IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 5 Issue 1 / Jan - Feb 2017
S.No
|
Title/Author Name
|
Page No
|
1
|
Modular Representation of Thaala in Indian Classical System
- Mr. Mahesha Padyana, Dr. Bindu A Thomas Abstract PDF Cite/Export |
1 |
2
|
Scheming a Robust Diagnostic Signature for Cutaneous Melanoma with New Hybrid Classifier in Multimodal Data
- V.Poonkodi, Dr. R.Hemalatha Abstract PDF Cite/Export |
7 |
3
|
Target Class Guided Compression in Feature Subspace
- H.N.Meenakshi, P.Nagabushan Abstract PDF Cite/Export |
17 |
4
|
Review on Channel Allocation in Cognitive Radio Network using Priority Scheduling
- S.Tamilarasasan, Bharath Raj D, K. Balakrishnan, Avinash N Abstract PDF Cite/Export |
29 |
5
|
Gesture Based Musical Metronome Implementation Strategy
- Mr. Mahesha Padyana, Dr. Bindu A Thomas Abstract PDF Cite/Export |
33 |
6
|
E-Government in Sudan: Challenges and Future Prospects
- Dr. Mozamel M. Saeed Abstract PDF Cite/Export |
38 |
7
|
An Optimized Approach for Attack Detection and Prevention in Wireless Sensor Networks
- Vishal Kumar, Shaveta Jain Abstract PDF Cite/Export |
43 |
8
|
Role of Data Fusion in Intelligent Transportation System: A Survey
- Ekta Maini, Silpa Ajith Kumar, Suhas. R Abstract PDF Cite/Export |
49 |
9
|
Agile Project Estimation: An Imperative Approach for Small Software Industries
- Dr. Vikrant V. Shaga, Laxmikant K.Shinde Abstract PDF Cite/Export |
54 |
10
|
A Study on Data Compression Using Huffman Coding Algorithms
- D.Jasmine Shoba, D.Jasmine Shoba Abstract PDF Cite/Export |
58 |
11
|
Women Empowerment and Microfinance
-Bincy Bose Abstract PDF Cite/Export |
64 |
12
|
3-D Discrete Shearlet Transform Based MRI, CT and PET Image Fusion: a Review
- Ms. Trupti B. Pawal, Mr. S. N. Patil Abstract PDF Cite/Export |
70 |
13
|
Network Anomaly Detection Through Hybrid Algorithm
- Vasudha Sharma, Vivek Suryawanshi Abstract PDF Cite/Export |
74 |
14
|
Classification of cancer dataset in data mining Algorithms Using R Tool
- P.Dhivyapriya, Dr.S.Sivakumar Abstract PDF Cite/Export |
79 |
15
|
Big Data- fitting in the shoes of Internet of Things
- Ravi Gorli Abstract PDF Cite/Export |
84 |
16
|
Key Architectural Models, Security Issues and Solutions on Cloud Computing
- Andemariam Mebrahtu, Balu Srinivasulu Abstract PDF Cite/Export |
88 |
17
|
Feature Extraction Based Hybrid Method for Segmentation of Brain Tumor in MRI Brain Images
- P.Kalavathi, R.Ilakkiyamuthu Abstract PDF Cite/Export |
95 |
18
|
LTE Advanced Techniques and Its Applications: A Literature Review
- Ratnesh Patel, Dr. Agya Mishra Abstract PDF Cite/Export |
101 |
19
|
A Survey Paper on Lossless and Reversible data hiding in Encrypted Images
- Veena S. Nair, Dhanya K. Sudhish Abstract PDF Cite/Export |
107 |
20
|
Evaluate and Propose a Novel Technique to Check Genuineness of the Currency Using Image Processing
- Sunetra Chandel, Mahendra Tyagi Abstract PDF Cite/Export |
111 |
21
|
Removal of Salt and Pepper noise from Gray-scale and Color Images: An Adaptive Approach
- Sujaya Kumar Sathua, Arabinda Dash, Aishwaryarani Behera Abstract PDF Cite/Export |
117 |