IJCST Logo

 

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)-VOL IV ISSUE SPL 4, OCT TO DEC 2013


International Journal of Computer Science and Technology (IJCST VOL IV ISSUE SPL 4)
S.No. Research Topic Paper ID
1 Image Based Feature Extraction Technique For Multiple Face Detection and Recognition in Color Images

Anusha Nandigam, A.N. Lakshmipathi

IJCST/4/Spl4/C-0060
2 Robust and Oblivious Watermarking Scheme Based on DCT

B. Rakesh Reddy, G.Nirmala, Dr. A. Yesu Babu

IJCST/4/Spl4/C-0061
3 DDD-View Sate): Distributed Databases Detachment View State for I/O Life Cycles

Bharat Kumar Manepali, JSV Gopala Krishna

IJCST/4/Spl4/C-0062
4 Nano Technology and Biomedical Application Using Multy Functional Biochips

Bommireddy.Madhav Rao, Namburi.Venkateswara Rao, B.N.V.Sirisha, K.Renuka Devi, A.Chandini

IJCST/4/Spl4/C-0063
5 Evaluation of Measures Defined for Quality Attributes

Bommireddy.Madhav Rao, Bomma.Rama Krishna, T.Agnivesh, U.L.N.S.Prasad, Ch.N.N.Jyothi

IJCST/4/Spl4/C-0064
6 Privacy-Preserving Data Outsourcing in Cloud Computing

Ch.Srinivas

IJCST/4/Spl4/C-0065
7 Good Requirements Collection for Better Software Project

Chodagam Suresh Kumar, Prathipati Ratna Kumar, Dr. G P Saradhi Varma

IJCST/4/Spl4/C-0066
8 Aspect Based Retrieval Quality in Conversational Recommenders

D. Venkatrao, Dr. A. Yesu Babu, G.Nirmala

IJCST/4/Spl4/C-0067
9 A Novel Approach for Personalizing Web Search Using Ranking Model Adaptation

Deepak Nedunuri, Radha Krishna, Dr.A.Yesu Babu

IJCST/4/Spl4/C-0068
10 Hiding Schemes Defined for Thwarting of Selective Jamming Attacks in Wireless Networks

Dokku Koteswara Prasad, Naga Madhavi Latha Kakarla

IJCST/4/Spl4/C-0069
11 Classification of Metals Using Texture Features

Dr. V.V.Krishna, Suneel Kumar B, Veera Prasad V

IJCST/4/Spl4/C-0070
12 A Novel approach for Efficient Routing in MANET With Energy Routing Algorithm

Dr.A.Yesu Babu, Deepak Nedunuri, Kiran Kumar Reddi, M.Krishna, M.M.Manohar

IJCST/4/Spl4/C-0071
13 3-Phase Parallel Model With Testing for MIS

Dumpati Raghu, Prathipati Ratna Kumar, G P Saradhi Varma

IJCST/4/Spl4/C-0072
14 A Study on Vulnerabilties and Their Impact in Web Applications

G. Nirmala, Padmaja Kanchi

IJCST/4/Spl4/C-0073
15 Vehicle Detection and Tracking by Using Dynamic Bayesian Networks

Haritha, Ch Ramadevi

IJCST/4/Spl4/C-0074
16 Forced Protection Security Wall for Web Server on Network Attacks

Homer Benny Bandela, G Samuel Vara Prasad Raju, T R S Prasad Babu

IJCST/4/Spl4/C-0075
17 Prediction of Business Calculations for Web Usage Mining

J.S.V.G.Krishna, Dr. M.Venkateswara Rao

IJCST/4/Spl4/C-0076
18 RCF: A Novel Approach for Removing Conflicts in Firewalls

K. Anil Chowdary, K. Rajkamal

IJCST/4/Spl4/C-0077
19 Construct a Key-Insulated Symmetric Key by Using Cryptographic Cloud Software

K. Budda Vara Prasad, M. Sathi Ekambareesh

IJCST/4/Spl4/C-0078
20 A Panoramic View of Hands on practice of AOL Calendar

K.Naga Gopi, S.Satyanarayana, PVRD Prasada Rao

IJCST/4/Spl4/C-0079
21 Systems Bag for Dynamic Risk Management of Security in a Network

