IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 4 Issue 3 / May- Jun 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
A Survey On Enforcing End-To-End Application Security in Cloud Computing
- T.Arunambika, P.Sudha Abstract ![]() ![]() |
1 |
2
|
Comparative Analysis of OSPF and Is- Is Routing Protocols with Service Provider Network
- Vikasdeep Kaur,Jaspreet Kaur,Harpreet Kaur Abstract ![]() ![]() |
9 |
3
|
Proxy Based Batch Authentication Scheme For Vehicular Ad Hoc Network
- Godavari H. Kudlikar, Sunita S. Barve Abstract ![]() ![]() |
13 |
4
|
A Survey on Cluster Head Election Techniques in Wireless Sensor Networks
- Sandeep Kaur, Navjeet Saini, Neelam chouhan, Pooja Harchand Abstract ![]() ![]() |
18 |
5
|
Prevention of Sybil Attacks in VANETS Using Bacterial Foraging Optimizations Algorithm
- Sakshi Gupta, Taranjit Singh Aulakh Abstract ![]() ![]() |
25 |
6
|
Review of Face Recognition system using MATLAB
- Navpreet Kaur Abstract ![]() ![]() |
30 |
7
|
A Review of Infected Part Detection of Apple Fruit Using Various Segmentation Techniques in Matlab
- Simran Bhagat Abstract ![]() ![]() |
34 |
8
|
Time-Frequency Coherence of Multichannel EEG Signals: Synchrosqueezing Transform Based Analysis
- Md. Sujan Ali, Mst. Jannatul Ferdous, Md. Ekramul Hamid, Md. Khademul Islam Molla Abstract ![]() ![]() |
40 |
9
|
Sentimental Analysis of Movie Reviews in Kannada
- Sai Darshan B.R, Shashank Bhatt.P, Karthik H.S, Sachin Kumar B.S, Merin Thomas, Dr.Latha C.A Abstract ![]() ![]() |
49 |
10
|
Hybridization of Improved K-Means and Artificial Neural Network for Heart Disease Prediction
- Shubhada Bhalerao, Dr. Baisa Gunjal Abstract ![]() ![]() |
54 |
11
|
Energy Aware Load Balancing Technique For Managing Network Workload in Cloud Computing
- Abhinav Thorat, Prof. Shrinivas Sonkar Abstract ![]() ![]() |
62 |
12
|
A Reliable System for Scaling Application over Clouds
- Sreepathi .B, Sheela B.P,Saisunethra K,Spandana,SnehaM.S, Rashmi.w Abstract ![]() ![]() |
67 |
13
|
Secure Cloud Storage using AccessControl with Anonymous Authentication
- Sreepathi.B, Santhamma, Ajanna Nadiu, Archana.L, Chinta Praveena Lakshmi, Preethi J Abstract ![]() ![]() |
73 |
14
|
Social Media Ways Trade Market of Opinions Transaction Twitter Analysis (Time)
- S.Nafeesa Begam Abstract ![]() ![]() |
78 |
15
|
JPEG Image Compression Using Various Algorithms: A Review
- Yashodha Devi Abstract ![]() ![]() |
89 |
16
|
A Review Study of Apache Spark in Big Data Processing
- V Srinivas Jonnalagadda, P Srikanth, Krishnamachari Thumati, Sri Hari Nallamala Abstract ![]() ![]() |
93 |
17
|
Dynamic Spectrum Sensing Scheduling in Cognitive Radio Networks - Effective Utility
- S.Tamilarasan, Dr.P.Kumar Abstract ![]() ![]() |
99 |
18
|
Implementation of Threshold Entropy Filter for Segmentation of Different Textures Using MATLAB
- Harjot, Rupinder Kaur Wahla Abstract ![]() ![]() |
103 |
19
|
Optimization of Link Cache in DSR over MANETs
- Mahantesh.H.M, Shivakeshi.C, Naveen Kumar.B, Pampapathi.B.M Abstract ![]() ![]() |
106 |
20
|
Detecting Selfish Nodes on Overlay Network and Optimizing the Network by Isolating Malicious Nodes using Reputation-Based Mechanism
- Naveen Kumar.B, Pampapathi.B.M, Mahantesh.H.M, Shivakeshi.C Abstract ![]() ![]() |
112 |
21
|
An Optimized method for Generating All Positive and Negative Association Rules
