IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 3 / May - June 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
PCB Defect Detection Using Image Subtraction Algorithm
-Suhasini A, Sonal D Kalro, Prathiksha B G, Meghashree B S, Phaneendra H D Abstract PDF Cite/Export |
1 |
2
|
Data Mining Technology for Efficient Network Security Management
-Ankit Naik, S.W. Ahmad Abstract PDF Cite/Export |
7 |
3
|
Study on Recent Trends of Distributed Denial of Service Attack and Handling Approach
-Rajnish Kumar Mishra, Amarnath Singh, Vipin Kumar Gupta Abstract PDF Cite/Export |
12 |
4
|
Security Certified LARDAR Protocol in Mobile Ad Hoc Network
-Kalpana Tyagi, Anamika Abstract PDF Cite/Export |
18 |
5
|
A Survey on Awareness Regarding The Education Industry
-Kanav Sadawarti, Abhilash Sharma Abstract PDF Cite/Export |
24 |
6
|
A Survey on the Power and Energy Consumption of Cloud Computing
-Harmanpreet Kaur, Jasmeet Singh Gurm Abstract PDF Cite/Export |
28 |
7
|
Hybrid Cloud Approach for Reliable Authorized Deduplication
-Shaik Shaju, V.V.Krishna Reddy, D. V. Subbaiah Abstract PDF Cite/Export |
32 |
8
|
Localization Problem Solution Using K-Mean Clustering and Bacterial Foraging Optimization in Wireless Sensor Network
-Er. Nisha Devi, Er. Harpreet Kaur Abstract PDF Cite/Export |
38 |
9
|
A Semantic Link Network Based Search Engine for Multimedia Files
-Anuj Kumar, Ravi Kumar Singh, Vikas Kumar, Vivek Patel, Priyanka Paygude Abstract PDF Cite/Export |
44 |
10
|
Survey on Advancements in Retail Sector and Its Future
-Pradeep Singh Guleria, Dr. Harsh Sadawarti Abstract PDF Cite/Export |
50 |
11
|
Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm
-G.Gayathri, N.Prabakaran Abstract PDF Cite/Export |
54 |
12
|
A Survey on Scheduling Strategies in Cloud Computing
-Aarti, Malti Rani, lohit kapoor Abstract PDF Cite/Export |
59 |
13
|
Rainfall Prediction using Neural Network
-Ankita Sharma, Geeta Nijhawan Abstract PDF Cite/Export |
65 |
14
|
Captcha-Based Password Authentication - Security Primitive Based On Hard AI Problems
-S.Vamsi Krishna,K. Lavanya, D. V. Subbaiah Abstract PDF Cite/Export |
70 |
15
|
Secure Deduplication in Hybrid Cloud Using Differential Privileges
-Vinutha B T , Yogish H K Abstract PDF Cite/Export |
75 |
16
|
Proposed Optimal Solution of TSP Using ACO
-Sanjeev Kumar, Shubham Sidana,Deepali Dev Abstract PDF Cite/Export |
78 |
17
|
Fairness of Packet Forwarding Strategy in Opportunistic Mobile Networks
-U. Venkata Padmasai, D. Pramodh Krishna, D. V. Subbaiah Abstract PDF Cite/Export |
82 |
18
|
Arithmetic Coding for Lossless Data Compression – A Review
-Ezhilarasu P, Krishnaraj N, Dhiyanesh B Abstract PDF Cite/Export |
89 |
19
|
A Friend Recommender System for Social Networks by Life Style Extraction Using Probabilistic Method -“Friendtome”
-Namrata M.Eklaspur, Anand S.Pashupatimath Abstract PDF Cite/Export |
95 |
20
|
Video Dissemination Protocol Over Hybrid WIFI Cellular Networks
-B.Lalin, B.Koteswar Rao, D. V. Subbaiah Abstract PDF Cite/Export |
102 |
21
|
A Survey on Sentence Level Sentiment Analysis
-Vrushali K. Bongirwar Abstract PDF Cite/Export |
110 |
22
|
Analysis of Base Station Adaptive Antenna Array Performance in CDMA20001x Mobile Radio Network
-Ifeagwu E.N, Obi P.I, Ejiofor H.C, Okoro K.C Abstract PDF Cite/Export |
114 |
23
|
Privacy Preservation in Collaborative Data Mining As Goal Oriented Attack Model
-Mr. J.RangaRajesh, Mrs. Srilakshmi.Voddelli, Mr. G.Venkata Krishna, Mrs. T.Hemalatha Abstract PDF Cite/Export |
123 |
24
|
A Survey on Different Digital Video Monitoring Systems
-Dr A.J. Patil, Gayatri.P.Sonawane Abstract PDF Cite/Export |
132 |
25
|
Bandwidth Allocation in Cloud-Based Wireless Live-Streaming
