IJCST Logo



Vol 3 Issue 1-2 | International journal of computer science and information technology

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)-VOL III ISSUE I – Ver 2, JAN TO MARCH 2012


International Journal of Computer Science and Technology (IJCST VOL III ISSUE I)
S.No. Research Topic Paper ID
46 Optimal Resource Allocation Under Bad Compatibility of Functional Limitations
Safwan Al Salaimeh, Zafer Makhadmee, V. P. Avramenko, S. V. Shtangee
IJCST/31/2/A-438
47 Computer Self-Efficacy, Anxiety and Attitudes Towards use of Technology Among University Academicians: A Case Study of University of Port Harcourt—Nigeria
Oye, N. D., Dr. A.Iahad, N., Dr. Ab.Rahim, N.
IJCST/31/2/A-439
48 Distributions of Linux and its Comprehensive Comparison with Windows
Vasishath Kaushal, Tanvir singh, Amit Kumar
IJCST/31/2/A-440
49 Paper Removed Due to Copyright Issue

IJCST/31/2/A-441
50 A New Starvation Mitigation Algorithm (SMA) for Wireless Mesh Networks
SK. Mansoor Rahaman, B. Ramesh Babu, A.Venkaiah Naidu, Dr. K.Rajasekhara Rao
IJCST/31/2/A-442
51 The Lifting Wavelet Transform for Periodogram Smoothing
M.Venakatanarayana, Dr.T.Jayachandra Prasad
IJCST/31/2/A-443
52 Mitigating Selective Forwarding TCP Attacks by Combining MAITH with a Channel-Aware Approach in MANET
M.Kavitha, S.Vinoth Kumar, D.Prabakar
IJCST/31/2/A-444
53 Abstractness of Uncertainty in Deception Under Randomized Anomalies
S.Rajkumar, V.Narayani, Dr. S.P.Victor
IJCST/31/2/A-445
54 Performance Analysis of Three Gateways Discovery Approaches in AODV Routing Protocol for Connectivity with Wired Network
Sajendra Kumar, Sachin Chaudhary
IJCST/31/2/A-446
55 Clustering Telecom Customers using Emergent Self Organizing Maps for Business Profitability
Kanchangauri Tulankar, Dr. Manali Kshirsagar, Rakhi Wajgi
IJCST/31/2/A-447
56 Trends in Web Mining for Personalization
Chhavi Rana
IJCST/31/2/A-448
57 Long Term Electric Load Forecasting using Neural Networks and Support Vector Machines
Renuka Achanta
IJCST/31/2/A-449
58 An Enhanced Approach for Medical EDGE Image Enhancement using Genetic Algorithm
B.Lakshmi, G.Lingaiah, S.S.Madhavi
IJCST/31/2/A-450
59 Map Based Image Retrieval Technique for Spatial Database System
Madhusmita Sahu, Animesh Tripathy
IJCST/31/2/A-451
60 Map Based Image Retrieval Technique for Spatial Database System
This paper is unavailable due to technical reasons
IJCST/31/2/A-452
61 Application Development on Windows Phone 7
B.Venkat Sandeep, Nagaraj G Cholli
IJCST/31/2/A-453
62 Survey of Indian Machine Translation Systems
Sitender, Seema Bawa
IJCST/31/2/A-454
63 CDMA Technique & Its Special Function in Network Technology
Sanjoy Paul, Radha Krishna Jana
IJCST/31/2/A-455
64 Content-Based Image Retrieval Based on Color
Mirnall Bansal, Gurpreet Kaur, Maninder Kaur
IJCST/31/2/A-456
65 Comparative Analysis of Techniques for Detecting Faults in Optical Multistage Interconnection Networks
Mona Mittal, Sandeep Singh Kang
IJCST/31/2/A-457
