IJCST ONLINE
DOWNLOADS
Call for Paper :

Welcomes Conference Proposals
International Journal of Computer Science aprTrends and Technology
IJCST-Volume 5 Issue 2 / Mar-Apr 2017
|
S.No
|
Title/Author Name
|
Page No
|
|
1
|
Fabrication Attack Effect on Medical Applications based on VANETs
- Aleen Sliman, Karam Madi, Aws Khadour, Boushra Maala, Ahmad S. Ahmad Abstract |
1 |
|
2
|
Information Extraction System for Amharic Text
- Sinatyehu Hirpassa Abstract |
5 |
|
3
|
Synthesizing High-Frequency Rules from Various Data Sources Using Weighting Method (Determining Service Quality in Hospitals)
- Mr.A.Arulmurugan, A. Ajitha, R. Gracy Abstract |
16 |
|
4
|
Hydrological Information System using Archydro Data Model
- Mr. Pritam R. Patil, Dr.S.B.Thorat, Dr.S.R.Pande Abstract |
20 |
|
5
|
Rank Using User Clicks & Location Based Image Retrieval
- Ms.T. Suganya, S. Vivek Abstract |
25 |
|
6
|
Self-Care Application Using Android Google Maps and Geofence
- B.Karthikeyan, R.Charan, L.Ganapathy, J.GobuViknesh, P.Afsal Abstract |
28 |
|
7
|
A Review :A Digital Image Steganography
- Mrs.M.A.Wakure, Mrs.S.A.Wakure Abstract |
33 |
|
8
|
Multi Heart Disease Classification in ECG Signal Using Neural Network
- Theynisha .R, Shree Soundharya .R , Umarani .S , AnithaNithya.R Abstract |
38 |
|
9
|
High Security Routing On Three-Hop
- Sreekesh TU, Sreelakshmi k sunil Abstract |
45 |
|
10
|
An Efficient Dynamic Slot Allocation Based On Fairness Consideration for MAPREDUCE Clusters
- T.P.Simi Smirthiga, P.Sowmiya, C.Vimala, Mrs P.Anantha Prabha Abstract |
53 |
|
11
|
ERP System for college
- Vivek Anand, Adarsh Poojary, Rafiur Mondal, Pooja Prajapati, Subhash C.R. Pal Abstract |
59 |
|
12
|
Enhanced Project Task Planning With Runtime Scheduler
- Ms.B.Sruthi, Ms.S.Savitha, Ms.R.Sathya,Ms.K.R.Sarumathi Abstract |
63 |
|
13
|
Heart Disease Prediction Using Naïve Bayes Algorithm and Laplace Smoothing Technique
- Vincy Cherian, Bindu M.S Abstract |
68 |
|
14
|
A Review on Multi-Relay Wireless Data Transmission with Delay Aware Load Balancing
- Rohitha R, Sheena N Abstract |
74 |
|
15
|
A Survey Paper on News Web Video Event Mining
- Aggie Varghese, Smitha M. Jasmine Abstract |
78 |
|
16
|
Privacy Preserving Data Analysis in Mental Health Research Using Cloud Computation
- Dr. B. Anni Princy, G.Tamilselvi, S.Shruthakeerthi, B.Sowmya Abstract |
81 |
|
17
|
Critical Review on Edge Detection Techniques in Spatial Domain on Low Illumination Images
- Sunita Janoriya, Prof. M.P. Parsai Abstract |
86 |
|
18
|
Automated Guided Vehicle With ARDUINO Using Magnetic Sensor
- Prof. Ashraf Siddiqui, Vishwakarma Sarvajeet Ravindranath, Burte Pratik Vishnu, Vishwakarma Vishwaschandra Abstract |
91 |
|
19
|
Computer Aided Motif Designing: Development of Tool and Comparative Study
- Shalini Singh, Rajeev Singh Abstract |
94 |
|
20
|
Smart Computer In Vehicles
