IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science aprTrends and Technology
IJCST-Volume 5 Issue 2 / Mar-Apr 2017
S.No
|
Title/Author Name
|
Page No
|
1
|
Fabrication Attack Effect on Medical Applications based on VANETs
- Aleen Sliman, Karam Madi, Aws Khadour, Boushra Maala, Ahmad S. Ahmad Abstract PDF Cite/Export |
1 |
2
|
Information Extraction System for Amharic Text
- Sinatyehu Hirpassa Abstract PDF Cite/Export |
5 |
3
|
Synthesizing High-Frequency Rules from Various Data Sources Using Weighting Method (Determining Service Quality in Hospitals)
- Mr.A.Arulmurugan, A. Ajitha, R. Gracy Abstract PDF Cite/Export |
16 |
4
|
Hydrological Information System using Archydro Data Model
- Mr. Pritam R. Patil, Dr.S.B.Thorat, Dr.S.R.Pande Abstract PDF Cite/Export |
20 |
5
|
Rank Using User Clicks & Location Based Image Retrieval
- Ms.T. Suganya, S. Vivek Abstract PDF Cite/Export |
25 |
6
|
Self-Care Application Using Android Google Maps and Geofence
- B.Karthikeyan, R.Charan, L.Ganapathy, J.GobuViknesh, P.Afsal Abstract PDF Cite/Export |
28 |
7
|
A Review :A Digital Image Steganography
- Mrs.M.A.Wakure, Mrs.S.A.Wakure Abstract PDF Cite/Export |
33 |
8
|
Multi Heart Disease Classification in ECG Signal Using Neural Network
- Theynisha .R, Shree Soundharya .R , Umarani .S , AnithaNithya.R Abstract PDF Cite/Export |
38 |
9
|
High Security Routing On Three-Hop
- Sreekesh TU, Sreelakshmi k sunil Abstract PDF Cite/Export |
45 |
10
|
An Efficient Dynamic Slot Allocation Based On Fairness Consideration for MAPREDUCE Clusters
- T.P.Simi Smirthiga, P.Sowmiya, C.Vimala, Mrs P.Anantha Prabha Abstract PDF Cite/Export |
53 |
11
|
ERP System for college
- Vivek Anand, Adarsh Poojary, Rafiur Mondal, Pooja Prajapati, Subhash C.R. Pal Abstract PDF Cite/Export |
59 |
12
|
Enhanced Project Task Planning With Runtime Scheduler
- Ms.B.Sruthi, Ms.S.Savitha, Ms.R.Sathya,Ms.K.R.Sarumathi Abstract PDF Cite/Export |
63 |
13
|
Heart Disease Prediction Using Naïve Bayes Algorithm and Laplace Smoothing Technique
- Vincy Cherian, Bindu M.S Abstract PDF Cite/Export |
68 |
14
|
A Review on Multi-Relay Wireless Data Transmission with Delay Aware Load Balancing
- Rohitha R, Sheena N Abstract PDF Cite/Export |
74 |
15
|
A Survey Paper on News Web Video Event Mining
- Aggie Varghese, Smitha M. Jasmine Abstract PDF Cite/Export |
78 |
16
|
Privacy Preserving Data Analysis in Mental Health Research Using Cloud Computation
- Dr. B. Anni Princy, G.Tamilselvi, S.Shruthakeerthi, B.Sowmya Abstract PDF Cite/Export |
81 |
17
|
Critical Review on Edge Detection Techniques in Spatial Domain on Low Illumination Images
- Sunita Janoriya, Prof. M.P. Parsai Abstract PDF Cite/Export |
86 |
18
|
Automated Guided Vehicle With ARDUINO Using Magnetic Sensor
- Prof. Ashraf Siddiqui, Vishwakarma Sarvajeet Ravindranath, Burte Pratik Vishnu, Vishwakarma Vishwaschandra Abstract PDF Cite/Export |
91 |
19
|
Computer Aided Motif Designing: Development of Tool and Comparative Study
- Shalini Singh, Rajeev Singh Abstract PDF Cite/Export |
94 |
20
|
Smart Computer In Vehicles
- R.Jayachandran, N.Rubika, M.Mathivanan, C.V.Vidya Prabha Abstract PDF Cite/Export |
99 |
21
|
