IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 4 / July - Aug 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
Environmental Planning In Urban Areas through GIS Spatial and Temporal Planning
-Meshram Sagarkumar, Ramteke P. Deepa, Shingne Nilesh Abstract PDF Cite/Export |
1 |
2
|
Efficiency of Algorithms for Neighbouring Node Discovery in Adhoc Wireless Networks
-Manu Srivastava, Namrata Dhanda Abstract PDF Cite/Export |
12 |
3
|
Multi-Lingual Ontology Server (MOS) For Discovering Web Services
-Abdelrahman Abbas Ibrahim, Dr. Nael Salman Abstract PDF Cite/Export |
18 |
4
|
Performance Analysis of Distance Vector and Link State Routing Protocols
-Bhavna Rathi, Er. Farminder Singh Abstract PDF Cite/Export |
23 |
5
|
Survey on Fault Tolerance in Wireless Sensor Network
-Ajay Kumar, Jasmeet Singh Abstract PDF Cite/Export |
33 |
6
|
Overview of Controlling and Monitoring Of Extrusion Through Android System
-Anand D. Wankhede, Mr.G. A. Kulkarni Abstract PDF Cite/Export |
37 |
7
|
Hardware Implementation of LSB Steganography Using MATLAB and FPGA
-Apurva.S.Mahajan, Prof.Sheetal.G.Khadke Abstract PDF Cite/Export |
41 |
8
|
GSTARS: Generalized Statistical Dynamic Source Routing For Manets
-Narra Dinakar, S. Vasundra Abstract PDF Cite/Export |
45 |
9
|
A Comparative Study on Load Balancing Algorithms in Cloud Computing
-Seema Nagar, Ajeet KR Bhartee Abstract PDF Cite/Export |
51 |
10
|
Perception Among Students In Private And Government Education Industry
-Kanav Sadawarti, Abhilash Sharma Abstract PDF Cite/Export |
55 |
11
|
Analysis of Perception among Customers and E-Customers in Retail
-Pradeep Singh Guleria, Dr. Harsh Sadawarti Abstract PDF Cite/Export |
60 |
12
|
Optimization of Number of Nodes for AODV, OLSR And ZRP Protocols with and Without Black Hole Attack in MANET by Using Taguchi Method
-Sukhman Sodhi, Rupinder kaur Gurm, Harsimran Singh Sodhi Abstract PDF Cite/Export |
66 |
13
|
Optimization of Number of Nodes for AODV Protocol with and Without Black Hole Attack in MANET by Using Taguchi Method
-Sukhman Sodhi, Rupinder kaur Gurm, Harsimran Singh Sodhi. Abstract PDF Cite/Export |
71 |
14
|
FIRE: Fuzzy-logic based Theoretic Intrusion Response and Recovery Engine
-Deepika Irugu, P. Balaji, P. Nirupama Abstract PDF Cite/Export |
82 |
15
|
Comparative Analysis of MPLS Layer 2 VPN Techniques
-Gurwinder Singh, Er. Manuraj Moudgil Abstract PDF Cite/Export |
90 |
16
|
Improving Online Traffic Assessment Using LTI Frame Work
-Syed.Imran, M.Hymavathi Abstract PDF Cite/Export |
99 |
17
|
Application of Game Theory for Resource Management In Ubiquitous Environment
-Bhagyashree Lohar Abstract PDF Cite/Export |
103 |
18
|
An Improved Particle Swarm Optimization Algorithm for Meta Task Scheduling In Cloud Environment
-R. Jemina Priyadarsini, Dr. L. Arockiam Abstract PDF Cite/Export |
108 |
19
|
Amharic Text Predict System for Mobile Phone
-Alemebante Mulu, Vishal Goyal Abstract PDF Cite/Export |
113 |
20
|
Effective Process to Remove Broken Lines Effect from Degraded Document Images Using MATLAB Algorithm
