IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 6 Issue 4 / July-Aug 2018
S.No
|
Title/Author Name
|
Page No
|
1
|
Improve Total Harmonic Distortion Factor and Mitigation Reactive Power in AC Railway Systems by Using Shunt Active Filter
- Rashwan Ammon, Mohsen Daod [Abstract] [ PDF] [Cite/Export] |
1 |
2
|
Elaborative Analysis on Data Mining Techniques and Tools
- Ms. Palvi [Abstract] [ PDF] [Cite/Export] |
7 |
3
|
Hybrid Segmentation with Canny Edge and K Means Clustering To Extract the Mammogram Tumor
- M Punitha, K.Perumal [Abstract] [ PDF] [Cite/Export] |
11 |
4
|
Study the Equations of Motion for a Hexacopter Aerial Vehicle based on The Newton-Euler Method
- Taimaa Saleh, Kinda Aboukassem [Abstract] [ PDF] [Cite/Export] |
17 |
5
|
Analyzing Different Approaches of Text Mining Techniques and Applications
- S.Sheela, T.Bharathi [Abstract] [ PDF] [Cite/Export] |
23 |
6
|
Review Of Fault Tolerance Strategies Use Within Cloud Computing
- Rupinder Kaur, Malkit Singh [Abstract] [ PDF] [Cite/Export] |
30 |
7
|
Comprehensive Analysis of Security Mechanisms Within Cloud Computing
- Sumanpreet Kaur, Malkit Singh [Abstract] [ PDF] [Cite/Export] |
38 |
8
|
A Comparative Study of Techniques used in Video Streaming of VANETs
- Divya Susan Mathew [Abstract] [ PDF] [Cite/Export] |
43 |
9
|
A Study on Wireless Sensor Network Protocols
- Dr. K. Mohan Kumar, P. Narmatha [Abstract] [ PDF] [Cite/Export] |
48 |
10
|
PCB
- Fazlul Hasan Siddiqui, Md. Mostafijur Rahman, Md. Baker Hossen, Md. Asrafullah [Abstract] [ PDF] [Cite/Export] |
57 |
11
|
Comparitive Analysis of Image Segmentation Methods
- Anjali S [Abstract] [ PDF] [Cite/Export] |
63 |
12
|
Hand and Finger Fracture Detection and Type Classification Using Image Processing
- Mariam M Saii, Ali M Mayya [Abstract] [ PDF] [Cite/Export] |
68 |
13
|
Survey Of Energy Efficiency In Fault Tolerance Through The Distinct Technqiues
- Navjot Kaur, Malkit Singh [Abstract] [ PDF] [Cite/Export] |
77 |
14
|
A Study on Hacking and Ethical Hacking
- Dr.K.Mohan Kumar, K.Kavitha [Abstract] [ PDF] [Cite/Export] |
81 |
15
|
Bigtable: A Distributed Multilevel Map
- Amritansh Singh Chauhan, Akshita Khatri, NikharBhatnagar, Priyanka Sharma [Abstract] [ PDF] [Cite/Export] |
90 |
16
|
Mining Web Content Using Naïve Bayes Classification Analysis
- K.S. Jeen Marseline [Abstract] [ PDF] [Cite/Export] |
94 |
17
|
Error Rectification Using Backpropagation
- P.T.V.Lakshmi [Abstract] [ PDF] [Cite/Export] |
97 |
18
|
Automatic Scaling Of Internet Application For Cloud Computing
- C.Muruganandam, M.Gayathiri [Abstract] [ PDF] [Cite/Export] |
101 |
19
|
Detecting and preventing SQL Injection Attacks
- Amir Nasser, Reyad Daher [Abstract] [ PDF] [Cite/Export] |
109 |
20
|
An Extensive Study on the Multimodal Medical Image Fusion Techniques
- Kalaivani Ramasamy, Dr.Anna Saro Vijendran [Abstract] [ PDF] [Cite/Export] |
116 |
21
|
Blood Vessel Segmentation and Classification Based On ANFIS Method for Retinal Images
- Divya, Senbagavalli.c [Abstract] [ PDF] [Cite/Export] |
123 |
22
|
A Review Paper on Cryptography-Science of Secure Communication
- T.Saravanan, Dr.S.Venkatesh Kumar [Abstract] [ PDF] [Cite/Export] |
131 |
23
|
A Review Paper on Current Data Mining Applications and Techniques
- M.Vignesh, Dr.V.Kathiresan [Abstract] [ PDF] [Cite/Export] |
134 |
24
|
Network Security Based on Authentication Techniques
- J.Revanthraj,T.Sathyabama [Abstract] [ PDF] [Cite/Export] |
139 |