IJCST ONLINE
DOWNLOADS
Call for Paper :

Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 4 Issue 3 / May- Jun 2016
|
S.No
|
Title/Author Name
|
Page No
|
|
1
|
A Survey On Enforcing End-To-End Application Security in Cloud Computing
- T.Arunambika, P.Sudha Abstract |
1 |
|
2
|
Comparative Analysis of OSPF and Is- Is Routing Protocols with Service Provider Network
- Vikasdeep Kaur,Jaspreet Kaur,Harpreet Kaur Abstract |
9 |
|
3
|
Proxy Based Batch Authentication Scheme For Vehicular Ad Hoc Network
- Godavari H. Kudlikar, Sunita S. Barve Abstract |
13 |
|
4
|
A Survey on Cluster Head Election Techniques in Wireless Sensor Networks
- Sandeep Kaur, Navjeet Saini, Neelam chouhan, Pooja Harchand Abstract |
18 |
|
5
|
Prevention of Sybil Attacks in VANETS Using Bacterial Foraging Optimizations Algorithm
- Sakshi Gupta, Taranjit Singh Aulakh Abstract |
25 |
|
6
|
Review of Face Recognition system using MATLAB
- Navpreet Kaur Abstract |
30 |
|
7
|
A Review of Infected Part Detection of Apple Fruit Using Various Segmentation Techniques in Matlab
- Simran Bhagat Abstract |
34 |
|
8
|
Time-Frequency Coherence of Multichannel EEG Signals: Synchrosqueezing Transform Based Analysis
- Md. Sujan Ali, Mst. Jannatul Ferdous, Md. Ekramul Hamid, Md. Khademul Islam Molla Abstract |
40 |
|
9
|
Sentimental Analysis of Movie Reviews in Kannada
- Sai Darshan B.R, Shashank Bhatt.P, Karthik H.S, Sachin Kumar B.S, Merin Thomas, Dr.Latha C.A Abstract |
49 |
|
10
|
Hybridization of Improved K-Means and Artificial Neural Network for Heart Disease Prediction
- Shubhada Bhalerao, Dr. Baisa Gunjal Abstract |
54 |
|
11
|
Energy Aware Load Balancing Technique For Managing Network Workload in Cloud Computing
- Abhinav Thorat, Prof. Shrinivas Sonkar Abstract |
62 |
|
12
|
A Reliable System for Scaling Application over Clouds
- Sreepathi .B, Sheela B.P,Saisunethra K,Spandana,SnehaM.S, Rashmi.w Abstract |
67 |
|
13
|
Secure Cloud Storage using AccessControl with Anonymous Authentication
- Sreepathi.B, Santhamma, Ajanna Nadiu, Archana.L, Chinta Praveena Lakshmi, Preethi J Abstract |
73 |
|
14
|
Social Media Ways Trade Market of Opinions Transaction Twitter Analysis (Time)
- S.Nafeesa Begam Abstract |
78 |
|
15
|
JPEG Image Compression Using Various Algorithms: A Review
- Yashodha Devi Abstract |
89 |
|
16
|
A Review Study of Apache Spark in Big Data Processing
- V Srinivas Jonnalagadda, P Srikanth, Krishnamachari Thumati, Sri Hari Nallamala Abstract |
93 |
|
17
|
Dynamic Spectrum Sensing Scheduling in Cognitive Radio Networks - Effective Utility
- S.Tamilarasan, Dr.P.Kumar Abstract |
99 |
|
18
|
Implementation of Threshold Entropy Filter for Segmentation of Different Textures Using MATLAB
- Harjot, Rupinder Kaur Wahla Abstract |
103 |
|
19
|
Optimization of Link Cache in DSR over MANETs
- Mahantesh.H.M, Shivakeshi.C, Naveen Kumar.B, Pampapathi.B.M Abstract |
106 |
|
20
|
Detecting Selfish Nodes on Overlay Network and Optimizing the Network by Isolating Malicious Nodes using Reputation-Based Mechanism
- Naveen Kumar.B, Pampapathi.B.M, Mahantesh.H.M, Shivakeshi.C Abstract |
112 |
|
21
|
An Optimized method for Generating All Positive and Negative Association Rules