- Shivakeshi.C , Mahantesh.H.M, Naveen Kumar.B, Pampapathi.B.M Abstract ![]() ![]() |
117 |
22
|
An Approach for Content Based Image Retrieval Using Similarity Measures
- Ritu A. Mundada, Akash D. Waghmare Abstract ![]() ![]() |
124 |
23
|
Lung Cancer Diagnosis Based on Microarray Data by Using ART2 Network
- Fadoua Rafii, Badr Dine Rossi Hassani, M’hamed Aït Kbir Abstract ![]() ![]() |
129 |
24
|
Study for Accuracy Assessment of land use and land cover classification of New- Delhi, North India
- Pallavi Nain, Krishan kumar Abstract ![]() ![]() |
137 |
25
|
A Comprehensive Study of Recent Advancements in Methods and Tools for Network Anomaly Detection
-Koustubha Balakrishnan M, Dr. Vilas Maruthi Godki, Kuruvikulam Chandrasekaran Abstract ![]() ![]() |
144 |
26
|
De-Noising of Historical Document Images Using Ni-Black Thresholding
- Geetika Gupta, Rupinder Kaur, Arun Bansal Abstract ![]() ![]() |
157 |
27
|
Import Sourcing of Defect Life Cycle and Defect Management Process
- Dr V.Goutham Abstract ![]() ![]() |
163 |
28
|
Sentiment Analysis of Arabic Tweets: With Special Reference Restaurant Tweets
- Mnahel Ahmed Ibrahim , Naomie Salim Abstract ![]() ![]() |
173 |
29
|
An Unobservable Secure On-Demand Routing Protocol for Mobile Ad-Hoc Networks
- Nagaraj.M, Shivaraja.P, Sampath Kumar.R, Puneeth.G.J. Abstract ![]() ![]() |
180 |
30
|
Cloud Computing – A Classification, Business Models, and Research Directions
- Shalini Singh, Ramanjeet Kaur, Mandeep Hans, Arwinder Kaur Abstract ![]() ![]() |
187 |
31
|
Cloud Computing : Security Concerns
- Jitendra Nath Shrivastava, Uvaish Khan Abstract ![]() ![]() |
194 |
32
|
The Performance Computing of Oracle Database on AWS Cloud Storage
- Arpitha M.S Abstract ![]() ![]() |
200 |
33
|
An Approach to find node Voltages, Branch Currents and Power Losses of a Single and Three Phase Distribution System
- Arindam Banerjee, Amarnath Sanyal, Dr. Sourish Sanyal, Raju Basak, Subhasree Chatterjee Abstract ![]() ![]() |
204 |
34
|
Automatic 2D to 3D Stereoscopic Conversion
- Pallavi R. Kapse Abstract ![]() ![]() |
210 |
35
|
Expressive, Efficient and Revocable Data Access Control for Multi-Authority Cloud Storage
- Chetan Bulla, Akshata R. Patil, Priyanka B. Guttedar and Reshma G. Giddenavar Abstract ![]() ![]() |
215 |
36
|
A Fast Track Pedagogy of Software Architecture
- Sharada K S, Nagaraj M Benakanahalli, Pavana B, Arunakumar J Abstract ![]() ![]() |
223 |
37
|
Selfish Node Detection in Mobile Ad-Hoc Networks through Audit Approach with Correlation Function
- M.Madhumathi, R.Ashok Kumar Abstract ![]() ![]() |
229 |
38
|
A Survey on Novel Graph Based Clustering and Visualization Using Data Mining Algorithm
- M.Guruprasath, M. Elamparithi Abstract ![]() ![]() |
234 |
39
|
An Enhanced Supervised Random Walk Algorithm for Link Prediction
- A.vihashini, Dr.G.T.Prabhavathi Abstract ![]() ![]() |
241 |
40
|
Survey On Image Classification Methods In Image Processing
- Chaitali Dhaware, Mrs. K. H. Wanjale Abstract ![]() ![]() |
246 |
41
|
An Efficient Path Completion Technique for Web Log Mining
- Shanta H Biradar Abstract ![]() ![]() |
249 |
42
|
An Green And Energy Efficient Anonymous Routing Protocol With Multiple Hops For Communications In Highly Dynamic Hetrogenious Networks
- Bandi Palguna kumar, Sateesh,Vikram Neerugatti Abstract ![]() ![]() |
256 |
43
|
An Enhanced Text Compression System Based on ASCII Values and Huffman Coding
