IJCST Logo

 

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)-VOL III ISSUE I – Ver 4, JAN TO MARCH 2012


International Journal of Computer Science and Technology (IJCST VOL III ISSUE I)
S.No. Research Topic Paper ID
136 Paper Removed Due to Copyright Issue IJCST/31/4/A-529
137 Demystifying Mobile Cloud Computing using Pandaboard
Patnaikuni. Dinkar R Patnaik, A. S. Gundale
IJCST/31/4/A-530
138 Dynamic Model for Efficient Data Collection in Wireless Sensor Networks with Mobile Sink
Deepak Puthal, Bibhudatta Sahoo, Suraj Sharma
IJCST/31/4/A-531
139 Analysis in Heterogeneous Distributed Hash Tables
CVVN Varun, A Siddhartha Reddy, V. Siva Nagi Reddy, G.B.V.Kishore, S. Chinna Gopi
IJCST/31/4/A-532
140 Image De-Noising using Spatial Adaptive Wavelet Thresholding and Discrete Transform Techniques
Kulwinder Singh Rana, Kiranbir Kaur, Simrat Khokhar, Mandeep Kaur
IJCST/31/4/A-533
141 Desktop Streamer using Pandaboard over WLAN
Rahul Konapure, A. S. Gundale
IJCST/31/4/A-534
142 Minimum Spanning Tree-based Clustering Applied to Protein Sequences in Early Cancer Diagnosis
Dr. T. Karthikeyan, S. John Peter, B. Praburaj
IJCST/31/4/A-535
143 A Survey on Association Rules in Case of Multimedia Data Mining
Vishwadeepak Singh Baghela, Dr. S. P Tripathi
IJCST/31/4/A-536
144 Rotation Invariant Texture Classification using Fuzzy Local Texture Patterns
E. M. Srinivasan, Dr. K. Ramar, Dr. A. Suruliandi
IJCST/31/4/A-537
145 Classification Based Image Segmentation Approach
K.Yogeswara Rao, M.James Stephen, D.Siva Phanindra
IJCST/31/4/A-538
146 Antenna Management of Space-Time Shift Keying Systems
Asha Ravi, J.Nalini, 3Kanchana S. R
IJCST/31/4/A-539
147 Network Designing and Biometrics-Token Card System Based Network Security
M. Jaya Kumar, Dr. T. Christopher
IJCST/31/4/A-540
148 Performance Analysis of IEEE 802.11b, 802.15.1 and 802.16a Standards
Kapil Bhoria, Harish Rohil
IJCST/31/4/A-541
149 Ubiquitous Computing
Vernon
IJCST/31/4/A-542
150 Comparative Study of Routing Protocols in Sensor Network
Chandni Magoo, Shefali, Sheelu Sharma
IJCST/31/4/A-543
151 Code Legibility by A Metric Method
Premchand, Kumar Vasantha
IJCST/31/4/A-544
152 Location Detection in Wireless Sensor Network using Classical Optimization Methodology
Avinash Kaur, Sonu Agrawal
IJCST/31/4/A-545
153 Estimate the Concert of Data Reliability Proofs in Cloud Computing
V. Sreenivasulu, A. Madhavi, K.Yamuna Devi
IJCST/31/4/A-546
154 Performance Analysis of Secure Routing Protocols in Mobile Ad-Hoc Networks
C. Sreedhar, Dr. S. Madhusudhana Verma, Dr. N. Kasiviswanath
IJCST/31/4/A-547
155 A Survey of Electrocardiogram Data Capturing System using Digital Image Processing: A Review
Pradeep Kumar Jaisal, Dr. Sushil Kumar, Dr. S.P Shukla
IJCST/31/4/A-548
156 Bandwidth Efficiency in Wireless Networks using War Drop Routing
B. Srinivasa Rao, S. Madhuri, B. Krishna
IJCST/31/4/A-549
157 A Review of Speech Pattern Recognition: Survey
Pradeep Kumar Jaisal, Pankaj Kumar Mishra
IJCST/31/4/A-550
158 Leader Election Problem in Distributed Algorithm
Deepali P. Gawali
IJCST/31/4/A-551
159 CRC To Support Internet Protocol–IPV6
Shahsad. A. S, Dr. K.V Purushothaman
IJCST/31/4/A-552
160 Brain Slice Retrieval from a Feature Reduced MR Images using Moments
Abraham Varghese, Reji Rajan Varghese, Kannan Balakrishnan, J. S. Paul
IJCST/31/4/A-553
161 Paper Removed Due to Copyright Issue

IJCST/31/4/A-554
162 vWLANTM: An Innovative Approach for WLAN
Sachin Garg
IJCST/31/4/A-555
163 Reengineering of Super-Resolution
Vishal Vishwanath Anagire
IJCST/31/4/A-556
164 A Review Study on Fingerprint Classification Algorithm used for Fingerprint Identification and Recognition
S.Uma Maheswari, Dr. E. Chandra
IJCST/31/4/A-557
165 Randomized Algorithm for Conflict-Free Coloring of Graphs & Hypergraphs
Vinay Kumar Singhal, Akanksha Rastogi
IJCST/31/4/A-558
166 Comparative Study of Strassen’s Matrix Multiplication Algorithm
Juby Mathew, Dr. R Vijaya Kumar
IJCST/31/4/A-559
167 Document Improvement by using Bayesian Approach
N.H. Margam, R.R.Dube
IJCST/31/4/A-560
168 Mobile Commerce: Beyond E-Commerce
Palwinder Sandhu
IJCST/31/4/A-561
169 Routers Packet Classification using Configuration Machine
N.Kannaiya Raja, Dr. K.Arulanandam, P.Umadevi, G.David Raj
IJCST/31/4/A-562
170 A Comparative Study of Security Mechanisms of Fractal Based Digital Signature Schemes
Satish Kumar Singh, Dr. Manish Kumar
IJCST/31/4/A-563
171 Network Based Signature Generation using Intrusion Detection and Prevention System
J. Venkatesh, M.E, Sridevi K
IJCST/31/4/A-564
172 Recent Advances of Distributed Optical Fiber Raman Amplifiers in Ultra Wide Wavelength Division Multiplexing Telecommunication Networks
Abd El–Naser A. Mohamed, Ahmed Nabih Zaki Rashed, Mahmoud M. A. Eid
IJCST/31/4/A-565
173 Software Outsourcing: An IT Trend and Potential
Alka Pant, Dr. Kamal Pant
IJCST/31/4/A-566
174 An Efficient Association Rule Mining Model for Distributed Databases
A. Anitha, G. Raja Suhanantham, Dr. N. Krishnan
IJCST/31/4/A-567
175 Firewall: Testing of Various Commercially Available Firewalls in New Operating Systems
Veeranna.D, Venkatesulu, Narender Kumar
IJCST/31/4/A-568
176 E-Commerce in India: A Review
Pradeep Kaur, Dr. Mukesh M Joshi
IJCST/31/4/A-569