IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 5 / Sep - Oct 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
High Availability and Faster Convergence Techniques in IP Networks
-Er. Jashandeep Kaur, Er.Rupinder Kaur Gurm Abstract PDF Cite/Export |
1 |
2
|
Comparative Analysis of WAN Technologies
-Er.Harsimranpreet Kaur, Er.Rupinder Kaur Gurm Abstract PDF Cite/Export |
9 |
3
|
Survey on Intelligent Data Repository Using Soft Computing
-A. Prema, A.Pethalakshmi Abstract PDF Cite/Export |
21 |
4
|
Mining With Big Data Calculating Frequent Patterns Using APRIORI Algorithm
-A.Srinivas, A.Sowjanya, J.Sushmitha Abstract PDF Cite/Export |
41 |
5
|
Application of Representative-Based Clustering Using Hartigan & Wong Approach to Discern Electrical Switching Patterns
-Tushar Gupta, Somnath Saha, Prerna Gaur Abstract PDF Cite/Export |
46 |
6
|
Touch And Transfer Using Red TACTON
-Akash D. Patel, Muhib A. Lambay, Muneer R. Ahmed Abstract PDF Cite/Export |
55 |
7
|
Discovering End-To-End Communication Patterns in Manets Using GSTARS
-Ubokobong Esang, C Fancy Abstract PDF Cite/Export |
59 |
8
|
Online Examination Management System Using Genetic Algorithm
-Umed H. Suthar, Prof. Abdul Rais, Ashish Upadhyay, Prabhakar Upadhya Abstract PDF Cite/Export |
68 |
9
|
Multi Document Utility Presentation using Sentiment Analysis
-Mayur S. Dhote, Prof. S. S. Sonawane Abstract PDF Cite/Export |
72 |
10
|
A Present-Day Approach For 5G Technology
-Yashpal Abstract PDF Cite/Export |
78 |
11
|
M-Ticketing using Smartphones
-Kunal Mishra,Viraj Samant, Arvind Shukla, Waseem Sultan Abstract PDF Cite/Export |
82 |
12
|
Mitigating Flooding Attacks in Disruption Tolerant Network
-Aniekan Julius Bassey, C Fancy Abstract PDF Cite/Export |
85 |
13
|
Multiple Sink Placement Strategies by finding Maximum Cluster of Nodes in Wireless Sensor Networks
-Qazi Salman Khaliq, Rupinder Kaur Abstract PDF Cite/Export |
92 |
14
|
Web Application Vulnerability Detection and Mitigation With Static Exploration
-Uduakobong Asuquo Ituen, M. B. Mukeshkrishnan Abstract PDF Cite/Export |
101 |
15
|
Text Fusion in Grayscale Medical Images at Area of Non Interest
-Naveen Kumar, Dr.Sunil Shukla Abstract PDF Cite/Export |
110 |
16
|
Cloud Computing: An Outlook
-Jayanti Goyal Abstract PDF Cite/Export |
114 |
17
|
Effective Time and Cost Based Task Scheduling In Grid Computing
-Shashi Bhushan Semwal, Mr. Amit Das Abstract PDF Cite/Export |
118 |
18
|
Secure Clustering Algorithm for Wireless Sensor Networks in the Perspective of Confidentiality
-Antai Uduak-obong Ekpo, Dr Magesh Abstract PDF Cite/Export |
123 |
19
|
Parallel Multigrid Solver for Navier Stokes Equation Using Openmpi
-Mr.Shekhar Sitaram Shelke, Prof.Kalyani Waghmare Abstract PDF Cite/Export |
131 |
20
|
A Review Investigation of Optical Fibre Communication Using WSN
-Ishmeet Kaur Abstract PDF Cite/Export |
135 |
21
|
Basics of Algorithm Selection:A Review
-Niharika Singh, DR. R. G. Tiwari Abstract PDF Cite/Export |
139 |
22
|
Web Application Framework: Review
-Rimjhim Mishra, Dr.Pankaj Kumar Abstract PDF Cite/Export |
143 |
23
|
Control of Vehicle Effluence through Internet of Things & Android
-Amit.V.Kachavimath Abstract PDF Cite/Export |
148 |
24
|
