IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 4 Issue 2 / Mar-Apr 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
A Survey of Web Usage Mining: Concepts with Applications and its Future Scope
- Jitendra N. Shrivastava, Shivendra Pratap Singh Abstract PDF Cite/Export |
1 |
2
|
Relay Nodes: Enhancing Network Lifetime and Throughput in Wireless Sensor Networks
- Navjot Singh, Amandeep Singh Abstract PDF Cite/Export |
6 |
3
|
A Recommendation System for Online Products by Analyzing The Customer Feedback
- N. Rajganesh, R.Nandhini, G.Vinitha, E.Abinaya, M.Sumitha Abstract PDF Cite/Export |
14 |
4
|
Survey of Computing and Future Trends
- Mbanzabugabo Jean Baptiste Abstract PDF Cite/Export |
19 |
5
|
Data scheduling in VANET:A survey
- Sarita Negi, Smita Singh, S.K.Goel, Akshay Kumar Abstract PDF Cite/Export |
25 |
6
|
Survey on Enhancing the Speed of Mapreduce Classification Algorithms Using Pre-Processing Technique
- Maya A.Gharat, Sharmila S.Gaikwad,Saurabh Suman Abstract PDF Cite/Export |
32 |
7
|
Solutions of Cloud Computing Security Issues
- Jahangeer Qadiree, Mohd Ilyas Maqbool Abstract PDF Cite/Export |
38 |
8
|
Innovative Technique of Improving Student Performance Using Data Mining Algorithm
- Rupali Chudasama, Prof. Amol Joglekar Abstract PDF Cite/Export |
43 |
9
|
Help the Society in Selecting Their Best Life Insurance Cover (LIC) Using Data Mining Technique
- Prathama Nemalekar, Prof. Amol Joglekar Abstract PDF Cite/Export |
49 |
10
|
Accountable Obliviously Transfer With Access Control
- Mrs.K.Aruna, Ms.S.Durgadevi Abstract PDF Cite/Export |
54 |
11
|
Smart Supervised Method for Blood Vessel and Optic Disc Segmentation from Fundus Images
- P.Anu, T.Jeyaselvi, J.Johncy Eunice,M.Magie Pushpa Abstract PDF Cite/Export |
58 |
12
|
Cloud Computing Security single to multicloud using AES Algorithm
- Miss.Kirti Sakhare, Miss.Swati Patil, Miss.Vijaya Shendage, Miss.Swati Kolhe Abstract PDF Cite/Export |
66 |
13
|
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks
- Mohammed Tarique, Rohan Raul, Khalil Pinjari, Pranay Patil, Rohit Shinde Abstract PDF Cite/Export |
71 |
14
|
An Analytical Framework For Understanding Knowledge Sharing Process In Online Discussion Forum
- Jessima.B, Sowmiya.K, Kalpana.R, Amala Preethi.L, Mr.Barani Vijaya Kumar A.T Abstract PDF Cite/Export |
76 |
15
|
App Blocker Using Access Control Mechanism In Android Mobile Phones
- Prof. Divya S, Ms. Vanitha S, Ms. Dakshana V M, Ms. Sharmila N Abstract PDF Cite/Export |
79 |
16
|
Survey of Techniques for Improving the Quality of Image Obtained Using Jpeg Compression Algorithm
- Anand Mehrotra Abstract PDF Cite/Export |
84 |
17
|
Information Security in Large Amount of Data: Privacy and Data Mining
- Prof. Harish Barapatre, Ms. Sampada Samel Abstract PDF Cite/Export |
88 |
18
|
Store Hub an Android App
- Assist. Prof. Ansar Ahemad, Shakir Khan, Ajay Machhi, Ajay Baria, Akash Sabat Abstract PDF Cite/Export |
100 |
19
|
Survey On Continuous User Identity Verification Using Biometric Traits for Secure Internet Services
- Neethu T.D , Ayana Ajith Abstract PDF Cite/Export |
106 |
20
|
Malware Detection In Android By Network Behaviour Analysis
- Prof. Shanmuga Priya M, Ms. Soundarya S, Ms. Aashika S Abstract PDF Cite/Export |
