DOWNLOADS


IJCST IJCST




Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 3 Issue 4 / July - Aug 2015

S.No
Title/Author Name
Page No
1
Environmental Planning In Urban Areas through GIS Spatial and Temporal Planning
-Meshram Sagarkumar, Ramteke P. Deepa, Shingne Nilesh Abstract   IJCST  PDF
IJCSTCite/Export

1
2
Efficiency of Algorithms for Neighbouring Node Discovery in Adhoc Wireless Networks
-Manu Srivastava, Namrata Dhanda Abstract   IJCST  PDF
IJCSTCite/Export

12
3
Multi-Lingual Ontology Server (MOS) For Discovering Web Services
-Abdelrahman Abbas Ibrahim, Dr. Nael Salman Abstract   IJCST  PDF
IJCSTCite/Export

18
4
Performance Analysis of Distance Vector and Link State Routing Protocols
-Bhavna Rathi, Er. Farminder Singh Abstract   IJCST  PDF
IJCSTCite/Export

23
5
Survey on Fault Tolerance in Wireless Sensor Network
-Ajay Kumar, Jasmeet Singh Abstract   IJCST  PDF
IJCSTCite/Export

33
6
Overview of Controlling and Monitoring Of Extrusion Through Android System
-Anand D. Wankhede, Mr.G. A. Kulkarni Abstract   IJCST  PDF
IJCSTCite/Export

37
7
Hardware Implementation of LSB Steganography Using MATLAB and FPGA
-Apurva.S.Mahajan, Prof.Sheetal.G.Khadke Abstract   IJCST  PDF
IJCSTCite/Export

41
8
GSTARS: Generalized Statistical Dynamic Source Routing For Manets
-Narra Dinakar, S. Vasundra Abstract   IJCST  PDF
IJCSTCite/Export

45
9
A Comparative Study on Load Balancing Algorithms in Cloud Computing
-Seema Nagar, Ajeet KR Bhartee Abstract   IJCST  PDF
IJCSTCite/Export

51
10
Perception Among Students In Private And Government Education Industry
-Kanav Sadawarti, Abhilash Sharma Abstract   IJCST  PDF
IJCSTCite/Export

55
11
Analysis of Perception among Customers and E-Customers in Retail
-Pradeep Singh Guleria, Dr. Harsh Sadawarti Abstract   IJCST  PDF
IJCSTCite/Export

60
12
Optimization of Number of Nodes for AODV, OLSR And ZRP Protocols with and Without Black Hole Attack in MANET by Using Taguchi Method
-Sukhman Sodhi, Rupinder kaur Gurm, Harsimran Singh Sodhi Abstract   IJCST  PDF
IJCSTCite/Export

66
13
Optimization of Number of Nodes for AODV Protocol with and Without Black Hole Attack in MANET by Using Taguchi Method
-Sukhman Sodhi, Rupinder kaur Gurm, Harsimran Singh Sodhi. Abstract   IJCST  PDF
IJCSTCite/Export

71
14
FIRE: Fuzzy-logic based Theoretic Intrusion Response and Recovery Engine
-Deepika Irugu, P. Balaji, P. Nirupama Abstract   IJCST  PDF
IJCSTCite/Export

82
15
Comparative Analysis of MPLS Layer 2 VPN Techniques
-Gurwinder Singh, Er. Manuraj Moudgil Abstract   IJCST  PDF
IJCSTCite/Export

90
16
Improving Online Traffic Assessment Using LTI Frame Work
-Syed.Imran, M.Hymavathi Abstract   IJCST  PDF
IJCSTCite/Export

99
17
Application of Game Theory for Resource Management In Ubiquitous Environment
-Bhagyashree Lohar Abstract   IJCST  PDF
IJCSTCite/Export

103
18
An Improved Particle Swarm Optimization Algorithm for Meta Task Scheduling In Cloud Environment
-R. Jemina Priyadarsini, Dr. L. Arockiam Abstract   IJCST  PDF
IJCSTCite/Export

108
19
Amharic Text Predict System for Mobile Phone
-Alemebante Mulu, Vishal Goyal Abstract   IJCST  PDF
IJCSTCite/Export

113
20
Effective Process to Remove Broken Lines Effect from Degraded Document Images Using MATLAB Algorithm
-Megha Paul Abstract   IJCST  PDF
IJCSTCite/Export

