Call for Paper : September - 2017 Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 3 Issue 2 / March - April 2015

S.No
Title/Author Name
Page No
1
FMSR-AES in Multiple Cloud Storage System to Provide Secured Fault Tolerant
-V.Swathy, T.S Usha Nandhini, T.K.P Rajagopal Abstract   IJCST  PDF
IJCSTCite/Export

1
2
A Comparative Analysis of Tensor Decomposition Models Using Hyper spectral Image
-Ankit Gupta, Ashish Oberoi Abstract   IJCST  PDF
IJCSTCite/Export

5
3
An Exception Monitoring Using Java
-Jyoti Kumari, Sanjula Singh, Ankur Saxena Abstract   IJCST  PDF
IJCSTCite/Export

12
4
TWEET For Instantaneous Effect Vulnerability on Natural Disasters
- A.Srinivas, V.Sudheer Goud, M.Srinivasa Rao, S.Swaraj, Shruti Abstract   IJCST  PDF
IJCSTCite/Export

19
5
Handling Multithreading Approach Using Java
-Nikita Goel, Vijaya Laxmi, Ankur Saxena Abstract   IJCST  PDF
IJCSTCite/Export

24
6
Detection and Extraction of Brain Tumor from MRI Images Using K-Means Clustering and Watershed Algorithms
-Yogita Sharma, Parminder Kaur Abstract   IJCST  PDF
IJCSTCite/Export

32
7
High Efficient and Better Robustness 3D Face Recognition with Expression Simulations
-Shwetha C Baragi, Chetana Srinivas Abstract   IJCST  PDF
IJCSTCite/Export

39
8
Routing Mechanism in Wireless Ad-hoc Network
-Sunil Kumar Abstract   IJCST  PDF
IJCSTCite/Export

43
9
Hybrid-Statistical Machine Translation From English to Hindi
-Srishti Dhamija, Kriti Aggarwal, Shashi Pal Singh, Ajai Kumar Abstract   IJCST  PDF
IJCSTCite/Export

48
10
Hiding Data in Video Stenography by Using Different Algorithm: A Review
-Simaranjit Kaur Abstract   IJCST  PDF
IJCSTCite/Export

54
11
Internet Data Synchronization Tool
-Tushar Mohate, Vijay Rasal, Anil Panchal, Sarita Ambadekar Abstract   IJCST  PDF
IJCSTCite/Export

58
12
Comparitive Study On Color Recognition Methods
-Donia Augustine, Sini Jose, Namitha T N Abstract   IJCST  PDF
IJCSTCite/Export

61
13
Android Based Color Routing Wizard
-Abin Joy, Ann Theresa Kenny, Nishal Govind K R, Namitha T N Abstract   IJCST  PDF
IJCSTCite/Export

64
14
Filter False Message From Userwall
-Sunanda Reddy, Gourav Jain, Deepesh Wairkar, Vinay Haram, Prof. Gayatri Naik Abstract   IJCST  PDF
IJCSTCite/Export

67
15
Visual studio Professional 2012: A Benchmark For Tomorrow
-Devadrita Dey Sarkar Abstract   IJCST  PDF
IJCSTCite/Export

71
16
A Comprehensive Review of High Speed Low Complexity FFT Processor
-Harpreet Kaur Abstract   IJCST  PDF
IJCSTCite/Export

17
Survey Paper on Document Classification and Classifiers
-Upendra Singh, Saqib Hasan Abstract   IJCST  PDF
IJCSTCite/Export

83
18
Object Detection and Localization Using SURF Supported By K-NN
-Upendra Singh, Sidhant Shekhar Singh, Manish Kumar Srivastava Abstract   IJCST  PDF
IJCSTCite/Export

88
19
Review on Secret Data Hiding In Encrypted Compressed Video Bitstreams
-Sonali.A.Chaudhari, Prof.Manoj.D.Bagde Abstract   IJCST  PDF
IJCSTCite/Export

94
20
Optimizing Search Efforts by Extracting Information of Web Pages for Web Users from Web Tables
-Ms. Akshata U. Hegishte Abstract   IJCST  PDF
IJCSTCite/Export

97
21
Authentication System for Hadoop in Cloud Environment- A Collaborative Approach
-Shashank Raghunath, Mohanish Satam, Kiran Pugaonkar, Nikhil Joshi, Gayatri Naik Abstract   IJCST  PDF
IJCSTCite/Export

100
22
CO-Extracting Opinion Targets and Opinion Words from Online Reviews Based On the Word Alignment Model
-Aditya Rane, Sankalp Rane, Saily Sawant, Shubham Sali Prof.Sunil Jadhav Abstract   IJCST  PDF
IJCSTCite/Export

104
23
Role of (VPND) Vehicle Number Plate Detection In Curbing Crimes: A Review
-Sameer Dixit, Nitin Goel, Sudheer Kumar Singh, Shanshak Singh Abstract   IJCST  PDF
IJCSTCite/Export

