DOWNLOADS


IJCST IJCST




Call for Paper : September - 2017 Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 3 Issue 5 / Sep - Oct 2015

S.No
Title/Author Name
Page No
1
High Availability and Faster Convergence Techniques in IP Networks
-Er. Jashandeep Kaur, Er.Rupinder Kaur Gurm Abstract   IJCST  PDF
IJCSTCite/Export

1
2
Comparative Analysis of WAN Technologies
-Er.Harsimranpreet Kaur, Er.Rupinder Kaur Gurm Abstract   IJCST  PDF
IJCSTCite/Export

9
3
Survey on Intelligent Data Repository Using Soft Computing
-A. Prema, A.Pethalakshmi Abstract   IJCST  PDF
IJCSTCite/Export

21
4
Mining With Big Data Calculating Frequent Patterns Using APRIORI Algorithm
-A.Srinivas, A.Sowjanya, J.Sushmitha Abstract   IJCST  PDF
IJCSTCite/Export

41
5
Application of Representative-Based Clustering Using Hartigan & Wong Approach to Discern Electrical Switching Patterns
-Tushar Gupta, Somnath Saha, Prerna Gaur Abstract   IJCST  PDF
IJCSTCite/Export

46
6
Touch And Transfer Using Red TACTON
-Akash D. Patel, Muhib A. Lambay, Muneer R. Ahmed Abstract   IJCST  PDF
IJCSTCite/Export

55
7
Discovering End-To-End Communication Patterns in Manets Using GSTARS
-Ubokobong Esang, C Fancy Abstract   IJCST  PDF
IJCSTCite/Export

59
8
Online Examination Management System Using Genetic Algorithm
-Umed H. Suthar, Prof. Abdul Rais, Ashish Upadhyay, Prabhakar Upadhya Abstract   IJCST  PDF
IJCSTCite/Export

68
9
Multi Document Utility Presentation using Sentiment Analysis
-Mayur S. Dhote, Prof. S. S. Sonawane Abstract   IJCST  PDF
IJCSTCite/Export

72
10
A Present-Day Approach For 5G Technology
-Yashpal Abstract   IJCST  PDF
IJCSTCite/Export

78
11
M-Ticketing using Smartphones
-Kunal Mishra,Viraj Samant, Arvind Shukla, Waseem Sultan Abstract   IJCST  PDF
IJCSTCite/Export

82
12
Mitigating Flooding Attacks in Disruption Tolerant Network
-Aniekan Julius Bassey, C Fancy Abstract   IJCST  PDF
IJCSTCite/Export

85
13
Multiple Sink Placement Strategies by finding Maximum Cluster of Nodes in Wireless Sensor Networks
-Qazi Salman Khaliq, Rupinder Kaur Abstract   IJCST  PDF
IJCSTCite/Export

92
14
Web Application Vulnerability Detection and Mitigation With Static Exploration
-Uduakobong Asuquo Ituen, M. B. Mukeshkrishnan Abstract   IJCST  PDF
IJCSTCite/Export

101
15
Text Fusion in Grayscale Medical Images at Area of Non Interest
-Naveen Kumar, Dr.Sunil Shukla Abstract   IJCST  PDF
IJCSTCite/Export

110
16
Cloud Computing: An Outlook
-Jayanti Goyal Abstract   IJCST  PDF
IJCSTCite/Export

114
17
Effective Time and Cost Based Task Scheduling In Grid Computing
-Shashi Bhushan Semwal, Mr. Amit Das Abstract   IJCST  PDF
IJCSTCite/Export

118
18
Secure Clustering Algorithm for Wireless Sensor Networks in the Perspective of Confidentiality
-Antai Uduak-obong Ekpo, Dr Magesh Abstract   IJCST  PDF
IJCSTCite/Export

123
19
Parallel Multigrid Solver for Navier Stokes Equation Using Openmpi
-Mr.Shekhar Sitaram Shelke, Prof.Kalyani Waghmare Abstract   IJCST  PDF
IJCSTCite/Export

131
20
A Review Investigation of Optical Fibre Communication Using WSN
-Ishmeet Kaur Abstract   IJCST  PDF
IJCSTCite/Export

135
21
Basics of Algorithm Selection:A Review
-Niharika Singh, DR. R. G. Tiwari Abstract   IJCST  PDF
IJCSTCite/Export

139
22
Web Application Framework: Review
-Rimjhim Mishra, Dr.Pankaj Kumar Abstract   IJCST  PDF
IJCSTCite/Export

143
23
Control of Vehicle Effluence through Internet of Things & Android
-Amit.V.Kachavimath Abstract   IJCST  PDF
IJCSTCite/Export

