DOWNLOADS


IJCST IJCST



>Call for Paper : March 2017

Call for Paper : March 2017 Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 4 Issue 2 / Mar-Apr 2016

S.No
Title/Author Name
Page No
1
A Survey of Web Usage Mining: Concepts with Applications and its Future Scope
- Jitendra N. Shrivastava, Shivendra Pratap Singh Abstract   IJCST  PDF
IJCSTCite/Export

1
2
Relay Nodes: Enhancing Network Lifetime and Throughput in Wireless Sensor Networks
- Navjot Singh, Amandeep Singh Abstract   IJCST  PDF
IJCSTCite/Export

6
3
A Recommendation System for Online Products by Analyzing The Customer Feedback
- N. Rajganesh, R.Nandhini, G.Vinitha, E.Abinaya, M.Sumitha Abstract   IJCST  PDF
IJCSTCite/Export

14
4
Survey of Computing and Future Trends
- Mbanzabugabo Jean Baptiste Abstract   IJCST  PDF
IJCSTCite/Export

19
5
Data scheduling in VANET:A survey
- Sarita Negi, Smita Singh, S.K.Goel, Akshay Kumar Abstract   IJCST  PDF
IJCSTCite/Export

25
6
Survey on Enhancing the Speed of Mapreduce Classification Algorithms Using Pre-Processing Technique
- Maya A.Gharat, Sharmila S.Gaikwad,Saurabh Suman Abstract   IJCST  PDF
IJCSTCite/Export

32
7
Solutions of Cloud Computing Security Issues
- Jahangeer Qadiree, Mohd Ilyas Maqbool Abstract   IJCST  PDF
IJCSTCite/Export

38
8
Innovative Technique of Improving Student Performance Using Data Mining Algorithm
- Rupali Chudasama, Prof. Amol Joglekar Abstract   IJCST  PDF
IJCSTCite/Export

43
9
Help the Society in Selecting Their Best Life Insurance Cover (LIC) Using Data Mining Technique
- Prathama Nemalekar, Prof. Amol Joglekar Abstract   IJCST  PDF
IJCSTCite/Export

49
10
Accountable Obliviously Transfer With Access Control
- Mrs.K.Aruna, Ms.S.Durgadevi Abstract   IJCST  PDF
IJCSTCite/Export

54
11
Smart Supervised Method for Blood Vessel and Optic Disc Segmentation from Fundus Images
- P.Anu, T.Jeyaselvi, J.Johncy Eunice,M.Magie Pushpa Abstract   IJCST  PDF
IJCSTCite/Export

58
12
Cloud Computing Security single to multicloud using AES Algorithm
- Miss.Kirti Sakhare, Miss.Swati Patil, Miss.Vijaya Shendage, Miss.Swati Kolhe Abstract   IJCST  PDF
IJCSTCite/Export

66
13
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks
- Mohammed Tarique, Rohan Raul, Khalil Pinjari, Pranay Patil, Rohit Shinde Abstract   IJCST  PDF
IJCSTCite/Export

71
14
An Analytical Framework For Understanding Knowledge Sharing Process In Online Discussion Forum
- Jessima.B, Sowmiya.K, Kalpana.R, Amala Preethi.L, Mr.Barani Vijaya Kumar A.T Abstract   IJCST  PDF
IJCSTCite/Export

76
15
App Blocker Using Access Control Mechanism In Android Mobile Phones
- Prof. Divya S, Ms. Vanitha S, Ms. Dakshana V M, Ms. Sharmila N Abstract   IJCST  PDF
IJCSTCite/Export

79
16
Survey of Techniques for Improving the Quality of Image Obtained Using Jpeg Compression Algorithm
- Anand Mehrotra Abstract   IJCST  PDF
IJCSTCite/Export

84
17
Information Security in Large Amount of Data: Privacy and Data Mining
- Prof. Harish Barapatre, Ms. Sampada Samel Abstract   IJCST  PDF
IJCSTCite/Export

88
18
Store Hub an Android App
- Assist. Prof. Ansar Ahemad, Shakir Khan, Ajay Machhi, Ajay Baria, Akash Sabat Abstract   IJCST  PDF
IJCSTCite/Export

100
19
Survey On Continuous User Identity Verification Using Biometric Traits for Secure Internet Services
- Neethu T.D , Ayana Ajith Abstract   IJCST  PDF
IJCSTCite/Export

106
20
Malware Detection In Android By Network Behaviour Analysis
- Prof. Shanmuga Priya M, Ms. Soundarya S, Ms. Aashika S Abstract   IJCST  PDF
IJCSTCite/Export