- R.Jayachandran, N.Rubika, M.Mathivanan, C.V.Vidya Prabha Abstract |
99 |
|
21
|
Integration of Solar Renewable Energy Source with Dynamic Wireless Power Transfer in Recharging IR Based Receivers
- M.Sumithra, G.Suriya, P. Susithra, R.Varthini, B.Subhavani Abstract |
104 |
|
22
|
FAST JPEG Encoding Using OpenMP
- M. M. Raghuwanshi, Malhar Ujawane, Sameer Bhute, Sankalp Saoji, Madhushree Warkhade, Shivani Kadpati Abstract |
107 |
|
23
|
Hybrid ACO-PSO Based Energy Efficient Clustering Protocol In WSN
- Atul Rana, Manju Bala,Varsha Abstract |
112 |
|
24
|
A Review of Automated MRI Image Processing Techniques Employing Segmentation & Classification
- Ruchi Kumari Garg, Aishwarya Kulshreshtha Abstract |
117 |
|
25
|
Semantic Similarity based Classification of Narratives
- S. Gopi, A. Berno Raj, M. Abinav, P.Gokul Sarathy, D.P. Bharath Abstract |
121 |
|
26
|
Certificate Revocation Mechanism in Mobile ADHOC Grid Architecture
- J.Beschi Raja, Dr.S.Chenthur Pandian, J.Pamina Abstract |
125 |
|
27
|
Seed Sowing Robot
- Abdulrahman, Mangesh Koli, Umesh Kori, Ahmadakbar Abstract |
131 |
|
28
|
Data Leakage Detection and Prevention System
- Chirag S. Patil , Swapnil S. Nalawade, Vikas D. Natekar, Prof. Neha Saxena Abstract |
144 |
|
29
|
Automated Billing Cart
- Muhib A. Lambay, Abhishek Shinde, Anupam Tiwari, Vicky Sharma Abstract |
148 |
|
30
|
Waste Management System Using Iot
- Mrs.D.Anuradha, A.Vanitha, S.Padma Priya,S.Maheshwari Abstract |
152 |
|
31
|
Blister Testing in MATLAB
- Prof. Neha Saxena, Bhosale Mangesh Vishnu, Salian Shivraj Suresh, Khandelwal Amit Abstract |
156 |
|
32
|
Stock Selection using Principal Component Analysis with Differential Evolution
- Dr. Balamurugan .A, Arul Selvi. S, Syedhussian .A , Nithin .A Abstract |
160 |
|
33
|
Go Mumbai
- NehaSaxena, Suhasini Maurya, Ankit Rai, Santosh Yadav, Jinesh Malavia Abstract |
165 |
|
34
|
Customized Travel Sequence Recommendation on Multi-Source Big Social Media
- Nuthula Saireddy, Anudeep Nallamothu Abstract |
169 |
|
35
|
Student Smart Card using VB.NET, SQL, Barcode
- Dvij Parekh, Siddhali Save, Virag Mhatre, Prof. Anshika gupta Abstract |
175 |
|
36
|
Customer Relationship Management based Customized System Development
- Prerana Shastri, Abhishek Gupta, Sufyan Shaikh, Omair Kolsawala, Prof.Waseem Sultan Abstract |
178 |
|
37
|
Behavior Based Spyware Identification
- Pooja Singhal, Dharna Abstract |
182 |
|
38
|
A Survey Paper on Visual Cryptography for Grey Scale Images
- Kirti Rawat, Vijay Kumar Joshi Abstract |
189 |
|
39
|
Detection of ICMP Flood DDoS Attack
- Harshita, Ruchikaa Nayyar Abstract |
199 |
|
40
|
Identification Of DDoS Attack On Web Servers
- Ruchikaa Nayyar, Harshita Abstract |
206 |
|
41
|
Analysis and Detection of Botnets and Encrypted Tunnels
- Dharna, Pooja Singhal Abstract |
211 |
|
42
|
A Study and Secure Clustered-Authority Access Control Strategy in Open Cloud Storage Systems
