IJCST ONLINE
DOWNLOADS
Call for Paper :

Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 3 Issue 6 / Nov-Dec 2015
|
S.No
|
Title/Author Name
|
Page No
|
|
1
|
Text Mining Approach in Curtailing Cyber-Crimes in Nigeria
- Kasali Funmilayo, Kuyoro Afolashade, Awodele Oludele Abstract |
1 |
|
2
|
Survey on Log Analysis and Management
- Sandesh Thosar, Abhishek Mane, Swapnil Raykar, Rahul Jain, Pallavi Khude, Shanthi Guru Abstract |
9 |
|
3
|
Owner Secured Data Storage on Cloud and Sharing With Key Aggregate System
- Miss.Snehal Lande, Miss. Varsha Mhaske, Mr.Mahesh Lagad, Prof. Raskar R.B Abstract |
15 |
|
4
|
Identification of Fraudulent Phishing Emails Based On CSS Standard Technique to Explore Similarities in Web Pages
- Aishwarya Chavan, Raadhieca Iyer, Aparna Ramtirthakar, Mrs. Shanthi K. Guru, Ms. Pallavi Khude Abstract |
20 |
|
5
|
A Survey On Image Summarization Algorithms
- Sreelakshmi S, Mr. Paul P Mathai Abstract |
26 |
|
6
|
Automatic Assessment of Handwritten Essays Using LCS
- Reshma.V.M, Linda Sara Mathew Abstract |
32 |
|
7
|
An EPQ Model for Two-Parameter Weibully Deteriorated Items with Exponential Demand Rate and Completely Backlogged Shortages
- Devyani Chatterji, U. B. Gothi Abstract |
38 |
|
8
|
Data Structure for Representation of Big Data of Weather Forecasting: A Review
- Dhanashri V. Sahasrabuddhe, PallaviP.Jamsandekar Abstract |
48 |
|
9
|
Comparative Analysis of Parallel AES Algorithm with Pipelined AES Algorithm
- Tannu Bala, Yogesh Kumar Abstract |
57 |
|
10
|
A Survey of Different Public-Key Cryptosystems
- Anita Ganpati, Narender Tyagi Abstract |
63 |
|
11
|
A Carpool System Using Genetic Algorithm
- Prof. Shilpa P. Bunjkar, Himanshu Pareek, Nilamber Singh, Aditi Sisodiya, Neha Tarare Abstract |
71 |
|
12
|
A Survey Paper On Removal of File Duplication At Block Level In A Hybrid Cloud
- Pritam Dalvi, Vishnu Wagh, Shubham Kale, Krushna Khandagale, Dipalee A. Chaudhari, Soniya Bastawade Abstract |
75 |
|
13
|
A Review of Arithmetic Competitions on Cell phones in basic school with particular emphasis on Arabic/Hindi Numerals
- Mohammed Elbasheir Mohammed Babekir Abstract |
80 |
|
14
|
FRAPPE: Making Facebook More Secure
- Ritu Kumari, Utkarsha Mamidwar, Sanjoli Kapoor, Kritika Sharma, Mrs.Deepali Gothawal Abstract |
88 |
|
15
|
Spatio-Temporal Outlier Analysis and Detection using K-medoids with SVM
- M. Naveena Priya ,Mrs. P.Anitha, Abstract |
93 |
|
16
|
Projections of E-Commerce in India
- Jayanti Goya Abstract |
101 |
|
17
|
Cloud Computing Systems: Confidentiality Protection Of Data
- Mr. Chandan B, Mr. Vinay Kumar K Abstract |
105 |
|
19
|
A Comprehensive Review on Object detection in Video Surveillance
- Mamta Chopade, Pooja Chordiya, Shubhangi Godse, Prof. Anjali Shejul Abstract |
124 |
|
20
|
A Survey on Plant Disease Identification
- Vipinadas.M.J,Thamizharasi.A Abstract |
129 |
|
21
|
Green Computing and Power Management
- J.Selvam Abstract |
136 |
|
22
|
Middleware Interoperability using SOA for Enterprise Business Application
- T Sathis Kumar Abstract |
140 |
|
23
|
Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud
- Ms.Priya Kharmate, Prof. Ranjeetsingh Suryawanshi Abstract |
145 |
|
24
|
Statistical Analysis of Correlations Developed For Parametric Control in Machining With EDM
- B.N.Sreenivas, Dr Ch.V.S.ParameswaraRao Abstract |
150 |

