IJCST Logo

 

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)-VOL III ISSUE I – Ver 3, JAN TO MARCH 2012


International Journal of Computer Science and Technology (IJCST VOL III ISSUE I)
S.No. Research Topic Paper ID
91 Research on Distortion Correction of QR Code Images
Jiejing Zhou, Yunfei Liu, Amit Kumar
IJCST/31/3/A-484
92 Interframe Compression on Sequential Image using Wavelet
Dr. Albertus Joko Santoso, Dr. Lukito Edi Nugroho, Dr. Gede Bayu Suparta, Dr. Risanuri Hidayat
IJCST/31/3/A-485
93 Use of Cloud Computing in Academic Institutions
Silky Bansal, Sawtantar Singh, Amit Kumar
IJCST/31/3/A-486
94 Hidden Markov Model Based Interface to Control Computer Machine through Speech Commands for Punjabi Language
Bhupinder Singh, Sukhwinder Singh, Jaipal Singh, Hari Gobind Pathak, Neha Kapur
IJCST/31/3/A-487
95 Evaluating Effectiveness of e-Learning Initiatives in Higher Education Institutions: J&K
Namita Singh, Dr. Devanand Padha
IJCST/31/3/A-488
96 Efficient Load Balancing Algorithm in VM Cloud Environment
Meenakshi Sharma, Pankaj Sharma, Dr. Sandeep Sharma
IJCST/31/3/A-489
97 Voice Over Bluetooth: An Overview
Manisha Dawra, Sheelu Sharma, Anita Chauhan
IJCST/31/3/A-490
98 Proposed Framework to Initiate Open Source e-Learning in J&K
Namita Singh, Dr. Devanand Padha
IJCST/31/3/A-491
99 Segmentation Algorithms for Thyroid Scintigraphy Images
Jaspreet Kaur, Alka Jindal
IJCST/31/3/A-492
100 Cloud Computing with Service Oriented Architecture in Business Applications
Venkata Ramana Adari, Dr. Ch.Diwakar, Dr. P.Suresh Varma
IJCST/31/3/A-493
101 Detect and Prevent Threats in Websites
Reena K. Gadge, Dr. B.B. Meshram
IJCST/31/3/A-494
102 Detecting Image Spam Based on Image Features using Maximum Likelihood Technique
Minal Kamble, Chhaya Dule
IJCST/31/3/A-495
103 Reservation of Resources in Advance for Job Execution in Heterogeneous Grid Environment
Lata Gadhavi
IJCST/31/3/A-496
104 Partial Encryption Algorithm for Secure Transmission of Multimedia Messages
Priyanka Agrawal, Manisha Rajpoot
IJCST/31/3/A-497
105 Software Reliability – An Overview
E.Sridevi, B.Aruna, P. Sowjanya
IJCST/31/3/A-498
106 The Concept of Data Management in Peer 2 Peer Networks
Anil Lamba
IJCST/31/3/A-499
107 Manifestation of a Smart Card Reader using VLSI Technology
Saylee S. Bidwai, Sandeep S. Bidwai
IJCST/31/3/A-500
108 Paper Removed Due to Copyright Issue

IJCST/31/3/A-501
109 Implementing Improved Algorithm Over APRIORI Data Mining Association Rule Algorithm
Sanjeev Rao, Priyanka Gupta
IJCST/31/3/A-502
110 Secure Scheme of Data Protection in Cloud Computing
Sunitha Muppa, R. Lakshman Naik, Chalapathi Valupula
IJCST/31/3/A-503
111 Speed Control of Separately Excited D.C Motor using Self Tuned ANFIS Techniques
Sanju Saini, Arvind Kumar
IJCST/31/3/A-504
112 A Survey of Image De-noising Filters
Navjeet Kaur, Shveta Chadda, Rajni Thakur
IJCST/31/3/A-505
113 Appraisal of TCP Variants in Wireless Networks Environment
Ramanjyot Kaur, Manju Sharma
IJCST/31/3/A-506
114 Paper Removed Due to Copyright Issue IJCST/31/3/A-507
115 Zooming Techniques for Digital Images: A survey
Shveta Chadda, Navjeet Kaur, Rajni Thakur
IJCST/31/3/A-508
116 A Study of Biometric, Multimodal Biometric Systems: Fusion Techniques, Applications and Challenges
Savitri B. Patil
IJCST/31/3/A-509
117 Brain MRI: Region based Segmentation Techniques
Harman Kataria, Alka Jindal
IJCST/31/3/A-510
118 Design of Effective Very Low Power SAR ADC in 90 nm Using STSCL Approach
Chandra Datta Verma, Chandrahas Sahu
IJCST/31/3/A-511
119 Review on Shadow Detection and Removal Techniques/Algorithms
Rajni Thakur, Shveta Chadda, Navjeet Kaur
IJCST/31/3/A-512
120 BER Analysis of Alamouti Coding Scheme using Receiver Antenna Selection with Mutual Coupling
G. Koteswara Rao, T. P. Srinivaskausalyanandan, V. Anuragh, Vidya Rani. S
IJCST/31/3/A-513
121 Digital Forensic Investigation using WinHex Tool
Sindhu. K. K, Dr. B. B. Meshram
IJCST/31/3/A-514
122 Comparing the Effect of Fog and Snow Induced Attenuation on Free Space Optics (FSO) and RF Links
Ajaybeer Kaur, Dr. M. L Singh
IJCST/31/3/A-515
123 Augmentation of Image Retrieval using Fractional Coefficients of Hybrid Wavelet Transformed Images with Seven Image Transforms
Dr. H. B. Kekre, Dr. Sudeep D. Thepade, Varun K. Banura, Ankit Khandelwal
IJCST/31/3/A-516
124 Design and Comparative Study of Programmable Voltage Controlled Ring Oscillator
Arvind Kumar, Ritesh Kumar
IJCST/31/3/A-517
125 An Efficient Approach for Debugging the WPAN using Packet Analyzer
J. Venkata Rao, S. Harinadh Babu, T. Satish Kumar, K. JayaRam, K. Siva Naga Babu
IJCST/31/3/A-518
126 Secure Authentication using RFID
Mohit Chitlange, Aditya Bhise, Tushar Joshi
IJCST/31/3/A-519
127 Paper Removed Due to Copyright Issue IJCST/31/3/A-520
128 Study of Various Full Adders using Tanner EDA Tool
Arvind Kumar, Anil Kumar Goyal
IJCST/31/3/A-521
129 Needs of Knowledge Management in Career Exploration
Varekan Keishing, S.Renukadevi
IJCST/31/3/A-522
130 Attacks on Anonymous Systems
Mohan Balaji Areti, Dr. Subramanyam kodukula
IJCST/31/3/A-523
131 Fuzzy-Based Sub-Pixel Classification of Satellite Imagery
Satish Kumar, G. Saravana, R Rout, Ankur Pandit, Snehmani
IJCST/31/3/A-524
132 Color Image Quantization Techniques Based on Image Decomposition for Memory Consumption in Cloud Environment
Dr. Ramakrishnan, S. Ahamed Ali, K. R. Mohan Raj, S. Subramanian
IJCST/31/3/A-525
133 Comparative Study of 4-Bit ALU using CMOS and BiCMOS for 200nm Technology
Arvind Kumar
IJCST/31/3/A-526
134 Comparative Study of UDP and TCP Protocols for Multipath Multicasting Video in Manets
Kanmani Ruby. E. D, Dr. Kasthuri. N
IJCST/31/3/A-527
135 Corner Detection using Curvelet and Harris Algorithm
Mahesh, Dr. M. V. Subramanyam
IJCST/31/3/A-528