DOWNLOADS


IJCST IJCST




Call for Paper : September - 2017 Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 4 Issue 4 / July-Aug 2016

S.No
Title/Author Name
Page No
1
Automatic Speech Segmentation for Amharic Phonemes Using Hidden Markov Model Toolkit (HTK)
- Eshete Derb Emiru, Walelign Tewabe Sewunetie Abstract   IJCST  PDF
IJCSTCite/Export

1
2
Real-Time Speech Synthesis by Handling Amharic Gemination Words Using Statistical Technique
- Walelign Tewabe Sewunetie, Eshete Derb Emiru Abstract   IJCST  PDF
IJCSTCite/Export

8
3
Automated Cooking Machine Using Programmable Logic Controller (PLC)
- Reema Patel,A.N.Shewale,C.S.Patil Abstract   IJCST  PDF
IJCSTCite/Export

16
4
Investigation of Fiber Non Linearity for Different Modulation Schemes in DWDM Networks
- S. Rajalakshmi, Azaruddin Shaik, Bangaru B.N.V. Chalam Abstract   IJCST  PDF
IJCSTCite/Export

19
5
Content Based Image Retrieval Using SVM
- Priyanka Sharma Abstract   IJCST  PDF
IJCSTCite/Export

27
6
A Novel Video De-Noising Algorithm for Removing High Density Impulse Noise
- Preeti Shukla, Mr. Jageshwer Shriwas Abstract   IJCST  PDF
IJCSTCite/Export

31
7
Handling Redundancy from the Image Using Filtering and Buffer Allocation Method
- Prabhdeep Kaur, Rupinder Pal Singh Abstract   IJCST  PDF
IJCSTCite/Export

38
8
Compression of Encrypted Gray-Scale Images using Discrete Cosine Transform and Huffman Encoding
- Asawari Kulkarni, Prof. A. A. Junnarkar Abstract   IJCST  PDF
IJCSTCite/Export

43
9
Designing a Distributed Framework to Detect a Selfish Node in MANET by using a Collaborative Approach
- Er. Jagmeet Kaur, Mr. Prabhjit Singh Abstract   IJCST  PDF
IJCSTCite/Export

49
10
A Mechanism to Detect the Provenance Forgery and Packet Drop Attack in Wireless Sensor Networks
- Er. Amandeep Kaur, Dr. Sandeep Singh Kang Abstract   IJCST  PDF
IJCSTCite/Export

59
11
Adaptive Process For Bagging Based Ensembles
- Rajni David Bagul, Prof. Dr. B. D. Phulpagar Abstract   IJCST  PDF
IJCSTCite/Export

68
12
Multiuser Multi-Keyword Ranked Search over Encrypted Cloud Using MHR and KP-ABE
- Sonam.K.Darda, Prof.(Mrs).Manasi.K.Kulkarni Abstract   IJCST  PDF
IJCSTCite/Export

74
13
Web-Page Recommendation Using An Enhanced Incremental Sequence Mining Algorithm Along With Ontology
- Gauri Sonawane, Prof. Dr. Mrs. S. A. Itkar Abstract   IJCST  PDF
IJCSTCite/Export

80
14
Face Recognition by Using Multi-Probe LSH Indexing
- Ms. Tanuja Kiran Rajput, Prof. Dr. B. D. Phulpagar Abstract   IJCST  PDF
IJCSTCite/Export

85
15
Cosine Similarity in Clustering With Collaborative Filtering For Service Recommendation
- Reshma M Batule, Prof. Dr. S. A. Itkar Abstract   IJCST  PDF
IJCSTCite/Export

89
16
Matching And Grading Of Different Varieties Of Rice Grains Through Digital Image Processing
- Rajlakshmi Ghatkamble Abstract   IJCST  PDF
IJCSTCite/Export

95
17
Detection of Dishonest Friends in OSN by Efficient and Trustworthy Method
- Madhura Khandare, Prof. B. D. Phulpagar Abstract   IJCST  PDF
IJCSTCite/Export

100
18
An Analysis of Various Anti-Virus Software Tools Based On Different Effective Parameters
- K. Durga Devi, Dr. K. Mohan Kumar Abstract   IJCST  PDF
IJCSTCite/Export

104
19
A Study on Male Contraceptive Plants Using Plants Database
- S. Saranya, Dr. K. Mohan Kumar, Dr. P. Murugaian Abstract   IJCST  PDF
IJCSTCite/Export

