IJCST ONLINE
DOWNLOADS
Call for Paper :

Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 2 Issue 3 / May-June 2014
|
S.No
|
Title/Author Name
|
Page No
|
|
1
|
Review on Video Mining
-Rupinder kaur, Shruti Aggarwal Abstract |
1 |
|
2
|
Enhancing Asymmetric Encryption using DNA Based Cryptography
-Mamta Rani, Sandeep Jain, Asha Abstract |
7 |
|
3
|
Reducing Churn Rate Using Business Intelligence Approach in Data Mining
-Trasha Gupta Abstract |
12 |
|
4
|
Survey Paper on Basics of Cloud Computing and Data Security
-Jasleen Kaur, Ms.Anupma Sehrawat, Ms.Neha Bishnoi Abstract |
16 |
|
5
|
Analyzing the Factors Affecting Reusability for Black–Box Component
-Suchita Yadav, Amit Yadav, Surabhi Yadav Abstract |
20 |
|
6
|
A Survey: Classification Techniques
-ShamlaMantri, Ria Agrawal, ShraddhaBhattad, AnkitPadiya, RakshitRathi Abstract |
24 |
|
7
|
Comparative Analysis of Reactive Protocols in Mobile Ad Hoc Networks
-Nisha Mannan, Shipra Khurana, Mamta Rani Abstract |
28 |
|
8
|
A Comparative Analysis Review of Various MANET Routing Protocols
-Deepak Kumar Pathak, Abhilash Pandey, Garima Gupta Abstract |
33 |
|
9
|
Review on Text Clustering Using Statistical and Semantic Data
-Dilpreet Kaur, Shruti Aggarwal Abstract |
37 |
|
10
|
Survey Of Optimization Of Scheduling in Cloud Computing Environment
-Er.Mandeep kaur, Er.Rajinder kaur, Er.Sughandha Sharma Abstract |
43 |
|
11
|
A Review on Re-documentation Approaches and their Comparative Study
-Yamini Pathania, Gaurav Bathla Abstract |
48 |
|
12
|
Dynamic Programming He and Elgamal Used For Software Agent Security
-Prof. Sachin Upadhye, Dr. P.G. Khot Abstract |
52 |
|
13
|
Complexity and Precision Analysis of DFT Based ENF Extraction Methods
-Sumit Kumar Abstract |
56 |
|
14
|
Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm
-Sudhansu Ranjan Lenka, Biswaranjan Nayak Abstract |
60 |
|
15
|
IP Failure Handling Using Localized On-Demand Link State Routing
-Prof. S.M.Sangve, Sushil Warkar, Amit Shirke, Kunal Solanke, Pratap Patil Abstract |
65 |
|
16
|
A Survey of Digital Watermarking Techniques and its Applications
-Lalit Kumar Saini, Vishal Shrivastava Abstract |
70 |
|
17
|
Advanced Data Acquisition in Wireless Sensor Networks
-Deepthy Varghese Abstract |
74 |
|
18
|
A Survey of Data Mining: Concepts with Applications and its Future Scope
-Dr. Zubair Khan, Ashish Kumar, Sunny Kumar Abstract |
78 |
|
19
|
Design of High Probability & Low-Overhead Propagation Mechanism for Beacons in VANET
-Neethu C Sekhar Abstract |
83 |
|
20
|
The Common Interface Oriented Architectural Framework to Improve Compatibility of the Pure Object Oriented Cross Languages Interoperability
-Sonar Sanjay Bhagwan Abstract |
90 |
|
21
|
Adaptive Quadrant-Based Geographic Routing For MANET
-Babitha U B Abstract |
98 |
|
22
|
A Survey of Load Balancing Algorithms in Cloud Computing
-Harmandeep Singh Brar, Vivek Thapar, Kunal Kishor Abstract |
103 |
|
23
|
VHDL Implementation of π/4 QPSK MODEM
-M. S. Sadavarte, Prashil H. Zodape Abstract |
107 |
|
24
|
An Approach to Formulate Intelligent Data Repository
-A. Prema, A.Pethalakshmi Abstract |
113 |
|
25
|
Analysis of Attacks on Hybrid DWT-DCT Algorithm for Digital Image Watermarking With MATLAB
-Lalit Kumar Saini, Vishal Shrivastava Abstract |
123 |
|
26
|
Power Quality Time Series Data Mining Using S-Transform and Fuzzy Expert System
-Prasannnajit Dash Abstract |
127 |
|
27
|
Automatic Speech Recognition for Ahirani Language Using Hidden Markov Model Toolkit (HTK)
-Ajay S. Patil Abstract |
140 |

