IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 6 Issue 1 / Jan - Feb 2018
S.No
|
Title/Author Name
|
Page No
|
1
|
Hybrid Genetic Algorithm for Extracting Rules Considering the Dataset Complexity
- John Tsiligaridis [ Abstract ] [ PDF ] [ Cite/Export] |
1 |
2
|
Analysis Study of Routing Protocols Performance and RSU Attack for E-Call Service in VANET
- Nour Hasan Agha, Majd Zhlat, Mothanna Alkubeily, Ahmad S. Ahmad [ Abstract ] [ PDF ] [Cite/Export ] |
6 |
3
|
Location tracking using sms based on Android mobile
- Mr. N. Rupesh Babu, Dr. Y. K. Sundar Krishna [ Abstract ] [ PDF ] [Cite/Export ] |
12 |
4
|
A New Multi-Objective QoS Multicast Routing Protocol Based on Ant Colony Optimization for Mobile Ad Hoc Networks
- Ghazwan Raya, Mothanna Alkubeily, Sadek Ali, Boushra Maala [ Abstract ] [ PDF ] [ Cite/Export ] |
17 |
5
|
Distributed Denial of Service Attack Detection, Prevention and Secure Communication in MANET
- Ranjana Kumari, Achint Chugh [ Abstract ] [ PDF ] [Cite/Export ] |
24 |
6
|
Prediction of Fetal Health State during Pregnancy: A Survey
- Tadele Debisa Deressa, Kalyani Kadam [Abstract] [ PDF] [Cite/Export] |
29 |
7
|
Prediction and Control of Cutting Parameters for Machining Al-Sic MMC Material by Wire Cut EDM Process
- C.V. Sriram, Dr Ch.V.S.Parameswara Rao [Abstract] [ PDF] [Cite/Export] |
37 |
8
|
Analysis and Implementation of Region Based on Demand to Supply Chain Framework
- Mr.Shreenath Waramballi [Abstract] [ PDF] [Cite/Export] |
44 |
9
|
Effects of Rain on Vertical and Horizontal Polarized Ku-Band Radio Propagation in Tropical Region
- Olabisi O, Oladeji E.A [Abstract] [ PDF] [Cite/Export] |
49 |
10
|
Thinning in Digital Image Processing: A Review
- Shivanand B Lamani, Ravikumar K, Arshi Jamal [Abstract] [ PDF] [Cite/Export] |
54 |
11
|
Assessment of ICT Usage in Healthcare Service Systems: A Case Study of the Federal Medical Centre (FMC) Yenagoa in Bayelsa State, Nigeria
- Owaba Ceo, Arogo In, Ebuete Yi, Azor Pa, Dambo I, Ayaowie It, Ide Ma [Abstract] [ PDF] [Cite/Export] |
58 |
12
|
An Implementation of Search Engine Optimization Technique under Indian IT Law
- Anuraj Singh, Jay Narayan Thakre, Dr. Taruna Jain [Abstract] [ PDF] [Cite/Export] |
66 |
13
|
Foot Boundary Analysis for Crime Investigation
- Prof. Samir Kumar Bandyopadhyay [Abstract] [ PDF] [Cite/Export] |
72 |
14
|
Improving Secure Routing in Geographic Routing Protocols for Wireless Multimedia Sensor Network
- Ghaida Esber, Mothanna Alkubeily [Abstract] [ PDF] [Cite/Export] |
77 |
15
|
A Study to Improve the Handover Algorithm on the LTE-Advanced System in Terms of Speed
- Mohammad Saeid, Haisam Al-radwan [Abstract] [ PDF] [Cite/Export] |
89 |
16
|
Data Security In Mobile cloud Computing using TOTP generated by HMAC-SHA1 Algorithm
- D. Divya Priya, A. Mahalakshmi [Abstract] [ PDF] [Cite/Export] |
93 |
17
|
Topologies Resolute On Algebraic Permutation Sets
- L.Sowmyalatha, K.Thirunanasambandam [Abstract] [ PDF] [Cite/Export] |
99 |