-Mrs. Kaushlya Salunkhe, Prof. Mrs. Sanchika Bajpai Abstract PDF Cite/Export |
135 |
26
|
Reboost Image Segmentation Using Genetic Algorithm
-Shanta H Biradar Abstract PDF Cite/Export |
143 |
27
|
Monitoring Of Environmental Parameters by Using Cloud Computing
-Mayur Randhir, R. R. Karhe Abstract PDF Cite/Export |
151 |
28
|
An Efficient Adaptation of Edge Feature-Based Video Processing Algorithm for Wireless Multimedia Sensor Networks
-Thanaa Jbeily, Mothanna Alkubeily, Iyad Hatem Abstract PDF Cite/Export |
156 |
29
|
Application of Survival Analysis Model on Drug Addiction Dataset
-Runumi Devi Abstract PDF Cite/Export |
167 |
30
|
Improving Electrical Energy Efficiency in Nigerian Industries
-Akinwole O.O Abstract PDF Cite/Export |
170 |
31
|
A Fuzzy Inference Model for Reliability Estimation of Component Based Software System
-Gopal Prasad Jaiswal, Ram Nivas Giri Abstract PDF Cite/Export |
177 |
32
|
Correlation Analysis of Meteorological Data in Region of Tamil Nadu Districts Based On K- Means Clustering Algorithm
-M. Mayilvaganan, P. Vanitha Abstract PDF Cite/Export |
184 |
33
|
Algorithm Design for Robust Web Personalization Using Neural Network
-Ramandeep Kaur, Er. Iqbaldeep Kaur Abstract PDF Cite/Export |
191 |
34
|
Securing User Location in Social Applications Using Direct Conversions
-Gettuboyina.Nalini, M.Krishna Kishore Abstract PDF Cite/Export |
196 |
35
|
PCB
-Ankit Kandpal, Vishal Ramola Abstract PDF Cite/Export |
201 |
36
|
An Approach To Incentive-Based Reputation For Mobile Ad Hoc Networks
-Vivek Richhariya, Praveen Kaushik Abstract PDF Cite/Export |
207 |
37
|
Comparative Analysis Of MPLS Layer 3VPN And MPLS Layer 2 VPN
-Umar Bashir Sofi, Er. Rupinder Kaur Gurm Abstract PDF Cite/Export |
214 |
38
|
Providing High Privacy And Hop-by-Hop Message Authentication In Wireless Sensor Networks
-Kudumula Manasa, Vadlamudi Muniraju Naidu Abstract PDF Cite/Export |
221 |
40
|
Android Based Punjabi TTS System
-Hardeep, Parminder Singh Abstract PDF Cite/Export |
233 |
41
|
Automatic Hard Exudates Detection from Multi-Resolution Retinal Images Using HAAR Dual Tree Wavelet Transform
-Poonam M. Rokade Abstract PDF Cite/Export |
238 |
42
|
Performance Analysis of Routing Protocols Using Various Parameters in MANET Scenario
-Anuradha, Prof. Navneet Verma Abstract PDF Cite/Export |
246 |
43
|
Data Classification Using Support Vector Machine: A Review
-Er. Manju rani, Er. Lekha Bhambhu Abstract PDF Cite/Export |
254 |
44
|
A More Effective Approach For Mining Powerful Users In A Blogosphere
-Mrinalini Tiwari, Hare Ram Shah Abstract PDF Cite/Export |
258 |
45
|
Direct Security Approach Based on Trust Management In VANET
-Pankaj Singh Chouhan, Brajesh K. Shrivash, Priya Pathak Abstract PDF Cite/Export |
261 |
46
|
Predictive Text Entry Method for Somali Language on Mobile Phone
-Mahamed Daud, Vishal Goyal Abstract PDF Cite/Export |
274 |
47
|
Result Merging Approaches in Meta Search Engine: A Review
-Sarita Yadav, Jaswinder Singh Abstract PDF Cite/Export |
281 |
48
|
Ascendible Information Sharing In Cloud Storage Using Secure Key-Aggregate Cryptosystem
- K.R.Viswanath, G.Prasadbabu Abstract PDF Cite/Export |
286 |
49
|
Digital Image Steganographic Approach (DISA) to Enhance Quality and Imperceptibility
-Shampy Sharma, Dr. Ashish Oberoi, Pavninderpal Kaur Abstract PDF Cite/Export |
294 |
50
|
Studies on Wire Selection for Machining With W E D M
-NBV Prasad, Ch.V.S.ParameswaraRao, S. Sivanaga MalleswaraRao Abstract PDF Cite/Export |
300 |
51
|
Survey of Segmentation Techniques of Cancer Images Emphasizing on MRI Images
-R. Srivaramangai, Ajay. S. Patil Abstract PDF Cite/Export |
304 |
52
|
Role of Image Segmentation in Digital Image Processing for Information Processing
-Manjula.KA Abstract PDF Cite/Export |
312 |