IJCST ONLINE
DOWNLOADS
Call for Paper :

Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 3 / May - June 2015
|
S.No
|
Title/Author Name
|
Page No
|
|
1
|
PCB Defect Detection Using Image Subtraction Algorithm
-Suhasini A, Sonal D Kalro, Prathiksha B G, Meghashree B S, Phaneendra H D Abstract |
1 |
|
2
|
Data Mining Technology for Efficient Network Security Management
-Ankit Naik, S.W. Ahmad Abstract |
7 |
|
3
|
Study on Recent Trends of Distributed Denial of Service Attack and Handling Approach
-Rajnish Kumar Mishra, Amarnath Singh, Vipin Kumar Gupta Abstract |
12 |
|
4
|
Security Certified LARDAR Protocol in Mobile Ad Hoc Network
-Kalpana Tyagi, Anamika Abstract |
18 |
|
5
|
A Survey on Awareness Regarding The Education Industry
-Kanav Sadawarti, Abhilash Sharma Abstract |
24 |
|
6
|
A Survey on the Power and Energy Consumption of Cloud Computing
-Harmanpreet Kaur, Jasmeet Singh Gurm Abstract |
28 |
|
7
|
Hybrid Cloud Approach for Reliable Authorized Deduplication
-Shaik Shaju, V.V.Krishna Reddy, D. V. Subbaiah Abstract |
32 |
|
8
|
Localization Problem Solution Using K-Mean Clustering and Bacterial Foraging Optimization in Wireless Sensor Network
-Er. Nisha Devi, Er. Harpreet Kaur Abstract |
38 |
|
9
|
A Semantic Link Network Based Search Engine for Multimedia Files
-Anuj Kumar, Ravi Kumar Singh, Vikas Kumar, Vivek Patel, Priyanka Paygude Abstract |
44 |
|
10
|
Survey on Advancements in Retail Sector and Its Future
-Pradeep Singh Guleria, Dr. Harsh Sadawarti Abstract |
50 |
|
11
|
Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm
-G.Gayathri, N.Prabakaran Abstract |
54 |
|
12
|
A Survey on Scheduling Strategies in Cloud Computing
-Aarti, Malti Rani, lohit kapoor Abstract |
59 |
|
13
|
Rainfall Prediction using Neural Network
-Ankita Sharma, Geeta Nijhawan Abstract |
65 |
|
14
|
Captcha-Based Password Authentication - Security Primitive Based On Hard AI Problems
-S.Vamsi Krishna,K. Lavanya, D. V. Subbaiah Abstract |
70 |
|
15
|
Secure Deduplication in Hybrid Cloud Using Differential Privileges
-Vinutha B T , Yogish H K Abstract |
75 |
|
16
|
Proposed Optimal Solution of TSP Using ACO
-Sanjeev Kumar, Shubham Sidana,Deepali Dev Abstract |
78 |
|
17
|
Fairness of Packet Forwarding Strategy in Opportunistic Mobile Networks
-U. Venkata Padmasai, D. Pramodh Krishna, D. V. Subbaiah Abstract |
82 |
|
18
|
Arithmetic Coding for Lossless Data Compression – A Review
-Ezhilarasu P, Krishnaraj N, Dhiyanesh B Abstract |
89 |
|
19
|
A Friend Recommender System for Social Networks by Life Style Extraction Using Probabilistic Method -“Friendtome”
-Namrata M.Eklaspur, Anand S.Pashupatimath Abstract |
95 |
|
20
|
Video Dissemination Protocol Over Hybrid WIFI Cellular Networks
-B.Lalin, B.Koteswar Rao, D. V. Subbaiah Abstract |
102 |
|
21
|
A Survey on Sentence Level Sentiment Analysis
-Vrushali K. Bongirwar Abstract |
110 |
|
22
|
Analysis of Base Station Adaptive Antenna Array Performance in CDMA20001x Mobile Radio Network
-Ifeagwu E.N, Obi P.I, Ejiofor H.C, Okoro K.C Abstract |
114 |
|
23
|
Privacy Preservation in Collaborative Data Mining As Goal Oriented Attack Model
-Mr. J.RangaRajesh, Mrs. Srilakshmi.Voddelli, Mr. G.Venkata Krishna, Mrs. T.Hemalatha Abstract |
123 |
|
24
|
A Survey on Different Digital Video Monitoring Systems
-Dr A.J. Patil, Gayatri.P.Sonawane Abstract |
132 |
|
25
|
Bandwidth Allocation in Cloud-Based Wireless Live-Streaming
