DOWNLOADS


IJCST IJCST




Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 3 Issue 3 / May - June 2015

S.No
Title/Author Name
Page No
1
PCB Defect Detection Using Image Subtraction Algorithm
-Suhasini A, Sonal D Kalro, Prathiksha B G, Meghashree B S, Phaneendra H D Abstract   IJCST  PDF
IJCSTCite/Export

1
2
Data Mining Technology for Efficient Network Security Management
-Ankit Naik, S.W. Ahmad Abstract   IJCST  PDF
IJCSTCite/Export

7
3
Study on Recent Trends of Distributed Denial of Service Attack and Handling Approach
-Rajnish Kumar Mishra, Amarnath Singh, Vipin Kumar Gupta Abstract   IJCST  PDF
IJCSTCite/Export

12
4
Security Certified LARDAR Protocol in Mobile Ad Hoc Network
-Kalpana Tyagi, Anamika Abstract   IJCST  PDF
IJCSTCite/Export

18
5
A Survey on Awareness Regarding The Education Industry
-Kanav Sadawarti, Abhilash Sharma Abstract   IJCST  PDF
IJCSTCite/Export

24
6
A Survey on the Power and Energy Consumption of Cloud Computing
-Harmanpreet Kaur, Jasmeet Singh Gurm Abstract   IJCST  PDF
IJCSTCite/Export

28
7
Hybrid Cloud Approach for Reliable Authorized Deduplication
-Shaik Shaju, V.V.Krishna Reddy, D. V. Subbaiah Abstract   IJCST  PDF
IJCSTCite/Export

32
8
Localization Problem Solution Using K-Mean Clustering and Bacterial Foraging Optimization in Wireless Sensor Network
-Er. Nisha Devi, Er. Harpreet Kaur Abstract   IJCST  PDF
IJCSTCite/Export

38
9
A Semantic Link Network Based Search Engine for Multimedia Files
-Anuj Kumar, Ravi Kumar Singh, Vikas Kumar, Vivek Patel, Priyanka Paygude Abstract   IJCST  PDF
IJCSTCite/Export

44
10
Survey on Advancements in Retail Sector and Its Future
-Pradeep Singh Guleria, Dr. Harsh Sadawarti Abstract   IJCST  PDF
IJCSTCite/Export

50
11
Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm
-G.Gayathri, N.Prabakaran Abstract   IJCST  PDF
IJCSTCite/Export

54
12
A Survey on Scheduling Strategies in Cloud Computing
-Aarti, Malti Rani, lohit kapoor Abstract   IJCST  PDF
IJCSTCite/Export

59
13
Rainfall Prediction using Neural Network
-Ankita Sharma, Geeta Nijhawan Abstract   IJCST  PDF
IJCSTCite/Export

65
14
Captcha-Based Password Authentication - Security Primitive Based On Hard AI Problems
-S.Vamsi Krishna,K. Lavanya, D. V. Subbaiah Abstract   IJCST  PDF
IJCSTCite/Export

70
15
Secure Deduplication in Hybrid Cloud Using Differential Privileges
-Vinutha B T , Yogish H K Abstract   IJCST  PDF
IJCSTCite/Export

75
16
Proposed Optimal Solution of TSP Using ACO
-Sanjeev Kumar, Shubham Sidana,Deepali Dev Abstract   IJCST  PDF
IJCSTCite/Export

78
17
Fairness of Packet Forwarding Strategy in Opportunistic Mobile Networks
-U. Venkata Padmasai, D. Pramodh Krishna, D. V. Subbaiah Abstract   IJCST  PDF
IJCSTCite/Export

82
18
Arithmetic Coding for Lossless Data Compression – A Review
-Ezhilarasu P, Krishnaraj N, Dhiyanesh B Abstract   IJCST  PDF
IJCSTCite/Export

89
19
A Friend Recommender System for Social Networks by Life Style Extraction Using Probabilistic Method -“Friendtome”
-Namrata M.Eklaspur, Anand S.Pashupatimath Abstract   IJCST  PDF
IJCSTCite/Export

95
20
Video Dissemination Protocol Over Hybrid WIFI Cellular Networks
-B.Lalin, B.Koteswar Rao, D. V. Subbaiah Abstract   IJCST  PDF
IJCSTCite/Export

102
21
A Survey on Sentence Level Sentiment Analysis
-Vrushali K. Bongirwar Abstract   IJCST  PDF
IJCSTCite/Export

110
22
Analysis of Base Station Adaptive Antenna Array Performance in CDMA20001x Mobile Radio Network
-Ifeagwu E.N, Obi P.I, Ejiofor H.C, Okoro K.C Abstract   IJCST  PDF
IJCSTCite/Export

114
23
Privacy Preservation in Collaborative Data Mining As Goal Oriented Attack Model
-Mr. J.RangaRajesh, Mrs. Srilakshmi.Voddelli, Mr. G.Venkata Krishna, Mrs. T.Hemalatha Abstract   IJCST  PDF
IJCSTCite/Export

123
24
A Survey on Different Digital Video Monitoring Systems
-Dr A.J. Patil, Gayatri.P.Sonawane Abstract   IJCST  PDF
IJCSTCite/Export

132
25
Bandwidth Allocation in Cloud-Based Wireless Live-Streaming
-Mrs. Kaushlya Salunkhe, Prof. Mrs. Sanchika Bajpai Abstract   IJCST  PDF
IJCSTCite/Export