110 |
21
|
A Nowadays Protect Your Inbound /Outbound Data Packets Firewall Security Established In Network
- Yashpal, Aniruddha Dubey, Ashish Kumar Abstract PDF Cite/Export |
114 |
22
|
Effective Hybrid Compressive Sensors Using Wireless Networks in Clustering Methods
- P.Sukumar, B.Sowmya Abstract PDF Cite/Export |
118 |
23
|
Survey of VM Load Balancing Algorithm in Cloud Environment
- Er. Pooja, Er. Vivek Thapar Abstract PDF Cite/Export |
122 |
24
|
Secure Data Aggregation in Wireless Sensor Network using Trust Model
- M.Suraj, B.Raja, T.Vengattaraman Abstract PDF Cite/Export |
130 |
25
|
The Imperative of Education on National Development
- Umudjere Sunday Oghenebrorhie, Dr. Okogu Joel Otitie, Osah Mark Abstract PDF Cite/Export |
138 |
26
|
A Study to Develop Server Virtualization Infrastructure in Educational Institutions with Cost Effective and Green Computing Approach
- Yogesh Madhukar Ghorpade, Prof. (Dr.) R. Kamatchi Abstract PDF Cite/Export |
144 |
27
|
K-MED: An Algorithm of Uniform Clustering for Efficient Content-Based Image Retrieval
- Rashmi Chauhan, Shashank Kumar Som, Ankush Mittal Abstract PDF Cite/Export |
151 |
28
|
EDHS Schedulability Analysis for Real-Time Multiprocessor Scheduling
- Rula Mreisheh, Mohammed Hijazieh Abstract PDF Cite/Export |
157 |
29
|
Smart Event Management System
- Assist.prof. Khalil Pinjari, Khan Nur Abstract PDF Cite/Export |
161 |
30
|
Civic Administration
- Shahbaz khan, Ajeet Mishra, Sharad Hari Dhavre, Sagar Patil Abstract PDF Cite/Export |
165 |
31
|
A Methodology for the Usage of Side Data in Content Mining
- Priyanka S Muttur, Babruvan R. Solunke Abstract PDF Cite/Export |
170 |
32
|
A Review on Various Techniques of Brain Tumor Detection
- Rajeshwari G.. Tayade, Miss. P. H. Patil, Miss. Prachi A. Sonawane Abstract PDF Cite/Export |
179 |
33
|
A Review on Various Methodology of White Blood Cell Detection
- Miss. Prachi A. Sonawane, Mrs. A. N. Shewale, Miss. Rajeshwari G. Tayade Abstract PDF Cite/Export |
180 |
34
|
RedBox-A Data Mining Approach for Improving Business Intelligence
- Tapan Nayak Abstract PDF Cite/Export |
187 |
35
|
Efficient Smart Routing Protocol for Faithful Transmission Of Packet and Traffic Balancing (ESFTB)
- Sushma A, Dr. Premjyoti Patil, Dr. Shantakumar B Patil, Bhargava R Abstract PDF Cite/Export |
192 |
36
|
Transmission of Data Using Li-Fi Technology
- Gaurav Singh, Santoshkumar Yadav, Essakkimuthu Nadar, Kumari Gowda Archana Nanade Abstract PDF Cite/Export |
199 |
37
|
A Survey on Multiple Attribute Graph Indexing Methods
- Abilasha S, Remya G, Anuraj Mohan Abstract PDF Cite/Export |
203 |
38
|
Enhanced Multimedia Information Retrieval on Web Using Text Based Query
- Meenakshi Alamelu S, Mannar Mannan J Abstract PDF Cite/Export |
210 |
39
|
Energy Reduction Techniques in Cloud Computing: A Review
- Jasleen kaur, Navpreet Kaur Walia Abstract PDF Cite/Export |
216 |
40
|
Remotely Control of Android Based OS Mobile Application
- Dhananjay Singh Abstract PDF Cite/Export |
222 |
41
|
Software Testing Using CMM Level 5
- Dhananjay Singh Abstract PDF Cite/Export |
233 |
42
|
Open Source Software a Study on BITCOIN
- Kunwar Uday Singh, Harshit Sinha, Dr. Ajay S. Singh, Thirunavukkarasu K Abstract PDF Cite/Export |
