IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 2 / March - April 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
FMSR-AES in Multiple Cloud Storage System to Provide Secured Fault Tolerant
-V.Swathy, T.S Usha Nandhini, T.K.P Rajagopal Abstract PDF Cite/Export |
1 |
2
|
A Comparative Analysis of Tensor Decomposition Models Using Hyper spectral Image
-Ankit Gupta, Ashish Oberoi Abstract PDF Cite/Export |
5 |
3
|
An Exception Monitoring Using Java
-Jyoti Kumari, Sanjula Singh, Ankur Saxena Abstract PDF Cite/Export |
12 |
4
|
TWEET For Instantaneous Effect Vulnerability on Natural Disasters
- A.Srinivas, V.Sudheer Goud, M.Srinivasa Rao, S.Swaraj, Shruti Abstract PDF Cite/Export |
19 |
5
|
Handling Multithreading Approach Using Java
-Nikita Goel, Vijaya Laxmi, Ankur Saxena Abstract PDF Cite/Export |
24 |
6
|
Detection and Extraction of Brain Tumor from MRI Images Using K-Means Clustering and Watershed Algorithms
-Yogita Sharma, Parminder Kaur Abstract PDF Cite/Export |
32 |
7
|
High Efficient and Better Robustness 3D Face Recognition with Expression Simulations
-Shwetha C Baragi, Chetana Srinivas Abstract PDF Cite/Export |
39 |
8
|
Routing Mechanism in Wireless Ad-hoc Network
-Sunil Kumar Abstract PDF Cite/Export |
43 |
9
|
Hybrid-Statistical Machine Translation From English to Hindi
-Srishti Dhamija, Kriti Aggarwal, Shashi Pal Singh, Ajai Kumar Abstract PDF Cite/Export |
48 |
10
|
Hiding Data in Video Stenography by Using Different Algorithm: A Review
-Simaranjit Kaur Abstract PDF Cite/Export |
54 |
11
|
Internet Data Synchronization Tool
-Tushar Mohate, Vijay Rasal, Anil Panchal, Sarita Ambadekar Abstract PDF Cite/Export |
58 |
12
|
Comparitive Study On Color Recognition Methods
-Donia Augustine, Sini Jose, Namitha T N Abstract PDF Cite/Export |
61 |
13
|
Android Based Color Routing Wizard
-Abin Joy, Ann Theresa Kenny, Nishal Govind K R, Namitha T N Abstract PDF Cite/Export |
64 |
14
|
Filter False Message From Userwall
-Sunanda Reddy, Gourav Jain, Deepesh Wairkar, Vinay Haram, Prof. Gayatri Naik Abstract PDF Cite/Export |
67 |
15
|
Visual studio Professional 2012: A Benchmark For Tomorrow
-Devadrita Dey Sarkar Abstract PDF Cite/Export |
71 |
16
|
A Comprehensive Review of High Speed Low Complexity FFT Processor
-Harpreet Kaur Abstract PDF Cite/Export |
|
17
|
Survey Paper on Document Classification and Classifiers
-Upendra Singh, Saqib Hasan Abstract PDF Cite/Export |
83 |
18
|
Object Detection and Localization Using SURF Supported By K-NN
-Upendra Singh, Sidhant Shekhar Singh, Manish Kumar Srivastava Abstract PDF Cite/Export |
88 |
19
|
Review on Secret Data Hiding In Encrypted Compressed Video Bitstreams
-Sonali.A.Chaudhari, Prof.Manoj.D.Bagde Abstract PDF Cite/Export |
94 |
20
|
Optimizing Search Efforts by Extracting Information of Web Pages for Web Users from Web Tables
-Ms. Akshata U. Hegishte Abstract PDF Cite/Export |
97 |
21
|
Authentication System for Hadoop in Cloud Environment- A Collaborative Approach
-Shashank Raghunath, Mohanish Satam, Kiran Pugaonkar, Nikhil Joshi, Gayatri Naik Abstract PDF Cite/Export |
100 |
22
|
CO-Extracting Opinion Targets and Opinion Words from Online Reviews Based On the Word Alignment Model
-Aditya Rane, Sankalp Rane, Saily Sawant, Shubham Sali Prof.Sunil Jadhav Abstract PDF Cite/Export |
104 |
23
|
Role of (VPND) Vehicle Number Plate Detection In Curbing Crimes: A Review
-Sameer Dixit, Nitin Goel, Sudheer Kumar Singh, Shanshak Singh Abstract PDF Cite/Export |
111 |
24
|