-Megha Paul Abstract PDF Cite/Export |
119 |
21
|
Improving the Performance for Single and Multi-document Text Summarization via LSA & FL
-Ms.Pallavi.D.Patil, P.M.Mane Abstract PDF Cite/Export |
125 |
22
|
Collision Avoidance Mechanism Using Multi-Layered Collision Detection Model For Vehicular Networks
-Harjinderjeet Singh, Manuraj Moudgil Abstract PDF Cite/Export |
132 |
23
|
Hybridization of VM Based on Dynamic Threshold and DVFS in Cloud Computing
-Harmanpreet Kaur, Jasmeet Singh Gurm Abstract PDF Cite/Export |
137 |
24
|
Optimizing the Accuracy of CART Algorithm by Using Genetic Algorithm
-Jatinder Kaur, Jasmeet Singh Gurm Abstract PDF Cite/Export |
142 |
25
|
Digital Watermarking Of Compressed Images With Improved Encryption
-Aneena M Abstract PDF Cite/Export |
148 |
26
|
Comparative Analysis of Link State Routing Protocols OPSF and IS-IS
-Amanpreet Kaur, Er.Dinesh Kumar Abstract PDF Cite/Export |
159 |
27
|
Comparative Analysis of MPLS Signaling Protocols
-Damanjit Kaur, Er.Dinesh Kumar Abstract PDF Cite/Export |
169 |
28
|
A Survey on Security and Privacy Implications of Privacy Preserving Data Mining
-R.Hemalatha, M.Elamparithi Abstract PDF Cite/Export |
178 |
29
|
Review On Image Segmentation Techniques
-Jiwanjot kaur, Kirti Joshi Abstract PDF Cite/Export |
187 |
30
|
Supporting Flexible, Efficient, and User-Interpretable Retrieval of Similar Time Series
-Abhijeet K. Barde, M.B.Ansari Abstract PDF Cite/Export |
192 |
31
|
Performance and Security Analysis of Border Gateway Protocol
-Parvesh Kaushal, Mr. Amarvir Singh Abstract PDF Cite/Export |
196 |
32
|
Wavelet and Histogram Based Energy Feature Image Retrieval (W&HBEFIR)
-Shivhari S. Rahudkar, M.B.Ansari Abstract PDF Cite/Export |
208 |
33
|
Cloud Security Solutions: A Review
-Sugandh Bala Gupta, Dr. Pankaj Kumar Abstract PDF Cite/Export |
212 |
34
|
A Privacy Based Two Tales over Online Social Networks
-Datta V. Gunjal, Kavita U. Rahane Abstract PDF Cite/Export |
217 |
35
|
A Survey: Energy Efficient Routing Techniques in Mobile Wireless Sensor Network
-Nagashri K, Manjunath C R Abstract PDF Cite/Export |
223 |
36
|
Self-Organizing Deployment of Scalable Services In Peer To Peer System
-Athira U.K Abstract PDF Cite/Export |
228 |
37
|
Weighted Technique Using Image Fusion Techniques for Enhanced Visual Quality
-Anju Rani, Rupinder Kaur Abstract PDF Cite/Export |
233 |
38
|
A Review: Driver Drowsiness Detection System
-Chisty, Jasmeen Gill Abstract PDF Cite/Export |
243 |
39
|
Quick Fault Tolerance Algorithm For Wireless Sensor
-Ajay Kumar, Jasmeet Singh Abstract PDF Cite/Export |
253 |
40
|
Data Mining Approach To Big Data
-Jyothiprasanna Jaladi, B.V.Kiranmayee, S.Nagini Abstract PDF Cite/Export |
258 |
41
|
Software Quality Management Measured Based Code Assessments
-Salman Zakariya, Mohammed Belal Abstract PDF Cite/Export |
263 |
42
|
Versatile of Hybrid Numerical Asymptotic Boundary Element Method framework
-K.Rekha, Dr.K.Thirugnanasambandam Abstract PDF Cite/Export |
269 |