IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 4 Issue 1 / Jan - Feb 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
How Wireless Security Can Be Compromised
- Shripal Rawal Abstract PDF Cite/Export |
1 |
2
|
Big Data Analytics: Challenges and Solutions Using Hadoop, Map Reduce and Big Table
- M. Dhavapriya, N. Yasodha Abstract PDF Cite/Export |
5 |
3
|
Preventive System for Forests
- Prasad R. Khandar, K. Deivanai Abstract PDF Cite/Export |
15 |
4
|
Digital Video Monitoring System Based On ARM Cortex A7
- R. R. Karhe, Gayatri P Sonawane Abstract PDF Cite/Export |
19 |
5
|
Symmetric Encryption Scheme Using Logistic Map
- K.Saranya, AG.Shanmathi, N.Suchitra, Dr.S.Ramakrishnan Abstract PDF Cite/Export |
23 |
6
|
A Comparative Study of Disk Scheduling Algorithms
- Tarsem Singh Abstract PDF Cite/Export |
29 |
7
|
A Survey on Bug Triaging With Software Data Reduction
- KrishnaVeni V.L, Karthik.M Abstract PDF Cite/Export |
33 |
8
|
A Glimpse of Software Quality Assurance and Factors Affecting It
- Divya C D, Bharath T S Abstract PDF Cite/Export |
37 |
9
|
A Study: Network Technologies for Rural Regions
- Sanjib Das, Nikita Baidya Abstract PDF Cite/Export |
44 |
10
|
Accuracy Prediction for Loan Risk Using Machine Learning Models
- Anchal Goyal, Ranpreet Kaur Abstract PDF Cite/Export |
52 |
11
|
Securing The Cloud Resources Using Attribute Based Access Control
- Pradnya Agale Abstract PDF Cite/Export |
58 |
12
|
Confidential Audio Transmission using Image Slicing
- Vivek Solavande Abstract PDF Cite/Export |
62 |
13
|
Comparison of Image Search Reranking Techniques
- Ayswarya Chandramohan, Prathibha S Nair Abstract PDF Cite/Export |
65 |
14
|
Robust Biometrics Based Authentication Scheme Using Watermarking
-Naga Sowjanya K, Kannamma R Abstract PDF Cite/Export |
69 |
15
|
Path Planning through PSO Algorithm in Complex Environments
- Mukesh Kumar Nandanwar, Dr. Anupam Shukla, Dr. A.S. Zadagaonkar Abstract PDF Cite/Export |
79 |
16
|
Survey on Copy Move Image Forgery Detection Techniques
- Jaseela S, Mrs. Nishadha S. G Abstract PDF Cite/Export |
87 |
17
|
A Survey on Reversible Image Data Hiding
- Asha S Raj, Mrs.Gayathri Nair P Abstract PDF Cite/Export |
92 |
18
|
Breaking New Grounds: Realization Of “ALL EAR” Screen Readers
- Dr. M. A. Pradhan, Shambhavi Sinha, Swarali Shirke, Vedant Deshmukh, Akhilesh Mishra Abstract PDF Cite/Export |
99 |
19
|
Search and Safe Exchange of Real-Time Video on Mobile Cloud
- V.Pavithra, S.V.Shreekeerthana, S.Yogapriya Abstract PDF Cite/Export |
103 |
20
|
A Design Approach for Wireless Communication Security in Bluetooth Network
- C.Suresh, V.Vidhya, E.Shamli, R.Muthulakshmi, S.Menaka Abstract PDF Cite/Export |
106 |
21
|
Aspect-Based Opinion Mining Using Dependency Relations
- Amani K Samha Abstract PDF Cite/Export |
113 |
22
|
Big Data: Data Driven Design philosophy for Solving Hard Optimization Problem
- Sridevi Malipatil,Vani. N Abstract PDF Cite/Export |
124 |
23
|
A Brief Survey of Privacy Preserving Data Mining
- Shilpa M.S, Shalini.L Abstract PDF Cite/Export |
131 |
24
|
Implementation Idea For Secure Data Deduplication Using Hybrid Cloud Approach
- Ms. Deepali C. Ghosalkar Abstract PDF Cite/Export |
136 |
25
|
Preprocessing of Dataset for Quality Analysis of Contact Lens Material in Ophthalmology Using PCA
- Sumitra S, Dr. Ananthi Sheshasaayee Abstract PDF Cite/Export |
140 |
26
|
Enhancing Probability of Music Selection Using Smart Shuffling Policy
- Suraj Rasal, Paras Gandhi, Shraddha Shelar Abstract PDF Cite/Export |
143 |
27
|
Parking Availability in Sensor Enabled Car Parks
- Snehal Bankar, Mitali Dhaigude, Sonali Gajendragadakar, Supriya Gavli Abstract PDF Cite/Export |
146 |
28
|
Watermark Extraction and Validation in Images Using Hybrid Techniques
- Chhaya Verma, Dr. Sandhya Tarar Abstract PDF Cite/Export |
151 |
29
|
Image and Video Processing Edge Detection Technique used for Traffic Control Problem
- Himanshu Chauhan. Dr. Sandhya Tarar Abstract PDF Cite/Export |
157 |
Under in review process... |