IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 4 Issue 4 / July-Aug 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
Automatic Speech Segmentation for Amharic Phonemes Using Hidden Markov Model Toolkit (HTK)
- Eshete Derb Emiru, Walelign Tewabe Sewunetie Abstract PDF Cite/Export |
1 |
2
|
Real-Time Speech Synthesis by Handling Amharic Gemination Words Using Statistical Technique
- Walelign Tewabe Sewunetie, Eshete Derb Emiru Abstract PDF Cite/Export |
8 |
3
|
Automated Cooking Machine Using Programmable Logic Controller (PLC)
- Reema Patel,A.N.Shewale,C.S.Patil Abstract PDF Cite/Export |
16 |
4
|
Investigation of Fiber Non Linearity for Different Modulation Schemes in DWDM Networks
- S. Rajalakshmi, Azaruddin Shaik, Bangaru B.N.V. Chalam Abstract PDF Cite/Export |
19 |
5
|
Content Based Image Retrieval Using SVM
- Priyanka Sharma Abstract PDF Cite/Export |
27 |
6
|
A Novel Video De-Noising Algorithm for Removing High Density Impulse Noise
- Preeti Shukla, Mr. Jageshwer Shriwas Abstract PDF Cite/Export |
31 |
7
|
Handling Redundancy from the Image Using Filtering and Buffer Allocation Method
- Prabhdeep Kaur, Rupinder Pal Singh Abstract PDF Cite/Export |
38 |
8
|
Compression of Encrypted Gray-Scale Images using Discrete Cosine Transform and Huffman Encoding
- Asawari Kulkarni, Prof. A. A. Junnarkar Abstract PDF Cite/Export |
43 |
9
|
Designing a Distributed Framework to Detect a Selfish Node in MANET by using a Collaborative Approach
- Er. Jagmeet Kaur, Mr. Prabhjit Singh Abstract PDF Cite/Export |
49 |
10
|
A Mechanism to Detect the Provenance Forgery and Packet Drop Attack in Wireless Sensor Networks
- Er. Amandeep Kaur, Dr. Sandeep Singh Kang Abstract PDF Cite/Export |
59 |
11
|
Adaptive Process For Bagging Based Ensembles
- Rajni David Bagul, Prof. Dr. B. D. Phulpagar Abstract PDF Cite/Export |
68 |
12
|
Multiuser Multi-Keyword Ranked Search over Encrypted Cloud Using MHR and KP-ABE
- Sonam.K.Darda, Prof.(Mrs).Manasi.K.Kulkarni Abstract PDF Cite/Export |
74 |
13
|
Web-Page Recommendation Using An Enhanced Incremental Sequence Mining Algorithm Along With Ontology
- Gauri Sonawane, Prof. Dr. Mrs. S. A. Itkar Abstract PDF Cite/Export |
80 |
14
|
Face Recognition by Using Multi-Probe LSH Indexing
- Ms. Tanuja Kiran Rajput, Prof. Dr. B. D. Phulpagar Abstract PDF Cite/Export |
85 |
15
|
Cosine Similarity in Clustering With Collaborative Filtering For Service Recommendation
- Reshma M Batule, Prof. Dr. S. A. Itkar Abstract PDF Cite/Export |
89 |
16
|
Matching And Grading Of Different Varieties Of Rice Grains Through Digital Image Processing
- Rajlakshmi Ghatkamble Abstract PDF Cite/Export |
95 |
17
|
Detection of Dishonest Friends in OSN by Efficient and Trustworthy Method
- Madhura Khandare, Prof. B. D. Phulpagar Abstract PDF Cite/Export |
100 |
18
|
An Analysis of Various Anti-Virus Software Tools Based On Different Effective Parameters
- K. Durga Devi, Dr. K. Mohan Kumar Abstract PDF Cite/Export |
104 |
19
|
A Study on Male Contraceptive Plants Using Plants Database
- S. Saranya, Dr. K. Mohan Kumar, Dr. P. Murugaian Abstract PDF Cite/Export |
