IJCST ONLINE
DOWNLOADS
Call for Paper :

Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 1 / Jan - Feb 2015
|
S.No
|
Title/Author Name
|
Page No
|
|
1
|
Various Approaches of Intrusion Detection in Heterogeneous WSN
-Ms.Smita H.Karande, Mr.S.P.Kosbatwar Abstract |
1 |
|
2
|
Technical Review of Energy Management Mechanisms in Wireless Sensor Network
-Smit D. Saraiya, Yogendra K. Patel, Urvish D. Modi, Vatsal P. Shah, Hardik A. Patel, Sandip Delwadkar Abstract |
5 |
|
3
|
Metadata Based Approach for Web Multimedia Model
-Siddu P. Algur, Basavaraj A. Goudannavar, Prashant Bhat Abstract |
11 |
|
4
|
FUZZY SQL For Linguistic Queries
-Poonam Rathee Abstract |
17 |
|
5
|
Secure Video Data Hiding Using DCT and LZW
-Kumbhar Shraddha, Rokade Varsha, Sukre Mayuri Abstract |
24 |
|
6
|
Significant Analysis of Leukemic Cells Extraction and Detection Using KNN and Hough Transform Algorithm
-Subhan, Ms. Parminder Kaur Abstract |
27 |
|
7
|
Contrasting Different Distance Functions Using K-Means Algorithm
-Kanika, Gargi Narula Abstract |
34 |
|
8
|
Data Encryption In Unreliable Clouds
-Anuradha Yenkikar, Nikhil Pandit, Shrikant Shinde, Omprakash Pawar, Sachin Rajage Abstract |
37 |
|
9
|
Efficient Performance Evaluation for Robust Eye Localization System
-Krupa Jariwala, Dr. Mrs. Upena Dalal Abstract |
40 |
|
10
|
Vehicle Parameter Monitoring Using CAN Protocol
-Pratiksha Nawale, Anjali Vekhande, Priyanka Waje Abstract |
46 |
|
11
|
Interconnection between Peripherals in SoC'S Using CDMA Technique
-K. Shankar, T. Dineshkumar Abstract |
50 |
|
12
|
Security Applications for Malicious Code Detection Using Data Mining
-Suvendu Jena, Eshwari Kulkarni, Namrata Annaldas, Pravin Yalameli, Karishma Shingade Abstract |
56 |
|
13
|
OQM Model: A Case Study of Software Quality
-Mrs. Neha Agrawal Abstract |
62 |
|
14
|
A Highest Response Ratio Next(HRRN) Algorithm based Load Balancing Policy for Cloud Computing
-Rakesh Kumar Sanodiya, Dr. Sanjeev Sharma, Dr. Varsha Sharma Abstract |
72 |
|
15
|
Network Load Balancing and Its Performance Measures
-Ms. Arti Mishra Abstract |
77 |
|
16
|
An Overview of Data Mining and Warehousing – Architecture, Techniques and Applications
-P.Nithya, G.Lakshmipriya Abstract |
82 |
|
17
|
Agile Software Development Technological Implementation: Apache Struts Suitability
-Nitin Goel, Sudheer Kr Singh, Shashank Singh, Sameer Dixit Abstract |
87 |
|
18
|
Web Based Custom Validation Using Framework in Java
-Dr Ankur Saxena Abstract |
90 |
|
19
|
An Overview of CDMA Correlation Techniques in 3G Systems
-Ms. S. Chitra Abstract |
97 |
|
20
|
Campus Guidance and Security Application
-Prof.Santosh Pawar,Rahul Doke,Abhimanyu Jadhav,Mahaveer Khaire,Tejas Jawalkar Abstract |
101 |
|
21
|
A Study on Algorithmic Approaches and Mining Methodologies In Data Mining
-S. Padmapriya Abstract |
105 |
|
22
|
Concentration on the Area of Significance in Medical Images
-Jinesh K. Kamdar, Pritam A. Amre, Chintan B. Khatri, Prof. Mahendra S. Patil Abstract |
110 |
|
23
|
An Implementation of Improving the Service Accessibility for Cloud Users by Using Traffic Redundancy Elimination (TRE) Mechanism with PACK Technique
-Ms. R.Poorvadevi. A.Lakshmidurga, Ms.D.SaiVijitha, Ms. J.Praseeda Abstract |
115 |
|
24
|
A Survey on Cloud Computing Security and Solutions
-N. Sugavaneswaran, D.Saravanan Abstract |
124 |
|
25
|
Functionality Appraisal of Automated Testing Tools
-Tarannam Bharti, Er Vidhu dutt Abstract |
129 |
|
26
|
Data Generation for Analytics in HADOOP
-Anjali Devi, Aarif Birajdar, Madhuri Pol, Shobha Halle, Safiya Shaikh, Savita Halle Abstract |
135 |
|
27
|
Data Sharing in Cloud Storage by RSA based Encryption
-S. Monika, M. Jawahar, S.K. Murugaraja Abstract |
140 |
|
28
|
A Survey on Multi-Stage Interconnection Networks
-Dr. Harsh Sadawarti, Sony Bansal, Nirlaip Kaur Abstract |
143 |
|
29
|
Discovery and Visualization of Patterns in Data Mining Through Python Language
-Shipra Bansal, Nitin Bansal Abstract |
152 |
|
30
|
Designing of an Application on Health Development based on Android Platform
-Pallavi Gaur, Gopal Krishan Prajapat Abstract |
161 |
|
31
|
Reviewing execution performance of Association Rule Algorithm towards Data Mining
-Dr. Sanjay Kumar, Abhishek Shrivastava Abstract |
165 |
|
32
|
Performance Enhances Test Case Prioritization for Regression Testing
-Al Mehedi Hasan, Sheena Singh Abstract |
172 |
|
33
|
Comparison between Square Pixel Structure and Hexagonal Pixel Structure in Digital Image Processing
-Illa Singh, Ashish Oberoi Abstract |
176 |
|
34
|
A Review of Hybrid Intrusion Detection System
-Pushpak Singha, Anup Sheth, Rahul Lakkadwala, Akshay D. Gaikwad, Megha V. Kadam Abstract |
182 |
|
35
|
Handwritten Signature Verification based on SURF Features using HMM
-Ms Rajpal Kaur, Ms. Pooja Choudhary Abstract |
187 |
|
36
|
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
-Prof. Ms. Gulnaz Thakur, Prof. Trupti Dhumal, Prof. Ms. Ifra Kaladgi, Prof. Ms. Asiya Khan Abstract |
196 |
|
37
|
Routing Issues in Mobile Ad Hoc Networks: A Survey
-Meena Rao, Neeta Singh Abstract |
200 |
|
38
|
Sentiment Classification by Semantic Orientation Using SentiWordNet Lexicon from Online Customer Reviews
-Monalisa Ghosh, Prof (Dr) Gautam Sanyal Abstract |
206 |

