IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science aprTrends and Technology
IJCST-Volume 5 Issue 2 / Mar-Apr 2017
S.No
|
Title/Author Name
|
Page No
|
1
|
Fabrication Attack Effect on Medical Applications based on VANETs
- Aleen Sliman, Karam Madi, Aws Khadour, Boushra Maala, Ahmad S. Ahmad Abstract ![]() ![]() |
1 |
2
|
Information Extraction System for Amharic Text
- Sinatyehu Hirpassa Abstract ![]() ![]() |
5 |
3
|
Synthesizing High-Frequency Rules from Various Data Sources Using Weighting Method (Determining Service Quality in Hospitals)
- Mr.A.Arulmurugan, A. Ajitha, R. Gracy Abstract ![]() ![]() |
16 |
4
|
Hydrological Information System using Archydro Data Model
- Mr. Pritam R. Patil, Dr.S.B.Thorat, Dr.S.R.Pande Abstract ![]() ![]() |
20 |
5
|
Rank Using User Clicks & Location Based Image Retrieval
- Ms.T. Suganya, S. Vivek Abstract ![]() ![]() |
25 |
6
|
Self-Care Application Using Android Google Maps and Geofence
- B.Karthikeyan, R.Charan, L.Ganapathy, J.GobuViknesh, P.Afsal Abstract ![]() ![]() |
28 |
7
|
A Review :A Digital Image Steganography
- Mrs.M.A.Wakure, Mrs.S.A.Wakure Abstract ![]() ![]() |
33 |
8
|
Multi Heart Disease Classification in ECG Signal Using Neural Network
- Theynisha .R, Shree Soundharya .R , Umarani .S , AnithaNithya.R Abstract ![]() ![]() |
38 |
9
|
High Security Routing On Three-Hop
- Sreekesh TU, Sreelakshmi k sunil Abstract ![]() ![]() |
45 |
10
|
An Efficient Dynamic Slot Allocation Based On Fairness Consideration for MAPREDUCE Clusters
- T.P.Simi Smirthiga, P.Sowmiya, C.Vimala, Mrs P.Anantha Prabha Abstract ![]() ![]() |
53 |
11
|
ERP System for college
- Vivek Anand, Adarsh Poojary, Rafiur Mondal, Pooja Prajapati, Subhash C.R. Pal Abstract ![]() ![]() |
59 |
12
|
Enhanced Project Task Planning With Runtime Scheduler
- Ms.B.Sruthi, Ms.S.Savitha, Ms.R.Sathya,Ms.K.R.Sarumathi Abstract ![]() ![]() |
63 |
13
|
Heart Disease Prediction Using Naïve Bayes Algorithm and Laplace Smoothing Technique
- Vincy Cherian, Bindu M.S Abstract ![]() ![]() |
68 |
14
|
A Review on Multi-Relay Wireless Data Transmission with Delay Aware Load Balancing
- Rohitha R, Sheena N Abstract ![]() ![]() |
74 |
15
|
A Survey Paper on News Web Video Event Mining
- Aggie Varghese, Smitha M. Jasmine Abstract ![]() ![]() |
78 |
16
|
Privacy Preserving Data Analysis in Mental Health Research Using Cloud Computation
- Dr. B. Anni Princy, G.Tamilselvi, S.Shruthakeerthi, B.Sowmya Abstract ![]() ![]() |
81 |
17
|
Critical Review on Edge Detection Techniques in Spatial Domain on Low Illumination Images
- Sunita Janoriya, Prof. M.P. Parsai Abstract ![]() ![]() |
86 |
18
|
Automated Guided Vehicle With ARDUINO Using Magnetic Sensor
- Prof. Ashraf Siddiqui, Vishwakarma Sarvajeet Ravindranath, Burte Pratik Vishnu, Vishwakarma Vishwaschandra Abstract ![]() ![]() |
91 |
19
|
Computer Aided Motif Designing: Development of Tool and Comparative Study
- Shalini Singh, Rajeev Singh Abstract ![]() ![]() |
94 |
20
|
Smart Computer In Vehicles
- R.Jayachandran, N.Rubika, M.Mathivanan, C.V.Vidya Prabha Abstract ![]() ![]() |
99 |
21
|
