IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 4 Issue 5 / Sep-Oct 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
Experimental Study of Minutiae Based Matching Algorithm for Fingerprint Recognition System
- Sally .H. Ismail, Mohamed .E. Wahed, Mohamed .A.Ahmed Abstract PDF Cite/Export |
1 |
2
|
A Study- To Combined Cryptography And Steganography Methods
- Kavita Rawat, Mr. Shambhu Sha Abstract PDF Cite/Export |
7 |
3
|
WAT Calculation in EDTM
- Anu Thomas Abstract PDF Cite/Export |
10 |
4
|
Performance Evaluation of Meta-heuristic based Load Balancing in Cloud Computing
- Pooja Mangla, Sandip Kr. Goyal Abstract PDF Cite/Export |
22 |
5
|
Effectively Error Detection on Cloud by using Time Efficient Technique
- Vishakha Dattatraya Bajad Abstract PDF Cite/Export |
28 |
6
|
Accessing Information Of Emergency Medical Services Through Internet Of Things
- Prof. Amruta Gadekar, Ambalkar Pooja, Mayuri Manjare, Reema Malvi Abstract PDF Cite/Export |
31 |
7
|
A Comparative Study of Fixed Length Time-Sliced Round Robin Scheduling and Priority Based Variable Length Time Sliced Round Robin Scheduling Algorithms
- Suchishree Sengupta Abstract PDF Cite/Export |
34 |
8
|
Investigating the Impact of Simulation Time on Convergence Activity & Duration of EIGRP, OSPF Routing Protocols under Link Failure and Link Recovery in WAN using OPNET Modeler
- Dumala Anveshini, S.Pallam Shetty Abstract PDF Cite/Export |
38 |
9
|
Investigating the Impact of Maintenance Hold off Time on the performance of DSR in MANETs
- Molli Srinivasa Rao, Dr. S. Pallam Shetty Abstract PDF Cite/Export |
43 |
10
|
Investigating the impact of the Hello Interval Time on the Performance of the OSPF in MANETs
- A.V.N.Chandra Sekhar , Dr.S.Pallam Shetty, Dr. D.Lalitha Bhaskari Abstract PDF Cite/Export |
48 |
11
|
Situation of Internet Filtration in India
- Nand Kumar Singh, Ajay Kumar Yadav, Brajkishor Pathak, Jaishree Bajaj Abstract PDF Cite/Export |
53 |
12
|
Performance analysis of mail clients with RSA and Digital signature using SNORT
- Mr. K Sreerama Murthy, Dr. S P.Setty, Dr. G. Samuel Vara Pasad Raju Abstract PDF Cite/Export |
56 |
13
|
Impact of Beacon Period on the QoS metrics of Temporally Ordered Routing Algorithm in Mobile Adhoc Networks
- C.R.Raman, Dr.S.Pallam Shetty Abstract PDF Cite/Export |
66 |
14
|
Reliable Dynamic Data Integration approach for SAAS application with their on-premises systems
- K. Abdur Rahman Khan, Dr. P. Suryanarayana Babu Abstract PDF Cite/Export |
71 |
15
|
Models and Characteristics in Agile processes
- Parul, Jabir Singh Abstract PDF Cite/Export |
74 |
16
|
Enhanced Secure and Authentication Protocol for WSN for Urban Transportation
- M.Vasantha, V. Hanuman Kumar Abstract PDF Cite/Export |
77 |
17
|
Efficient Scheme for Profit Maximization and QoS to Clients in Cloud
- A. Naga Prathyusha, Dr.V.C. Bharathi Abstract PDF Cite/Export |
81 |
18
|
A Lost And Found Is a Platform Where People Can Go To Retrieve Lost Peoples That May Have Been Found By Others
- Prof. Yogesh Pawar,Mangesh Gore, Nehal Athani, Prashant Sengar,Shankar Ingole Abstract PDF Cite/Export |
85 |
19
|
Image Restoration and De-Blurring Using Various Algorithms
- Navdeep Kaur, Er.Divya Garg Abstract PDF Cite/Export |
88 |
20
|