Customized ERP System for Testing and Calibration Laboratory
-Sourabh Singh, Muhib Lambay,Nitesh Tembe,Nasreen Shaikh Abstract PDF Cite/Export |
154 |
25
|
Robotic Maid
-Umesh Yadav, Dharmendra Yadav,Ashraf Siddiqui Abstract PDF Cite/Export |
157 |
26
|
Making Network More Tolerant Towards Fault by Using Centralized Techniques
-Ajay Kumar, Jasmeet Singh Abstract PDF Cite/Export |
159 |
27
|
Distributed Trust Management Model for Peer To Peer Systems
-M.Anitha,R.Hemalatha Abstract PDF Cite/Export |
165 |
28
|
Question Paper Generator System
-Surbhi Choudhary, Abdul Rais Abdul Waheed, Shrutika Gawandi, Kavita Joshi Abstract PDF Cite/Export |
174 |
29
|
Network Traffic Control Using Distributed Control Plane of Software Defined Networks
-Mr. Sachin Ashok Vanjari, Dr. R. B. Ingle Abstract PDF Cite/Export |
177 |
30
|
Knowledge Based Service Diagnosis System
-Anish Bhagwat Abstract PDF Cite/Export |
182 |
31
|
Survey on Texture Classification Methods
-Manisha Dhongade Abstract PDF Cite/Export |
185 |
32
|
Optimized Page Ranking Algorithm for Online Digital Libraries
-Jigyasa Sidhu Abstract PDF Cite/Export |
189 |
33
|
Analysing the Dependency of Exchange Rate on Crude oil Price with Wavelet Networks: Evidence from India
-M. Yasin Pir, Firdous Ahmad Shah, M. Asger Abstract PDF Cite/Export |
202 |
34
|
Generic Architecture for Detecting Botnet
-Anushah Khan, Anchit Bijalwan Abstract PDF Cite/Export |
210 |
35
|
Image classification using Householder Transform
-P.V Nishana Rasheed , R. Shreej Abstract PDF Cite/Export |
235 |
36
|
Survey of Papers for Data Mining with Neural Networks to Predict the Student’s Academic Achievements
-Richa Shambhulal Agrawal, Prof. Mitula Hirenkumar Pandya Abstract PDF Cite/Export |
246 |
37
|
Literature Survey On Contactless Palm Vein Recognition
-Roshni C Rahul, Merin Cherian, Manu Mohan C M Abstract PDF Cite/Export |
250 |
38
|
An Analysis of Recently Used Steganography Techniques on Images
-Somya Rastogi, Achala Shakya Abstract PDF Cite/Export |
256 |
39
|
A Comprehensive Study on Next Generation Internet Protocol (Ipv6) and Security Vulnerabilities
-M.Buvaneswari, Dr.N.Rajendran Abstract PDF Cite/Export |
261 |
40
|
A Review on Text Mining Techniques
-S.Sathya, Dr.N.Rajendran Abstract PDF Cite/Export |
274 |
41
|
Evaluating The Effects of the Energy Management’s Issues on the MANET’s Performance Using Two Native Routing Protocols against a Power-Aware Routing Protocol
-Gatete Marcel, Dr. N. Vetrivelan Abstract PDF Cite/Export |
285 |
42
|
Baseline Collaborative Image Retrieval Using Euclidean Distances Metric Learning
-Shubhangi Durgi, Prof. Pravinkumar Badadapure Abstract PDF Cite/Export |
291 |
43
|
Throughput-Aware Probabilistic Rebroadcasting Method to Reduce Routing Overhead in Mobile Ad Hoc Network
-Mr. H. T. Gurme, Mr. B. R. Solu Abstract PDF Cite/Export |
298 |
44
|
Passive IP Traceback: Disclosing the Locations of Man in the Middle from Path Backscatter
-Aman Shekhar, Krishan Yadav, Krishna Yele, Utpal Chirag, Ms. Santhi K. Guru Abstract PDF Cite/Export |
307 |
45
|
Literature Survey on Supporting Security Assurance in Customized Web Search
-Pallavi Shinde, Vaibhavi Joglekar, Shital Londhe, Mayank Mrinal, Mrs. D. A. Phalke Abstract PDF Cite/Export |
312 |