IJCST Logo

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY


VOL- 2 ┬áISSUE – 3 (Version 3) , September- 2011
S.No. Research Topic Paper ID
88. Phishing Detection based on Web Page Similarity
Radha Damodaram, Dr. M.L. Valarmathi
IJCST/992/1/A-227
89. A Real Time DOS Attack Detection in IP Networks Based on Bandwidth Utilization Pattern and Rule Based Pattern Matching
Revathi Cherukuri, Thadoor Shobha Rani, Challa Madhavi, Dr.Manjunath Gadiparthi
IJCST/992/1/A-228
90. Heart Sound Separating from Lung Sound using Lab VIEW
Pradeep Kumar Jaisal, Anant G. Kulkarni
IJCST/992/1/A-229
91. Search Engine Optimization through Web Page Rank Algorithm
Santosh Kumar Ganta, Satya P Kumar Somayajula
IJCST/992/1/A-230
92. A Novel Approach to Retrieving an Image using Content Based Kernel
Gumpina V V Satya Prasad, Satya P Kumar Somayajula
IJCST/992/1/A-231
93. Hide the Duplicate WebPages
Bolla Anil Kumar, Satya P Kumar Somayajula
IJCST/992/1/A-232
94. Data Warehousing-A Case-based Courseware
T.Krishna Kishore, T. Sasi Vardhan,
IJCST/992/1/A-233
95. Efficient Routing of Intermittently Connected Mobile Networks Using Wait & Spray
T. Krishna Kishore, T. Sasi Vardhan
IJCST/992/1/A-234
96. Irregular Augmented Four Tree Network
Dr.Harsh Sadawarti, Pawandeep Kaur, Kanwarpreet Kaur
IJCST/992/1/A-235
97. RED TACTON
Gurpreet Singh, Jaswinder Singh
IJCST/992/1/A-236
98. Improved NOVEL Routing Protocol for Load Balancing in Wireless Sensor Network
Harwinder Singh Sohal, Rajbir Singh Cheema, Ankit Arora
IJCST/992/1/A-237
99. An Enhanced Cluster-Based Multi-hop Multipath Routing Protocol for MANETs
R. Shanthy, J. Suji Priya
IJCST/992/1/A-238
100. Automatic Noise Identification in Images using Statistical Features
Dr. P. Subashini, Bharathi.P. T
IJCST/992/1/A-239
101. Skew Correction and Localisation of Number Plate Using Hough Rectangular Transform
Varun Manchikalapudi
IJCST/992/1/A-240
102. Public Key Encryption Algorithms for Digital Information Exchange
Iqbal Singh
IJCST/992/1/A-241
103. Pattern Recognition to Detect Breast Cancer Thermogram Images Based on Fuzzy Inference System Method
Kodrat Iman Satoto, Oky Dwi Nurhayati, R.Rizal Isnanto, Indonesia
IJCST/992/1/A-242
104. A Survey of Agent-based Personalized Semantic information retrieval
Dr. M.Thangaraj, M. Chamundeeswari
IJCST/992/1/A-243
105. A Segmented Morphological Approach to Detect Tumor in Lung Images
Poonam Bhayan, Gagandeep Jindal
IJCST/992/1/A-244
106. NetCap: A Packet Sniffer in Java
Rajan Parmar, Hetal Patel
IJCST/992/1/A-245
107. Implementation of FIR filter in frequency Domain and Time Domain for Wireless Communication System
Karan Singh Gaur, Monika Rawat
IJCST/992/1/A-246
108. Efficient Identity Based Public Verifiable Signcryption Scheme
Prashant Kushwah, Dr. Sunder Lal
IJCST/992/1/A-247
109. Enhance Framework for Reliability & Quality Assurance of Safety-Critical Software
Ankur Pandit, Alka Gulati, Vineet Richhariya
IJCST/992/1/A-248
110. Through Put Analysis of Various Encryption Algorithms
Gurjeevan Singh, Ashwani Kumar Singla, K.S. Sandha
IJCST/992/1/A-249
111. A Fuzzy Grid-Clustering Algorithm
K. Yogeswara Rao, Ch. Sita Kameswari, D. Siva Phanindra
IJCST/992/1/A-250
112. Comparative Analysis of Energy Efficient Routing Protocols in MANETS (Mobile Ad-hoc Networks)
Dinesh Singh, Deepak Sethi, Pooja
IJCST/992/1/A-251
113. Study and Analysis of Various Image Steganography Techniques
Jagvinder Kaur, Sanjeev Kumar
IJCST/992/1/A-252
114. Implementation and Evaluation of Scheduling Algorithms in Point-to- Multipoint Mode in Wimax Networks
Harpreet Kaur, Gurpal Singh
IJCST/992/1/A-253
115. Detection of Phishing e-mail
Jasveer Singh
IJCST/992/1/A-254
116. Importance of Hindi Thesaurus in NLP and Hindi Language Script Description
Roochie
IJCST/992/1/A-255
117. Performance Comparison of Different Forward Error Correction Coding Techniques for Wireless Communication Systems
Sanjeev Kumar, Ragini Gupta
IJCST/992/1/A-256
118. Performance Evaluation of Tree – Based Multicast Routing Protocols in MANETs
M. Nagaratna, Dr. V. Kamakshi Prasad, Dr. C. Raghavendra Rao
IJCST/992/1/A-257
119. Sustainable Cloud Computing
Amandeep Kaur, Ranju Marwaha
IJCST/992/1/A-258
120. Promoting Open Source Technology in Education: NetBeans : The Perfect Open Source IDE
Rakesh Sharma, Sonymol Koshy
IJCST/992/1/A-259
121. Metamorphic Testing Effectiveness on Trignometry
Tarun Khosla, Sushil Garg
IJCST/992/1/A-260
122. Intermediatery Proxies By Scalable and Robust Network Content Processing
Satya P Kumar Somayajula, Sesi Kala Bapatla
IJCST/992/1/A-261
123. Secured Initialization of Dynamic Message Authentication in Wireless Devices
Dr. D. Raghu, Radha Krishna cheepi, Ch. Raja Jacub
IJCST/992/1/A-262
124. On Fast and Accurate Detection of Unauthorized Access Point using Time Stamp in Wlan
Sushama Shirke, S. B. Vanjale, Dr. P.B.Mane
IJCST/992/1/A-263
125. A Novel Software Tool for Supporting and Automating the Requirements Engineering Process with the use of Natural Language
Marinos G. Georgiades, Andreas S. Andreou
IJCST/992/1/A-264
126. Comparison of different Mobile Agent Based Intrusion Detection Techniques
Gurpreet Singh, Dr. Jatinder Singh
IJCST/992/1/A-265
127. Two Innovative Algorithms for Fast Computation of Constrained Shortest Paths
R.Pravallika, V.Udaya Bhanu
IJCST/992/1/A-266
128. Ontology for MANET Intrusion Detection
Jatinder Singh, Rohit Sharma
IJCST/992/1/A-267
129. Survey of Web usage Mining
Rakesh Kumar Malviya, Mahesh Chandra Malviya,Vinay Kumar Soni,
IJCST/992/1/A-268
130. Hybrid Threshold Technique for Speckle Noise Reduction using wavelets for Grey scale images
Manish Goyal, Gianetan Singh Sekhon,
IJCST/992/1/A-269