Integration of Solar Renewable Energy Source with Dynamic Wireless Power Transfer in Recharging IR Based Receivers
- M.Sumithra, G.Suriya, P. Susithra, R.Varthini, B.Subhavani Abstract ![]() ![]() |
104 |
22
|
FAST JPEG Encoding Using OpenMP
- M. M. Raghuwanshi, Malhar Ujawane, Sameer Bhute, Sankalp Saoji, Madhushree Warkhade, Shivani Kadpati Abstract ![]() ![]() |
107 |
23
|
Hybrid ACO-PSO Based Energy Efficient Clustering Protocol In WSN
- Atul Rana, Manju Bala,Varsha Abstract ![]() ![]() |
112 |
24
|
A Review of Automated MRI Image Processing Techniques Employing Segmentation & Classification
- Ruchi Kumari Garg, Aishwarya Kulshreshtha Abstract ![]() ![]() |
117 |
25
|
Semantic Similarity based Classification of Narratives
- S. Gopi, A. Berno Raj, M. Abinav, P.Gokul Sarathy, D.P. Bharath Abstract ![]() ![]() |
121 |
26
|
Certificate Revocation Mechanism in Mobile ADHOC Grid Architecture
- J.Beschi Raja, Dr.S.Chenthur Pandian, J.Pamina Abstract ![]() ![]() |
125 |
27
|
Seed Sowing Robot
- Abdulrahman, Mangesh Koli, Umesh Kori, Ahmadakbar Abstract ![]() ![]() |
131 |
28
|
Data Leakage Detection and Prevention System
- Chirag S. Patil , Swapnil S. Nalawade, Vikas D. Natekar, Prof. Neha Saxena Abstract ![]() ![]() |
144 |
29
|
Automated Billing Cart
- Muhib A. Lambay, Abhishek Shinde, Anupam Tiwari, Vicky Sharma Abstract ![]() ![]() |
148 |
30
|
Waste Management System Using Iot
- Mrs.D.Anuradha, A.Vanitha, S.Padma Priya,S.Maheshwari Abstract ![]() ![]() |
152 |
31
|
Blister Testing in MATLAB
- Prof. Neha Saxena, Bhosale Mangesh Vishnu, Salian Shivraj Suresh, Khandelwal Amit Abstract ![]() ![]() |
156 |
32
|
Stock Selection using Principal Component Analysis with Differential Evolution
- Dr. Balamurugan .A, Arul Selvi. S, Syedhussian .A , Nithin .A Abstract ![]() ![]() |
160 |
33
|
Go Mumbai
- NehaSaxena, Suhasini Maurya, Ankit Rai, Santosh Yadav, Jinesh Malavia Abstract ![]() ![]() |
165 |
34
|
Customized Travel Sequence Recommendation on Multi-Source Big Social Media
- Nuthula Saireddy, Anudeep Nallamothu Abstract ![]() ![]() |
169 |
35
|
Student Smart Card using VB.NET, SQL, Barcode
- Dvij Parekh, Siddhali Save, Virag Mhatre, Prof. Anshika gupta Abstract ![]() ![]() |
175 |
36
|
Customer Relationship Management based Customized System Development
- Prerana Shastri, Abhishek Gupta, Sufyan Shaikh, Omair Kolsawala, Prof.Waseem Sultan Abstract ![]() ![]() |
178 |
37
|
Behavior Based Spyware Identification
- Pooja Singhal, Dharna Abstract ![]() ![]() |
182 |
38
|
A Survey Paper on Visual Cryptography for Grey Scale Images
- Kirti Rawat, Vijay Kumar Joshi Abstract ![]() ![]() |
189 |
39
|
Detection of ICMP Flood DDoS Attack
- Harshita, Ruchikaa Nayyar Abstract ![]() ![]() |
199 |
40
|
Identification Of DDoS Attack On Web Servers
- Ruchikaa Nayyar, Harshita Abstract ![]() ![]() |
206 |
41
|
Analysis and Detection of Botnets and Encrypted Tunnels
- Dharna, Pooja Singhal Abstract ![]() ![]() |
211 |
42
|
A Study and Secure Clustered-Authority Access Control Strategy in Open Cloud Storage Systems
- Srikanth Maddineni, Arnab Pal Abstract ![]() ![]() |
218 |
43
