IJCST ONLINE
DOWNLOADS
Call for Paper :

Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 5 / Sep - Oct 2015
|
S.No
|
Title/Author Name
|
Page No
|
|
1
|
High Availability and Faster Convergence Techniques in IP Networks
-Er. Jashandeep Kaur, Er.Rupinder Kaur Gurm Abstract |
1 |
|
2
|
Comparative Analysis of WAN Technologies
-Er.Harsimranpreet Kaur, Er.Rupinder Kaur Gurm Abstract |
9 |
|
3
|
Survey on Intelligent Data Repository Using Soft Computing
-A. Prema, A.Pethalakshmi Abstract |
21 |
|
4
|
Mining With Big Data Calculating Frequent Patterns Using APRIORI Algorithm
-A.Srinivas, A.Sowjanya, J.Sushmitha Abstract |
41 |
|
5
|
Application of Representative-Based Clustering Using Hartigan & Wong Approach to Discern Electrical Switching Patterns
-Tushar Gupta, Somnath Saha, Prerna Gaur Abstract |
46 |
|
6
|
Touch And Transfer Using Red TACTON
-Akash D. Patel, Muhib A. Lambay, Muneer R. Ahmed Abstract |
55 |
|
7
|
Discovering End-To-End Communication Patterns in Manets Using GSTARS
-Ubokobong Esang, C Fancy Abstract |
59 |
|
8
|
Online Examination Management System Using Genetic Algorithm
-Umed H. Suthar, Prof. Abdul Rais, Ashish Upadhyay, Prabhakar Upadhya Abstract |
68 |
|
9
|
Multi Document Utility Presentation using Sentiment Analysis
-Mayur S. Dhote, Prof. S. S. Sonawane Abstract |
72 |
|
10
|
A Present-Day Approach For 5G Technology
-Yashpal Abstract |
78 |
|
11
|
M-Ticketing using Smartphones
-Kunal Mishra,Viraj Samant, Arvind Shukla, Waseem Sultan Abstract |
82 |
|
12
|
Mitigating Flooding Attacks in Disruption Tolerant Network
-Aniekan Julius Bassey, C Fancy Abstract |
85 |
|
13
|
Multiple Sink Placement Strategies by finding Maximum Cluster of Nodes in Wireless Sensor Networks
-Qazi Salman Khaliq, Rupinder Kaur Abstract |
92 |
|
14
|
Web Application Vulnerability Detection and Mitigation With Static Exploration
-Uduakobong Asuquo Ituen, M. B. Mukeshkrishnan Abstract |
101 |
|
15
|
Text Fusion in Grayscale Medical Images at Area of Non Interest
-Naveen Kumar, Dr.Sunil Shukla Abstract |
110 |
|
16
|
Cloud Computing: An Outlook
-Jayanti Goyal Abstract |
114 |
|
17
|
Effective Time and Cost Based Task Scheduling In Grid Computing
-Shashi Bhushan Semwal, Mr. Amit Das Abstract |
118 |
|
18
|
Secure Clustering Algorithm for Wireless Sensor Networks in the Perspective of Confidentiality
-Antai Uduak-obong Ekpo, Dr Magesh Abstract |
123 |
|
19
|
Parallel Multigrid Solver for Navier Stokes Equation Using Openmpi
-Mr.Shekhar Sitaram Shelke, Prof.Kalyani Waghmare Abstract |
131 |
|
20
|
A Review Investigation of Optical Fibre Communication Using WSN
-Ishmeet Kaur Abstract |
135 |
|
21
|
Basics of Algorithm Selection:A Review
-Niharika Singh, DR. R. G. Tiwari Abstract |
139 |
|
22
|
Web Application Framework: Review
-Rimjhim Mishra, Dr.Pankaj Kumar Abstract |
143 |
|
23
|
Control of Vehicle Effluence through Internet of Things & Android
-Amit.V.Kachavimath Abstract |
148 |
|
24
|