110
21
A Nowadays Protect Your Inbound /Outbound Data Packets Firewall Security Established In Network
- Yashpal, Aniruddha Dubey, Ashish Kumar Abstract   IJCST  PDF
IJCSTCite/Export

114
22
Effective Hybrid Compressive Sensors Using Wireless Networks in Clustering Methods
- P.Sukumar, B.Sowmya Abstract   IJCST  PDF
IJCSTCite/Export

118
23
Survey of VM Load Balancing Algorithm in Cloud Environment
- Er. Pooja, Er. Vivek Thapar Abstract   IJCST  PDF
IJCSTCite/Export

122
24
Secure Data Aggregation in Wireless Sensor Network using Trust Model
- M.Suraj, B.Raja, T.Vengattaraman Abstract   IJCST  PDF
IJCSTCite/Export

130
25
The Imperative of Education on National Development
- Umudjere Sunday Oghenebrorhie, Dr. Okogu Joel Otitie, Osah Mark Abstract   IJCST  PDF
IJCSTCite/Export

138
26
A Study to Develop Server Virtualization Infrastructure in Educational Institutions with Cost Effective and Green Computing Approach
- Yogesh Madhukar Ghorpade, Prof. (Dr.) R. Kamatchi Abstract   IJCST  PDF
IJCSTCite/Export

144
27
K-MED: An Algorithm of Uniform Clustering for Efficient Content-Based Image Retrieval
- Rashmi Chauhan, Shashank Kumar Som, Ankush Mittal Abstract   IJCST  PDF
IJCSTCite/Export

151
28
EDHS Schedulability Analysis for Real-Time Multiprocessor Scheduling
- Rula Mreisheh, Mohammed Hijazieh Abstract   IJCST  PDF
IJCSTCite/Export

157
29
Smart Event Management System
- Assist.prof. Khalil Pinjari, Khan Nur Abstract   IJCST  PDF
IJCSTCite/Export

161
30
Civic Administration
- Shahbaz khan, Ajeet Mishra, Sharad Hari Dhavre, Sagar Patil Abstract   IJCST  PDF
IJCSTCite/Export

165
31
A Methodology for the Usage of Side Data in Content Mining
- Priyanka S Muttur, Babruvan R. Solunke Abstract   IJCST  PDF
IJCSTCite/Export

170
32
A Review on Various Techniques of Brain Tumor Detection
- Rajeshwari G.. Tayade, Miss. P. H. Patil, Miss. Prachi A. Sonawane Abstract   IJCST  PDF
IJCSTCite/Export

179
33
A Review on Various Methodology of White Blood Cell Detection
- Miss. Prachi A. Sonawane, Mrs. A. N. Shewale, Miss. Rajeshwari G. Tayade Abstract   IJCST  PDF
IJCSTCite/Export

180
34
RedBox-A Data Mining Approach for Improving Business Intelligence
- Tapan Nayak Abstract   IJCST  PDF
IJCSTCite/Export

187
35
Efficient Smart Routing Protocol for Faithful Transmission Of Packet and Traffic Balancing (ESFTB)
- Sushma A, Dr. Premjyoti Patil, Dr. Shantakumar B Patil, Bhargava R Abstract   IJCST  PDF
IJCSTCite/Export

192
36
Transmission of Data Using Li-Fi Technology
- Gaurav Singh, Santoshkumar Yadav, Essakkimuthu Nadar, Kumari Gowda Archana Nanade Abstract   IJCST  PDF
IJCSTCite/Export

199
37
A Survey on Multiple Attribute Graph Indexing Methods
- Abilasha S, Remya G, Anuraj Mohan Abstract   IJCST  PDF
IJCSTCite/Export

203
38
Enhanced Multimedia Information Retrieval on Web Using Text Based Query
- Meenakshi Alamelu S, Mannar Mannan J Abstract   IJCST  PDF
IJCSTCite/Export

210
39
Energy Reduction Techniques in Cloud Computing: A Review
- Jasleen kaur, Navpreet Kaur Walia Abstract   IJCST  PDF
IJCSTCite/Export

216
40
Remotely Control of Android Based OS Mobile Application
- Dhananjay Singh Abstract   IJCST  PDF
IJCSTCite/Export

222
41
Software Testing Using CMM Level 5
- Dhananjay Singh Abstract   IJCST  PDF
IJCSTCite/Export

233
42
Open Source Software a Study on BITCOIN
- Kunwar Uday Singh, Harshit Sinha, Dr. Ajay S. Singh, Thirunavukkarasu K Abstract   IJCST  PDF
IJCSTCite/Export