148
24
Customized ERP System for Testing and Calibration Laboratory
-Sourabh Singh, Muhib Lambay,Nitesh Tembe,Nasreen Shaikh Abstract   IJCST  PDF
IJCSTCite/Export

154
25
Robotic Maid
-Umesh Yadav, Dharmendra Yadav,Ashraf Siddiqui Abstract   IJCST  PDF
IJCSTCite/Export

157
26
Making Network More Tolerant Towards Fault by Using Centralized Techniques
-Ajay Kumar, Jasmeet Singh Abstract   IJCST  PDF
IJCSTCite/Export

159
27
Distributed Trust Management Model for Peer To Peer Systems
-M.Anitha,R.Hemalatha Abstract   IJCST  PDF
IJCSTCite/Export

165
28
Question Paper Generator System
-Surbhi Choudhary, Abdul Rais Abdul Waheed, Shrutika Gawandi, Kavita Joshi Abstract   IJCST  PDF
IJCSTCite/Export

174
29
Network Traffic Control Using Distributed Control Plane of Software Defined Networks
-Mr. Sachin Ashok Vanjari, Dr. R. B. Ingle Abstract   IJCST  PDF
IJCSTCite/Export

177
30
Knowledge Based Service Diagnosis System
-Anish Bhagwat Abstract   IJCST  PDF
IJCSTCite/Export

182
31
Survey on Texture Classification Methods
-Manisha Dhongade Abstract   IJCST  PDF
IJCSTCite/Export

185
32
Optimized Page Ranking Algorithm for Online Digital Libraries
-Jigyasa Sidhu Abstract   IJCST  PDF
IJCSTCite/Export

189
33
Analysing the Dependency of Exchange Rate on Crude oil Price with Wavelet Networks: Evidence from India
-M. Yasin Pir, Firdous Ahmad Shah, M. Asger Abstract   IJCST  PDF
IJCSTCite/Export

202
34
Generic Architecture for Detecting Botnet
-Anushah Khan, Anchit Bijalwan Abstract   IJCST  PDF
IJCSTCite/Export

210
35
Image classification using Householder Transform
-P.V Nishana Rasheed , R. Shreej Abstract   IJCST  PDF
IJCSTCite/Export

235
36
Survey of Papers for Data Mining with Neural Networks to Predict the Student’s Academic Achievements
-Richa Shambhulal Agrawal, Prof. Mitula Hirenkumar Pandya Abstract   IJCST  PDF
IJCSTCite/Export

246
37
Literature Survey On Contactless Palm Vein Recognition
-Roshni C Rahul, Merin Cherian, Manu Mohan C M Abstract   IJCST  PDF
IJCSTCite/Export

250
38
An Analysis of Recently Used Steganography Techniques on Images
-Somya Rastogi, Achala Shakya Abstract   IJCST  PDF
IJCSTCite/Export

256
39
A Comprehensive Study on Next Generation Internet Protocol (Ipv6) and Security Vulnerabilities
-M.Buvaneswari, Dr.N.Rajendran Abstract   IJCST  PDF
IJCSTCite/Export

261
40
A Review on Text Mining Techniques
-S.Sathya, Dr.N.Rajendran Abstract   IJCST  PDF
IJCSTCite/Export

274
41
Evaluating The Effects of the Energy Management’s Issues on the MANET’s Performance Using Two Native Routing Protocols against a Power-Aware Routing Protocol
-Gatete Marcel, Dr. N. Vetrivelan Abstract   IJCST  PDF
IJCSTCite/Export

285
42
Baseline Collaborative Image Retrieval Using Euclidean Distances Metric Learning
-Shubhangi Durgi, Prof. Pravinkumar Badadapure Abstract   IJCST  PDF
IJCSTCite/Export

291
43
Throughput-Aware Probabilistic Rebroadcasting Method to Reduce Routing Overhead in Mobile Ad Hoc Network
-Mr. H. T. Gurme, Mr. B. R. Solu Abstract   IJCST  PDF
IJCSTCite/Export

298
44
Passive IP Traceback: Disclosing the Locations of Man in the Middle from Path Backscatter
-Aman Shekhar, Krishan Yadav, Krishna Yele, Utpal Chirag, Ms. Santhi K. Guru Abstract   IJCST  PDF
IJCSTCite/Export

307
45
Literature Survey on Supporting Security Assurance in Customized Web Search
-Pallavi Shinde, Vaibhavi Joglekar, Shital Londhe, Mayank Mrinal, Mrs. D. A. Phalke Abstract   IJCST  PDF
IJCSTCite/Export

312