IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 4 Issue 1 / Jan - Feb 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
How Wireless Security Can Be Compromised
- Shripal Rawal Abstract ![]() ![]() |
1 |
2
|
Big Data Analytics: Challenges and Solutions Using Hadoop, Map Reduce and Big Table
- M. Dhavapriya, N. Yasodha Abstract ![]() ![]() |
5 |
3
|
Preventive System for Forests
- Prasad R. Khandar, K. Deivanai Abstract ![]() ![]() |
15 |
4
|
Digital Video Monitoring System Based On ARM Cortex A7
- R. R. Karhe, Gayatri P Sonawane Abstract ![]() ![]() |
19 |
5
|
Symmetric Encryption Scheme Using Logistic Map
- K.Saranya, AG.Shanmathi, N.Suchitra, Dr.S.Ramakrishnan Abstract ![]() ![]() |
23 |
6
|
A Comparative Study of Disk Scheduling Algorithms
- Tarsem Singh Abstract ![]() ![]() |
29 |
7
|
A Survey on Bug Triaging With Software Data Reduction
- KrishnaVeni V.L, Karthik.M Abstract ![]() ![]() |
33 |
8
|
A Glimpse of Software Quality Assurance and Factors Affecting It
- Divya C D, Bharath T S Abstract ![]() ![]() |
37 |
9
|
A Study: Network Technologies for Rural Regions
- Sanjib Das, Nikita Baidya Abstract ![]() ![]() |
44 |
10
|
Accuracy Prediction for Loan Risk Using Machine Learning Models
- Anchal Goyal, Ranpreet Kaur Abstract ![]() ![]() |
52 |
11
|
Securing The Cloud Resources Using Attribute Based Access Control
- Pradnya Agale Abstract ![]() ![]() |
58 |
12
|
Confidential Audio Transmission using Image Slicing
- Vivek Solavande Abstract ![]() ![]() |
62 |
13
|
Comparison of Image Search Reranking Techniques
- Ayswarya Chandramohan, Prathibha S Nair Abstract ![]() ![]() |
65 |
14
|
Robust Biometrics Based Authentication Scheme Using Watermarking
-Naga Sowjanya K, Kannamma R Abstract ![]() ![]() |
69 |
15
|
Path Planning through PSO Algorithm in Complex Environments
- Mukesh Kumar Nandanwar, Dr. Anupam Shukla, Dr. A.S. Zadagaonkar Abstract ![]() ![]() |
79 |
16
|
Survey on Copy Move Image Forgery Detection Techniques
- Jaseela S, Mrs. Nishadha S. G Abstract ![]() ![]() |
87 |
17
|
A Survey on Reversible Image Data Hiding
- Asha S Raj, Mrs.Gayathri Nair P Abstract ![]() ![]() |
92 |
18
|
Breaking New Grounds: Realization Of “ALL EAR” Screen Readers
- Dr. M. A. Pradhan, Shambhavi Sinha, Swarali Shirke, Vedant Deshmukh, Akhilesh Mishra Abstract ![]() ![]() |
99 |
19
|
Search and Safe Exchange of Real-Time Video on Mobile Cloud
- V.Pavithra, S.V.Shreekeerthana, S.Yogapriya Abstract ![]() ![]() |
103 |
20
|
A Design Approach for Wireless Communication Security in Bluetooth Network
- C.Suresh, V.Vidhya, E.Shamli, R.Muthulakshmi, S.Menaka Abstract ![]() ![]() |
106 |
21
|
Aspect-Based Opinion Mining Using Dependency Relations
- Amani K Samha Abstract ![]() ![]() |
113 |
22
|
Big Data: Data Driven Design philosophy for Solving Hard Optimization Problem
- Sridevi Malipatil,Vani. N Abstract ![]() ![]() |
124 |
23
|
A Brief Survey of Privacy Preserving Data Mining
- Shilpa M.S, Shalini.L Abstract ![]() ![]() |
131 |
24
|
Implementation Idea For Secure Data Deduplication Using Hybrid Cloud Approach
- Ms. Deepali C. Ghosalkar Abstract ![]() ![]() |
136 |
25
|
Preprocessing of Dataset for Quality Analysis of Contact Lens Material in Ophthalmology Using PCA
- Sumitra S, Dr. Ananthi Sheshasaayee Abstract ![]() ![]() |
140 |
26
|
Enhancing Probability of Music Selection Using Smart Shuffling Policy
- Suraj Rasal, Paras Gandhi, Shraddha Shelar Abstract ![]() ![]() |
143 |
27
|
Parking Availability in Sensor Enabled Car Parks
- Snehal Bankar, Mitali Dhaigude, Sonali Gajendragadakar, Supriya Gavli Abstract ![]() ![]() |
146 |
28
|
Watermark Extraction and Validation in Images Using Hybrid Techniques
- Chhaya Verma, Dr. Sandhya Tarar Abstract ![]() ![]() |
151 |
29
|
Image and Video Processing Edge Detection Technique used for Traffic Control Problem
- Himanshu Chauhan. Dr. Sandhya Tarar Abstract ![]() ![]() |
157 |
Under in review process... |