135
26
Reboost Image Segmentation Using Genetic Algorithm
-Shanta H Biradar Abstract   IJCST  PDF
IJCSTCite/Export

143
27
Monitoring Of Environmental Parameters by Using Cloud Computing
-Mayur Randhir, R. R. Karhe Abstract   IJCST  PDF
IJCSTCite/Export

151
28
An Efficient Adaptation of Edge Feature-Based Video Processing Algorithm for Wireless Multimedia Sensor Networks
-Thanaa Jbeily, Mothanna Alkubeily, Iyad Hatem Abstract   IJCST  PDF
IJCSTCite/Export

156
29
Application of Survival Analysis Model on Drug Addiction Dataset
-Runumi Devi Abstract   IJCST  PDF
IJCSTCite/Export

167
30
Improving Electrical Energy Efficiency in Nigerian Industries
-Akinwole O.O Abstract   IJCST  PDF
IJCSTCite/Export

170
31
A Fuzzy Inference Model for Reliability Estimation of Component Based Software System
-Gopal Prasad Jaiswal, Ram Nivas Giri Abstract   IJCST  PDF
IJCSTCite/Export

177
32
Correlation Analysis of Meteorological Data in Region of Tamil Nadu Districts Based On K- Means Clustering Algorithm
-M. Mayilvaganan, P. Vanitha Abstract   IJCST  PDF
IJCSTCite/Export

184
33
Algorithm Design for Robust Web Personalization Using Neural Network
-Ramandeep Kaur, Er. Iqbaldeep Kaur Abstract   IJCST  PDF
IJCSTCite/Export

191
34
Securing User Location in Social Applications Using Direct Conversions
-Gettuboyina.Nalini, M.Krishna Kishore Abstract   IJCST  PDF
IJCSTCite/Export

196
35
PCB
-Ankit Kandpal, Vishal Ramola Abstract   IJCST  PDF
IJCSTCite/Export

201
36
An Approach To Incentive-Based Reputation For Mobile Ad Hoc Networks
-Vivek Richhariya, Praveen Kaushik Abstract   IJCST  PDF
IJCSTCite/Export

207
37
Comparative Analysis Of MPLS Layer 3VPN And MPLS Layer 2 VPN
-Umar Bashir Sofi, Er. Rupinder Kaur Gurm Abstract   IJCST  PDF
IJCSTCite/Export

214
38
Providing High Privacy And Hop-by-Hop Message Authentication In Wireless Sensor Networks
-Kudumula Manasa, Vadlamudi Muniraju Naidu Abstract   IJCST  PDF
IJCSTCite/Export

221
40
Android Based Punjabi TTS System
-Hardeep, Parminder Singh Abstract   IJCST  PDF
IJCSTCite/Export

233
41
Automatic Hard Exudates Detection from Multi-Resolution Retinal Images Using HAAR Dual Tree Wavelet Transform
-Poonam M. Rokade Abstract   IJCST  PDF
IJCSTCite/Export

238
42
Performance Analysis of Routing Protocols Using Various Parameters in MANET Scenario
-Anuradha, Prof. Navneet Verma Abstract   IJCST  PDF
IJCSTCite/Export

246
43
Data Classification Using Support Vector Machine: A Review
-Er. Manju rani, Er. Lekha Bhambhu Abstract   IJCST  PDF
IJCSTCite/Export

254
44
A More Effective Approach For Mining Powerful Users In A Blogosphere
-Mrinalini Tiwari, Hare Ram Shah Abstract   IJCST  PDF
IJCSTCite/Export

258
45
Direct Security Approach Based on Trust Management In VANET
-Pankaj Singh Chouhan, Brajesh K. Shrivash, Priya Pathak Abstract   IJCST  PDF
IJCSTCite/Export

261
46
Predictive Text Entry Method for Somali Language on Mobile Phone
-Mahamed Daud, Vishal Goyal Abstract   IJCST  PDF
IJCSTCite/Export

274
47
Result Merging Approaches in Meta Search Engine: A Review
-Sarita Yadav, Jaswinder Singh Abstract   IJCST  PDF
IJCSTCite/Export

281
48
Ascendible Information Sharing In Cloud Storage Using Secure Key-Aggregate Cryptosystem
- K.R.Viswanath, G.Prasadbabu Abstract   IJCST  PDF
IJCSTCite/Export

286
49
Digital Image Steganographic Approach (DISA) to Enhance Quality and Imperceptibility
-Shampy Sharma, Dr. Ashish Oberoi, Pavninderpal Kaur Abstract   IJCST  PDF
IJCSTCite/Export

294
50
Studies on Wire Selection for Machining With W E D M
-NBV Prasad, Ch.V.S.ParameswaraRao, S. Sivanaga MalleswaraRao Abstract   IJCST  PDF
IJCSTCite/Export

300
51
Survey of Segmentation Techniques of Cancer Images Emphasizing on MRI Images
-R. Srivaramangai, Ajay. S. Patil Abstract   IJCST  PDF
IJCSTCite/Export

304
52
Role of Image Segmentation in Digital Image Processing for Information Processing
-Manjula.KA Abstract   IJCST  PDF
IJCSTCite/Export

312
Copyright © 2013-2020 International Journal of Computer Science Trends and Technology,
Published By Eighth Sense Research Group™. All Rights Reserved.