network optimization
Authors: Anshul Chaturvedi, Nidhi Mishra, Rajeev Kumar Singh
99-103
20 Effect of Guard Period Insertion in MIMO OFDM System
Authors: Mitalee Agrawal, Yudhishthir Raut
104-108
21 Implementation of Intelligent Polling System Using GSM Mobile Authors: Monali R.Dave, Jai Karan Singh, Mukesh Tiwari, Anubhuti Khare
109-113
22 The Role of Data Mining in Design and Implementation of Intrusion Detection Systems
Authors: Neha Sthapak, Shweta Modi
114-119
23 Data Mining Algorithms for personalizing user’s profiles on Web Authors: Robin Singh Bhadoria, Deepak Sain, Rahul Moriwal
120-125
24 Dynamic memory scheduling using  FPGA
Authors: Anubhuti Khare, Manish Saxena, Shweta Tiwari
126-129
25 Performance Optimization in Ad-hoc Networks
Authors: Swati Jaiswal, Satya Prakash, Neeraj Gupta, Devendra Rewadikar
130-135
26 Secure Pervasive Computing Environment for Health Monitoring
Authors: Shilpa Lakhina, Zeenat Mahmood, Sarwesh Site
136-139
27 Hyper Secure Cryptographic Algorithm to Improve Avalanche Effect for Data Security
Authors:Parvez Khan Pathan, Basant Verma
140-145
28 Adaptive Optimised Approach for Image Denoising for SDR Implementation in Cognitive Radio
Authors:Rajeshree Raut,Kishore D. Kulat, Vipul Lande
145-149
29 M-Commerce with Process of Knowledge Discovery
Authors: Sanjivani Mahor, Sourabh Jain
150-155
30 Analysis Of Different Pseudo Noise Sequences
Authors: Alka Sawlikar,Manisha Sharma
156-160
31 A Layered Approach for Intrusion Detection Using Meta-modeling with Classification Techniques
Authors:Ankita Gaur, Vineet Richariya
161-167
32 Performance Analysis of Ad-Hoc Network under Node Failure Authors: Alankar Shastri, Pallavi Khatri, Shilpi Jain
168-173
33 Low Area FSM based Programmable BIST
Authors:Neha Namdev, Rita Jain, Ashutosh kumar Singh
174-177
34 An Effective Image-Text Association algorithm to retrieve data from Multimedia Web Documents
Authors:H K Sawant,Dipali Kadam
178-182
35 VHDL Modeling of Wi-Fi MAC Layer for Receiver
Authors: Vibhanshu Srivastava, Sandip Nemade
183-186
36 Video Water Marking Using Abrupt Scene Change Detection
Authors: Kintu Patel, Mukesh Tiwari, Jaikaran Singh
187-189
37 Analysis of Contrast Enhancement Techniques For Underwater Image
Authors: Balwant Singh, Ravi Shankar Mishra
190-194

Copyright 2011 IJCTEE Inc. All Rights Reserved.