Integration of Solar Renewable Energy Source with Dynamic Wireless Power Transfer in Recharging IR Based Receivers
- M.Sumithra, G.Suriya, P. Susithra, R.Varthini, B.Subhavani Abstract PDF Cite/Export |
104 |
22
|
FAST JPEG Encoding Using OpenMP
- M. M. Raghuwanshi, Malhar Ujawane, Sameer Bhute, Sankalp Saoji, Madhushree Warkhade, Shivani Kadpati Abstract PDF Cite/Export |
107 |
23
|
Hybrid ACO-PSO Based Energy Efficient Clustering Protocol In WSN
- Atul Rana, Manju Bala,Varsha Abstract PDF Cite/Export |
112 |
24
|
A Review of Automated MRI Image Processing Techniques Employing Segmentation & Classification
- Ruchi Kumari Garg, Aishwarya Kulshreshtha Abstract PDF Cite/Export |
117 |
25
|
Semantic Similarity based Classification of Narratives
- S. Gopi, A. Berno Raj, M. Abinav, P.Gokul Sarathy, D.P. Bharath Abstract PDF Cite/Export |
121 |
26
|
Certificate Revocation Mechanism in Mobile ADHOC Grid Architecture
- J.Beschi Raja, Dr.S.Chenthur Pandian, J.Pamina Abstract PDF Cite/Export |
125 |
27
|
Seed Sowing Robot
- Abdulrahman, Mangesh Koli, Umesh Kori, Ahmadakbar Abstract PDF Cite/Export |
131 |
28
|
Data Leakage Detection and Prevention System
- Chirag S. Patil , Swapnil S. Nalawade, Vikas D. Natekar, Prof. Neha Saxena Abstract PDF Cite/Export |
144 |
29
|
Automated Billing Cart
- Muhib A. Lambay, Abhishek Shinde, Anupam Tiwari, Vicky Sharma Abstract PDF Cite/Export |
148 |
30
|
Waste Management System Using Iot
- Mrs.D.Anuradha, A.Vanitha, S.Padma Priya,S.Maheshwari Abstract PDF Cite/Export |
152 |
31
|
Blister Testing in MATLAB
- Prof. Neha Saxena, Bhosale Mangesh Vishnu, Salian Shivraj Suresh, Khandelwal Amit Abstract PDF Cite/Export |
156 |
32
|
Stock Selection using Principal Component Analysis with Differential Evolution
- Dr. Balamurugan .A, Arul Selvi. S, Syedhussian .A , Nithin .A Abstract PDF Cite/Export |
160 |
33
|
Go Mumbai
- NehaSaxena, Suhasini Maurya, Ankit Rai, Santosh Yadav, Jinesh Malavia Abstract PDF Cite/Export |
165 |
34
|
Customized Travel Sequence Recommendation on Multi-Source Big Social Media
- Nuthula Saireddy, Anudeep Nallamothu Abstract PDF Cite/Export |
169 |
35
|
Student Smart Card using VB.NET, SQL, Barcode
- Dvij Parekh, Siddhali Save, Virag Mhatre, Prof. Anshika gupta Abstract PDF Cite/Export |
175 |
36
|
Customer Relationship Management based Customized System Development
- Prerana Shastri, Abhishek Gupta, Sufyan Shaikh, Omair Kolsawala, Prof.Waseem Sultan Abstract PDF Cite/Export |
178 |
37
|
Behavior Based Spyware Identification
- Pooja Singhal, Dharna Abstract PDF Cite/Export |
182 |
38
|
A Survey Paper on Visual Cryptography for Grey Scale Images
- Kirti Rawat, Vijay Kumar Joshi Abstract PDF Cite/Export |
189 |
39
|
Detection of ICMP Flood DDoS Attack
- Harshita, Ruchikaa Nayyar Abstract PDF Cite/Export |
199 |
40
|
Identification Of DDoS Attack On Web Servers
- Ruchikaa Nayyar, Harshita Abstract PDF Cite/Export |
206 |
41
|
Analysis and Detection of Botnets and Encrypted Tunnels
- Dharna, Pooja Singhal Abstract PDF Cite/Export |
211 |
42
|
A Study and Secure Clustered-Authority Access Control Strategy in Open Cloud Storage Systems
- Srikanth Maddineni, Arnab Pal Abstract PDF Cite/Export |
218 |
43
|
