DOWNLOADS


IJCST IJCST




Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 6 Issue 2 / Mar - Apr 2018

S.No
Title/Author Name
Page No
1
Analytic Study about Slotted Waveguide Antenna to Enhance Radiation Pattern of These Antenna
- Mayass Nassour, Moeen Younes
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


1
2
Performance Improve of Multipath Routing Protocols Using Wireless Sensor Networks
- Madiraju Jagadeeshwar, Dr.N.Satyanarayana
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


7
3
Hiding an Image Data into Video Stenography Using Different Algorithm and MATLAB : A Review
- Anchal Chander Lekha ,Monika Gautam
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


12
4
An Efficient Dynamic Channel Allocation Method for the Next Generation Mobile Networks
- P. Bonus Reddy, P. Venkata Krishna
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


17
5
Design and Implementation of Search Engine using Quick Sort Algorithm
- Hemant A. Lad, Shubham V. Kamble, Piyush A. Wanjari, Priyanka Tekadpande
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


23
6
Fractal Compression of Colored Satellite Stereo Images Based on HV Partitioning Method
- Heba Hatem , Mariam Saii, Al Samoual Saleh
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


28
7
Review and Analysis of Minimum Spanning Tree Using Prim's Algorithm
- Jogamohan Medak
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


34
8
Functionality Website Using Disability Persons
- Mr.Shahid.A, Mr.J.Jelsteen, Mr.Nithin Sunny
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


40
9
Industrial Pattern Analysis of the United Kingdom using Hadoop
- Dr. Bhoomi Gupta, Tanya Gupta, Archit Gupta
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


44
10
Heuristic Based Job Scheduling Approach to Process Large Data Packets
- Anjali Nema, Deepak Gour
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


49
11
A Keystroke Dynamics Based Authentication System
- Ravi Kiran, Sarita Soni
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


53
12
A Review of Techniques for VOIP Classification
- Anjali, Max Bhatia
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


56
13
A Survey on Phishing and Anti-Phishing Techniques
- L. Joy Singh
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


62
14
Graph Theory: Graph Based Feature Extraction Of Different Types Of Graphs
- Mr. Saptarshi Bhattacharyya, Mr. Abhijit Bera
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


69
15
Rat Trap Electronic Device (RTED)
- Muhammad Syakir Aiman, Suziana Omar, Fatimah Nur Mohd Redzwan, Nur Syahirah binti Kamarozaman, Ahmad Sabirin Zoolfakar
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


77
16
Achieving Space-Efficiency And Access Isolation By Implementing File Partition For Online Data
- Ankita Bung, C.Sudha, Sravanthi Nanumasa
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


81
17
Advanced and Secured Video Steganography Using Least Significant Bit and Discrete Wavelet Transform Techniques
- Anchal Chander Lekha,Monika
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


86
18
Predicting Dengue Fever Using Data Mining Techniques
- P. Sathya, Mrs. A.Sumathi
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


94
19
Predicting Colon Cancer Using Data Mining Techniques
- K. Siva Sankari, Mrs M. Logambal
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


97
20
Predicting Eye Cancer Using Data Mining Techniques
- K.Kowsalya Devi, Mrs.R. Mythili
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


100
21
Reliable and Efficient Data Acquisition in Wireless Sensor Network
- S.Padmavathi, S.kawsalya
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


104
22
A Brief Survey of Cryptography Techniques
- Dr. Kusum Lata Bharti, Dr. Varun Tiwari
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


109
23
A Novel Fuzzy based Decision system for efficient Cross-Layer Based Multicast Routing in Manets
- M. Chandramouli Reddy, P. Venkata Krishna
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


113
24
Text Extraction in Images
- Shraddha, Soumya B, Swathi S Hegde, Thejaswini, Prof Kaushik K.S
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


119
25

Paper removed by Editorial Board


26
Pshycopathy Traits from an Image Using Neuro Fuzzy Technique
- Pallavi Bhatt, Pawan Kumar Mishra
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


130
27
Traffic Sign Recognition and classification using Convolutional Neural Networks
- Kenzari Zouleykha, Boulekouirat Sabrina, Abbas Fayçal, Bekhouche Abdelali
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


137
28
A Neuro-Fussy Based Model for Diagnosis of Monkeypox Diseases
- Tom Joshua Joshua , Dr. Anebo, Nlerum P
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


143
29
A Review of IoT-Based Flipped Learning Platform for Medical Education
- Sharda Tiwari, Dr Manuj Darbari
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


154
30
Performance Evaluation of Secrete Image Steganography Techniques Using Least Significant Bit (LSB) Method
- Mrinal
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


160
Copyright © 2013-2020 International Journal of Computer Science Trends and Technology,
Published By Eighth Sense Research Group™. All Rights Reserved.