DOWNLOADS


IJCST IJCST




Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals

International Journal of Computer Science Trends and Technology

IJCST-Volume 6 Issue 4 / July-Aug 2018

S.No
Title/Author Name
Page No
1
Improve Total Harmonic Distortion Factor and Mitigation Reactive Power in AC Railway Systems by Using Shunt Active Filter
- Rashwan Ammon, Mohsen Daod
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


1
2
Elaborative Analysis on Data Mining Techniques and Tools
- Ms. Palvi
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


7
3
Hybrid Segmentation with Canny Edge and K Means Clustering To Extract the Mammogram Tumor
- M Punitha, K.Perumal
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


11
4
Study the Equations of Motion for a Hexacopter Aerial Vehicle based on The Newton-Euler Method
- Taimaa Saleh, Kinda Aboukassem
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


17
5
Analyzing Different Approaches of Text Mining Techniques and Applications
- S.Sheela, T.Bharathi
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


23
6
Review Of Fault Tolerance Strategies Use Within Cloud Computing
- Rupinder Kaur, Malkit Singh
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


30
7
Comprehensive Analysis of Security Mechanisms Within Cloud Computing
- Sumanpreet Kaur, Malkit Singh
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


38
8
A Comparative Study of Techniques used in Video Streaming of VANETs
- Divya Susan Mathew
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


43
9
A Study on Wireless Sensor Network Protocols
- Dr. K. Mohan Kumar, P. Narmatha
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


48
10
PCB
- Fazlul Hasan Siddiqui, Md. Mostafijur Rahman, Md. Baker Hossen, Md. Asrafullah
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


57
11
Comparitive Analysis of Image Segmentation Methods
- Anjali S
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


63
12
Hand and Finger Fracture Detection and Type Classification Using Image Processing
- Mariam M Saii, Ali M Mayya
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


68
13
Survey Of Energy Efficiency In Fault Tolerance Through The Distinct Technqiues
- Navjot Kaur, Malkit Singh
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


77
14
A Study on Hacking and Ethical Hacking
- Dr.K.Mohan Kumar, K.Kavitha
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


81
15
Bigtable: A Distributed Multilevel Map
- Amritansh Singh Chauhan, Akshita Khatri, NikharBhatnagar, Priyanka Sharma
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


90
16
Mining Web Content Using Naïve Bayes Classification Analysis
- K.S. Jeen Marseline
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


94
17
Error Rectification Using Backpropagation
- P.T.V.Lakshmi
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


97
18
Automatic Scaling Of Internet Application For Cloud Computing
- C.Muruganandam, M.Gayathiri
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


101
19
Detecting and preventing SQL Injection Attacks
- Amir Nasser, Reyad Daher
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


109
20
An Extensive Study on the Multimodal Medical Image Fusion Techniques
- Kalaivani Ramasamy, Dr.Anna Saro Vijendran
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


116
21
Blood Vessel Segmentation and Classification Based On ANFIS Method for Retinal Images
- Divya, Senbagavalli.c
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


123
22
A Review Paper on Cryptography-Science of Secure Communication
- T.Saravanan, Dr.S.Venkatesh Kumar
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


131
23
A Review Paper on Current Data Mining Applications and Techniques
- M.Vignesh, Dr.V.Kathiresan
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


134
24
Network Security Based on Authentication Techniques
- J.Revanthraj,T.Sathyabama
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


139
Copyright © 2013-2020 International Journal of Computer Science Trends and Technology,
Published By Eighth Sense Research Group™. All Rights Reserved.