Smart Attendance Management System
- Aman Jobanputra, Shubham Jain, Kruttika Choithani Abstract PDF Cite/Export |
97 |
21
|
Data Compression on Enhanced Z-SEP for Effective Energy Utilization Technique
- Pankaj Sharma, Sukhbeer Singh Abstract PDF Cite/Export |
101 |
22
|
Effective Task Assignment on Multi-Skill Worker Using Crowdsourcing
- Narawade Swati,Thube Meenakshi,Gaikwad Pratima Abstract PDF Cite/Export |
106 |
23
|
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
- Prof. Amol Jadhao, Kunal Anand, Shashank Dhar, Sagar Mukharia Abstract PDF Cite/Export |
110 |
24
|
A Survey On Content Based Information Retrieval Using Privacy Preserving Framework
- Prof. Priti Mithari, Komal Satam, Sayali Satpute, Pranita Umarjikar Abstract PDF Cite/Export |
114 |
25
|
A Robust Approach for Image Compression Using PCA and DCT Algorithms
- Yashodha Devi, Er. Priyanka Mehta Abstract PDF Cite/Export |
117 |
26
|
Educational Clouds – The Future Computing Model for Indian Higher Educational Institutions
- G.Sobers Smiles David, Dr.R.Anbuselvi Abstract PDF Cite/Export |
122 |
27
|
Secure User Authentication and Graphical Password using Cued Click-Points
- Prof .Rupali Nirgude,Kadam Sandip,Kadam Rohit,Chaudhari Bhushan Abstract PDF Cite/Export |
129 |
28
|
Spatial Data System: Architecture and Applications
- Thirunavukkarasu K, Dr. Manoj Wadhwa Abstract PDF Cite/Export |
133 |
29
|
A Review: An effective approach for Lung cancer detection using Various Algorithm
- Swati Thakur , Monika Sharma Abstract PDF Cite/Export |
140 |
30
|
Specialized Topic Model to Enhance Automated Bug Triaging
- Vishal Jare,Amar Deep, Akshay Borade Abstract PDF Cite/Export |
143 |
31
|
A Model for Employing Semantic Role Labeling To Extract Predicate Argument Structure
- Hadia Abbas Mohammed Elsied , Naomie Salim, Atif Khan Abstract PDF Cite/Export |
147 |
32
|
Exploring Traditional Approaches for Solving 0-1 Knapsack Problem
- Stephen Opoku Oppong, Evans Baidoo Abstract PDF Cite/Export |
151 |
33
|
An Optimized Approach for Attack Detection and Prevention in Wireless Sensor Networks
- Vishal Kumar, Shaveta Jain Abstract PDF Cite/Export |
157 |
34
|
Biometric Based User Authentication in WSN Using ABC Optimization
- D.Thamaraiselvi, Dr.M.Ramakrishnan Abstract PDF Cite/Export |
165 |
35
|
Sentiment Analysis by Data mining of Past Movie Reviews/Ratings
- Neelu Rani , Nishant Singh, Ram kale, Prof. Sujay Pawar Abstract PDF Cite/Export |
170 |
36
|
Bilinear Hashing With Conditional Attributes For Secured Data Storage In Cloud
- M.Buvaneswari, Dr.N.Rajendran Abstract PDF Cite/Export |
173 |
37
|
Optimized Implementation of Large Data on Grid Environment using Multiple Ant Colony Algorithm
- Ashraf Siddiqui, Kiran Bhandari, Veena Kulkarni Abstract PDF Cite/Export |
183 |
38
|
Automation of Secure Cloud Transactions Process Life Cycle
- Subhash Konduru Abstract PDF Cite/Export |
188 |
39
|
A Learning Approach of Pregnancy Hurdles Using Clustering
- Kavitha. D, Balasubramanian. T Abstract PDF Cite/Export |
202 |
39
|
A Learning Approach of Pregnancy Hurdles Using Clustering
- Kavitha. D, Balasubramanian. T Abstract PDF Cite/Export |
202 |
40
|
Design and Implementation of ANFIS to enhance the performance of Secure LAR Routing Protocol in MANETs