- Srikanth Maddineni, Arnab Pal Abstract |
218 |
|
43
|
Auditing and De-Duplication in Cloud Computing
- E Lokesh Kumar, Krishna Narayan P, P.Renuka Devi Abstract |
225 |
|
44
|
Edge Shield Static Median Filter for Removing Noise on Various Types of Images
- M.Chitradevi, S.Kavitha Abstract |
230 |
|
45
|
A Strategic Study on Scenario Based Design Method to Implement in Ubiquitous Systems
- Venkata Rao Barige, Dr. B.D.C.N.Prasad Abstract |
238 |
|
46
|
Privacy Preserving and Detection of Packet Dropping Attacks in MANETS
- Sonia Choudarygari,Penmatsa Naga, Venkata Divya Abstract |
243 |
|
47
|
Cloth pattern recognition for visually impaired people
- V. Varun Varma, S. Narasimha Reddy, S. Kanmani Abstract |
248 |
|
48
|
Data DEDUPLICATION Security with Dynamic Ownership Management
- MS.C.Kamatchi, R.Pooja, S.Serishma, R.Vanitha Abstract |
252 |
|
49
|
Remote Access Tool With Offline Messenger
- Prof. Anshika Gupta, Niraj Sunil Chaughule, Prasad Ganpat Haryan, Sheetalkumar Brajesh Dubey Abstract |
257 |
|
50
|
Smoothing of a Noisy Image Using Different Low Pass Filters
- Natasha R Shaikh Abstract |
260 |
|
51
|
People Safety APP - Belief
- Tabrez Chowkar, Ankit Shukla, Saif Shaikh, Vivek Anand Abstract |
265 |
|
52
|
Categorization of Drugs Using SVM Classification
- Asst.Prof.J.Omana, S.Dhanalakshmi, V.M.Divyalakshmi, S.Mahalakshmi Abstract |
269 |
|
53
|
An ERP Web Portal for Small and Mid-Sized Clinics
- Muhib A. Lambay, Dhaval C. Dedhia, Guruprasad D. Rao Abstract |
273 |
|
54
|
Performance Analysis and Comparison of Cluster Based Routing Protocol in WSN
- Akhila Joshi, Saurabh Mehta, Ajitkumar Khachane Abstract |
277 |
|
55
|
A survey on automatic vehicle number plate detection system
- Aruna Bajpai Abstract |
291 |
|
56
|
Secure Data with Key Managers by Using Shamir Scheme and AES Algorithm
- Prof.S. Athinarayanan, S.NivethaPriya , R.Supriya Abstract |
298 |
|
57
|
Data Integrity Checking Protocol with Dynamic Public Verifiability
- M.D.Boomija , P.V.Pooja, K. Preethi Abstract |
302 |
|
58
|
Alumni Interaction System
- Subashini.S, Sowndarya.A Abstract |
306 |
|
59
|
Data mining with Big Data in Health Informatics
- Akanksha, Vinod Mann Abstract |
310 |
|
60
|
A Review on Data Mining With Big Data
- Akanksha, Dr.Vinod Mann Abstract |
316 |
|
61
|
Significant Approaches to Computation on Encrypted Data
- Irene Getzi S Abstract |
321 |
|
61
|
Significant Approaches to Computation on Encrypted Data
- Irene Getzi S Abstract |
321 |
|
62
|
Detection of Lung Cancer Tumor in Its Early Stages Using Image Processing Techniques
- Vrushali Desale, Dongare Vijaykumar, Tushar Bakhale, Kadam Suraj, Dhalpe Somnath Abstract |
326 |
|
63
|
Genetic Algorithm Based Text Categorization Using K-NN Method
- Mr.R.AlaghuKarthiKeyan, Mrs.k .Brindha Abstract |
329 |
|
64
|
Augmented Reality Based Construction Module for Floor Capacity Estimation
