IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 3 / May - June 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
PCB Defect Detection Using Image Subtraction Algorithm
-Suhasini A, Sonal D Kalro, Prathiksha B G, Meghashree B S, Phaneendra H D Abstract ![]() ![]() |
1 |
2
|
Data Mining Technology for Efficient Network Security Management
-Ankit Naik, S.W. Ahmad Abstract ![]() ![]() |
7 |
3
|
Study on Recent Trends of Distributed Denial of Service Attack and Handling Approach
-Rajnish Kumar Mishra, Amarnath Singh, Vipin Kumar Gupta Abstract ![]() ![]() |
12 |
4
|
Security Certified LARDAR Protocol in Mobile Ad Hoc Network
-Kalpana Tyagi, Anamika Abstract ![]() ![]() |
18 |
5
|
A Survey on Awareness Regarding The Education Industry
-Kanav Sadawarti, Abhilash Sharma Abstract ![]() ![]() |
24 |
6
|
A Survey on the Power and Energy Consumption of Cloud Computing
-Harmanpreet Kaur, Jasmeet Singh Gurm Abstract ![]() ![]() |
28 |
7
|
Hybrid Cloud Approach for Reliable Authorized Deduplication
-Shaik Shaju, V.V.Krishna Reddy, D. V. Subbaiah Abstract ![]() ![]() |
32 |
8
|
Localization Problem Solution Using K-Mean Clustering and Bacterial Foraging Optimization in Wireless Sensor Network
-Er. Nisha Devi, Er. Harpreet Kaur Abstract ![]() ![]() |
38 |
9
|
A Semantic Link Network Based Search Engine for Multimedia Files
-Anuj Kumar, Ravi Kumar Singh, Vikas Kumar, Vivek Patel, Priyanka Paygude Abstract ![]() ![]() |
44 |
10
|
Survey on Advancements in Retail Sector and Its Future
-Pradeep Singh Guleria, Dr. Harsh Sadawarti Abstract ![]() ![]() |
50 |
11
|
Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm
-G.Gayathri, N.Prabakaran Abstract ![]() ![]() |
54 |
12
|
A Survey on Scheduling Strategies in Cloud Computing
-Aarti, Malti Rani, lohit kapoor Abstract ![]() ![]() |
59 |
13
|
Rainfall Prediction using Neural Network
-Ankita Sharma, Geeta Nijhawan Abstract ![]() ![]() |
65 |
14
|
Captcha-Based Password Authentication - Security Primitive Based On Hard AI Problems
-S.Vamsi Krishna,K. Lavanya, D. V. Subbaiah Abstract ![]() ![]() |
70 |
15
|
Secure Deduplication in Hybrid Cloud Using Differential Privileges
-Vinutha B T , Yogish H K Abstract ![]() ![]() |
75 |
16
|
Proposed Optimal Solution of TSP Using ACO
-Sanjeev Kumar, Shubham Sidana,Deepali Dev Abstract ![]() ![]() |
78 |
17
|
Fairness of Packet Forwarding Strategy in Opportunistic Mobile Networks
-U. Venkata Padmasai, D. Pramodh Krishna, D. V. Subbaiah Abstract ![]() ![]() |
82 |
18
|
Arithmetic Coding for Lossless Data Compression – A Review
-Ezhilarasu P, Krishnaraj N, Dhiyanesh B Abstract ![]() ![]() |
89 |
19
|
A Friend Recommender System for Social Networks by Life Style Extraction Using Probabilistic Method -“Friendtome”
-Namrata M.Eklaspur, Anand S.Pashupatimath Abstract ![]() ![]() |
95 |
20
|
Video Dissemination Protocol Over Hybrid WIFI Cellular Networks
-B.Lalin, B.Koteswar Rao, D. V. Subbaiah Abstract ![]() ![]() |
102 |
21
|
A Survey on Sentence Level Sentiment Analysis
-Vrushali K. Bongirwar Abstract ![]() ![]() |
110 |
22
|
Analysis of Base Station Adaptive Antenna Array Performance in CDMA20001x Mobile Radio Network
-Ifeagwu E.N, Obi P.I, Ejiofor H.C, Okoro K.C Abstract ![]() ![]() |
114 |
23
|
Privacy Preservation in Collaborative Data Mining As Goal Oriented Attack Model
-Mr. J.RangaRajesh, Mrs. Srilakshmi.Voddelli, Mr. G.Venkata Krishna, Mrs. T.Hemalatha Abstract ![]() ![]() |
123 |
24
|
A Survey on Different Digital Video Monitoring Systems
-Dr A.J. Patil, Gayatri.P.Sonawane Abstract ![]() ![]() |
132 |
25
|
Bandwidth Allocation in Cloud-Based Wireless Live-Streaming