111 |
20
|
Unwanted Message Filtration from User's Wall Using Naive Bayes
- Punam K.Mohare, Prof. (Dr). S A Itkar Abstract PDF Cite/Export |
122 |
21
|
Redundancy Management of Multipath Routing In Heterogeneous WSN
- Manisha Dangi, Prof. R.K.Krishna Abstract PDF Cite/Export |
126 |
22
|
Serotyping Of Campylobacter Jejuni Strains Isolated From Hospitalized Patients
- Elena Trajkovska-Dokic, Snezana Stojkovska, Milena Petrovska, Nikola Panovski Abstract PDF Cite/Export |
129 |
23
|
Hadoop Mapreduce Based Distributed Phylogenetic Analysis
- Lavanya K, V Nagaveni Abstract PDF Cite/Export |
133 |
24
|
A Study on Energy Efficient Multicast Approach for Grid Based WSN
- Manjunath C R, Nagaraj G S, Srikanth S Abstract PDF Cite/Export |
138 |
25
|
A Study On Multi-Sink Data Aggregation in Wireless Sensor Network
- Manjunath C R, Nagaraj G S, Abhishek G Abstract PDF Cite/Export |
143 |
26
|
A Study Paper on Storage Area Network Problem-Solving Issues
- Priyanka Malviya Abstract PDF Cite/Export |
151 |
27
|
Study On-Comparison between IP SAN and FC SAN
- Komal A. Dhabale Abstract PDF Cite/Export |
157 |
28
|
Comparative Study On Apriori Algorithm And Fp Growth Algorithm With Pros And Cons
- Mrs. M.Kavitha, Ms.S.T.Tamil Selvi Abstract PDF Cite/Export |
161 |
29
|
An Effective Technique for PSO Based Clustering and Polynomial Regression in Wireless Sensor Network
- M.Arthi,M.Jayashree Abstract PDF Cite/Export |
165 |
30
|
A Review on GOOGLE File System
- Richa Pandey, S.P Sah Abstract PDF Cite/Export |
177 |
31
|
Creative Image Covert Sharing Method with Autostereogram for Image Security
- N.Suganya, Dr.K.Mahesh Abstract PDF Cite/Export |
181 |
32
|
Modified Fuzzy C Means Clustering To Study the Willingness Maximization Using Discrete Multi-Valued Particle Swarm Optimization (DPSO) For Social Activity Planning
- Alagulaskhmisubha.A, Mohanapriya.C Abstract PDF Cite/Export |
186 |
33
|
A Medical Image Fusion with YbCr Colour Transformation
- Pallavi P.Chinchole,Prof. Prabhakar N. Kota Abstract PDF Cite/Export |
194 |
34
|
Challenges and Prospects of using Object Oriented Programming in Solving Linear Programming Problems
- F. U. Onu, C.L. Nwagbo, R.E. Obiadazie Abstract PDF Cite/Export |
200 |
35
|
Security and Privacy Preserving with Service Consuming in Vehicular Cloud
- Greeshma S Chirayil, Ashly Thomas Abstract PDF Cite/Export |
209 |
36
|
Interference between LTE and GPs measuring with Power Spectral Density
- Ravirajsinh S Vaghela, Dr. Atul Gonsai, Vishal sojitra Abstract PDF Cite/Export |
216 |
37
|
A Survey on Web Server Load Balancing Using SSL Back-End Forwarding Method
- G.Srilakshmi, Dr.K.Kungumaraj Abstract PDF Cite/Export |
220 |
38
|
A Survey on a Content Based Dynamic Load Balancing Algorithm for Heterogeneous Web Server Cluster
- S.Tamilarasi, Dr. K.Kungumaraj Abstract PDF Cite/Export |
232 |
39
|
Obstacle Avoidance and Restoration with Energy Efficiency in Mobile Robotic Sensors
- Sherin Ann Sebi, Divya Sunny Abstract PDF Cite/Export |
246 |
40
|
Anonymous Two-Factor Authentication in Distributed Systems