111
20
Unwanted Message Filtration from User's Wall Using Naive Bayes
- Punam K.Mohare, Prof. (Dr). S A Itkar Abstract   IJCST  PDF
IJCSTCite/Export

122
21
Redundancy Management of Multipath Routing In Heterogeneous WSN
- Manisha Dangi, Prof. R.K.Krishna Abstract   IJCST  PDF
IJCSTCite/Export

126
22
Serotyping Of Campylobacter Jejuni Strains Isolated From Hospitalized Patients
- Elena Trajkovska-Dokic, Snezana Stojkovska, Milena Petrovska, Nikola Panovski Abstract   IJCST  PDF
IJCSTCite/Export

129
23
Hadoop Mapreduce Based Distributed Phylogenetic Analysis
- Lavanya K, V Nagaveni Abstract   IJCST  PDF
IJCSTCite/Export

133
24
A Study on Energy Efficient Multicast Approach for Grid Based WSN
- Manjunath C R, Nagaraj G S, Srikanth S Abstract   IJCST  PDF
IJCSTCite/Export

138
25
A Study On Multi-Sink Data Aggregation in Wireless Sensor Network
- Manjunath C R, Nagaraj G S, Abhishek G Abstract   IJCST  PDF
IJCSTCite/Export

143
26
A Study Paper on Storage Area Network Problem-Solving Issues
- Priyanka Malviya Abstract   IJCST  PDF
IJCSTCite/Export

151
27
Study On-Comparison between IP SAN and FC SAN
- Komal A. Dhabale Abstract   IJCST  PDF
IJCSTCite/Export

157
28
Comparative Study On Apriori Algorithm And Fp Growth Algorithm With Pros And Cons
- Mrs. M.Kavitha, Ms.S.T.Tamil Selvi Abstract   IJCST  PDF
IJCSTCite/Export

161
29
An Effective Technique for PSO Based Clustering and Polynomial Regression in Wireless Sensor Network
- M.Arthi,M.Jayashree Abstract   IJCST  PDF
IJCSTCite/Export

165
30
A Review on GOOGLE File System
- Richa Pandey, S.P Sah Abstract   IJCST  PDF
IJCSTCite/Export

177
31
Creative Image Covert Sharing Method with Autostereogram for Image Security
- N.Suganya, Dr.K.Mahesh Abstract   IJCST  PDF
IJCSTCite/Export

181
32
Modified Fuzzy C Means Clustering To Study the Willingness Maximization Using Discrete Multi-Valued Particle Swarm Optimization (DPSO) For Social Activity Planning
- Alagulaskhmisubha.A, Mohanapriya.C Abstract   IJCST  PDF
IJCSTCite/Export

186
33
A Medical Image Fusion with YbCr Colour Transformation
- Pallavi P.Chinchole,Prof. Prabhakar N. Kota Abstract   IJCST  PDF
IJCSTCite/Export

194
34
Challenges and Prospects of using Object Oriented Programming in Solving Linear Programming Problems
- F. U. Onu, C.L. Nwagbo, R.E. Obiadazie Abstract   IJCST  PDF
IJCSTCite/Export

200
35
Security and Privacy Preserving with Service Consuming in Vehicular Cloud
- Greeshma S Chirayil, Ashly Thomas Abstract   IJCST  PDF
IJCSTCite/Export

209
36
Interference between LTE and GPs measuring with Power Spectral Density
- Ravirajsinh S Vaghela, Dr. Atul Gonsai, Vishal sojitra Abstract   IJCST  PDF
IJCSTCite/Export

216
37
A Survey on Web Server Load Balancing Using SSL Back-End Forwarding Method
- G.Srilakshmi, Dr.K.Kungumaraj Abstract   IJCST  PDF
IJCSTCite/Export

220
38
A Survey on a Content Based Dynamic Load Balancing Algorithm for Heterogeneous Web Server Cluster
- S.Tamilarasi, Dr. K.Kungumaraj Abstract   IJCST  PDF
IJCSTCite/Export

232
39
Obstacle Avoidance and Restoration with Energy Efficiency in Mobile Robotic Sensors
- Sherin Ann Sebi, Divya Sunny Abstract   IJCST  PDF
IJCSTCite/Export

