IJCST ONLINE
DOWNLOADS
Call for Paper :

Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 2 / March - April 2015
|
S.No
|
Title/Author Name
|
Page No
|
|
1
|
FMSR-AES in Multiple Cloud Storage System to Provide Secured Fault Tolerant
-V.Swathy, T.S Usha Nandhini, T.K.P Rajagopal Abstract |
1 |
|
2
|
A Comparative Analysis of Tensor Decomposition Models Using Hyper spectral Image
-Ankit Gupta, Ashish Oberoi Abstract |
5 |
|
3
|
An Exception Monitoring Using Java
-Jyoti Kumari, Sanjula Singh, Ankur Saxena Abstract |
12 |
|
4
|
TWEET For Instantaneous Effect Vulnerability on Natural Disasters
- A.Srinivas, V.Sudheer Goud, M.Srinivasa Rao, S.Swaraj, Shruti Abstract |
19 |
|
5
|
Handling Multithreading Approach Using Java
-Nikita Goel, Vijaya Laxmi, Ankur Saxena Abstract |
24 |
|
6
|
Detection and Extraction of Brain Tumor from MRI Images Using K-Means Clustering and Watershed Algorithms
-Yogita Sharma, Parminder Kaur Abstract |
32 |
|
7
|
High Efficient and Better Robustness 3D Face Recognition with Expression Simulations
-Shwetha C Baragi, Chetana Srinivas Abstract |
39 |
|
8
|
Routing Mechanism in Wireless Ad-hoc Network
-Sunil Kumar Abstract |
43 |
|
9
|
Hybrid-Statistical Machine Translation From English to Hindi
-Srishti Dhamija, Kriti Aggarwal, Shashi Pal Singh, Ajai Kumar Abstract |
48 |
|
10
|
Hiding Data in Video Stenography by Using Different Algorithm: A Review
-Simaranjit Kaur Abstract |
54 |
|
11
|
Internet Data Synchronization Tool
-Tushar Mohate, Vijay Rasal, Anil Panchal, Sarita Ambadekar Abstract |
58 |
|
12
|
Comparitive Study On Color Recognition Methods
-Donia Augustine, Sini Jose, Namitha T N Abstract |
61 |
|
13
|
Android Based Color Routing Wizard
-Abin Joy, Ann Theresa Kenny, Nishal Govind K R, Namitha T N Abstract |
64 |
|
14
|
Filter False Message From Userwall
-Sunanda Reddy, Gourav Jain, Deepesh Wairkar, Vinay Haram, Prof. Gayatri Naik Abstract |
67 |
|
15
|
Visual studio Professional 2012: A Benchmark For Tomorrow
-Devadrita Dey Sarkar Abstract |
71 |
|
16
|
A Comprehensive Review of High Speed Low Complexity FFT Processor
-Harpreet Kaur Abstract |
|
|
17
|
Survey Paper on Document Classification and Classifiers
-Upendra Singh, Saqib Hasan Abstract |
83 |
|
18
|
Object Detection and Localization Using SURF Supported By K-NN
-Upendra Singh, Sidhant Shekhar Singh, Manish Kumar Srivastava Abstract |
88 |
|
19
|
Review on Secret Data Hiding In Encrypted Compressed Video Bitstreams
-Sonali.A.Chaudhari, Prof.Manoj.D.Bagde Abstract |
94 |
|
20
|
Optimizing Search Efforts by Extracting Information of Web Pages for Web Users from Web Tables
-Ms. Akshata U. Hegishte Abstract |
97 |
|
21
|
Authentication System for Hadoop in Cloud Environment- A Collaborative Approach
-Shashank Raghunath, Mohanish Satam, Kiran Pugaonkar, Nikhil Joshi, Gayatri Naik Abstract |
100 |
|
22
|
CO-Extracting Opinion Targets and Opinion Words from Online Reviews Based On the Word Alignment Model
-Aditya Rane, Sankalp Rane, Saily Sawant, Shubham Sali Prof.Sunil Jadhav Abstract |
104 |
|
23
|
Role of (VPND) Vehicle Number Plate Detection In Curbing Crimes: A Review
-Sameer Dixit, Nitin Goel, Sudheer Kumar Singh, Shanshak Singh Abstract |
