IJCST Logo

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)-VOL II ISSUE IV – Ver 2,OCT TO DEC 2011


International Journal of Computer Science and Technology (IJCST VOL II ISSUE IV)
S.No. Research Topic Paper ID
41 Periodic Web Personalization for Meta Search Engine
K.Srinivas, P.V.S.Srinivas, A.Govardhan, V.Valli Kumari
IJCST/24/2/A-310
42 Trends in Broadband Wireless Networks Technologies
Amardeep Singh
IJCST/24/2/A-311
43 Word based Alignment of News Headline in Machine Translation
Sourav Mandal, Radha Krishna Jana
IJCST/24/2/A-312
44 Database and Information Security Concerns
Tejpreet Singh, Rakesh Kumar
IJCST/24/2/A-313
45 Web Based Share Tracker
T.Revathi, T.HemaLatha, M.Soujanya, G.Rajendra Kumar
IJCST/24/2/A-314
46 Solving FPGA Routing using Ant Colony Optimization with Minimum CPU Time
Vinay Chopra, Dr. Amardeep Singh
IJCST/24/2/A-315
47 Open and Distance Education under the Umbrella of Information and Communication Technology (ICT)
Ejaz Shakeb
IJCST/24/2/A-316
48 Sentiment Mining for M Learning Systems
A. Nisha Jebaseeli, Dr. E. Kirubakaran, L. Jayasimman
IJCST/24/2/A-317
49 Supervised Machine Learning Approaches for Medical Data Set Classification – A Review
S. Anto, Dr.S.Chandramathi
IJCST/24/2/A-318
50 Study of Ocean using Indian Space Borne Microwave Sensors
OPN Calla
IJCST/24/2/A-319
51 Key Distribution For Dynamic Multicast Groups
G.Murali, DR.R.Sivaram Prasad, G.Gurivi Reddy, Y.Srinivasulu, N. Priyanka
IJCST/24/2/A-320
52 Taxonomy Towards Application Security Metric Generation using Attack Patterns
U Jyothi Kameswari, K Raja Sekhar, K Seetha Devi
IJCST/24/2/A-321
53 Tuning of PID Controller for Liquid Level Tank System using Intelligent
Techniques

Bijay Kumar, Rohtash Dhiman
IJCST/24/2/A-322
54 Mobile Ad-Hoc Network Routing Principle and Protocol Evaluation Metrices
K. Sivakumar
IJCST/24/2/A-323
55 Modeling of ARM Cortex- M3 processor core using SystemC
Mitesh J. Limachia, Dr. Nikhil J. Kothari
IJCST/24/2/A-324
56 Context Based Location Management for MANET in Disaster Area using
Mobile Agent

Dharmesh Niranjan, A. K. Vatsa
IJCST/24/2/A-325
57 An Effective Algorithm for Clustering Time-Series Data by Fuzzy Logic
Sadiq Hussain, Prof. G.C. Hazarika
IJCST/24/2/A-326
58 Dynamic Routing Key Distribution in Security Considerations
D. Raghu, Baliguddin, Ch. Raja Jacob
IJCST/24/2/A-327
59 Effective Data Mining Association Rules for Heart Disease Prediction System
Himigiri. Danapana, M. Sumender Roy
IJCST/24/2/A-328
60 Analysis of Different Propagation Model for IPSec-LANMAR Routing Protocol to Secure Network Layer for MANET in Emergency Area Environment
D.Devi Aruna, Dr.P.Subashini
IJCST/24/2/A-329
61 An Impression of Routing Protocol in Mane
Sudhakar Sengan, Dr.S.Chenthur Pandian
IJCST/24/2/A-330
62 Wireless and Mobile Computing Automated System for Smart & Tablet Devices using 3G/Cloud
P Renuka, R Vijayalakshmi, R Raja
IJCST/24/2/A-331
63 An Effective Shape Extraction Algorithm for Dental Radiographs using Contour Information
B.Vijayakumari, Dr. G.Ulaganathan, Dr. A.Banumathi
IJCST/24/2/A-332
64 Efficient Scheduling in Computational Grid with an Improved Ant Colony
Algorithm

J.Rajeshkumar, M.Kowsigan
IJCST/24/2/A-333
65 Morphological Approach for Segmentation of Scanned Handwritten Devnagari Text
Sandip N.Kamble, Prof. Megha Kamble
IJCST/24/2/A-334
66 A Comparative Study of Surface Reconstruction Algorithms based on 3D Cloud Points Delaunay and Crust Triangulation
Shitu Bala, Gianetan S. Sekhon
IJCST/24/2/A-335
67 An Effective Algorithm for Ink-Bleed through Removal in Document Images
Rajbir Kaur, Amandeep Kaur
IJCST/24/2/A-336
68 Novel Scheme for Image Encryption using Merkle-Hellman Knapsack Cryptosystem-Approach, Evaluation and Experimentation
G. Lokeshwari, G. Aparna, Dr. S. Udaya Kumar
IJCST/24/2/A-337
69 Feature Enhanced Clerical Error Free Evaluation of Answer Scripts by Digital Ways using JSP, JAVA and HTML
Ankith C N, Rohan T S, Parvatha Reddy Gadedha
IJCST/24/2/A-338
70 A Novel Solution for Effective Bandwidth Utilization in 802.16 Networks
Madhuri Polisetty, Maanasa Thoragu
IJCST/24/2/A-339
71 Mining Software Defects using Random tree
Antony Rosewelt, Dr. Sampathkumar Vajeravelu
IJCST/24/2/A-340
72 A Survey on Behaviour of AODV and OLSR Routing Protocol of Manets under Black Hole Attack
Anuj Gupta, Navjot Kaur, Amandeep Kaur
IJCST/24/2/A-341
73 Simulating Instinct Analytics in Healthcare Domain Through Data Marts
Dr. Kishori Lal Bansal, Sanjay Kumar Sharma, Satish Sood
IJCST/24/2/A-342
74 A Multi-way Authentication using Embedded Public Key
Harshavardhan Arugonda, B.Rajani
IJCST/24/2/A-343
75 Component Object Model Communication Fundamentals and its Components
Rajesh kumar kaushal
IJCST/24/2/A-344
76 Secured Data Carrier for Cryptographic Applications
Nagaraj Hediyal
IJCST/24/2/A-345
77 Resources Utilization via Virtualization in LINUX on Different Workloads using Virtual Box
Gurmeet Singh, Amit Bindal
IJCST/24/2/A-346
78 A Visualization Model for Time Series Analysis of Data
Sunil Bhaskarana
IJCST/24/2/A-347
79 Reliable Multi-hop Routing in Wireless Sensor Networks
Krishnachaitanya. Katkam, Ch. Deepthi, T.Poornashekar, B.Lavanya Madhuri
IJCST/24/2/A-348
80 A Novel Approach of Harris Corner Detection of Noisy Images using Adaptive Wavelet Thresholding Technique
Nilanjan Dey, Pradipti Nandi, Nilanjana Barman
IJCST/24/2/A-349
81 Image Retrieval and Similarity Measurement based on Image Feature
R. Venkata Ramana Chary, Dr. D. Rajya Lakshmi, Dr. K. V. N Sunitha
IJCST/24/2/A-350