|
Auditing and De-Duplication in Cloud Computing
- E Lokesh Kumar, Krishna Narayan P, P.Renuka Devi Abstract ![]() ![]() |
225 |
44
|
Edge Shield Static Median Filter for Removing Noise on Various Types of Images
- M.Chitradevi, S.Kavitha Abstract ![]() ![]() |
230 |
45
|
A Strategic Study on Scenario Based Design Method to Implement in Ubiquitous Systems
- Venkata Rao Barige, Dr. B.D.C.N.Prasad Abstract ![]() ![]() |
238 |
46
|
Privacy Preserving and Detection of Packet Dropping Attacks in MANETS
- Sonia Choudarygari,Penmatsa Naga, Venkata Divya Abstract ![]() ![]() |
243 |
47
|
Cloth pattern recognition for visually impaired people
- V. Varun Varma, S. Narasimha Reddy, S. Kanmani Abstract ![]() ![]() |
248 |
48
|
Data DEDUPLICATION Security with Dynamic Ownership Management
- MS.C.Kamatchi, R.Pooja, S.Serishma, R.Vanitha Abstract ![]() ![]() |
252 |
49
|
Remote Access Tool With Offline Messenger
- Prof. Anshika Gupta, Niraj Sunil Chaughule, Prasad Ganpat Haryan, Sheetalkumar Brajesh Dubey Abstract ![]() ![]() |
257 |
50
|
Smoothing of a Noisy Image Using Different Low Pass Filters
- Natasha R Shaikh Abstract ![]() ![]() |
260 |
51
|
People Safety APP - Belief
- Tabrez Chowkar, Ankit Shukla, Saif Shaikh, Vivek Anand Abstract ![]() ![]() |
265 |
52
|
Categorization of Drugs Using SVM Classification
- Asst.Prof.J.Omana, S.Dhanalakshmi, V.M.Divyalakshmi, S.Mahalakshmi Abstract ![]() ![]() |
269 |
53
|
An ERP Web Portal for Small and Mid-Sized Clinics
- Muhib A. Lambay, Dhaval C. Dedhia, Guruprasad D. Rao Abstract ![]() ![]() |
273 |
54
|
Performance Analysis and Comparison of Cluster Based Routing Protocol in WSN
- Akhila Joshi, Saurabh Mehta, Ajitkumar Khachane Abstract ![]() ![]() |
277 |
55
|
A survey on automatic vehicle number plate detection system
- Aruna Bajpai Abstract ![]() ![]() |
291 |
56
|
Secure Data with Key Managers by Using Shamir Scheme and AES Algorithm
- Prof.S. Athinarayanan, S.NivethaPriya , R.Supriya Abstract ![]() ![]() |
298 |
57
|
Data Integrity Checking Protocol with Dynamic Public Verifiability
- M.D.Boomija , P.V.Pooja, K. Preethi Abstract ![]() ![]() |
302 |
58
|
Alumni Interaction System
- Subashini.S, Sowndarya.A Abstract ![]() ![]() |
306 |
59
|
Data mining with Big Data in Health Informatics
- Akanksha, Vinod Mann Abstract ![]() ![]() |
310 |
60
|
A Review on Data Mining With Big Data
- Akanksha, Dr.Vinod Mann Abstract ![]() ![]() |
316 |
61
|
Significant Approaches to Computation on Encrypted Data
- Irene Getzi S Abstract ![]() ![]() |
321 |
61
|
Significant Approaches to Computation on Encrypted Data
- Irene Getzi S Abstract ![]() ![]() |
321 |
62
|
Detection of Lung Cancer Tumor in Its Early Stages Using Image Processing Techniques
- Vrushali Desale, Dongare Vijaykumar, Tushar Bakhale, Kadam Suraj, Dhalpe Somnath Abstract ![]() ![]() |
326 |
63
|
Genetic Algorithm Based Text Categorization Using K-NN Method
- Mr.R.AlaghuKarthiKeyan, Mrs.k .Brindha Abstract ![]() ![]() |
329 |
64
|
Augmented Reality Based Construction Module for Floor Capacity Estimation
- Netra S. Patil, Tanvir Panesar, Parth Shinde, Krati Saxena, Suraj U Rasal Abstract ![]() ![]() |