- Netra S. Patil, Tanvir Panesar, Parth Shinde, Krati Saxena, Suraj U Rasal Abstract |
333 |
|
65
|
Direct Assessment Automator For Outcome Based System
- Utkarsh Jaiswal, Rishabh Pandey, Rishav Rana, D.M.Thakore, NaveenKumar JayaKumar Abstract |
337 |
|
66
|
Building A Database Driven Reverse Medical Dictionary
- Pragya Tripathi, Manjusha Deshmukh Abstract |
341 |
|
67
|
Weighted Hybrid Approach in Recommendation Method
- Mr.Avadhut D.Wagavkar, Prof. Mrs.S.S.Vairagar Abstract |
346 |
|
68
|
Data Security in Cloud Computing Using HDFS
- Navjot Sekhon, Richa Mahajan Abstract |
351 |
|
69
|
Data Extraction Techniques for Android Based Devices
- Soudamini Patil, Khushboo Sharma, Mudita Sharma, Garima Chhaparwal, Kanchan Chowdhari Abstract |
355 |
|
70
|
BVDUCOE College Alumni Portal
- Rohit Singh, Rajat Singh Parmar, Saurabh Tripathi, Prof. Rohini Khalkar, Prof. Sheetal Patil Abstract |
359 |
|
71
|
Raspberry Pi based Home Automation Using Wi-Fi, IoT & Android for Live monitoring
- Prof. Prashant Rathod, Syed Khizaruddin, Rashmi Kotian, Shubham Lal Abstract |
363 |
|
72
|
Information Security Management in Distributed Systems (ISMDS)
- Augustine O. Ugbari, Ikechukwu O. Uche Abstract |
369 |
|
73
|
An Assessment Model to Evaluate Quality Attributes In Big Data Quality
- Supriya Haribhau Pawar, Prof. Dr. Devendrasingh Thakore Abstract |
373 |
|
74
|
Response Time Analysis Using Linux Completely Fair Scheduler for Compute-Intensive Tasks
- Pooja Tanaji Patil, Prof. Sunita Dhotre Abstract |
377 |
|
75
|
Amplifying Statistical Machine Translation (SMT) Model Using Graph-Based Approach: A Novel Idea
- Priyanka Malviya, Prof. Gauri Rao Abstract |
381 |
|
76
|
Simulating EDM Model of Nano copper hybrid composites using Generalized Neural Network Tools
- P.Radha Abstract |
386 |
|
77
|
Data Display System for Mars Color Camera Onboard Mom
- Nisha Chetana Sastry, Nikhil Patil, Samhitha Rao, Sathvik Shetty, Shyamala G Abstract |
395 |
|
78
|
Security Mechanism in RIPv2, EIGRP and OSPF for Campus Network - A Review
- Devansh Diwan, V.K.Narang, Anuj Kumar Singh Abstract |
399 |
|
79
|
Integer Factorization in RSA Encryption: Challenge for Cloud Attackers
- Janaki Sivakumar, Hameetha Begum Abstract |
405 |
|
80
|
Handling Anomalies in the System Design: A Unique Methodology and Solution
- Pratik Rajan Bhore, Dr. Shashank D. Joshi, Dr. Naveenkumar Jayakumar Abstract |
409 |
|
81
|
Hybrid Approach to minimize Makespan and Flowtime in Grid Environment
- Malkeet Kaur, Mr. Karan Mahajan Abstract |
414 |
|
82
|
Automatic Bug Triaging System using Prediction Algorithm on Rating Basis
- Vishal Jare, Amar Deep, Akshay Borade Abstract |
420 |
|
83
|
A Treatment for I/O Latency in I/O Stack
- Ashutosh Kumar Singh, Dr. S.H.Patil, Dr. Naveenkumar Jayakumar Abstract |
424 |
|
84
|
Digital Rights Management By Using Cloud Computing
- Miss. Shyamli Ugale, Prof. Ankit Mune, Prof. Dr. H.R. Deshmukh Abstract |