Customized ERP System for Testing and Calibration Laboratory
-Sourabh Singh, Muhib Lambay,Nitesh Tembe,Nasreen Shaikh Abstract |
154 |
|
25
|
Robotic Maid
-Umesh Yadav, Dharmendra Yadav,Ashraf Siddiqui Abstract |
157 |
|
26
|
Making Network More Tolerant Towards Fault by Using Centralized Techniques
-Ajay Kumar, Jasmeet Singh Abstract |
159 |
|
27
|
Distributed Trust Management Model for Peer To Peer Systems
-M.Anitha,R.Hemalatha Abstract |
165 |
|
28
|
Question Paper Generator System
-Surbhi Choudhary, Abdul Rais Abdul Waheed, Shrutika Gawandi, Kavita Joshi Abstract |
174 |
|
29
|
Network Traffic Control Using Distributed Control Plane of Software Defined Networks
-Mr. Sachin Ashok Vanjari, Dr. R. B. Ingle Abstract |
177 |
|
30
|
Knowledge Based Service Diagnosis System
-Anish Bhagwat Abstract |
182 |
|
31
|
Survey on Texture Classification Methods
-Manisha Dhongade Abstract |
185 |
|
32
|
Optimized Page Ranking Algorithm for Online Digital Libraries
-Jigyasa Sidhu Abstract |
189 |
|
33
|
Analysing the Dependency of Exchange Rate on Crude oil Price with Wavelet Networks: Evidence from India
-M. Yasin Pir, Firdous Ahmad Shah, M. Asger Abstract |
202 |
|
34
|
Generic Architecture for Detecting Botnet
-Anushah Khan, Anchit Bijalwan Abstract |
210 |
|
35
|
Image classification using Householder Transform
-P.V Nishana Rasheed , R. Shreej Abstract |
235 |
|
36
|
Survey of Papers for Data Mining with Neural Networks to Predict the Student’s Academic Achievements
-Richa Shambhulal Agrawal, Prof. Mitula Hirenkumar Pandya Abstract |
246 |
|
37
|
Literature Survey On Contactless Palm Vein Recognition
-Roshni C Rahul, Merin Cherian, Manu Mohan C M Abstract |
250 |
|
38
|
An Analysis of Recently Used Steganography Techniques on Images
-Somya Rastogi, Achala Shakya Abstract |
256 |
|
39
|
A Comprehensive Study on Next Generation Internet Protocol (Ipv6) and Security Vulnerabilities
-M.Buvaneswari, Dr.N.Rajendran Abstract |
261 |
|
40
|
A Review on Text Mining Techniques
-S.Sathya, Dr.N.Rajendran Abstract |
274 |
|
41
|
Evaluating The Effects of the Energy Management’s Issues on the MANET’s Performance Using Two Native Routing Protocols against a Power-Aware Routing Protocol
-Gatete Marcel, Dr. N. Vetrivelan Abstract |
285 |
|
42
|
Baseline Collaborative Image Retrieval Using Euclidean Distances Metric Learning
-Shubhangi Durgi, Prof. Pravinkumar Badadapure Abstract |
291 |
|
43
|
Throughput-Aware Probabilistic Rebroadcasting Method to Reduce Routing Overhead in Mobile Ad Hoc Network
-Mr. H. T. Gurme, Mr. B. R. Solu Abstract |
298 |
|
44
|
Passive IP Traceback: Disclosing the Locations of Man in the Middle from Path Backscatter
-Aman Shekhar, Krishan Yadav, Krishna Yele, Utpal Chirag, Ms. Santhi K. Guru Abstract |
307 |
|
45
|
Literature Survey on Supporting Security Assurance in Customized Web Search
-Pallavi Shinde, Vaibhavi Joglekar, Shital Londhe, Mayank Mrinal, Mrs. D. A. Phalke Abstract |
312 |