Auditing and De-Duplication in Cloud Computing
- E Lokesh Kumar, Krishna Narayan P, P.Renuka Devi Abstract PDF Cite/Export |
225 |
44
|
Edge Shield Static Median Filter for Removing Noise on Various Types of Images
- M.Chitradevi, S.Kavitha Abstract PDF Cite/Export |
230 |
45
|
A Strategic Study on Scenario Based Design Method to Implement in Ubiquitous Systems
- Venkata Rao Barige, Dr. B.D.C.N.Prasad Abstract PDF Cite/Export |
238 |
46
|
Privacy Preserving and Detection of Packet Dropping Attacks in MANETS
- Sonia Choudarygari,Penmatsa Naga, Venkata Divya Abstract PDF Cite/Export |
243 |
47
|
Cloth pattern recognition for visually impaired people
- V. Varun Varma, S. Narasimha Reddy, S. Kanmani Abstract PDF Cite/Export |
248 |
48
|
Data DEDUPLICATION Security with Dynamic Ownership Management
- MS.C.Kamatchi, R.Pooja, S.Serishma, R.Vanitha Abstract PDF Cite/Export |
252 |
49
|
Remote Access Tool With Offline Messenger
- Prof. Anshika Gupta, Niraj Sunil Chaughule, Prasad Ganpat Haryan, Sheetalkumar Brajesh Dubey Abstract PDF Cite/Export |
257 |
50
|
Smoothing of a Noisy Image Using Different Low Pass Filters
- Natasha R Shaikh Abstract PDF Cite/Export |
260 |
51
|
People Safety APP - Belief
- Tabrez Chowkar, Ankit Shukla, Saif Shaikh, Vivek Anand Abstract PDF Cite/Export |
265 |
52
|
Categorization of Drugs Using SVM Classification
- Asst.Prof.J.Omana, S.Dhanalakshmi, V.M.Divyalakshmi, S.Mahalakshmi Abstract PDF Cite/Export |
269 |
53
|
An ERP Web Portal for Small and Mid-Sized Clinics
- Muhib A. Lambay, Dhaval C. Dedhia, Guruprasad D. Rao Abstract PDF Cite/Export |
273 |
54
|
Performance Analysis and Comparison of Cluster Based Routing Protocol in WSN
- Akhila Joshi, Saurabh Mehta, Ajitkumar Khachane Abstract PDF Cite/Export |
277 |
55
|
A survey on automatic vehicle number plate detection system
- Aruna Bajpai Abstract PDF Cite/Export |
291 |
56
|
Secure Data with Key Managers by Using Shamir Scheme and AES Algorithm
- Prof.S. Athinarayanan, S.NivethaPriya , R.Supriya Abstract PDF Cite/Export |
298 |
57
|
Data Integrity Checking Protocol with Dynamic Public Verifiability
- M.D.Boomija , P.V.Pooja, K. Preethi Abstract PDF Cite/Export |
302 |
58
|
Alumni Interaction System
- Subashini.S, Sowndarya.A Abstract PDF Cite/Export |
306 |
59
|
Data mining with Big Data in Health Informatics
- Akanksha, Vinod Mann Abstract PDF Cite/Export |
310 |
60
|
A Review on Data Mining With Big Data
- Akanksha, Dr.Vinod Mann Abstract PDF Cite/Export |
316 |
61
|
Significant Approaches to Computation on Encrypted Data
- Irene Getzi S Abstract PDF Cite/Export |
321 |
61
|
Significant Approaches to Computation on Encrypted Data
- Irene Getzi S Abstract PDF Cite/Export |
321 |
62
|
Detection of Lung Cancer Tumor in Its Early Stages Using Image Processing Techniques
- Vrushali Desale, Dongare Vijaykumar, Tushar Bakhale, Kadam Suraj, Dhalpe Somnath Abstract PDF Cite/Export |
326 |
63
|
Genetic Algorithm Based Text Categorization Using K-NN Method
- Mr.R.AlaghuKarthiKeyan, Mrs.k .Brindha Abstract PDF Cite/Export |
329 |
64
|
Augmented Reality Based Construction Module for Floor Capacity Estimation
- Netra S. Patil, Tanvir Panesar, Parth Shinde, Krati Saxena, Suraj U Rasal Abstract PDF Cite/Export |