428 |
|
85
|
Survey of Security Challenges in Aeronautical Data Communication Networks
- Suman, Pinki Rani Abstract |
435 |
|
86
|
ownCloud Using Raspberry Pi
- Prof. Krunal J. Pimple, Shubham Jarwal, Gaurav Rajai, Pooja Ghadshi, Gaurav Dubey Abstract |
440 |
|
87
|
Real-Time Detection of Multiple Objects from High Resolution Video Feeds Using Multiple Raspberry Pi’s And OpenCV
- Preeja Priji, Pranav JI, Rashmi S Nair Abstract |
443 |
|
88
|
Mining User-aware Rare STPs and Frequent Events from Social media
- Salmath Amina KP, Farzin Ahammed T Abstract |
446 |
|
89
|
Mining Top K-HUI Patterns By using RUC Strategy
- Riswana.P.P, Divya.M Abstract |
449 |
|
90
|
NKS Search in Multidimensional Dataset with and without using User Preference
- Shimna P.T, Dilna V.C Abstract |
453 |
|
91
|
PCB
- Miss. Rucha Shankar Jamale, Mrs.Sunita Dhotre, Miss. Pooja Tanaji Patil Abstract |
457 |
|
92
|
Random Way Point Generation In Constrained Environment
- Dabbiru Ravi Vikranth Abstract |
462 |
|
93
|
A Study on Data Security in Internet of Things
- G. Ambika, Dr.P.Srivaramangai Abstract |
467 |
|
94
|
A Survey of Brain Tumor Segmentation Methods with Different Image Modalitites
- M. Sumithra, S. Malathi Abstract |
470 |
|
95
|
Node Reduction using Similarity Graph Computation Algorithm in Large Networks
- K. Thamizhmaran, K. Prabu Abstract |
480 |
|
96
|
Trust Based Dynamic Source Routing Protocol by Exclusion of Black-Hole Attack for MANETs
- K. Thamizhmaran, K. Prabu Abstract |
486 |
|
97
|
The Evolvement of ATM Using Fingerprint
- V. Ajantha Devi, A. Priyanka Abstract |
491 |
|
98
|
Red TACTON-Innovation of Human Area Networking
- M.Bobby, V.Ajantha Devi, C. Madhubala Abstract |
497 |
|
99
|
Security Algorithms in Cloud Computing
- T.Ramaporkalai Abstract |
500 |
|
100
|
The Empowerment Of Energy-Efficiency, Security & Scalablity In Wireless Sensor Networks Using Mac And TMP Protocols
- M.Bobby, Bauvya Kuruvila.K Abstract |
504 |
|
101
|
Synergising Blendspace for Effective Instruction
- N.Devaki, M.Deivam Abstract |
507 |
|
102
|
Ensuring Multitier ATM with AADHAAR Details by Using Bioinformatics
- V.Ajantha Devi, R.Archana Abstract |
511 |
|
103
|
Intelligences of Fusing Face and Gait in Multimodal Biometric System: A Contemporary Study
- Annbuselvi K, Santhi N Abstract |
516 |
|
104
|
Designing Beaded Patch Appliqué Using Digital Surface Layering Technique
- R. Anil Kumar, R.I. Sathya Abstract |
523 |
|
105
|
Identification of Multiword Expressions: A Comparative Literature Study
- Jisha T E, Thomas Monoth Abstract |
528 |
|
106
|
Translation of Paniya Language in Wayanad to Malayalam Using Lexical Analysis
- Anjali Maria Paul, Jisha T.E, Thomas Monoth Abstract |
534 |
|
107
|
Ontology Construction For Object Oriented Concepts Using Natural Language Processing
- Satyasheela T.Kadam, Prof. Dr. Devendrasingh Thakore Abstract |
540 |