- Shivakeshi.C , Mahantesh.H.M, Naveen Kumar.B, Pampapathi.B.M Abstract |
117 |
|
22
|
An Approach for Content Based Image Retrieval Using Similarity Measures
- Ritu A. Mundada, Akash D. Waghmare Abstract |
124 |
|
23
|
Lung Cancer Diagnosis Based on Microarray Data by Using ART2 Network
- Fadoua Rafii, Badr Dine Rossi Hassani, M’hamed Aït Kbir Abstract |
129 |
|
24
|
Study for Accuracy Assessment of land use and land cover classification of New- Delhi, North India
- Pallavi Nain, Krishan kumar Abstract |
137 |
|
25
|
A Comprehensive Study of Recent Advancements in Methods and Tools for Network Anomaly Detection
-Koustubha Balakrishnan M, Dr. Vilas Maruthi Godki, Kuruvikulam Chandrasekaran Abstract |
144 |
|
26
|
De-Noising of Historical Document Images Using Ni-Black Thresholding
- Geetika Gupta, Rupinder Kaur, Arun Bansal Abstract |
157 |
|
27
|
Import Sourcing of Defect Life Cycle and Defect Management Process
- Dr V.Goutham Abstract |
163 |
|
28
|
Sentiment Analysis of Arabic Tweets: With Special Reference Restaurant Tweets
- Mnahel Ahmed Ibrahim , Naomie Salim Abstract |
173 |
|
29
|
An Unobservable Secure On-Demand Routing Protocol for Mobile Ad-Hoc Networks
- Nagaraj.M, Shivaraja.P, Sampath Kumar.R, Puneeth.G.J. Abstract |
180 |
|
30
|
Cloud Computing – A Classification, Business Models, and Research Directions
- Shalini Singh, Ramanjeet Kaur, Mandeep Hans, Arwinder Kaur Abstract |
187 |
|
31
|
Cloud Computing : Security Concerns
- Jitendra Nath Shrivastava, Uvaish Khan Abstract |
194 |
|
32
|
The Performance Computing of Oracle Database on AWS Cloud Storage
- Arpitha M.S Abstract |
200 |
|
33
|
An Approach to find node Voltages, Branch Currents and Power Losses of a Single and Three Phase Distribution System
- Arindam Banerjee, Amarnath Sanyal, Dr. Sourish Sanyal, Raju Basak, Subhasree Chatterjee Abstract |
204 |
|
34
|
Automatic 2D to 3D Stereoscopic Conversion
- Pallavi R. Kapse Abstract |
210 |
|
35
|
Expressive, Efficient and Revocable Data Access Control for Multi-Authority Cloud Storage
- Chetan Bulla, Akshata R. Patil, Priyanka B. Guttedar and Reshma G. Giddenavar Abstract |
215 |
|
36
|
A Fast Track Pedagogy of Software Architecture
- Sharada K S, Nagaraj M Benakanahalli, Pavana B, Arunakumar J Abstract |
223 |
|
37
|
Selfish Node Detection in Mobile Ad-Hoc Networks through Audit Approach with Correlation Function
- M.Madhumathi, R.Ashok Kumar Abstract |
229 |
|
38
|
A Survey on Novel Graph Based Clustering and Visualization Using Data Mining Algorithm
- M.Guruprasath, M. Elamparithi Abstract |
234 |
|
39
|
An Enhanced Supervised Random Walk Algorithm for Link Prediction
- A.vihashini, Dr.G.T.Prabhavathi Abstract |
241 |
|
40
|
Survey On Image Classification Methods In Image Processing
- Chaitali Dhaware, Mrs. K. H. Wanjale Abstract |
246 |
|
41
|
An Efficient Path Completion Technique for Web Log Mining
- Shanta H Biradar Abstract |
249 |
|
42
|
An Green And Energy Efficient Anonymous Routing Protocol With Multiple Hops For Communications In Highly Dynamic Hetrogenious Networks
- Bandi Palguna kumar, Sateesh,Vikram Neerugatti Abstract |
256 |
|
43
|