333 |
65
|
Direct Assessment Automator For Outcome Based System
- Utkarsh Jaiswal, Rishabh Pandey, Rishav Rana, D.M.Thakore, NaveenKumar JayaKumar Abstract PDF Cite/Export |
337 |
66
|
Building A Database Driven Reverse Medical Dictionary
- Pragya Tripathi, Manjusha Deshmukh Abstract PDF Cite/Export |
341 |
67
|
Weighted Hybrid Approach in Recommendation Method
- Mr.Avadhut D.Wagavkar, Prof. Mrs.S.S.Vairagar Abstract PDF Cite/Export |
346 |
68
|
Data Security in Cloud Computing Using HDFS
- Navjot Sekhon, Richa Mahajan Abstract PDF Cite/Export |
351 |
69
|
Data Extraction Techniques for Android Based Devices
- Soudamini Patil, Khushboo Sharma, Mudita Sharma, Garima Chhaparwal, Kanchan Chowdhari Abstract PDF Cite/Export |
355 |
70
|
BVDUCOE College Alumni Portal
- Rohit Singh, Rajat Singh Parmar, Saurabh Tripathi, Prof. Rohini Khalkar, Prof. Sheetal Patil Abstract PDF Cite/Export |
359 |
71
|
Raspberry Pi based Home Automation Using Wi-Fi, IoT & Android for Live monitoring
- Prof. Prashant Rathod, Syed Khizaruddin, Rashmi Kotian, Shubham Lal Abstract PDF Cite/Export |
363 |
72
|
Information Security Management in Distributed Systems (ISMDS)
- Augustine O. Ugbari, Ikechukwu O. Uche Abstract PDF Cite/Export |
369 |
73
|
An Assessment Model to Evaluate Quality Attributes In Big Data Quality
- Supriya Haribhau Pawar, Prof. Dr. Devendrasingh Thakore Abstract PDF Cite/Export |
373 |
74
|
Response Time Analysis Using Linux Completely Fair Scheduler for Compute-Intensive Tasks
- Pooja Tanaji Patil, Prof. Sunita Dhotre Abstract PDF Cite/Export |
377 |
75
|
Amplifying Statistical Machine Translation (SMT) Model Using Graph-Based Approach: A Novel Idea
- Priyanka Malviya, Prof. Gauri Rao Abstract PDF Cite/Export |
381 |
76
|
Simulating EDM Model of Nano copper hybrid composites using Generalized Neural Network Tools
- P.Radha Abstract PDF Cite/Export |
386 |
77
|
Data Display System for Mars Color Camera Onboard Mom
- Nisha Chetana Sastry, Nikhil Patil, Samhitha Rao, Sathvik Shetty, Shyamala G Abstract PDF Cite/Export |
395 |
78
|
Security Mechanism in RIPv2, EIGRP and OSPF for Campus Network - A Review
- Devansh Diwan, V.K.Narang, Anuj Kumar Singh Abstract PDF Cite/Export |
399 |
79
|
Integer Factorization in RSA Encryption: Challenge for Cloud Attackers
- Janaki Sivakumar, Hameetha Begum Abstract PDF Cite/Export |
405 |
80
|
Handling Anomalies in the System Design: A Unique Methodology and Solution
- Pratik Rajan Bhore, Dr. Shashank D. Joshi, Dr. Naveenkumar Jayakumar Abstract PDF Cite/Export |
409 |
81
|
Hybrid Approach to minimize Makespan and Flowtime in Grid Environment
- Malkeet Kaur, Mr. Karan Mahajan Abstract PDF Cite/Export |
414 |
82
|
Automatic Bug Triaging System using Prediction Algorithm on Rating Basis
- Vishal Jare, Amar Deep, Akshay Borade Abstract PDF Cite/Export |
420 |
83
|
A Treatment for I/O Latency in I/O Stack
- Ashutosh Kumar Singh, Dr. S.H.Patil, Dr. Naveenkumar Jayakumar Abstract PDF Cite/Export |
424 |
84
|
Digital Rights Management By Using Cloud Computing
- Miss. Shyamli Ugale, Prof. Ankit Mune, Prof. Dr. H.R. Deshmukh Abstract PDF Cite/Export |
428 |
85
|