111
24
Identity-Based Secure Data Storage Schemes
-Unmesh Mhatre, Dhondiram Jadhav, Shrikant Bhirud, Sumit Desai, Prof. Sunil Jadhav Abstract   IJCST  PDF
IJCSTCite/Export

117
25
Cut Detection in Wireless Sensor Network
-Vignesh Menon, Pratiksha Mhase, Shwetali Kanekar, Prof: Nilima Nikam Abstract   IJCST  PDF
IJCSTCite/Export

121
26
Code Clone Detection and Analysis Using Software Metrics and Neural Network-A Literature Review
-Balwinder Kumar, Dr. Satwinder Singh Abstract   IJCST  PDF
IJCSTCite/Export

127
27
An Approach Towards Increasing The Throughput By Reducing Routing Overhead In MANET
-Harish T. Gurme, Babruvan R. Solunke Abstract   IJCST  PDF
IJCSTCite/Export

133
28
Customer Relationship Management Based on Decision Tree
-S. Govindu, B.Yugandhar Abstract   IJCST  PDF
IJCSTCite/Export

137
29
A Literature Review on Satellite Image Retrieval Techniques
-Dimple Jayaswal, Vishal Shrivastava Abstract   IJCST  PDF
IJCSTCite/Export

141
30
English Scanned Document Character Recognition Using NN And MDA
-Ms. Pardeep Kaur, Ms. Pooja Choudhary Abstract   IJCST  PDF
IJCSTCite/Export

147
31
Review of Re-ranking of Images Based on Semantic Signature
-Smita Patil, Gopal Prajapati Abstract   IJCST  PDF
IJCSTCite/Export

154
32
Hybrid Model for Detecting Malware in Mobile Networks with Heterogeneous Devices
-G.Vamsi, A. Ravi, D. V. Subbaiah Abstract   IJCST  PDF
IJCSTCite/Export

158
33
Enhance Quality of Service (QOS) by using AODV based Routing Algorithm in MANETS
-Ala Anjaneyulu Abstract   IJCST  PDF
IJCSTCite/Export

163
34
Cloud Computing and Security Issues: A Survey
-Barinder Kaur Abstract   IJCST  PDF
IJCSTCite/Export

168
35
Data Sharing in Cloud Storage Using Aggregate Key Cryptosystem
-Balaji M, Rajashekar S A Abstract   IJCST  PDF
IJCSTCite/Export

172
36
Visual Cryptography for Image Privacy
-Miss. Shubhangi Rajanwar, Mr. Shirish Kumbar, Mr. Akshay Jadhav, Prof. Saba Siraj Abstract   IJCST  PDF
IJCSTCite/Export

177
37
Mitigating Congestion in High Speed Wireless Multimedia Sensor Networks using Energy Efficient Grid Based D3 Technique
-Mantoj Kaur, Malti Rani, Tulika Mehta Abstract   IJCST  PDF
IJCSTCite/Export

185
38
Automated Analysis of Malicious Document Files
-Ajinkya R. Bhosale, Swati S. Joshi Abstract   IJCST  PDF
IJCSTCite/Export

192
39
A Survey on Floating Point Adders
-Deepak Mishra, Vipul Agrawal Abstract   IJCST  PDF
IJCSTCite/Export

195
40
A Low Power High Speed Double Tail Comparator in 90nm CMOS Technology
-K. Deepika, K. Lokesh Krishna, Dr. K. Anuradha Abstract   IJCST  PDF
IJCSTCite/Export

203
41
An Efficient Image Fusion of PET-MRI Using Wavelet Transforms
-Brundashree .R, Nita Kakhandaki Abstract   IJCST  PDF
IJCSTCite/Export

208
42
Face Recognition Using Radon & Wavelet Transform
-Ms. Gayatri K. Bhole, Mr. M. D. Jakhete Abstract   IJCST  PDF
IJCSTCite/Export

212
43
Review On LSB Steganography
-Apurva. S. Mahajan, Prof. Sheetal. G. Khadke Abstract   IJCST  PDF
IJCSTCite/Export

216
44
Fuzzy Database Data Models and Its Framework
-Ms. Poonam Abstract   IJCST  PDF
IJCSTCite/Export

219
45
SWT Approach For The Detection Of Cotton Contaminants
-Er.Heena Gulati, Er. Parminder Singh Abstract   IJCST  PDF
IJCSTCite/Export

224
46
A Note on Quantization Using Cuckoo Search Using Self Information
-Er. Sandeep Kad, Er.Sukhmeet Kaur Abstract   IJCST  PDF
IJCSTCite/Export

230
47
Alternate Path Selection Algorithm By Virtue Of Proactive Congestion Control Technique for VANETS
-Nagaraj S R, Ashwini G, Dr.Nalini N Abstract   IJCST  PDF
IJCSTCite/Export

235
48
Comparative Analysis on Reliability Estimation Techniques of Component Based Software System
-Gopal Prasad Jaiswal, Ram Nivas Giri, Dipesh Sharma Abstract   IJCST  PDF
IJCSTCite/Export

240