Identity-Based Secure Data Storage Schemes
-Unmesh Mhatre, Dhondiram Jadhav, Shrikant Bhirud, Sumit Desai, Prof. Sunil Jadhav Abstract PDF Cite/Export |
117 |
25
|
Cut Detection in Wireless Sensor Network
-Vignesh Menon, Pratiksha Mhase, Shwetali Kanekar, Prof: Nilima Nikam Abstract PDF Cite/Export |
121 |
26
|
Code Clone Detection and Analysis Using Software Metrics and Neural Network-A Literature Review
-Balwinder Kumar, Dr. Satwinder Singh Abstract PDF Cite/Export |
127 |
27
|
An Approach Towards Increasing The Throughput By Reducing Routing Overhead In MANET
-Harish T. Gurme, Babruvan R. Solunke Abstract PDF Cite/Export |
133 |
28
|
Customer Relationship Management Based on Decision Tree
-S. Govindu, B.Yugandhar Abstract PDF Cite/Export |
137 |
29
|
A Literature Review on Satellite Image Retrieval Techniques
-Dimple Jayaswal, Vishal Shrivastava Abstract PDF Cite/Export |
141 |
30
|
English Scanned Document Character Recognition Using NN And MDA
-Ms. Pardeep Kaur, Ms. Pooja Choudhary Abstract PDF Cite/Export |
147 |
31
|
Review of Re-ranking of Images Based on Semantic Signature
-Smita Patil, Gopal Prajapati Abstract PDF Cite/Export |
154 |
32
|
Hybrid Model for Detecting Malware in Mobile Networks with Heterogeneous Devices
-G.Vamsi, A. Ravi, D. V. Subbaiah Abstract PDF Cite/Export |
158 |
33
|
Enhance Quality of Service (QOS) by using AODV based Routing Algorithm in MANETS
-Ala Anjaneyulu Abstract PDF Cite/Export |
163 |
34
|
Cloud Computing and Security Issues: A Survey
-Barinder Kaur Abstract PDF Cite/Export |
168 |
35
|
Data Sharing in Cloud Storage Using Aggregate Key Cryptosystem
-Balaji M, Rajashekar S A Abstract PDF Cite/Export |
172 |
36
|
Visual Cryptography for Image Privacy
-Miss. Shubhangi Rajanwar, Mr. Shirish Kumbar, Mr. Akshay Jadhav, Prof. Saba Siraj Abstract PDF Cite/Export |
177 |
37
|
Mitigating Congestion in High Speed Wireless Multimedia Sensor Networks using Energy Efficient Grid Based D3 Technique
-Mantoj Kaur, Malti Rani, Tulika Mehta Abstract PDF Cite/Export |
185 |
38
|
Automated Analysis of Malicious Document Files
-Ajinkya R. Bhosale, Swati S. Joshi Abstract PDF Cite/Export |
192 |
39
|
A Survey on Floating Point Adders
-Deepak Mishra, Vipul Agrawal Abstract PDF Cite/Export |
195 |
40
|
A Low Power High Speed Double Tail Comparator in 90nm CMOS Technology
-K. Deepika, K. Lokesh Krishna, Dr. K. Anuradha Abstract PDF Cite/Export |
203 |
41
|
An Efficient Image Fusion of PET-MRI Using Wavelet Transforms
-Brundashree .R, Nita Kakhandaki Abstract PDF Cite/Export |
208 |
42
|
Face Recognition Using Radon & Wavelet Transform
-Ms. Gayatri K. Bhole, Mr. M. D. Jakhete Abstract PDF Cite/Export |
212 |
43
|
Review On LSB Steganography
-Apurva. S. Mahajan, Prof. Sheetal. G. Khadke Abstract PDF Cite/Export |
216 |
44
|
Fuzzy Database Data Models and Its Framework
-Ms. Poonam Abstract PDF Cite/Export |
219 |
45
|
SWT Approach For The Detection Of Cotton Contaminants
-Er.Heena Gulati, Er. Parminder Singh Abstract PDF Cite/Export |
224 |
46
|
A Note on Quantization Using Cuckoo Search Using Self Information
-Er. Sandeep Kad, Er.Sukhmeet Kaur Abstract PDF Cite/Export |
230 |
47
|
Alternate Path Selection Algorithm By Virtue Of Proactive Congestion Control Technique for VANETS
-Nagaraj S R, Ashwini G, Dr.Nalini N Abstract PDF Cite/Export |
235 |
48
|
Comparative Analysis on Reliability Estimation Techniques of Component Based Software System
-Gopal Prasad Jaiswal, Ram Nivas Giri, Dipesh Sharma Abstract PDF Cite/Export |
240 |