333 |
65
|
Direct Assessment Automator For Outcome Based System
- Utkarsh Jaiswal, Rishabh Pandey, Rishav Rana, D.M.Thakore, NaveenKumar JayaKumar Abstract ![]() ![]() |
337 |
66
|
Building A Database Driven Reverse Medical Dictionary
- Pragya Tripathi, Manjusha Deshmukh Abstract ![]() ![]() |
341 |
67
|
Weighted Hybrid Approach in Recommendation Method
- Mr.Avadhut D.Wagavkar, Prof. Mrs.S.S.Vairagar Abstract ![]() ![]() |
346 |
68
|
Data Security in Cloud Computing Using HDFS
- Navjot Sekhon, Richa Mahajan Abstract ![]() ![]() |
351 |
69
|
Data Extraction Techniques for Android Based Devices
- Soudamini Patil, Khushboo Sharma, Mudita Sharma, Garima Chhaparwal, Kanchan Chowdhari Abstract ![]() ![]() |
355 |
70
|
BVDUCOE College Alumni Portal
- Rohit Singh, Rajat Singh Parmar, Saurabh Tripathi, Prof. Rohini Khalkar, Prof. Sheetal Patil Abstract ![]() ![]() |
359 |
71
|
Raspberry Pi based Home Automation Using Wi-Fi, IoT & Android for Live monitoring
- Prof. Prashant Rathod, Syed Khizaruddin, Rashmi Kotian, Shubham Lal Abstract ![]() ![]() |
363 |
72
|
Information Security Management in Distributed Systems (ISMDS)
- Augustine O. Ugbari, Ikechukwu O. Uche Abstract ![]() ![]() |
369 |
73
|
An Assessment Model to Evaluate Quality Attributes In Big Data Quality
- Supriya Haribhau Pawar, Prof. Dr. Devendrasingh Thakore Abstract ![]() ![]() |
373 |
74
|
Response Time Analysis Using Linux Completely Fair Scheduler for Compute-Intensive Tasks
- Pooja Tanaji Patil, Prof. Sunita Dhotre Abstract ![]() ![]() |
377 |
75
|
Amplifying Statistical Machine Translation (SMT) Model Using Graph-Based Approach: A Novel Idea
- Priyanka Malviya, Prof. Gauri Rao Abstract ![]() ![]() |
381 |
76
|
Simulating EDM Model of Nano copper hybrid composites using Generalized Neural Network Tools
- P.Radha Abstract ![]() ![]() |
386 |
77
|
Data Display System for Mars Color Camera Onboard Mom
- Nisha Chetana Sastry, Nikhil Patil, Samhitha Rao, Sathvik Shetty, Shyamala G Abstract ![]() ![]() |
395 |
78
|
Security Mechanism in RIPv2, EIGRP and OSPF for Campus Network - A Review
- Devansh Diwan, V.K.Narang, Anuj Kumar Singh Abstract ![]() ![]() |
399 |
79
|
Integer Factorization in RSA Encryption: Challenge for Cloud Attackers
- Janaki Sivakumar, Hameetha Begum Abstract ![]() ![]() |
405 |
80
|
Handling Anomalies in the System Design: A Unique Methodology and Solution
- Pratik Rajan Bhore, Dr. Shashank D. Joshi, Dr. Naveenkumar Jayakumar Abstract ![]() ![]() |
409 |
81
|
Hybrid Approach to minimize Makespan and Flowtime in Grid Environment
- Malkeet Kaur, Mr. Karan Mahajan Abstract ![]() ![]() |
414 |
82
|
Automatic Bug Triaging System using Prediction Algorithm on Rating Basis
- Vishal Jare, Amar Deep, Akshay Borade Abstract ![]() ![]() |
420 |
83
|
A Treatment for I/O Latency in I/O Stack
- Ashutosh Kumar Singh, Dr. S.H.Patil, Dr. Naveenkumar Jayakumar Abstract ![]() ![]() |
424 |
84
|
Digital Rights Management By Using Cloud Computing
- Miss. Shyamli Ugale, Prof. Ankit Mune, Prof. Dr. H.R. Deshmukh Abstract ![]() ![]() |
428 |
