Articles view

The International Journal on Engineering Technology and Science (IJETS) is a peer reviewed international online journal for scientists and engineers involved in all aspects of Engineering and technology to publish high quality, refereed papers. The journal offers survey and review articles from experts in the field, promoting insight and understanding of the state of the art, and trends in technology. The contents include original research and innovative applications from all parts of the world. While the journal presents mostly previously unpublished materials, selected conference papers with exceptional merit are also published, at the discretion of the editors of IJETS.

S.No Contents
1 APPLICATIONS OF A NOVEL GREEN ADSORBENT FOR ENVIRONMENTAL MONITORING
Authors : Kanika Solanki, Khushbhu Sharma , Mamta Soni and N. Bhojak*
2 Efficient Anonymous Transfer of Data in Wireless Networks
Authors : K.HEMALATHA, Dr.S.M.NANDHAGOPAL
3 SECURE ROUTING IN MANETs WITH KEY MANAGEMENT
Authors : M. Kavitha, T. Maheshwaran, Prof. M. Senthil Kumar
4 STUDY ON STRENGTH PROPERTIES OF CONCRETE BY PARTIALLY REPLACEMENT OF SAND BY STEEL SLAG
Authors : M.SOUNDAR RAJAN
5 PRIVACY PRESERVING DATA FORWARDING IN WIRELESS SENSOR NETWORKS
Authors : Kavya. N, Ms.B.Amutha
6 Synchronized Encrypted Database Structure Management Method for Remote Storage Environment
Authors : Ms. S.Tharani, Dr. T. Senthil Prakash, Mr. S. Prakadeswaran, M.E.,
7 USER GROUP ESTIMATION AND RECOMMENDATION MODEL FOR SOCIAL NETWORKS
Authors : Ms. S.Rabiyathul Basiriya, Dr. T. Senthil Prakash, Ms. P.Sudhaselvanayaki
8 Spatio-Temporal Query Processing on Weighted Timestamp Data Environment
Authors : Ms. P.Maheswari, Dr. T. Senthil Prakash, Ms. N. Narmatha
9 Confidential User Query Profile Construction for Personalized Web Search
Authors : Ms. P. Sudhaselvanayaki, Dr. T. Senthil Prakash, Ms. V. Karthikeyani
10 Attack Resistant User Authentication using Visual Verification Mechanism
Authors : Ms. V.Karthikeyani, Dr. T. Senthil Prakash, Ms. S. Rabiyathul Basiriya
11 Optimal Clustering with Nearest Neighbor Relationships
Authors : Ms. N. Narmatha, Dr. T. Senthil Prakash, Ms.S. Kokila
12 Privacy and Security Ensured Database Rights Management Scheme
Authors : Ms. S.Kokila, Dr. T. Senthil Prakash, Ms. P.Maheswari
13 REDUCING THE TIME DELAY OF BACKBONE NETWORKS
Authors : M. Subashinidevi, S. Castro, Prof. M. Senthil Kumar
14 KEY AGGREGATE DATA STORAGE AND DATA INTEGRITY PROTECTION IN CLOUD
Authors : V.Rajkumar, D.Mohanapriya
15 AN AUTONOMOUS PEOPLE FRIENDLY INTELLIGENT TRANSPORTATION SYSTEM
Authors : N.Mathiarasi, T.Sureshkumar
16 A UNIFIED APPROACH FOR CANCER CLASSIFICATION USING STEM CELLS
Authors : R.Anbu selvi, Dr.R.Nallusamy
17 HIGH DIMENSIONAL DATA WITH SUBSPACE AND OUTLIER ANALYSIS USING MODEL BASED CLUSTERING ALGORITHM
Authors : Ms K.Abinaya, Dr.M.Vijaya kumar, M.E.Ph.D.,
18 SECURE ROUTING AND ATTACK DETECTION IN WIRELESS AD HOC NETWORK
Authors : Dr.C.Kumar Charliepaul, K.Megala Devi
Back to Top