IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 2 Issue 3 / May-June 2014
S.No
|
Title/Author Name
|
Page No
|
1
|
Review on Video Mining
-Rupinder kaur, Shruti Aggarwal Abstract PDF Cite/Export |
1 |
2
|
Enhancing Asymmetric Encryption using DNA Based Cryptography
-Mamta Rani, Sandeep Jain, Asha Abstract PDF Cite/Export |
7 |
3
|
Reducing Churn Rate Using Business Intelligence Approach in Data Mining
-Trasha Gupta Abstract PDF Cite/Export |
12 |
4
|
Survey Paper on Basics of Cloud Computing and Data Security
-Jasleen Kaur, Ms.Anupma Sehrawat, Ms.Neha Bishnoi Abstract PDF Cite/Export |
16 |
5
|
Analyzing the Factors Affecting Reusability for Black–Box Component
-Suchita Yadav, Amit Yadav, Surabhi Yadav Abstract PDF Cite/Export |
20 |
6
|
A Survey: Classification Techniques
-ShamlaMantri, Ria Agrawal, ShraddhaBhattad, AnkitPadiya, RakshitRathi Abstract PDF Cite/Export |
24 |
7
|
Comparative Analysis of Reactive Protocols in Mobile Ad Hoc Networks
-Nisha Mannan, Shipra Khurana, Mamta Rani Abstract PDF Cite/Export |
28 |
8
|
A Comparative Analysis Review of Various MANET Routing Protocols
-Deepak Kumar Pathak, Abhilash Pandey, Garima Gupta Abstract PDF Cite/Export |
33 |
9
|
Review on Text Clustering Using Statistical and Semantic Data
-Dilpreet Kaur, Shruti Aggarwal Abstract PDF Cite/Export |
37 |
10
|
Survey Of Optimization Of Scheduling in Cloud Computing Environment
-Er.Mandeep kaur, Er.Rajinder kaur, Er.Sughandha Sharma Abstract PDF Cite/Export |
43 |
11
|
A Review on Re-documentation Approaches and their Comparative Study
-Yamini Pathania, Gaurav Bathla Abstract PDF Cite/Export |
48 |
12
|
Dynamic Programming He and Elgamal Used For Software Agent Security
-Prof. Sachin Upadhye, Dr. P.G. Khot Abstract PDF Cite/Export |
52 |
13
|
Complexity and Precision Analysis of DFT Based ENF Extraction Methods
-Sumit Kumar Abstract PDF Cite/Export |
56 |
14
|
Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm
-Sudhansu Ranjan Lenka, Biswaranjan Nayak Abstract PDF Cite/Export |
60 |
15
|
IP Failure Handling Using Localized On-Demand Link State Routing
-Prof. S.M.Sangve, Sushil Warkar, Amit Shirke, Kunal Solanke, Pratap Patil Abstract PDF Cite/Export |
65 |
16
|
A Survey of Digital Watermarking Techniques and its Applications
-Lalit Kumar Saini, Vishal Shrivastava Abstract PDF Cite/Export |
70 |
17
|
Advanced Data Acquisition in Wireless Sensor Networks
-Deepthy Varghese Abstract PDF Cite/Export |
74 |
18
|
A Survey of Data Mining: Concepts with Applications and its Future Scope
-Dr. Zubair Khan, Ashish Kumar, Sunny Kumar Abstract PDF Cite/Export |
78 |
19
|
Design of High Probability & Low-Overhead Propagation Mechanism for Beacons in VANET
-Neethu C Sekhar Abstract PDF Cite/Export |
83 |
20
|
The Common Interface Oriented Architectural Framework to Improve Compatibility of the Pure Object Oriented Cross Languages Interoperability
-Sonar Sanjay Bhagwan Abstract PDF Cite/Export |
90 |
21
|
Adaptive Quadrant-Based Geographic Routing For MANET
-Babitha U B Abstract PDF Cite/Export |
98 |
22
|
A Survey of Load Balancing Algorithms in Cloud Computing
-Harmandeep Singh Brar, Vivek Thapar, Kunal Kishor Abstract PDF Cite/Export |
103 |
23
|
VHDL Implementation of π/4 QPSK MODEM
-M. S. Sadavarte, Prashil H. Zodape Abstract PDF Cite/Export |
107 |
24
|
An Approach to Formulate Intelligent Data Repository
-A. Prema, A.Pethalakshmi Abstract PDF Cite/Export |
113 |
25
|
Analysis of Attacks on Hybrid DWT-DCT Algorithm for Digital Image Watermarking With MATLAB
-Lalit Kumar Saini, Vishal Shrivastava Abstract PDF Cite/Export |
123 |
26
|
Power Quality Time Series Data Mining Using S-Transform and Fuzzy Expert System
-Prasannnajit Dash Abstract PDF Cite/Export |
127 |
27
|
Automatic Speech Recognition for Ahirani Language Using Hidden Markov Model Toolkit (HTK)
-Ajay S. Patil Abstract PDF Cite/Export |
140 |