85
|
Survey of Security Challenges in Aeronautical Data Communication Networks
- Suman, Pinki Rani Abstract ![]() ![]() |
435 |
86
|
ownCloud Using Raspberry Pi
- Prof. Krunal J. Pimple, Shubham Jarwal, Gaurav Rajai, Pooja Ghadshi, Gaurav Dubey Abstract ![]() ![]() |
440 |
87
|
Real-Time Detection of Multiple Objects from High Resolution Video Feeds Using Multiple Raspberry Pi’s And OpenCV
- Preeja Priji, Pranav JI, Rashmi S Nair Abstract ![]() ![]() |
443 |
88
|
Mining User-aware Rare STPs and Frequent Events from Social media
- Salmath Amina KP, Farzin Ahammed T Abstract ![]() ![]() |
446 |
89
|
Mining Top K-HUI Patterns By using RUC Strategy
- Riswana.P.P, Divya.M Abstract ![]() ![]() |
449 |
90
|
NKS Search in Multidimensional Dataset with and without using User Preference
- Shimna P.T, Dilna V.C Abstract ![]() ![]() |
453 |
91
|
PCB
- Miss. Rucha Shankar Jamale, Mrs.Sunita Dhotre, Miss. Pooja Tanaji Patil Abstract ![]() ![]() |
457 |
92
|
Random Way Point Generation In Constrained Environment
- Dabbiru Ravi Vikranth Abstract ![]() ![]() |
462 |
93
|
A Study on Data Security in Internet of Things
- G. Ambika, Dr.P.Srivaramangai Abstract ![]() ![]() |
467 |
94
|
A Survey of Brain Tumor Segmentation Methods with Different Image Modalitites
- M. Sumithra, S. Malathi Abstract ![]() ![]() |
470 |
95
|
Node Reduction using Similarity Graph Computation Algorithm in Large Networks
- K. Thamizhmaran, K. Prabu Abstract ![]() ![]() |
480 |
96
|
Trust Based Dynamic Source Routing Protocol by Exclusion of Black-Hole Attack for MANETs
- K. Thamizhmaran, K. Prabu Abstract ![]() ![]() |
486 |
97
|
The Evolvement of ATM Using Fingerprint
- V. Ajantha Devi, A. Priyanka Abstract ![]() ![]() |
491 |
98
|
Red TACTON-Innovation of Human Area Networking
- M.Bobby, V.Ajantha Devi, C. Madhubala Abstract ![]() ![]() |
497 |
99
|
Security Algorithms in Cloud Computing
- T.Ramaporkalai Abstract ![]() ![]() |
500 |
100
|
The Empowerment Of Energy-Efficiency, Security & Scalablity In Wireless Sensor Networks Using Mac And TMP Protocols
- M.Bobby, Bauvya Kuruvila.K Abstract ![]() ![]() |
504 |
101
|
Synergising Blendspace for Effective Instruction
- N.Devaki, M.Deivam Abstract ![]() ![]() |
507 |
102
|
Ensuring Multitier ATM with AADHAAR Details by Using Bioinformatics
- V.Ajantha Devi, R.Archana Abstract ![]() ![]() |
511 |
103
|
Intelligences of Fusing Face and Gait in Multimodal Biometric System: A Contemporary Study
- Annbuselvi K, Santhi N Abstract ![]() ![]() |
516 |
104
|
Designing Beaded Patch Appliqué Using Digital Surface Layering Technique
- R. Anil Kumar, R.I. Sathya Abstract ![]() ![]() |
523 |
105
|
Identification of Multiword Expressions: A Comparative Literature Study
- Jisha T E, Thomas Monoth Abstract ![]() ![]() |
528 |
106
|
Translation of Paniya Language in Wayanad to Malayalam Using Lexical Analysis
- Anjali Maria Paul, Jisha T.E, Thomas Monoth Abstract ![]() ![]() |
534 |
107
|
Ontology Construction For Object Oriented Concepts Using Natural Language Processing
- Satyasheela T.Kadam, Prof. Dr. Devendrasingh Thakore Abstract ![]() ![]() |
540 |