An Enhanced Text Compression System Based on ASCII Values and Huffman Coding
- Mamta Rani, Vikram Singh Abstract |
262 |
|
44
|
Dynamic Resource Allocation in Cognitive Radio Networks - Survey
- Prof. G.Ezra Sastry, Prof. S.Tamilarasan, Dr.P.Kumar Abstract |
268 |
|
45
|
PCB
- Shruti Pardhi, Mrs. K. H. Wanjale Abstract |
275 |
|
46
|
Shunt Active Power Filter for Power Quality Improvement by Fuzzy Controller
- Mrs. M. Inba Arasi, S. Ranjitha Abstract |
281 |
|
47
|
Performance Analysis of AODV and MAODV Routing Protocols in MANET
- Aanchal Joshi Abstract |
292 |
|
48
|
A Noval Medical Image Analysis and Compression Using Hybrid Wavelet Transform
- Vishal Tamrakar, Mr. Chandrashekhar Kamargaonkar, Dr. Monisha Sharma Abstract |
299 |
|
49
|
Sustainable Urban Transport System: A Case Study of Manpada Road
- Ms. Naikwadi Sumaiyya , Prof. Khare Pranay R, Prof. Darade Milind M Abstract |
304 |
|
50
|
One Hop and Fingerprint Techniques for Peer To Peer Multimedia Distribution
- Sajna.N.S, Annie R Das Abstract |
309 |
|
51
|
A 3-6 Ghz Current Reuse Noise Cancelling Low Noise Amplifier For WLAN And WPAN Application
- Shivabhakt Mhalasakant Hanamant, Dr.S.D.Shirbahadurakar Abstract |
315 |
|
52
|
ZigBee Security for Home Automation: A Comparison of Different Approaches
- Jisna V A, Sobha Xavier,Ninu Francis Abstract |
320 |
|
53
|
A Review: Restoring the Images and remove Blurry Effects from Scanned Document Images Using various MATLAB Algorithm
- Navdeep Kaur, Er.Divya Garg Abstract |
324 |
|
54
|
Speech Therapy Models For Disabled Children Using Data Mining Techniques- A Review
- Usha.M, Dr.L.Sankari Abstract |
328 |
|
55
|
Optimal Placement and Sizing of Solar Constructed Dg Using SSO Technique
- Vijay R, Antrut Jaffrin R, Ravichandran CS Abstract |
333 |
|
56
|
Technology and Autism: Is Technology a Boon for Autistic Children?
- Renju K, Megha C Abstract |
343 |
|
57
|
Web Image Re-Ranking Using Query Semantic Signature and Duplicate Detection
- Mr. Wavhal Rameshwar Ganpat, Prof. B.S.Chunchure Abstract |
347 |
|
58
|
Ranking of Products on the Basis of Aspects- A Probabilistic Approach
- Neha M. Toshniwal, Prof.D.V.Gore Abstract |
350 |
|
59
|
Paper Has Been Removed |
354 |
|
60
|
Issues In Development of Routing Techniques In Wireless Sensor Networks
- Harpreet Singh, Amarveer Singh Abstract |
361 |
|
61
|
Sentiment Analysis on Twitter Data Using Support Vector Machine
- Bholane Savita D., Prof.Deipali Gore Abstract |
365 |
|
62
|
Distributed Transaction System Application for Web Services Using Design Pattern
- Sushma D. Bobade Abstract |
371 |
|
63
|
Single or Multi-document Summarization Techniques
- Maithili Bhide Abstract |
375 |
|
64
|
Self-Organizing Trust Model
- Suyog Ashokrao Nagare, Prof. D.B. Kshirsagar Abstract |
380 |
|
65
|
Discovery of Ranking Frauds for Mobile Apps Using FRAppE Tool
- Dr.L.Pavithira Abstract |
384 |
|
66
|
BASIC PATTERN GENERATION FOR KALPANA SWARA SYNTHESIS USING GRAPHICAL APPROACH
- Mahesha Padyana, Bindu A Thomas Abstract |
384 |
|
67
|
Image Restoration using combined Adaptive Weiner Filter and Radial Basis Function ANN with Sub-block Decomposition for Medical Applications
- Arifa Sultana Abstract |
389 |