- Mamta Rani, Vikram Singh Abstract ![]() ![]() |
262 |
44
|
Dynamic Resource Allocation in Cognitive Radio Networks - Survey
- Prof. G.Ezra Sastry, Prof. S.Tamilarasan, Dr.P.Kumar Abstract ![]() ![]() |
268 |
45
|
PCB
- Shruti Pardhi, Mrs. K. H. Wanjale Abstract ![]() ![]() |
275 |
46
|
Shunt Active Power Filter for Power Quality Improvement by Fuzzy Controller
- Mrs. M. Inba Arasi, S. Ranjitha Abstract ![]() ![]() |
281 |
47
|
Performance Analysis of AODV and MAODV Routing Protocols in MANET
- Aanchal Joshi Abstract ![]() ![]() |
292 |
48
|
A Noval Medical Image Analysis and Compression Using Hybrid Wavelet Transform
- Vishal Tamrakar, Mr. Chandrashekhar Kamargaonkar, Dr. Monisha Sharma Abstract ![]() ![]() |
299 |
49
|
Sustainable Urban Transport System: A Case Study of Manpada Road
- Ms. Naikwadi Sumaiyya , Prof. Khare Pranay R, Prof. Darade Milind M Abstract ![]() ![]() |
304 |
50
|
One Hop and Fingerprint Techniques for Peer To Peer Multimedia Distribution
- Sajna.N.S, Annie R Das Abstract ![]() ![]() |
309 |
51
|
A 3-6 Ghz Current Reuse Noise Cancelling Low Noise Amplifier For WLAN And WPAN Application
- Shivabhakt Mhalasakant Hanamant, Dr.S.D.Shirbahadurakar Abstract ![]() ![]() |
315 |
52
|
ZigBee Security for Home Automation: A Comparison of Different Approaches
- Jisna V A, Sobha Xavier,Ninu Francis Abstract ![]() ![]() |
320 |
53
|
A Review: Restoring the Images and remove Blurry Effects from Scanned Document Images Using various MATLAB Algorithm
- Navdeep Kaur, Er.Divya Garg Abstract ![]() ![]() |
324 |
54
|
Speech Therapy Models For Disabled Children Using Data Mining Techniques- A Review
- Usha.M, Dr.L.Sankari Abstract ![]() ![]() |
328 |
55
|
Optimal Placement and Sizing of Solar Constructed Dg Using SSO Technique
- Vijay R, Antrut Jaffrin R, Ravichandran CS Abstract ![]() ![]() |
333 |
56
|
Technology and Autism: Is Technology a Boon for Autistic Children?
- Renju K, Megha C Abstract ![]() ![]() |
343 |
57
|
Web Image Re-Ranking Using Query Semantic Signature and Duplicate Detection
- Mr. Wavhal Rameshwar Ganpat, Prof. B.S.Chunchure Abstract ![]() ![]() |
347 |
58
|
Ranking of Products on the Basis of Aspects- A Probabilistic Approach
- Neha M. Toshniwal, Prof.D.V.Gore Abstract ![]() ![]() |
350 |
59
|
Paper Has Been Removed |
354 |
60
|
Issues In Development of Routing Techniques In Wireless Sensor Networks
- Harpreet Singh, Amarveer Singh Abstract ![]() ![]() |
361 |
61
|
Sentiment Analysis on Twitter Data Using Support Vector Machine
- Bholane Savita D., Prof.Deipali Gore Abstract ![]() ![]() |
365 |
62
|
Distributed Transaction System Application for Web Services Using Design Pattern
- Sushma D. Bobade Abstract ![]() ![]() |
371 |
63
|
Single or Multi-document Summarization Techniques
- Maithili Bhide Abstract ![]() ![]() |
375 |
64
|
Self-Organizing Trust Model
- Suyog Ashokrao Nagare, Prof. D.B. Kshirsagar Abstract ![]() ![]() |
380 |
65
|
Discovery of Ranking Frauds for Mobile Apps Using FRAppE Tool
- Dr.L.Pavithira Abstract ![]() ![]() |
384 |
66
|
BASIC PATTERN GENERATION FOR KALPANA SWARA SYNTHESIS USING GRAPHICAL APPROACH
- Mahesha Padyana, Bindu A Thomas Abstract ![]() ![]() |
384 |
67
|
Image Restoration using combined Adaptive Weiner Filter and Radial Basis Function ANN with Sub-block Decomposition for Medical Applications
- Arifa Sultana Abstract ![]() ![]() |
389 |