246
40
Anonymous Two-Factor Authentication in Distributed Systems
- Ashwani Vijayachandran, Kiran G Kumar Abstract   IJCST  PDF
IJCSTCite/Export

252
41
Technology for the Convenience of Persons with Disabilities
- Harsimrat Deo Abstract   IJCST  PDF
IJCSTCite/Export

256
42
LI-FI Based Data Storage Device
- Mohammed Zafar Faraz, Aditya Ambasth Abstract   IJCST  PDF
IJCSTCite/Export

261
43
Snort Using Parallel Architecture for Intrusion Detection in Busy Network
- Aiswarya Mohan K, Jyothi B Abstract   IJCST  PDF
IJCSTCite/Export

266
44
ROI Based Hybrid Compression Techniques for Transferring MRI Brain Images
- T. Kalaiselvi, S. Boopathiraja, P. Sriramakrishnan Abstract   IJCST  PDF
IJCSTCite/Export

270
45
Digital Image Processing Filtering with LABVIEW
- Liqaa S. Mezher Abstract   IJCST  PDF
IJCSTCite/Export

278
46
A Literature Survey for Test Case Generation Using UML Model
- Md Khalid Hussain, Dr. Krishna Nandan Prasad Abstract   IJCST  PDF
IJCSTCite/Export

283
47
Shadow Detection and Removal Using Lab Colors, Morphological Operations and Chromaticity
- Nimarta Abstract   IJCST  PDF
IJCSTCite/Export

289
48
A Survey on Automatically Annotating Learning Objects with Competence Leveling
- Mrs. K. Deepika, Dr. N Sathyanarayana Abstract   IJCST  PDF
IJCSTCite/Export

296
49
Secure Authentication for Vehicular Ad Hoc Network
- Rinsu Aravind, Deepa P L Abstract   IJCST  PDF
IJCSTCite/Export

307
50
Securing ASP.NET Querystring Data Transmission In Web Application Using Hybrid Encryption Technique
- Vilas T Mahajan, Rajendra B Patil Abstract   IJCST  PDF
IJCSTCite/Export

314
51
Securing ASP.NET Query String Data Transmission in Web Application Using Hybrid Encryption Technique
- Jasleen kaur, Navpreet Kaur Walia Abstract   IJCST  PDF
IJCSTCite/Export

319
52
SQL Injection Attack Prevention Using 448 Blowfish Encryption Standard
- K.Rajeswari, C.Amsaveni Abstract   IJCST  PDF
IJCSTCite/Export

325
52
SQL Injection Attack Prevention Using 448 Blowfish Encryption Standard
- K.Rajeswari, C.Amsaveni Abstract   IJCST  PDF
IJCSTCite/Export

325
53
Fully Homomorphic Encryption Based Outsourcing in the Cloud
- P.L.Jebin, L.Nirmal Jega Selvi Abstract   IJCST  PDF
IJCSTCite/Export

336
54
Aspect Oriented Sentiment Analysis Model of Arabic Tweets
- Mnahel A Ibrahim, Naomie Salim Abstract   IJCST  PDF
IJCSTCite/Export

342
55
Infected Part Detection and Segmentation of Fruits Using Marker Controlled Watershed Algorithm
- Simran Bhagat Abstract   IJCST  PDF
IJCSTCite/Export

354
56
Semantic Web Repository Maintenance on Hadoop
- Dr. K. Sridevi Abstract   IJCST  PDF
IJCSTCite/Export

358
57
Simulative Analysis of Various Faults for Protection of Induction Motor using SCADA
- Neetika, Parminder Kaur, Hardeep Singh Abstract   IJCST  PDF
IJCSTCite/Export

363
58
Implementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise
- Simarjeet Kaur, Rupinder Kaur Abstract   IJCST  PDF
IJCSTCite/Export

370
59
MASDKM: Mobile Agent Based Secure and Dynamic Key Management Scheme for Wireless Sensor Networks
- Ramu Kuchipudi, Dr. Ahmed Abdul Moiz Qyser, Dr. V V S S S Balaram Abstract   IJCST  PDF
IJCSTCite/Export

375
60
ClickCheck: A Novel Framework for the Detection of ClickJacking Attacks on Html5 Webpages
- Anoop MV, Arun P Kuttappan Abstract   IJCST  PDF
IJCSTCite/Export

382