119
21
Improving the Performance for Single and Multi-document Text Summarization via LSA & FL
-Ms.Pallavi.D.Patil, P.M.Mane Abstract   IJCST  PDF
IJCSTCite/Export

125
22
Collision Avoidance Mechanism Using Multi-Layered Collision Detection Model For Vehicular Networks
-Harjinderjeet Singh, Manuraj Moudgil Abstract   IJCST  PDF
IJCSTCite/Export

132
23
Hybridization of VM Based on Dynamic Threshold and DVFS in Cloud Computing
-Harmanpreet Kaur, Jasmeet Singh Gurm Abstract   IJCST  PDF
IJCSTCite/Export

137
24
Optimizing the Accuracy of CART Algorithm by Using Genetic Algorithm
-Jatinder Kaur, Jasmeet Singh Gurm Abstract   IJCST  PDF
IJCSTCite/Export

142
25
Digital Watermarking Of Compressed Images With Improved Encryption
-Aneena M Abstract   IJCST  PDF
IJCSTCite/Export

148
26
Comparative Analysis of Link State Routing Protocols OPSF and IS-IS
-Amanpreet Kaur, Er.Dinesh Kumar Abstract   IJCST  PDF
IJCSTCite/Export

159
27
Comparative Analysis of MPLS Signaling Protocols
-Damanjit Kaur, Er.Dinesh Kumar Abstract   IJCST  PDF
IJCSTCite/Export

169
28
A Survey on Security and Privacy Implications of Privacy Preserving Data Mining
-R.Hemalatha, M.Elamparithi Abstract   IJCST  PDF
IJCSTCite/Export

178
29
Review On Image Segmentation Techniques
-Jiwanjot kaur, Kirti Joshi Abstract   IJCST  PDF
IJCSTCite/Export

187
30
Supporting Flexible, Efficient, and User-Interpretable Retrieval of Similar Time Series
-Abhijeet K. Barde, M.B.Ansari Abstract   IJCST  PDF
IJCSTCite/Export

192
31
Performance and Security Analysis of Border Gateway Protocol
-Parvesh Kaushal, Mr. Amarvir Singh Abstract   IJCST  PDF
IJCSTCite/Export

196
32
Wavelet and Histogram Based Energy Feature Image Retrieval (W&HBEFIR)
-Shivhari S. Rahudkar, M.B.Ansari Abstract   IJCST  PDF
IJCSTCite/Export

208
33
Cloud Security Solutions: A Review
-Sugandh Bala Gupta, Dr. Pankaj Kumar Abstract   IJCST  PDF
IJCSTCite/Export

212
34
A Privacy Based Two Tales over Online Social Networks
-Datta V. Gunjal, Kavita U. Rahane Abstract   IJCST  PDF
IJCSTCite/Export

217
35
A Survey: Energy Efficient Routing Techniques in Mobile Wireless Sensor Network
-Nagashri K, Manjunath C R Abstract   IJCST  PDF
IJCSTCite/Export

223
36
Self-Organizing Deployment of Scalable Services In Peer To Peer System
-Athira U.K Abstract   IJCST  PDF
IJCSTCite/Export

228
37
Weighted Technique Using Image Fusion Techniques for Enhanced Visual Quality
-Anju Rani, Rupinder Kaur Abstract   IJCST  PDF
IJCSTCite/Export

233
38
A Review: Driver Drowsiness Detection System
-Chisty, Jasmeen Gill Abstract   IJCST  PDF
IJCSTCite/Export

243
39
Quick Fault Tolerance Algorithm For Wireless Sensor
-Ajay Kumar, Jasmeet Singh Abstract   IJCST  PDF
IJCSTCite/Export

253
40
Data Mining Approach To Big Data
-Jyothiprasanna Jaladi, B.V.Kiranmayee, S.Nagini Abstract   IJCST  PDF
IJCSTCite/Export

258
41
Software Quality Management Measured Based Code Assessments
-Salman Zakariya, Mohammed Belal Abstract   IJCST  PDF
IJCSTCite/Export

263
42
Versatile of Hybrid Numerical Asymptotic Boundary Element Method framework
-K.Rekha, Dr.K.Thirugnanasambandam Abstract   IJCST  PDF
IJCSTCite/Export

269
Copyright © 2013-2020 International Journal of Computer Science Trends and Technology,
Published By Eighth Sense Research Group™. All Rights Reserved.