243 |
43
|
Virtual Keyboard Using BLOB Analysis
- Antara Kanade, Ayesha Shaikh, Mabel Fernandes, Shubhangi Chikhalthane Abstract PDF Cite/Export |
247 |
44
|
Precising the Characteristics of IP-FPM Algorithm
- Dr. K.Kavitha Abstract PDF Cite/Export |
252 |
45
|
A Proposed Approach for Cloud Storage Optimization with Authorized Byte level De-duplication
- Ruchi Agrawal, Prof. D. R. Naidu Abstract PDF Cite/Export |
259 |
46
|
Comparative Study of Routing Protocols in Mobile ADHOC Networks
- Muhammad Safdar,Izaz Ahmad Khan, Fazlullah Khan, Farman Ullah, Syed Roohullah Jan Abstract PDF Cite/Export |
264 |
47
|
Face Recognition Using Principal Component Analysis Based Feature Space by Incorporating with Probabilistic Neural Network
- Muhammad Tahir, Shahid Akbar Shahzad, Maqsood Hayat, Nazia Azim Abstract PDF Cite/Export |
276 |
48
|
Offsite One Way Data Replication towards Improving Data Refresh Performance
- Nazia Azim, Yasir Qureshi, Fazlullah Khan*, Muhammad Tahir, Syed Roohullah Jan, Abdul Majid Abstract PDF Cite/Export |
285 |
49
|
Superseding Nearest Neighbor Search in Wireless Network using Delaunay Triangulation
- Shweta Purohit, Ajay Mathur Abstract PDF Cite/Export |
297 |
50
|
Review: Apache Spark and Big Data Analytics for Solving Real World Problems
- Mrs. Dipali Dayanand Ghatge Abstract PDF Cite/Export |
301 |
51
|
Effect of Performance In Heterogeneous Traffic In Opportunistic Networks
- Gopinath A R, Sithara K J Abstract PDF Cite/Export |
305 |
52
|
REAL: A Reciprocal Protocol for Privacy in Wireless Communication Networks
- Annapurna B P, Bhuvana N, Harshitha Rajendra, S Renukadevi Abstract PDF Cite/Export |
309 |
53
|
Factor of Success in Software Development: Effort Prediction
- Akshika Aneja Abstract PDF Cite/Export |
312 |
54
|
Messaging Application Based On Android for Visually Challenged People
- Akshika aneja Abstract PDF Cite/Export |
315 |
55
|
Energy Conservation and Effective Data Transmission Using the Selective Data Dissemination Strategies
- Himani Sharma, Jatinder Pal Sharma Abstract PDF Cite/Export |
319 |
56
|
Cognitive Computing: Building a Smarter Planet
- Sapandeep Kaur, Ikvinderpal Singh Abstract PDF Cite/Export |
325 |
57
|
A Survey Report on Internet of Things Applications
- Sapandeep Kaur, Ikvinderpal Singh Abstract PDF Cite/Export |
330 |
58
|
Reducing Bug Triage in Software Development in Data Reduction
- M. Ahilandesware, J. Prathiba Abstract PDF Cite/Export |
336 |
59
|
Internet of Things (IOT) Vision in Gulf Future Business
- Waleed Bamousa Abstract PDF Cite/Export |
340 |
60
|
Light fidelity (LiFi): Future of Wireless Technology
- Akshika Aneja, Arvind Sharma Abstract PDF Cite/Export |
343 |
61
|
A Study of Security Issues Related With Wireless Fidelity (WI-FI)
- Akshika Aneja, Garima Sodhi Abstract PDF Cite/Export |
346 |
62
|
An Analysis on Types of Speech Recognition and Algorithms
- Dr.V.Ajantha Devi,Ms.V.Suganya Abstract PDF Cite/Export |
350 |
63
|
Remove Noise from Scanned Handwritten De-Graded Document Images Using Various Approaches
- Kuljeet Singh, Gurinder Singh Abstract PDF Cite/Export |
356 |
64
|
Safety and Threats in Cloud Computing Survey paper
- Sultan Alfajhan Abstract PDF Cite/Export |
362 |