- Ashwani Vijayachandran, Kiran G Kumar Abstract PDF Cite/Export |
252 |
41
|
Technology for the Convenience of Persons with Disabilities
- Harsimrat Deo Abstract PDF Cite/Export |
256 |
42
|
LI-FI Based Data Storage Device
- Mohammed Zafar Faraz, Aditya Ambasth Abstract PDF Cite/Export |
261 |
43
|
Snort Using Parallel Architecture for Intrusion Detection in Busy Network
- Aiswarya Mohan K, Jyothi B Abstract PDF Cite/Export |
266 |
44
|
ROI Based Hybrid Compression Techniques for Transferring MRI Brain Images
- T. Kalaiselvi, S. Boopathiraja, P. Sriramakrishnan Abstract PDF Cite/Export |
270 |
45
|
Digital Image Processing Filtering with LABVIEW
- Liqaa S. Mezher Abstract PDF Cite/Export |
278 |
46
|
A Literature Survey for Test Case Generation Using UML Model
- Md Khalid Hussain, Dr. Krishna Nandan Prasad Abstract PDF Cite/Export |
283 |
47
|
Shadow Detection and Removal Using Lab Colors, Morphological Operations and Chromaticity
- Nimarta Abstract PDF Cite/Export |
289 |
48
|
A Survey on Automatically Annotating Learning Objects with Competence Leveling
- Mrs. K. Deepika, Dr. N Sathyanarayana Abstract PDF Cite/Export |
296 |
49
|
Secure Authentication for Vehicular Ad Hoc Network
- Rinsu Aravind, Deepa P L Abstract PDF Cite/Export |
307 |
50
|
Securing ASP.NET Querystring Data Transmission In Web Application Using Hybrid Encryption Technique
- Vilas T Mahajan, Rajendra B Patil Abstract PDF Cite/Export |
314 |
51
|
Securing ASP.NET Query String Data Transmission in Web Application Using Hybrid Encryption Technique
- Jasleen kaur, Navpreet Kaur Walia Abstract PDF Cite/Export |
319 |
52
|
SQL Injection Attack Prevention Using 448 Blowfish Encryption Standard
- K.Rajeswari, C.Amsaveni Abstract PDF Cite/Export |
325 |
52
|
SQL Injection Attack Prevention Using 448 Blowfish Encryption Standard
- K.Rajeswari, C.Amsaveni Abstract PDF Cite/Export |
325 |
53
|
Fully Homomorphic Encryption Based Outsourcing in the Cloud
- P.L.Jebin, L.Nirmal Jega Selvi Abstract PDF Cite/Export |
336 |
54
|
Aspect Oriented Sentiment Analysis Model of Arabic Tweets
- Mnahel A Ibrahim, Naomie Salim Abstract PDF Cite/Export |
342 |
55
|
Infected Part Detection and Segmentation of Fruits Using Marker Controlled Watershed Algorithm
- Simran Bhagat Abstract PDF Cite/Export |
354 |
56
|
Semantic Web Repository Maintenance on Hadoop
- Dr. K. Sridevi Abstract PDF Cite/Export |
358 |
57
|
Simulative Analysis of Various Faults for Protection of Induction Motor using SCADA
- Neetika, Parminder Kaur, Hardeep Singh Abstract PDF Cite/Export |
363 |
58
|
Implementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise
- Simarjeet Kaur, Rupinder Kaur Abstract PDF Cite/Export |
370 |
59
|
MASDKM: Mobile Agent Based Secure and Dynamic Key Management Scheme for Wireless Sensor Networks
- Ramu Kuchipudi, Dr. Ahmed Abdul Moiz Qyser, Dr. V V S S S Balaram Abstract PDF Cite/Export |
375 |
60
|
ClickCheck: A Novel Framework for the Detection of ClickJacking Attacks on Html5 Webpages
- Anoop MV, Arun P Kuttappan Abstract PDF Cite/Export |
382 |