IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 6 Issue 3 / May-June 2018
S.No
|
Title/Author Name
|
Page No
|
1
|
Latency Equalization as a New Network Service Primitive in an Interactive Network Application
- Kappala Suryass Kavya Priya, Mr.Prasad [Abstract] [ PDF] [Cite/Export] |
1 |
2
|
Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption Technique
- Chekkala Vindhya Devi, Mr.Prasad [Abstract] [ PDF] [Cite/Export] |
6 |
3
|
Credit Card Fraud and Detection Techniques: A Review
- Sankurathri Anusha Devi, Mr. Prasad [Abstract] [ PDF] [Cite/Export] |
10 |
4
|
Predicting Blood Tumor and Hematology Using Data Mining Techniques
- J.Abinaya, Mrs.A.Sumathi [Abstract] [ PDF] [Cite/Export] |
20 |
5
|
Detection and Classification of Vehicles using Deep learning
- Adami Fatima Zohra, Salmi Kamilia, Abbas Fayçal, Saadi Souad [Abstract] [ PDF] [Cite/Export] |
23 |
6
|
Web Wizard: The Online Web Discussion Forum
- Akshatha Samanth, Ramya, Suraj, Vignesh Karkera, Prof Alok Ranjan [Abstract] [ PDF] [Cite/Export] |
30 |
7
|
A Brief Survey of Software Testing Methods and Tools
- Dr. Kusum Lata Bharti, Dr. Tanvir Ahmad Abbasi, Dr. Varun Tiwari [Abstract] [ PDF] [Cite/Export] |
34 |
8
|
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
- Qutaiba Mumtaz Dawood, Dr. K. Gangadhara Rao, Dr.B.Basaveswara Rao [Abstract] [ PDF] [Cite/Export] |
38 |
9
|
Proposed E-Commerce Framework Using Cloud Computing Technology
- Raphael Olufemi Akinyede [Abstract] [ PDF] [Cite/Export] |
47 |
10
|
Investigation on Giant Data leaning Data Analyzing and Processing knowledge
- Mr. Mehari Mesfin, Mr. Tewhasom Aregay Weldu, Dr. Narayana Babu [Abstract] [ PDF] [Cite/Export] |
56 |
11
|
Optimised Approach for Traffic Prediction by Hybridizing KNN with Euclidean Distance with WSN
- Kawaljit kaur, Meenakshi Sharma [Abstract] [ PDF] [Cite/Export] |
61 |
12
|
Energy Efficient Virtual Machine Scheduling Algorithm
- Simran Pathak, ,Ekta Raj, Meenakshi Ahirwar, Ekta Borasi,Anjana Pandey [Abstract] [ PDF] [Cite/Export] |
67 |
13
|
Enhanced Approach for Attack Detection within Wireless Sensor Network
- Manbir kaur, Tejinderdeep singh [Abstract] [ PDF] [Cite/Export] |
73 |
14
|
Electrical and Network Issue Monitoring System
- Akhila s shetty, Chaithra s, Joyline Deepthi Coelho, Shrinidhi Baindur, Shatanand Bhat [Abstract] [ PDF] [Cite/Export] |
80 |
15
|
Routing Protocols in Ad Hoc Networks: An Overview
- Astha Sharma, Mr. Vikas Khatri [Abstract] [ PDF] [Cite/Export] |
85 |
16
|
An Application for Teachers to Get Easy Access to Their Daily Activities in Classroom
- Nikhitha Shenoy, Nikitha, Nishith C Salian, P Sandesh Baliga, Prof Sunil Kumar B.L [Abstract] [ PDF] [Cite/Export] |
91 |
17
|
The Evolution of Internet of Things: Bringing the power of Artificial Intelligence to IoT, its Opportunities and Challenges
- Dr. Venkatesh Naganathan, Prof. Rajesh Rao K [Abstract] [ PDF] [Cite/Export] |
94 |
18
|
Designing Smart Campus Using Internet of Things
- Ahmed Abdi [Abstract] [ PDF] [Cite/Export] |
109 |
19
|
Accelerating Information Retrieval using Natural Language Processing
- Vignesh Venkatesh [Abstract] [ PDF] [Cite/Export] |
132 |
20
|
Tumbling the Occurrence of Faults in Medication with Electronic Data Skills
- Mrs. S.Veeralakshmi [Abstract] [ PDF] [Cite/Export] |
