QR Code

IJCST

Visitors




Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 6 Issue 2 / Mar - Apr 2018

S.No
Title/Author Name
Page No
1
Analytic Study about Slotted Waveguide Antenna to Enhance Radiation Pattern of These Antenna
- Mayass Nassour, Moeen Younes
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


1
2
Performance Improve of Multipath Routing Protocols Using Wireless Sensor Networks
- Madiraju Jagadeeshwar, Dr.N.Satyanarayana
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


7
3
Hiding an Image Data into Video Stenography Using Different Algorithm and MATLAB : A Review
- Anchal Chander Lekha ,Monika Gautam
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


12
4
An Efficient Dynamic Channel Allocation Method for the Next Generation Mobile Networks
- P. Bonus Reddy, P. Venkata Krishna
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


17
5
Design and Implementation of Search Engine using Quick Sort Algorithm
- Hemant A. Lad, Shubham V. Kamble, Piyush A. Wanjari, Priyanka Tekadpande
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


23
6
Fractal Compression of Colored Satellite Stereo Images Based on HV Partitioning Method
- Heba Hatem , Mariam Saii, Al Samoual Saleh
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


28
7
Review and Analysis of Minimum Spanning Tree Using Prim's Algorithm
- Jogamohan Medak
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


34
8
Functionality Website Using Disability Persons
- Mr.Shahid.A, Mr.J.Jelsteen, Mr.Nithin Sunny
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


40
9
Industrial Pattern Analysis of the United Kingdom using Hadoop
- Dr. Bhoomi Gupta, Tanya Gupta, Archit Gupta
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


44
10
Heuristic Based Job Scheduling Approach to Process Large Data Packets
- Anjali Nema, Deepak Gour
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


49
11
A Keystroke Dynamics Based Authentication System
- Ravi Kiran, Sarita Soni
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


53
12
A Review of Techniques for VOIP Classification
- Anjali, Max Bhatia
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


56
13
A Survey on Phishing and Anti-Phishing Techniques
- L. Joy Singh
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


62
14
Graph Theory: Graph Based Feature Extraction Of Different Types Of Graphs
- Mr. Saptarshi Bhattacharyya, Mr. Abhijit Bera
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


69
15
Rat Trap Electronic Device (RTED)
- Muhammad Syakir Aiman, Suziana Omar, Fatimah Nur Mohd Redzwan, Nur Syahirah binti Kamarozaman, Ahmad Sabirin Zoolfakar
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


77
16
Achieving Space-Efficiency And Access Isolation By Implementing File Partition For Online Data
- Ankita Bung, C.Sudha, Sravanthi Nanumasa
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


81
17
Advanced and Secured Video Steganography Using Least Significant Bit and Discrete Wavelet Transform Techniques
- Anchal Chander Lekha,Monika
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


86
18
Predicting Dengue Fever Using Data Mining Techniques
- P. Sathya, Mrs. A.Sumathi
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


92
19
Predicting Colon Cancer Using Data Mining Techniques
- K. Siva Sankari, Mrs M. Logambal
[Abstract]  [IJCST  PDF]  [IJCSTCite/Export]


96

Under in review process, article will publish soon...

Copyright © 2013-2018 International Journal of Computer Science Trends and Technology,
Published By Eighth Sense Research Group™. All Rights Reserved.