DOWNLOADS


IJCST IJCST



>Call for Paper :

Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 4 Issue 1 / Jan - Feb 2016

S.No
Title/Author Name
Page No
1
How Wireless Security Can Be Compromised
- Shripal Rawal Abstract   IJCST  PDF
IJCSTCite/Export

1
2
Big Data Analytics: Challenges and Solutions Using Hadoop, Map Reduce and Big Table
- M. Dhavapriya, N. Yasodha Abstract   IJCST  PDF
IJCSTCite/Export

5
3
Preventive System for Forests
- Prasad R. Khandar, K. Deivanai Abstract   IJCST  PDF
IJCSTCite/Export

15
4
Digital Video Monitoring System Based On ARM Cortex A7
- R. R. Karhe, Gayatri P Sonawane Abstract   IJCST  PDF
IJCSTCite/Export

19
5
Symmetric Encryption Scheme Using Logistic Map
- K.Saranya, AG.Shanmathi, N.Suchitra, Dr.S.Ramakrishnan Abstract   IJCST  PDF
IJCSTCite/Export

23
6
A Comparative Study of Disk Scheduling Algorithms
- Tarsem Singh Abstract   IJCST  PDF
IJCSTCite/Export

29
7
A Survey on Bug Triaging With Software Data Reduction
- KrishnaVeni V.L, Karthik.M Abstract   IJCST  PDF
IJCSTCite/Export

33
8
A Glimpse of Software Quality Assurance and Factors Affecting It
- Divya C D, Bharath T S Abstract   IJCST  PDF
IJCSTCite/Export

37
9
A Study: Network Technologies for Rural Regions
- Sanjib Das, Nikita Baidya Abstract   IJCST  PDF
IJCSTCite/Export

44
10
Accuracy Prediction for Loan Risk Using Machine Learning Models
- Anchal Goyal, Ranpreet Kaur Abstract   IJCST  PDF
IJCSTCite/Export

52
11
Securing The Cloud Resources Using Attribute Based Access Control
- Pradnya Agale Abstract   IJCST  PDF
IJCSTCite/Export

58
12
Confidential Audio Transmission using Image Slicing
- Vivek Solavande Abstract   IJCST  PDF
IJCSTCite/Export

62
13
Comparison of Image Search Reranking Techniques
- Ayswarya Chandramohan, Prathibha S Nair Abstract   IJCST  PDF
IJCSTCite/Export

65
14
Robust Biometrics Based Authentication Scheme Using Watermarking
-Naga Sowjanya K, Kannamma R Abstract   IJCST  PDF
IJCSTCite/Export

69
15
Path Planning through PSO Algorithm in Complex Environments
- Mukesh Kumar Nandanwar, Dr. Anupam Shukla, Dr. A.S. Zadagaonkar Abstract   IJCST  PDF
IJCSTCite/Export

79
16
Survey on Copy Move Image Forgery Detection Techniques
- Jaseela S, Mrs. Nishadha S. G Abstract   IJCST  PDF
IJCSTCite/Export

87
17
A Survey on Reversible Image Data Hiding
- Asha S Raj, Mrs.Gayathri Nair P Abstract   IJCST  PDF
IJCSTCite/Export

92
18
Breaking New Grounds: Realization Of “ALL EAR” Screen Readers
- Dr. M. A. Pradhan, Shambhavi Sinha, Swarali Shirke, Vedant Deshmukh, Akhilesh Mishra Abstract   IJCST  PDF
IJCSTCite/Export

99
19
Search and Safe Exchange of Real-Time Video on Mobile Cloud
- V.Pavithra, S.V.Shreekeerthana, S.Yogapriya Abstract   IJCST  PDF
IJCSTCite/Export

103
20
A Design Approach for Wireless Communication Security in Bluetooth Network
- C.Suresh, V.Vidhya, E.Shamli, R.Muthulakshmi, S.Menaka Abstract   IJCST  PDF
IJCSTCite/Export

106
21
Aspect-Based Opinion Mining Using Dependency Relations
- Amani K Samha Abstract   IJCST  PDF
IJCSTCite/Export

113
22
Big Data: Data Driven Design philosophy for Solving Hard Optimization Problem
- Sridevi Malipatil,Vani. N Abstract   IJCST  PDF
IJCSTCite/Export

124
23
A Brief Survey of Privacy Preserving Data Mining
- Shilpa M.S, Shalini.L Abstract   IJCST  PDF
IJCSTCite/Export

131
24
Implementation Idea For Secure Data Deduplication Using Hybrid Cloud Approach
- Ms. Deepali C. Ghosalkar Abstract   IJCST  PDF
IJCSTCite/Export

136
25
Preprocessing of Dataset for Quality Analysis of Contact Lens Material in Ophthalmology Using PCA
- Sumitra S, Dr. Ananthi Sheshasaayee Abstract   IJCST  PDF
IJCSTCite/Export

140
26
Enhancing Probability of Music Selection Using Smart Shuffling Policy
- Suraj Rasal, Paras Gandhi, Shraddha Shelar Abstract   IJCST  PDF
IJCSTCite/Export

143
27
Parking Availability in Sensor Enabled Car Parks
- Snehal Bankar, Mitali Dhaigude, Sonali Gajendragadakar, Supriya Gavli Abstract   IJCST  PDF
IJCSTCite/Export

146
28
Watermark Extraction and Validation in Images Using Hybrid Techniques
- Chhaya Verma, Dr. Sandhya Tarar Abstract   IJCST  PDF
IJCSTCite/Export

151
29
Image and Video Processing Edge Detection Technique used for Traffic Control Problem
- Himanshu Chauhan. Dr. Sandhya Tarar Abstract   IJCST  PDF
IJCSTCite/Export

157

Under in review process...

Copyright © 2013-2020 International Journal of Computer Science Trends and Technology,
Published By Eighth Sense Research Group™. All Rights Reserved.