IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 6 Issue 2 / Mar - Apr 2018
S.No
|
Title/Author Name
|
Page No
|
1
|
Analytic Study about Slotted Waveguide Antenna to Enhance Radiation Pattern of These Antenna
- Mayass Nassour, Moeen Younes [Abstract] [ PDF] [Cite/Export] |
1 |
2
|
Performance Improve of Multipath Routing Protocols Using Wireless Sensor Networks
- Madiraju Jagadeeshwar, Dr.N.Satyanarayana [Abstract] [ PDF] [Cite/Export] |
7 |
3
|
Hiding an Image Data into Video Stenography Using Different Algorithm and MATLAB : A Review
- Anchal Chander Lekha ,Monika Gautam [Abstract] [ PDF] [Cite/Export] |
12 |
4
|
An Efficient Dynamic Channel Allocation Method for the Next Generation Mobile Networks
- P. Bonus Reddy, P. Venkata Krishna [Abstract] [ PDF] [Cite/Export] |
17 |
5
|
Design and Implementation of Search Engine using Quick Sort Algorithm
- Hemant A. Lad, Shubham V. Kamble, Piyush A. Wanjari, Priyanka Tekadpande [Abstract] [ PDF] [Cite/Export] |
23 |
6
|
Fractal Compression of Colored Satellite Stereo Images Based on HV Partitioning Method
- Heba Hatem , Mariam Saii, Al Samoual Saleh [Abstract] [ PDF] [Cite/Export] |
28 |
7
|
Review and Analysis of Minimum Spanning Tree Using Prim's Algorithm
- Jogamohan Medak [Abstract] [ PDF] [Cite/Export] |
34 |
8
|
Functionality Website Using Disability Persons
- Mr.Shahid.A, Mr.J.Jelsteen, Mr.Nithin Sunny [Abstract] [ PDF] [Cite/Export] |
40 |
9
|
Industrial Pattern Analysis of the United Kingdom using Hadoop
- Dr. Bhoomi Gupta, Tanya Gupta, Archit Gupta [Abstract] [ PDF] [Cite/Export] |
44 |
10
|
Heuristic Based Job Scheduling Approach to Process Large Data Packets
- Anjali Nema, Deepak Gour [Abstract] [ PDF] [Cite/Export] |
49 |
11
|
A Keystroke Dynamics Based Authentication System
- Ravi Kiran, Sarita Soni [Abstract] [ PDF] [Cite/Export] |
53 |
12
|
A Review of Techniques for VOIP Classification
- Anjali, Max Bhatia [Abstract] [ PDF] [Cite/Export] |
56 |
13
|
A Survey on Phishing and Anti-Phishing Techniques
- L. Joy Singh [Abstract] [ PDF] [Cite/Export] |
62 |
14
|
Graph Theory: Graph Based Feature Extraction Of Different Types Of Graphs
- Mr. Saptarshi Bhattacharyya, Mr. Abhijit Bera [Abstract] [ PDF] [Cite/Export] |
69 |
15
|
Rat Trap Electronic Device (RTED)
- Muhammad Syakir Aiman, Suziana Omar, Fatimah Nur Mohd Redzwan, Nur Syahirah binti Kamarozaman, Ahmad Sabirin Zoolfakar [Abstract] [ PDF] [Cite/Export] |
77 |
16
|
Achieving Space-Efficiency And Access Isolation By Implementing File Partition For Online Data
- Ankita Bung, C.Sudha, Sravanthi Nanumasa [Abstract] [ PDF] [Cite/Export] |
81 |
17
|
Advanced and Secured Video Steganography Using Least Significant Bit and Discrete Wavelet Transform Techniques
- Anchal Chander Lekha,Monika [Abstract] [ PDF] [Cite/Export] |
86 |
18
|
Predicting Dengue Fever Using Data Mining Techniques
- P. Sathya, Mrs. A.Sumathi [Abstract] [ PDF] [Cite/Export] |
94 |
19
|
Predicting Colon Cancer Using Data Mining Techniques
- K. Siva Sankari, Mrs M. Logambal [Abstract] [ PDF] [Cite/Export] |
97 |
20
|
Predicting Eye Cancer Using Data Mining Techniques
- K.Kowsalya Devi, Mrs.R. Mythili [Abstract] [ PDF] [Cite/Export] |
100 |
21
|
Reliable and Efficient Data Acquisition in Wireless Sensor Network
- S.Padmavathi, S.kawsalya [Abstract] [ PDF] [Cite/Export] |
104 |
22
|
A Brief Survey of Cryptography Techniques
- Dr. Kusum Lata Bharti, Dr. Varun Tiwari [Abstract] [ PDF] [Cite/Export] |
109 |
23
|
A Novel Fuzzy based Decision system for efficient Cross-Layer Based Multicast Routing in Manets
- M. Chandramouli Reddy, P. Venkata Krishna [Abstract] [ PDF] [Cite/Export] |
113 |
24
|
Text Extraction in Images
- Shraddha, Soumya B, Swathi S Hegde, Thejaswini, Prof Kaushik K.S [Abstract] [ PDF] [Cite/Export] |
119 |
25
|
Paper removed by Editorial Board |
|
26
|
Pshycopathy Traits from an Image Using Neuro Fuzzy Technique
- Pallavi Bhatt, Pawan Kumar Mishra [Abstract] [ PDF] [Cite/Export] |
130 |
27
|
Traffic Sign Recognition and classification using Convolutional Neural Networks
- Kenzari Zouleykha, Boulekouirat Sabrina, Abbas Fayçal, Bekhouche Abdelali [Abstract] [ PDF] [Cite/Export] |
137 |
28
|
A Neuro-Fussy Based Model for Diagnosis of Monkeypox Diseases
- Tom Joshua Joshua , Dr. Anebo, Nlerum P [Abstract] [ PDF] [Cite/Export] |
143 |
29
|
A Review of IoT-Based Flipped Learning Platform for Medical Education
- Sharda Tiwari, Dr Manuj Darbari [Abstract] [ PDF] [Cite/Export] |
154 |
30
|
Performance Evaluation of Secrete Image Steganography Techniques Using Least Significant Bit (LSB) Method
- Mrinal [Abstract] [ PDF] [Cite/Export] |
160 |