66 Three-Phase Diode Rectifier with Active Current Modulation and High Efficiency
Jeji.K, CH. Sujatha
IJCST/31/2/A-458
67 Query Optimisation using Natural Language Processing
Ashish Tamrakar, Deepty Dubey
IJCST/31/2/A-459
68 Web Mining Based Distributed Crawling with Instant Backup Supports
Yogesh Pawar
IJCST/31/2/A-460
69 Computing MMRE and RMSSE of Software Efforts using Neural Network Based Approaches and Comparing with Traditional Models of Estimation
Manpreet Kaur, Mohit Verma
IJCST/31/2/A-461
70 An Efficient and Improving the Security of AODV Routing Protocol
Satyendra Singh, Vinod Kumar Yadav, Ganesh Chandra, Rahul Kumar Gangwar
IJCST/31/2/A-462
71 Agent Based Modeling and its Effect in Social Influence: A Review
Swati Basak, Bireshwar Dass Mazumdar, Ravi Kant Yadav
IJCST/31/2/A-463
72 ZigBee: A Review
Gurpreet Singh, Raghav Bhardwaj, Karamjeet Singh, Sahil Mehla
IJCST/31/2/A-464
73 Performance Comparison of Features Reduction Techniques for Intrusion Detection System
Rupali Datti, Shilpa Lakhina
IJCST/31/2/A-465
74 Neural Networking using Multiple Web Page Noise Removing Method
P.Siva Kumar, Dr. R.M.S Parvathi
IJCST/31/2/A-466
75 Cloud Computing Security Issues with Possible Solutions
B.Meena, Krishnaveer Abhishek Challa
IJCST/31/2/A-467
76 Modeling Blogger Influence in a Ubiquitous Environment
Sheela Ghosh
IJCST/31/2/A-468
77 The Impact of Directional Antennas on MAC Layer Protocol for Ad-Hoc Networks
Ashish B. Pandya, Bhavini D. Parmar
IJCST/31/2/A-469
78 Modelling and Detection of Rotor Broken Bar Fault using Induction Motor Fed PWM Inverter
Khadim Moin Siddiqui, Dr. V.K. Giri
IJCST/31/2/A-470
79 Effective Software Quality Management in Quality Control
S T V S Kumar, Dr. SN Panday
IJCST/31/2/A-471
80 Face Detection: A Complete Study of Modern Security Era
Rajandeep Kaur, Vijay Dhir
IJCST/31/2/A-472
81 Integration of Android Operating System with Wireless Sensor Network
Revathi Gujjarlapudi, Archana Kakaraparthy, Kalyan Mohan Goli
IJCST/31/2/A-473
82 Computational Electromagnetics: A Survey
Ashish B. Pandya, Prarthan D.Mehta
IJCST/31/2/A-474
83 An Experimental Study to Reduce the Effect of ICI in OFDM Based WLAN System
Shruti M. Kallurwar, Rahila Patel
IJCST/31/2/A-475
84 Performance Analysis of Transmission Control Protocol Variants
Pooja Sahni, Dr. Ravinder Khanna
IJCST/31/2/A-476
85 Visual Inquiry in Temporal Information with Multi Properties
Himanshu Saxena, Rohit Chandra, Naveen Kumar
IJCST/31/2/A-477
86 Web Profitability Mart
Nagaraj G Cholli, I M Umesh, Dr. Srinivasan G N
IJCST/31/2/A-478
87 Cloud Computing: The Next Generation of the Internet
Karthick Ramachandran S
IJCST/31/2/A-479
88 Artificial Vision–A Bionic Eye
C. V. Krishnaveni, Ramesh B Lakkakula, Sunki Manasa
IJCST/31/2/A-480
89 Security Features used for Heterogeneous Networks in Wireless Architecture
Arshi Shamsi, Saoud Sarwar, Shamim Ahmad, Shahroukh Khan
IJCST/31/2/A-481
90 Improving LZW Compression
Amit Makkar, Gurjit Singh, Rajneesh Narula
IJCST/31/2/A-482