-Mrs. Kaushlya Salunkhe, Prof. Mrs. Sanchika Bajpai Abstract ![]() ![]() |
135 |
26
|
Reboost Image Segmentation Using Genetic Algorithm
-Shanta H Biradar Abstract ![]() ![]() |
143 |
27
|
Monitoring Of Environmental Parameters by Using Cloud Computing
-Mayur Randhir, R. R. Karhe Abstract ![]() ![]() |
151 |
28
|
An Efficient Adaptation of Edge Feature-Based Video Processing Algorithm for Wireless Multimedia Sensor Networks
-Thanaa Jbeily, Mothanna Alkubeily, Iyad Hatem Abstract ![]() ![]() |
156 |
29
|
Application of Survival Analysis Model on Drug Addiction Dataset
-Runumi Devi Abstract ![]() ![]() |
167 |
30
|
Improving Electrical Energy Efficiency in Nigerian Industries
-Akinwole O.O Abstract ![]() ![]() |
170 |
31
|
A Fuzzy Inference Model for Reliability Estimation of Component Based Software System
-Gopal Prasad Jaiswal, Ram Nivas Giri Abstract ![]() ![]() |
177 |
32
|
Correlation Analysis of Meteorological Data in Region of Tamil Nadu Districts Based On K- Means Clustering Algorithm
-M. Mayilvaganan, P. Vanitha Abstract ![]() ![]() |
184 |
33
|
Algorithm Design for Robust Web Personalization Using Neural Network
-Ramandeep Kaur, Er. Iqbaldeep Kaur Abstract ![]() ![]() |
191 |
34
|
Securing User Location in Social Applications Using Direct Conversions
-Gettuboyina.Nalini, M.Krishna Kishore Abstract ![]() ![]() |
196 |
35
|
PCB
-Ankit Kandpal, Vishal Ramola Abstract ![]() ![]() |
201 |
36
|
An Approach To Incentive-Based Reputation For Mobile Ad Hoc Networks
-Vivek Richhariya, Praveen Kaushik Abstract ![]() ![]() |
207 |
37
|
Comparative Analysis Of MPLS Layer 3VPN And MPLS Layer 2 VPN
-Umar Bashir Sofi, Er. Rupinder Kaur Gurm Abstract ![]() ![]() |
214 |
38
|
Providing High Privacy And Hop-by-Hop Message Authentication In Wireless Sensor Networks
-Kudumula Manasa, Vadlamudi Muniraju Naidu Abstract ![]() ![]() |
221 |
40
|
Android Based Punjabi TTS System
-Hardeep, Parminder Singh Abstract ![]() ![]() |
233 |
41
|
Automatic Hard Exudates Detection from Multi-Resolution Retinal Images Using HAAR Dual Tree Wavelet Transform
-Poonam M. Rokade Abstract ![]() ![]() |
238 |
42
|
Performance Analysis of Routing Protocols Using Various Parameters in MANET Scenario
-Anuradha, Prof. Navneet Verma Abstract ![]() ![]() |
246 |
43
|
Data Classification Using Support Vector Machine: A Review
-Er. Manju rani, Er. Lekha Bhambhu Abstract ![]() ![]() |
254 |
44
|
A More Effective Approach For Mining Powerful Users In A Blogosphere
-Mrinalini Tiwari, Hare Ram Shah Abstract ![]() ![]() |
258 |
45
|
Direct Security Approach Based on Trust Management In VANET
-Pankaj Singh Chouhan, Brajesh K. Shrivash, Priya Pathak Abstract ![]() ![]() |
261 |
46
|
Predictive Text Entry Method for Somali Language on Mobile Phone
-Mahamed Daud, Vishal Goyal Abstract ![]() ![]() |
274 |
47
|
Result Merging Approaches in Meta Search Engine: A Review
-Sarita Yadav, Jaswinder Singh Abstract ![]() ![]() |
281 |
48
|
Ascendible Information Sharing In Cloud Storage Using Secure Key-Aggregate Cryptosystem
- K.R.Viswanath, G.Prasadbabu Abstract ![]() ![]() |
286 |
49
|
Digital Image Steganographic Approach (DISA) to Enhance Quality and Imperceptibility
-Shampy Sharma, Dr. Ashish Oberoi, Pavninderpal Kaur Abstract ![]() ![]() |
294 |
50
|
Studies on Wire Selection for Machining With W E D M
-NBV Prasad, Ch.V.S.ParameswaraRao, S. Sivanaga MalleswaraRao Abstract ![]() ![]() |
300 |
51
|
Survey of Segmentation Techniques of Cancer Images Emphasizing on MRI Images
-R. Srivaramangai, Ajay. S. Patil Abstract ![]() ![]() |
304 |
52
|
Role of Image Segmentation in Digital Image Processing for Information Processing
-Manjula.KA Abstract ![]() ![]() |
312 |