IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 6 / Nov-Dec 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
Text Mining Approach in Curtailing Cyber-Crimes in Nigeria
- Kasali Funmilayo, Kuyoro Afolashade, Awodele Oludele Abstract PDF Cite/Export |
1 |
2
|
Survey on Log Analysis and Management
- Sandesh Thosar, Abhishek Mane, Swapnil Raykar, Rahul Jain, Pallavi Khude, Shanthi Guru Abstract PDF Cite/Export |
9 |
3
|
Owner Secured Data Storage on Cloud and Sharing With Key Aggregate System
- Miss.Snehal Lande, Miss. Varsha Mhaske, Mr.Mahesh Lagad, Prof. Raskar R.B Abstract PDF Cite/Export |
15 |
4
|
Identification of Fraudulent Phishing Emails Based On CSS Standard Technique to Explore Similarities in Web Pages
- Aishwarya Chavan, Raadhieca Iyer, Aparna Ramtirthakar, Mrs. Shanthi K. Guru, Ms. Pallavi Khude Abstract PDF Cite/Export |
20 |
5
|
A Survey On Image Summarization Algorithms
- Sreelakshmi S, Mr. Paul P Mathai Abstract PDF Cite/Export |
26 |
6
|
Automatic Assessment of Handwritten Essays Using LCS
- Reshma.V.M, Linda Sara Mathew Abstract PDF Cite/Export |
32 |
7
|
An EPQ Model for Two-Parameter Weibully Deteriorated Items with Exponential Demand Rate and Completely Backlogged Shortages
- Devyani Chatterji, U. B. Gothi Abstract PDF Cite/Export |
38 |
8
|
Data Structure for Representation of Big Data of Weather Forecasting: A Review
- Dhanashri V. Sahasrabuddhe, PallaviP.Jamsandekar Abstract PDF Cite/Export |
48 |
9
|
Comparative Analysis of Parallel AES Algorithm with Pipelined AES Algorithm
- Tannu Bala, Yogesh Kumar Abstract PDF Cite/Export |
57 |
10
|
A Survey of Different Public-Key Cryptosystems
- Anita Ganpati, Narender Tyagi Abstract PDF Cite/Export |
63 |
11
|
A Carpool System Using Genetic Algorithm
- Prof. Shilpa P. Bunjkar, Himanshu Pareek, Nilamber Singh, Aditi Sisodiya, Neha Tarare Abstract PDF Cite/Export |
71 |
12
|
A Survey Paper On Removal of File Duplication At Block Level In A Hybrid Cloud
- Pritam Dalvi, Vishnu Wagh, Shubham Kale, Krushna Khandagale, Dipalee A. Chaudhari, Soniya Bastawade Abstract PDF Cite/Export |
75 |
13
|
A Review of Arithmetic Competitions on Cell phones in basic school with particular emphasis on Arabic/Hindi Numerals
- Mohammed Elbasheir Mohammed Babekir Abstract PDF Cite/Export |
80 |
14
|
FRAPPE: Making Facebook More Secure
- Ritu Kumari, Utkarsha Mamidwar, Sanjoli Kapoor, Kritika Sharma, Mrs.Deepali Gothawal Abstract PDF Cite/Export |
88 |
15
|
Spatio-Temporal Outlier Analysis and Detection using K-medoids with SVM
- M. Naveena Priya ,Mrs. P.Anitha, Abstract PDF Cite/Export |
93 |
16
|
Projections of E-Commerce in India
- Jayanti Goya Abstract PDF Cite/Export |
101 |
17
|
Cloud Computing Systems: Confidentiality Protection Of Data
- Mr. Chandan B, Mr. Vinay Kumar K Abstract PDF Cite/Export |
105 |
19
|
A Comprehensive Review on Object detection in Video Surveillance
- Mamta Chopade, Pooja Chordiya, Shubhangi Godse, Prof. Anjali Shejul Abstract PDF Cite/Export |
124 |
20
|
A Survey on Plant Disease Identification
- Vipinadas.M.J,Thamizharasi.A Abstract PDF Cite/Export |
129 |
21
|
Green Computing and Power Management
- J.Selvam Abstract PDF Cite/Export |
136 |
22
|
Middleware Interoperability using SOA for Enterprise Business Application
- T Sathis Kumar Abstract PDF Cite/Export |
140 |
23
|
Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud
- Ms.Priya Kharmate, Prof. Ranjeetsingh Suryawanshi Abstract PDF Cite/Export |
145 |
24
|
Statistical Analysis of Correlations Developed For Parametric Control in Machining With EDM
- B.N.Sreenivas, Dr Ch.V.S.ParameswaraRao Abstract PDF Cite/Export |
150 |