243
43
Virtual Keyboard Using BLOB Analysis
- Antara Kanade, Ayesha Shaikh, Mabel Fernandes, Shubhangi Chikhalthane Abstract   IJCST  PDF
IJCSTCite/Export

247
44
Precising the Characteristics of IP-FPM Algorithm
- Dr. K.Kavitha Abstract   IJCST  PDF
IJCSTCite/Export

252
45
A Proposed Approach for Cloud Storage Optimization with Authorized Byte level De-duplication
- Ruchi Agrawal, Prof. D. R. Naidu Abstract   IJCST  PDF
IJCSTCite/Export

259
46
Comparative Study of Routing Protocols in Mobile ADHOC Networks
- Muhammad Safdar,Izaz Ahmad Khan, Fazlullah Khan, Farman Ullah, Syed Roohullah Jan Abstract   IJCST  PDF
IJCSTCite/Export

264
47
Face Recognition Using Principal Component Analysis Based Feature Space by Incorporating with Probabilistic Neural Network
- Muhammad Tahir, Shahid Akbar Shahzad, Maqsood Hayat, Nazia Azim Abstract   IJCST  PDF
IJCSTCite/Export

276
48
Offsite One Way Data Replication towards Improving Data Refresh Performance
- Nazia Azim, Yasir Qureshi, Fazlullah Khan*, Muhammad Tahir, Syed Roohullah Jan, Abdul Majid Abstract   IJCST  PDF
IJCSTCite/Export

285
49
Superseding Nearest Neighbor Search in Wireless Network using Delaunay Triangulation
- Shweta Purohit, Ajay Mathur Abstract   IJCST  PDF
IJCSTCite/Export

297
50
Review: Apache Spark and Big Data Analytics for Solving Real World Problems
- Mrs. Dipali Dayanand Ghatge Abstract   IJCST  PDF
IJCSTCite/Export

301
51
Effect of Performance In Heterogeneous Traffic In Opportunistic Networks
- Gopinath A R, Sithara K J Abstract   IJCST  PDF
IJCSTCite/Export

305
52
REAL: A Reciprocal Protocol for Privacy in Wireless Communication Networks
- Annapurna B P, Bhuvana N, Harshitha Rajendra, S Renukadevi Abstract   IJCST  PDF
IJCSTCite/Export

309
53
Factor of Success in Software Development: Effort Prediction
- Akshika Aneja Abstract   IJCST  PDF
IJCSTCite/Export

312
54
Messaging Application Based On Android for Visually Challenged People
- Akshika aneja Abstract   IJCST  PDF
IJCSTCite/Export

315
55
Energy Conservation and Effective Data Transmission Using the Selective Data Dissemination Strategies
- Himani Sharma, Jatinder Pal Sharma Abstract   IJCST  PDF
IJCSTCite/Export

319
56
Cognitive Computing: Building a Smarter Planet
- Sapandeep Kaur, Ikvinderpal Singh Abstract   IJCST  PDF
IJCSTCite/Export

325
57
A Survey Report on Internet of Things Applications
- Sapandeep Kaur, Ikvinderpal Singh Abstract   IJCST  PDF
IJCSTCite/Export

330
58
Reducing Bug Triage in Software Development in Data Reduction
- M. Ahilandesware, J. Prathiba Abstract   IJCST  PDF
IJCSTCite/Export

336
59
Internet of Things (IOT) Vision in Gulf Future Business
- Waleed Bamousa Abstract   IJCST  PDF
IJCSTCite/Export

340
60
Light fidelity (LiFi): Future of Wireless Technology
- Akshika Aneja, Arvind Sharma Abstract   IJCST  PDF
IJCSTCite/Export

343
61
A Study of Security Issues Related With Wireless Fidelity (WI-FI)
- Akshika Aneja, Garima Sodhi Abstract   IJCST  PDF
IJCSTCite/Export

346
62
An Analysis on Types of Speech Recognition and Algorithms
- Dr.V.Ajantha Devi,Ms.V.Suganya Abstract   IJCST  PDF
IJCSTCite/Export

350
63
Remove Noise from Scanned Handwritten De-Graded Document Images Using Various Approaches
- Kuljeet Singh, Gurinder Singh Abstract   IJCST  PDF
IJCSTCite/Export

356
64
Safety and Threats in Cloud Computing Survey paper
- Sultan Alfajhan Abstract   IJCST  PDF
IJCSTCite/Export

362