Survey of Security Challenges in Aeronautical Data Communication Networks
- Suman, Pinki Rani Abstract PDF Cite/Export |
435 |
86
|
ownCloud Using Raspberry Pi
- Prof. Krunal J. Pimple, Shubham Jarwal, Gaurav Rajai, Pooja Ghadshi, Gaurav Dubey Abstract PDF Cite/Export |
440 |
87
|
Real-Time Detection of Multiple Objects from High Resolution Video Feeds Using Multiple Raspberry Pi’s And OpenCV
- Preeja Priji, Pranav JI, Rashmi S Nair Abstract PDF Cite/Export |
443 |
88
|
Mining User-aware Rare STPs and Frequent Events from Social media
- Salmath Amina KP, Farzin Ahammed T Abstract PDF Cite/Export |
446 |
89
|
Mining Top K-HUI Patterns By using RUC Strategy
- Riswana.P.P, Divya.M Abstract PDF Cite/Export |
449 |
90
|
NKS Search in Multidimensional Dataset with and without using User Preference
- Shimna P.T, Dilna V.C Abstract PDF Cite/Export |
453 |
91
|
PCB
- Miss. Rucha Shankar Jamale, Mrs.Sunita Dhotre, Miss. Pooja Tanaji Patil Abstract PDF Cite/Export |
457 |
92
|
Random Way Point Generation In Constrained Environment
- Dabbiru Ravi Vikranth Abstract PDF Cite/Export |
462 |
93
|
A Study on Data Security in Internet of Things
- G. Ambika, Dr.P.Srivaramangai Abstract PDF Cite/Export |
467 |
94
|
A Survey of Brain Tumor Segmentation Methods with Different Image Modalitites
- M. Sumithra, S. Malathi Abstract PDF Cite/Export |
470 |
95
|
Node Reduction using Similarity Graph Computation Algorithm in Large Networks
- K. Thamizhmaran, K. Prabu Abstract PDF Cite/Export |
480 |
96
|
Trust Based Dynamic Source Routing Protocol by Exclusion of Black-Hole Attack for MANETs
- K. Thamizhmaran, K. Prabu Abstract PDF Cite/Export |
486 |
97
|
The Evolvement of ATM Using Fingerprint
- V. Ajantha Devi, A. Priyanka Abstract PDF Cite/Export |
491 |
98
|
Red TACTON-Innovation of Human Area Networking
- M.Bobby, V.Ajantha Devi, C. Madhubala Abstract PDF Cite/Export |
497 |
99
|
Security Algorithms in Cloud Computing
- T.Ramaporkalai Abstract PDF Cite/Export |
500 |
100
|
The Empowerment Of Energy-Efficiency, Security & Scalablity In Wireless Sensor Networks Using Mac And TMP Protocols
- M.Bobby, Bauvya Kuruvila.K Abstract PDF Cite/Export |
504 |
101
|
Synergising Blendspace for Effective Instruction
- N.Devaki, M.Deivam Abstract PDF Cite/Export |
507 |
102
|
Ensuring Multitier ATM with AADHAAR Details by Using Bioinformatics
- V.Ajantha Devi, R.Archana Abstract PDF Cite/Export |
511 |
103
|
Intelligences of Fusing Face and Gait in Multimodal Biometric System: A Contemporary Study
- Annbuselvi K, Santhi N Abstract PDF Cite/Export |
516 |
104
|
Designing Beaded Patch Appliqué Using Digital Surface Layering Technique
- R. Anil Kumar, R.I. Sathya Abstract PDF Cite/Export |
523 |
105
|
Identification of Multiword Expressions: A Comparative Literature Study
- Jisha T E, Thomas Monoth Abstract PDF Cite/Export |
528 |
106
|
Translation of Paniya Language in Wayanad to Malayalam Using Lexical Analysis
- Anjali Maria Paul, Jisha T.E, Thomas Monoth Abstract PDF Cite/Export |
534 |
107
|
Ontology Construction For Object Oriented Concepts Using Natural Language Processing
- Satyasheela T.Kadam, Prof. Dr. Devendrasingh Thakore Abstract PDF Cite/Export |
540 |