Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 2 Issue 3 / May-June 2014

S.No
Title/Author Name
Page No
1
Review on Video Mining
-Rupinder kaur, Shruti Aggarwal Abstract   IJCST  PDF
IJCSTCite/Export

1
2
Enhancing Asymmetric Encryption using DNA Based Cryptography
-Mamta Rani, Sandeep Jain, Asha Abstract   IJCST  PDF
IJCSTCite/Export

7
3
Reducing Churn Rate Using Business Intelligence Approach in Data Mining
-Trasha Gupta Abstract   IJCST  PDF
IJCSTCite/Export

12
4
Survey Paper on Basics of Cloud Computing and Data Security
-Jasleen Kaur, Ms.Anupma Sehrawat, Ms.Neha Bishnoi Abstract   IJCST  PDF
IJCSTCite/Export

16
5
Analyzing the Factors Affecting Reusability for Black–Box Component
-Suchita Yadav, Amit Yadav, Surabhi Yadav Abstract   IJCST  PDF
IJCSTCite/Export

20
6
A Survey: Classification Techniques
-ShamlaMantri, Ria Agrawal, ShraddhaBhattad, AnkitPadiya, RakshitRathi Abstract   IJCST  PDF
IJCSTCite/Export

24
7
Comparative Analysis of Reactive Protocols in Mobile Ad Hoc Networks
-Nisha Mannan, Shipra Khurana, Mamta Rani Abstract   IJCST  PDF
IJCSTCite/Export

28
8
A Comparative Analysis Review of Various MANET Routing Protocols
-Deepak Kumar Pathak, Abhilash Pandey, Garima Gupta Abstract   IJCST  PDF
IJCSTCite/Export

33
9
Review on Text Clustering Using Statistical and Semantic Data
-Dilpreet Kaur, Shruti Aggarwal Abstract   IJCST  PDF
IJCSTCite/Export

37
10
Survey Of Optimization Of Scheduling in Cloud Computing Environment
-Er.Mandeep kaur, Er.Rajinder kaur, Er.Sughandha Sharma Abstract   IJCST  PDF
IJCSTCite/Export

43
11
A Review on Re-documentation Approaches and their Comparative Study
-Yamini Pathania, Gaurav Bathla Abstract   IJCST  PDF
IJCSTCite/Export

48
12
Dynamic Programming He and Elgamal Used For Software Agent Security
-Prof. Sachin Upadhye, Dr. P.G. Khot Abstract   IJCST  PDF
IJCSTCite/Export

52
13
Complexity and Precision Analysis of DFT Based ENF Extraction Methods
-Sumit Kumar Abstract   IJCST  PDF
IJCSTCite/Export

56
14
Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm
-Sudhansu Ranjan Lenka, Biswaranjan Nayak Abstract   IJCST  PDF
IJCSTCite/Export

60
15
IP Failure Handling Using Localized On-Demand Link State Routing
-Prof. S.M.Sangve, Sushil Warkar, Amit Shirke, Kunal Solanke, Pratap Patil Abstract   IJCST  PDF
IJCSTCite/Export

65
16
A Survey of Digital Watermarking Techniques and its Applications
-Lalit Kumar Saini, Vishal Shrivastava Abstract   IJCST  PDF
IJCSTCite/Export

70
17
Advanced Data Acquisition in Wireless Sensor Networks
-Deepthy Varghese Abstract   IJCST  PDF
IJCSTCite/Export

74
18
A Survey of Data Mining: Concepts with Applications and its Future Scope
-Dr. Zubair Khan, Ashish Kumar, Sunny Kumar Abstract   IJCST  PDF
IJCSTCite/Export

78
19
Design of High Probability & Low-Overhead Propagation Mechanism for Beacons in VANET
-Neethu C Sekhar Abstract   IJCST  PDF
IJCSTCite/Export

83
20
The Common Interface Oriented Architectural Framework to Improve Compatibility of the Pure Object Oriented Cross Languages Interoperability
-Sonar Sanjay Bhagwan Abstract   IJCST  PDF
IJCSTCite/Export

90
21
Adaptive Quadrant-Based Geographic Routing For MANET
-Babitha U B Abstract   IJCST  PDF
IJCSTCite/Export

98
22
A Survey of Load Balancing Algorithms in Cloud Computing
-Harmandeep Singh Brar, Vivek Thapar, Kunal Kishor Abstract   IJCST  PDF
IJCSTCite/Export

103
23
VHDL Implementation of π/4 QPSK MODEM
-M. S. Sadavarte, Prashil H. Zodape Abstract   IJCST  PDF
IJCSTCite/Export

107
24
An Approach to Formulate Intelligent Data Repository
-A. Prema, A.Pethalakshmi Abstract   IJCST  PDF
IJCSTCite/Export

113
25
Analysis of Attacks on Hybrid DWT-DCT Algorithm for Digital Image Watermarking With MATLAB
-Lalit Kumar Saini, Vishal Shrivastava Abstract   IJCST  PDF
IJCSTCite/Export

123
26
Power Quality Time Series Data Mining Using S-Transform and Fuzzy Expert System
-Prasannnajit Dash Abstract   IJCST  PDF
IJCSTCite/Export

127
27
Automatic Speech Recognition for Ahirani Language Using Hidden Markov Model Toolkit (HTK)
-Ajay S. Patil Abstract   IJCST  PDF
IJCSTCite/Export

140
Copyright © 2013-2020 International Journal of Computer Science Trends and Technology,
Published By Eighth Sense Research Group™. All Rights Reserved.