-Mrs. Kaushlya Salunkhe, Prof. Mrs. Sanchika Bajpai Abstract |
135 |
|
26
|
Reboost Image Segmentation Using Genetic Algorithm
-Shanta H Biradar Abstract |
143 |
|
27
|
Monitoring Of Environmental Parameters by Using Cloud Computing
-Mayur Randhir, R. R. Karhe Abstract |
151 |
|
28
|
An Efficient Adaptation of Edge Feature-Based Video Processing Algorithm for Wireless Multimedia Sensor Networks
-Thanaa Jbeily, Mothanna Alkubeily, Iyad Hatem Abstract |
156 |
|
29
|
Application of Survival Analysis Model on Drug Addiction Dataset
-Runumi Devi Abstract |
167 |
|
30
|
Improving Electrical Energy Efficiency in Nigerian Industries
-Akinwole O.O Abstract |
170 |
|
31
|
A Fuzzy Inference Model for Reliability Estimation of Component Based Software System
-Gopal Prasad Jaiswal, Ram Nivas Giri Abstract |
177 |
|
32
|
Correlation Analysis of Meteorological Data in Region of Tamil Nadu Districts Based On K- Means Clustering Algorithm
-M. Mayilvaganan, P. Vanitha Abstract |
184 |
|
33
|
Algorithm Design for Robust Web Personalization Using Neural Network
-Ramandeep Kaur, Er. Iqbaldeep Kaur Abstract |
191 |
|
34
|
Securing User Location in Social Applications Using Direct Conversions
-Gettuboyina.Nalini, M.Krishna Kishore Abstract |
196 |
|
35
|
PCB
-Ankit Kandpal, Vishal Ramola Abstract |
201 |
|
36
|
An Approach To Incentive-Based Reputation For Mobile Ad Hoc Networks
-Vivek Richhariya, Praveen Kaushik Abstract |
207 |
|
37
|
Comparative Analysis Of MPLS Layer 3VPN And MPLS Layer 2 VPN
-Umar Bashir Sofi, Er. Rupinder Kaur Gurm Abstract |
214 |
|
38
|
Providing High Privacy And Hop-by-Hop Message Authentication In Wireless Sensor Networks
-Kudumula Manasa, Vadlamudi Muniraju Naidu Abstract |
221 |
|
40
|
Android Based Punjabi TTS System
-Hardeep, Parminder Singh Abstract |
233 |
|
41
|
Automatic Hard Exudates Detection from Multi-Resolution Retinal Images Using HAAR Dual Tree Wavelet Transform
-Poonam M. Rokade Abstract |
238 |
|
42
|
Performance Analysis of Routing Protocols Using Various Parameters in MANET Scenario
-Anuradha, Prof. Navneet Verma Abstract |
246 |
|
43
|
Data Classification Using Support Vector Machine: A Review
-Er. Manju rani, Er. Lekha Bhambhu Abstract |
254 |
|
44
|
A More Effective Approach For Mining Powerful Users In A Blogosphere
-Mrinalini Tiwari, Hare Ram Shah Abstract |
258 |
|
45
|
Direct Security Approach Based on Trust Management In VANET
-Pankaj Singh Chouhan, Brajesh K. Shrivash, Priya Pathak Abstract |
261 |
|
46
|
Predictive Text Entry Method for Somali Language on Mobile Phone
-Mahamed Daud, Vishal Goyal Abstract |
274 |
|
47
|
Result Merging Approaches in Meta Search Engine: A Review
-Sarita Yadav, Jaswinder Singh Abstract |
281 |
|
48
|
Ascendible Information Sharing In Cloud Storage Using Secure Key-Aggregate Cryptosystem
- K.R.Viswanath, G.Prasadbabu Abstract |
286 |
|
49
|
Digital Image Steganographic Approach (DISA) to Enhance Quality and Imperceptibility
-Shampy Sharma, Dr. Ashish Oberoi, Pavninderpal Kaur Abstract |
294 |
|
50
|
Studies on Wire Selection for Machining With W E D M
-NBV Prasad, Ch.V.S.ParameswaraRao, S. Sivanaga MalleswaraRao Abstract |
300 |
|
51
|
Survey of Segmentation Techniques of Cancer Images Emphasizing on MRI Images
-R. Srivaramangai, Ajay. S. Patil Abstract |
304 |
|
52
|
Role of Image Segmentation in Digital Image Processing for Information Processing
-Manjula.KA Abstract |
312 |