- Y.V.S. Sai Pragathi, S.Pallam Shetty Abstract PDF Cite/Export |
205 |
41
|
Enhanced iMODLEACH for Maximum Energy Utilization in WSN
- Gurpreet Kaur, Anshu Chopra, Sukhbeer Singh Abstract PDF Cite/Export |
209 |
42
|
An Enhanced Genetic Algorithm based Intrusion Detection System for detection of Denial –of-Service Attacks
- B.Koustubha Madhavi, V.Mohan, Dr. Vilas M Ghodki Abstract PDF Cite/Export |
214 |
43
|
Increasing the Quality of Security of Mobile Ad-Hoc Networks
- Sharmila Chopade,Mohini Mohite, Bhagyashri Narwade, Mahadevi Barche Abstract PDF Cite/Export |
220 |
44
|
Probabilistic Deterministic Classifier Based Sequential Pattern Mining to Evaluate Structural Pattern on Chemical Bonding
- S.Sathya, N.Rajendran Abstract PDF Cite/Export |
223 |
45
|
Comparative Study on MS-MAC and LMS-MAC with Pros and Cons
- Ms.D.JothiKanna, Mrs.G.Sophia Reena Abstract PDF Cite/Export |
232 |
46
|
Adaptive Privacy Policy Inference for Image Sharing
- P Ravi Kumar, V Syama Sudha, M Murali Abstract PDF Cite/Export |
237 |
47
|
iOVFDT for Concept-drift Problem in Big Data
- Rajeswari P. V. N, Radhika P Abstract PDF Cite/Export |
242 |
48
|
Analysing The Cloud Services From Perspective of Elasticity
- B.Susrutha , I.Shalini Abstract PDF Cite/Export |
250 |
49
|
Building a Low Cost Energy Efficient Private Cloud
- P. Jayanthi, E. Prakash Babu, V. Janardhan Babu Abstract PDF Cite/Export |
256 |
50
|
Error Detection and Cleaning for Big Data Sets from Sensor Network Systems on Cloud
- A. Ravi Kumar, Dr. M. Ashok, Dr. R. Praveen Sam Abstract PDF Cite/Export |
261 |
51
|
Distributed Data Analysis for Large-Scale Social Networks
- Shaik Allabagash, C Bhanuprakash Abstract PDF Cite/Export |
266 |
52
|
Treatment Prediction via Sparse Deep Learning
- M. Manoj Kumar, CH. Sivasankar, Maddineni Nandini chowdary Abstract PDF Cite/Export |
271 |
53
|
Different Scheduling Algorithms in Types of Clouds
- Padmaja. K, Dr. R Seshadri, P. Anusha Abstract PDF Cite/Export |
276 |
54
|
Depending against Web server Compromise Attacks through DWA-IV
- Puligoru Mrudula, Prathap Sathyavedu Abstract PDF Cite/Export |
281 |
55
|
Scalable and Synchronized City-Scale Taxi Sharing
- Swapna. Ch, Jahnavi. Y and Subba Rao. G Abstract PDF Cite/Export |
286 |
56
|
Modified Fuzzy C Means Clustering To Study The Willingness Maximization Using Mean Weighted Artificial Bee Colony Algorithm (Mwabc) For Social Activity Planning
- Alagulaskhmisubha.A, Mohanapriya.C Abstract PDF Cite/Export |
293 |
57
|
Combination of Biometric Information into Video Watermarking
- Hai Truong, Thanh Tung Nguyen Abstract PDF Cite/Export |
304 |
58
|
Fractal Image Compression with Advanced Particle Swarm Optimization and Sorting
- S.keerthika, S.Vidhya Abstract PDF Cite/Export |
309 |
59
|
Efficient Load Balancing and Extending Lifetime Using Neighbor Coverage Based Self-Organizing Tree-Based Protocol
- A.Kalyani Sundari , G. Aravind Swaminathan, V. Perathu Selvi Abstract PDF Cite/Export |
313 |
60
|
Optimized SIERPEINSIKI Fractal Antenna with Enhanced Performance Parameters
- Roopa.R, Dr.Y.S.Kumarswamy Abstract PDF Cite/Export |
318 |
61
|
Generalisation of Event Turfs Decipherable Through HNA Process
- K.Rekha, Dr.K.Thirugnanasambandam Abstract PDF Cite/Export |
324 |