111 |
|
24
|
Identity-Based Secure Data Storage Schemes
-Unmesh Mhatre, Dhondiram Jadhav, Shrikant Bhirud, Sumit Desai, Prof. Sunil Jadhav Abstract |
117 |
|
25
|
Cut Detection in Wireless Sensor Network
-Vignesh Menon, Pratiksha Mhase, Shwetali Kanekar, Prof: Nilima Nikam Abstract |
121 |
|
26
|
Code Clone Detection and Analysis Using Software Metrics and Neural Network-A Literature Review
-Balwinder Kumar, Dr. Satwinder Singh Abstract |
127 |
|
27
|
An Approach Towards Increasing The Throughput By Reducing Routing Overhead In MANET
-Harish T. Gurme, Babruvan R. Solunke Abstract |
133 |
|
28
|
Customer Relationship Management Based on Decision Tree
-S. Govindu, B.Yugandhar Abstract |
137 |
|
29
|
A Literature Review on Satellite Image Retrieval Techniques
-Dimple Jayaswal, Vishal Shrivastava Abstract |
141 |
|
30
|
English Scanned Document Character Recognition Using NN And MDA
-Ms. Pardeep Kaur, Ms. Pooja Choudhary Abstract |
147 |
|
31
|
Review of Re-ranking of Images Based on Semantic Signature
-Smita Patil, Gopal Prajapati Abstract |
154 |
|
32
|
Hybrid Model for Detecting Malware in Mobile Networks with Heterogeneous Devices
-G.Vamsi, A. Ravi, D. V. Subbaiah Abstract |
158 |
|
33
|
Enhance Quality of Service (QOS) by using AODV based Routing Algorithm in MANETS
-Ala Anjaneyulu Abstract |
163 |
|
34
|
Cloud Computing and Security Issues: A Survey
-Barinder Kaur Abstract |
168 |
|
35
|
Data Sharing in Cloud Storage Using Aggregate Key Cryptosystem
-Balaji M, Rajashekar S A Abstract |
172 |
|
36
|
Visual Cryptography for Image Privacy
-Miss. Shubhangi Rajanwar, Mr. Shirish Kumbar, Mr. Akshay Jadhav, Prof. Saba Siraj Abstract |
177 |
|
37
|
Mitigating Congestion in High Speed Wireless Multimedia Sensor Networks using Energy Efficient Grid Based D3 Technique
-Mantoj Kaur, Malti Rani, Tulika Mehta Abstract |
185 |
|
38
|
Automated Analysis of Malicious Document Files
-Ajinkya R. Bhosale, Swati S. Joshi Abstract |
192 |
|
39
|
A Survey on Floating Point Adders
-Deepak Mishra, Vipul Agrawal Abstract |
195 |
|
40
|
A Low Power High Speed Double Tail Comparator in 90nm CMOS Technology
-K. Deepika, K. Lokesh Krishna, Dr. K. Anuradha Abstract |
203 |
|
41
|
An Efficient Image Fusion of PET-MRI Using Wavelet Transforms
-Brundashree .R, Nita Kakhandaki Abstract |
208 |
|
42
|
Face Recognition Using Radon & Wavelet Transform
-Ms. Gayatri K. Bhole, Mr. M. D. Jakhete Abstract |
212 |
|
43
|
Review On LSB Steganography
-Apurva. S. Mahajan, Prof. Sheetal. G. Khadke Abstract |
216 |
|
44
|
Fuzzy Database Data Models and Its Framework
-Ms. Poonam Abstract |
219 |
|
45
|
SWT Approach For The Detection Of Cotton Contaminants
-Er.Heena Gulati, Er. Parminder Singh Abstract |
224 |
|
46
|
A Note on Quantization Using Cuckoo Search Using Self Information
-Er. Sandeep Kad, Er.Sukhmeet Kaur Abstract |
230 |
|
47
|
Alternate Path Selection Algorithm By Virtue Of Proactive Congestion Control Technique for VANETS
-Nagaraj S R, Ashwini G, Dr.Nalini N Abstract |
235 |
|
48
|
Comparative Analysis on Reliability Estimation Techniques of Component Based Software System
-Gopal Prasad Jaiswal, Ram Nivas Giri, Dipesh Sharma Abstract |
240 |