133 |
21
|
Rigorous Operative Boundaries on the Hausdorff Measurement of Sustained Fraction Cantor Groups
- Mrs. S.Veeralakshmi M.Sc.,M.Phil [Abstract] [ PDF] [Cite/Export] |
145 |
22
|
Practices of Healthcare Information Exchange in the Emergency Department of a Sudanese Hospital
- Amgad Atta Abdelmageed Mohammed, Dr Lars Rune Christensen [Abstract] [ PDF] [Cite/Export] |
171 |
23
|
A Review Of 28 Years Of Health Information Exchange Research: Achievements,Challenges And Future Work
- Amgad Atta Abdelmageed Mohammed, Dr Lars Rune Christensen [Abstract] [ PDF] [Cite/Export] |
178 |
24
|
Cryptographic Security technique in Hadoop for Data Security
- Praveen Kumar, Pankaj Sharma [Abstract] [ PDF] [Cite/Export] |
188 |
25
|
A Literature Survey on Modified Iterative Channel Estimation with Coded OFDM System
- Ajay Kumar, Dr. Abhishek Sharma [Abstract] [ PDF] [Cite/Export] |
194 |
26
|
Sentimental Analysis of Movies Tweets with Different Analyzer
- Manish Gupta, Pankaj Sharma [Abstract] [ PDF] [Cite/Export] |
200 |
27
|
Development of an Arabic Image Description System
- Rasha Mualla, Jafar Alkheir [Abstract] [ PDF] [Cite/Export] |
205 |
28
|
Analysis and Comparison of License Vehicle Number Plate Recognition Techniques
- Munish Bansal, Navneet Kaur [Abstract] [ PDF] [Cite/Export] |
214 |
29
|
A Novel Advisory System for the Psychological Guidance of University Students
- A. E. E. ElAlfi, A. E. Shalaby, M. E. E. ElAlmi, S. A. Shaban [Abstract] [ PDF] [Cite/Export] |
219 |
30
|
Securing Data in Cloud using Disinformation Data In Fog Computing
- Urmi Priyadarshani Das, VijayaKumar R, Dr B Rajalakshmi Ravishankar [Abstract] [ PDF] [Cite/Export] |
244 |
31
|
Data Mining Techniques Using To Weather Prediction
- P.Kalaiyarasi, Mrs.A.Kalaiselvi [Abstract] [ PDF] [Cite/Export] |
249 |
32
|
Cloud Computing: An Avenue for Enhancing E-Government Syst
- Mbanzabugabo Jean Baptiste, Phd, Bizimana Theoneste, Uwitonze Gilbert [Abstract] [ PDF] [Cite/Export] |
255 |
33
|
Impact of Intelligent Road Traffic Control in a Technologically Connected Vehicle Environment
- Mr. Hitiyaremye Eric, Dr. Mbanzabugabo Jean Baptiste, Mr. Uwitonze Gilbert [Abstract] [ PDF] [Cite/Export] |
265 |
34
|
Deployment of Citizen Service Centers Using Simulated Annealing Method Applied Study on Damascus the Capital City of Syria
- Alaa H. Alhaffa, Sameer R. Sharaf [Abstract] [ PDF] [Cite/Export] |
275 |
35
|
Cross Entropy - Genetic Algorithm based Optimized Supply Chain Model
- K.Abishek Kumar [Abstract] [ PDF] [Cite/Export] |
287 |
36
|
A Study on Invasion Detection into Deep Packet Inspection for Finding Malware
- Khadarbasha.Dada, T Sai Prasad Reddy [Abstract] [ PDF] [Cite/Export] |
296 |
37
|
Role of Mobile Social Networks in Information Diffusion
- S Revanth, Dr B.Geetha vani [Abstract] [ PDF] [Cite/Export] |
308 |
38
|
Cybercrime Risk Avoidance on Online Service
- A.SriCheritha, J.VSMRaju [Abstract] [ PDF] [Cite/Export] |
314 |
39
|
Sentiment Analysis
- Shanta H Biradar, Dr.J.V Gorbal [Abstract] [ PDF] [Cite/Export] |
325 |
40
|
Introduction to Computer Network with Security
- Kapila Purohit [Abstract] [ PDF] [Cite/Export] |
333 |
41
|
On The Greatest Splitting Topology
- L.Sowmyalatha, K.Thirunanasambandam [Abstract] [ PDF] [Cite/Export] |
335 |