DOWNLOADS


IJCST IJCST




Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 6 Issue 3 / May-June 2018

S.No
Title/Author Name
Page No
1
Latency Equalization as a New Network Service Primitive in an Interactive Network Application
- Kappala Suryass Kavya Priya, Mr.Prasad
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


1
2
Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption Technique
- Chekkala Vindhya Devi, Mr.Prasad
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


6
3
Credit Card Fraud and Detection Techniques: A Review
- Sankurathri Anusha Devi, Mr. Prasad
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


10
4
Predicting Blood Tumor and Hematology Using Data Mining Techniques
- J.Abinaya, Mrs.A.Sumathi
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


20
5
Detection and Classification of Vehicles using Deep learning
- Adami Fatima Zohra, Salmi Kamilia, Abbas Fayçal, Saadi Souad
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


23
6
Web Wizard: The Online Web Discussion Forum
- Akshatha Samanth, Ramya, Suraj, Vignesh Karkera, Prof Alok Ranjan
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


30
7
A Brief Survey of Software Testing Methods and Tools
- Dr. Kusum Lata Bharti, Dr. Tanvir Ahmad Abbasi, Dr. Varun Tiwari
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


34
8
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
- Qutaiba Mumtaz Dawood, Dr. K. Gangadhara Rao, Dr.B.Basaveswara Rao
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


38
9
Proposed E-Commerce Framework Using Cloud Computing Technology
- Raphael Olufemi Akinyede
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


47
10
Investigation on Giant Data leaning Data Analyzing and Processing knowledge
- Mr. Mehari Mesfin, Mr. Tewhasom Aregay Weldu, Dr. Narayana Babu
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


56
11
Optimised Approach for Traffic Prediction by Hybridizing KNN with Euclidean Distance with WSN
- Kawaljit kaur, Meenakshi Sharma
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


61
12
Energy Efficient Virtual Machine Scheduling Algorithm
- Simran Pathak, ,Ekta Raj, Meenakshi Ahirwar, Ekta Borasi,Anjana Pandey
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


67
13
Enhanced Approach for Attack Detection within Wireless Sensor Network
- Manbir kaur, Tejinderdeep singh
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


73
14
Electrical and Network Issue Monitoring System
- Akhila s shetty, Chaithra s, Joyline Deepthi Coelho, Shrinidhi Baindur, Shatanand Bhat
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


80
15
Routing Protocols in Ad Hoc Networks: An Overview
- Astha Sharma, Mr. Vikas Khatri
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


85
16
An Application for Teachers to Get Easy Access to Their Daily Activities in Classroom
- Nikhitha Shenoy, Nikitha, Nishith C Salian, P Sandesh Baliga, Prof Sunil Kumar B.L
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


91
17
The Evolution of Internet of Things: Bringing the power of Artificial Intelligence to IoT, its Opportunities and Challenges
- Dr. Venkatesh Naganathan, Prof. Rajesh Rao K
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


94
18
Designing Smart Campus Using Internet of Things
- Ahmed Abdi
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


109
19
Accelerating Information Retrieval using Natural Language Processing
- Vignesh Venkatesh
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


132
20
Tumbling the Occurrence of Faults in Medication with Electronic Data Skills
- Mrs. S.Veeralakshmi
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


133
21
Rigorous Operative Boundaries on the Hausdorff Measurement of Sustained Fraction Cantor Groups
- Mrs. S.Veeralakshmi M.Sc.,M.Phil
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


145
22
Practices of Healthcare Information Exchange in the Emergency Department of a Sudanese Hospital
- Amgad Atta Abdelmageed Mohammed, Dr Lars Rune Christensen
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


171
23
A Review Of 28 Years Of Health Information Exchange Research: Achievements,Challenges And Future Work
- Amgad Atta Abdelmageed Mohammed, Dr Lars Rune Christensen
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


178
24
Cryptographic Security technique in Hadoop for Data Security
- Praveen Kumar, Pankaj Sharma
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


188
25
A Literature Survey on Modified Iterative Channel Estimation with Coded OFDM System
- Ajay Kumar, Dr. Abhishek Sharma
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


194
26
Sentimental Analysis of Movies Tweets with Different Analyzer
- Manish Gupta, Pankaj Sharma
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


200
27
Development of an Arabic Image Description System
- Rasha Mualla, Jafar Alkheir
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


205
28
Analysis and Comparison of License Vehicle Number Plate Recognition Techniques
- Munish Bansal, Navneet Kaur
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


214
29
A Novel Advisory System for the Psychological Guidance of University Students
- A. E. E. ElAlfi, A. E. Shalaby, M. E. E. ElAlmi, S. A. Shaban
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


219
30
Securing Data in Cloud using Disinformation Data In Fog Computing
- Urmi Priyadarshani Das, VijayaKumar R, Dr B Rajalakshmi Ravishankar
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


244
31
Data Mining Techniques Using To Weather Prediction
- P.Kalaiyarasi, Mrs.A.Kalaiselvi
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


249
32
Cloud Computing: An Avenue for Enhancing E-Government Syst
- Mbanzabugabo Jean Baptiste, Phd, Bizimana Theoneste, Uwitonze Gilbert
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


255
33
Impact of Intelligent Road Traffic Control in a Technologically Connected Vehicle Environment
- Mr. Hitiyaremye Eric, Dr. Mbanzabugabo Jean Baptiste, Mr. Uwitonze Gilbert
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


265
34
Deployment of Citizen Service Centers Using Simulated Annealing Method Applied Study on Damascus the Capital City of Syria
- Alaa H. Alhaffa, Sameer R. Sharaf
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


275
35
Cross Entropy - Genetic Algorithm based Optimized Supply Chain Model
- K.Abishek Kumar
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


287
36
A Study on Invasion Detection into Deep Packet Inspection for Finding Malware
- Khadarbasha.Dada, T Sai Prasad Reddy
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


296
37
Role of Mobile Social Networks in Information Diffusion
- S Revanth, Dr B.Geetha vani
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


308
38
Cybercrime Risk Avoidance on Online Service
- A.SriCheritha, J.VSMRaju
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


314
39
Sentiment Analysis
- Shanta H Biradar, Dr.J.V Gorbal
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


325
40
Introduction to Computer Network with Security
- Kapila Purohit
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


333
41
On The Greatest Splitting Topology
- L.Sowmyalatha, K.Thirunanasambandam
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


335
Copyright © 2013-2020 International Journal of Computer Science Trends and Technology,
Published By Eighth Sense Research Group™. All Rights Reserved.