IJCST ONLINE
DOWNLOADS
QR Code
Visitors
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 5 Issue 4 / Jul-Aug 2017
S.No
|
Title/Author Name
|
Page No
|
1
|
UAV Swarm Co-Ordination and Control Using Grossberg Neural Network
- Dabbiru Ravi Vikranth Abstract PDF Cite/Export |
1 |
2
|
Network Monitoring: Key Aspects in Packet Loss and its Measurements
- B Bindu Sahitya Devi, G Nageswara Rao Abstract PDF Cite/Export |
8 |
3
|
A Report on Big data Analysis in Development Sector
- V.Satish Kumar, D.Wasiha Tasneem, Shaik Neeha Abstract PDF Cite/Export |
12 |
4
|
A Survey on Data Integrity Auditing Schemes in Cloud Computing
- Purnima,Deepak Kumar Verma Abstract PDF Cite/Export |
17 |
5
|
Machine Transliteration for English to Amharic Proper Nouns
- Melaku Kore, Vishal Goyal Abstract PDF Cite/Export |
23 |
6
|
Internet of Things (IoT) Driven Design and Implementation of Smart Campus
- Bernabas Amare , Jyotsna Sengupta Abstract PDF Cite/Export |
32 |
7
|
Age and Gender Detection
- Harcharan Khalsa Abstract PDF Cite/Export |
39 |
8
|
Ranking of Images Based on Tags
- T.Chaitanya Reddy, K.Chaitanya Abstract PDF Cite/Export |
44 |
9
|
Classifying Brain Dataset Using Classification Based Association Rules (CBA)
- Bahera H. Nayef Abstract PDF Cite/Export |
48 |
10
|
Bigdata Analytics: Comparatives Analysis of Tools
- M.Dhavapriya Abstract PDF Cite/Export |
55 |
11
|
Optimal Scalable Dynamic Control and Selfish node Identification of Packets in Wireless Sensor Network
- K.Ravikumar , H.Bakyasri Abstract PDF Cite/Export |
60 |
12
|
Congestion Control in Vehicular Ad Hoc Networks (VANET) Using Meta-Heuristic Techniques
- K.Ravikumar , T.Vishvaroobi Abstract PDF Cite/Export |
66 |
13
|
A New DWT and Median Filter Based Noise Removal Method for Images
- Sunita Janoriya, Prof. M P. Parsai Abstract PDF Cite/Export |
73 |
14
|
Hybrid Recognition System under Feature Selection and Fusion
- Ali M Mayya , Dr. Mariam M Saii Abstract PDF Cite/Export |
78 |
15
|
Wireless Sensor Network Node To Node Mapped On Base Station with Energy Consumption
- Payal Jain, Rajneesh Pachouri Abstract PDF Cite/Export |
85 |
16
|
CYBERCRIME – A threat to network security
- V.Swarnakamali, D.Roshni Abstract PDF Cite/Export |
97 |
17
|
A Review of HIIPS: Healthcare Information Infrastructures among Public Hospitals (Case Study Sudan)
- Amgad Atta Abdelmageed Mohammed Abstract PDF Cite/Export |
104 |
18
|
Creating a High-Quality Syrian Audio Database for Analysis of Speaker Personality
- Raneem Knaj, Jafar Al- kheir Abstract PDF Cite/Export |
113 |
19
|
IPL-2017 Cross Country Cluster Analysis
- Mr. Chirag Goyal Abstract PDF Cite/Export |
117 |
20
|
Optimized Resource Utilization in Cloud Computing
- Preeti Jigalur, Dr. Geeta R. Bharamagoudar,Dr. Shashikumar G. Totad Abstract PDF Cite/Export |
123 |
21
|
Semantic Analysis and Report Generation for Social Content
- Ms. Sheela A Badagi, Mrs. Shanta Kallur Abstract PDF Cite/Export |
126 |
22
|
Automatic Evaluation of Website For Search Engine Optimization
- Amrita J Sathuri, B.S.Anami, Veeresh Hiremath Abstract PDF Cite/Export |
131 |
23
|
Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing
- Kirandeep Kaur, Jyotsna Sengupta Abstract PDF Cite/Export |
135 |
24
|
An Improved MANET Protocol with Enhanced Throughput to Prevent Black Hole Attack
- Sakshi Jindal, Prof. Jyotsna Sengupta Abstract PDF Cite/Export |
142 |
25
|
Statistical Analyzer of webpage contents
- Sharada Vakkund, Dr. Manu T M Abstract PDF Cite/Export |
147 |
26
|
Evaluation of Gated Recurrent Neural Networks on Deep Sentence Classification
- Amit Adate, Shubham Pathak Abstract PDF Cite/Export |
150 |