K.Varada Rajkumar, K.Naveen Kumar, M. Krishna, B.S.B.P. Rani

IJCST/4/Spl4/C-0080
22 Identifying SPAM Information by Screening Outgoing Messages

Kiran Mukkamala, Sri Krishna Chaitany Rudraraju

IJCST/4/Spl4/C-0081
23 Security Issues in Mobile Ad-Hoc Networks

Kishore Dasari, Tammineedi Venkata Satya Vivek

IJCST/4/Spl4/C-0082
24 Phantom Problems and Its Relief Over Router

Konakalla Ankalar Rao, Donavalli Venkata Vidya Deepthi, Prathipati Ratna Kumar

IJCST/4/Spl4/C-0083
25 Web Data Mining Based Business Intelligence and Its Applications

Konda Sreenu

IJCST/4/Spl4/C-0084
26 Methodical Fuzzy Search for Unique Recognition System

Kothapalli Chaitanya Deepthi

IJCST/4/Spl4/C-0085
27 Evalution of the Performance and Congestion-Control in Wireless Mesh Networks

M Ganesh Babu, Suresh Babu Satukumati, Abdul Kareem

IJCST/4/Spl4/C-0086
28 Multiple-Course Fusion Steering Algorithm – Shortest Path Routing Network

M.Krishna, N.V.Phaneeswar, B.S.B.P.Rani

IJCST/4/Spl4/C-0087
29 Mobile Message Authentication in IPv6

Madhavarao Maganti, Samparthi V S Kumar, Raavi Bala Bhargav

IJCST/4/Spl4/C-0088
30 Fuzzy Type Ahead: An Efficient Keyword Search in XML Data

Marlapalli Krishna, Dr. PVGD Prasad Reddy, Tummala Usha Rani

IJCST/4/Spl4/C-0089
31 A Novel Approach to Optimize Link – Node Failures in IP Networks

Naga Madhavi Latha Kakarla

IJCST/4/Spl4/C-0090
32 An Overview of Data Possessions on Scalability and Integrity Verification in Multi-Cloud Computing

P.Naga Deepthi, J.Surya Kiran

IJCST/4/Spl4/C-0091
33 An Insilco Approach to Restrain HIV Replication Through Clustering and Virtual Screening

P.V.R.D. Prasada Rao, K.Lakshmi Sunitha, K.Ramohana Rao, A. Govardhan

IJCST/4/Spl4/C-0092
34 Effective Multipath Routing Through Independent Directed Acyclic Graphs

S.Mahathi, Y.L.Sandhya Rani

IJCST/4/Spl4/C-0093
35 Multi View Point Similarity Measure With Incremental Clustering

S.Mohan Babu Chowdary, S.Priyanka Chadalavada

IJCST/4/Spl4/C-0094
36 Joint Perturbed Copies Verification Using Data Mining Techniques (Correlation)

Samparthi V.S.Kumar, S.Sateesh Kumar, Nagaram Phani Kumar

IJCST/4/Spl4/C-0095
37 A Bug Ignorance Causes Big Expensive on Smart Systems

Sri Krishna Chaitanya Rudraraju, M.Krishna

IJCST/4/Spl4/C-0096
38 A Secure Mechanism for MPI in Parllel Computing

Uday Kishore Pusuluri, G.Satyanarayana

IJCST/4/Spl4/C-0097
39 A Study of Algorithms Used to Secure Data Processing in Cloud Computing

V.S.Rayudu, N.Prasanthi, A.Jagadeesh, CH.Govardhan, K.Hari

IJCST/4/Spl4/C-0098
40 Procedure to Virtual Computing Laboratory (VCL)

Vahiduddin Shariff, Venkatesh Donepudi, Yuva Krishna Aluri

IJCST/4/Spl4/C-0099
41 Data Protection Analysis in Cloud Computing

Vallabhaneni Pranav, Vahiduddin Shariff, J. Swapna Priya, Chandrasekhar Rao Chennupati

IJCST/4/Spl4/C-0100
42 Effective Test Suite Generation for Bugs

A.Brahmani Devi

IJCST/4/Spl4/C-0101
43 Video Data Streaming Applications Using Wireless Sensor Networks

A.M.K.KANNA BABU

IJCST/4/Spl4/C-0102
44 Enhanced Accessibility of Resources in Paper Based and Digital Libraries for Visually Challenged Using Assistive Devices

A.Raghu Nath, N.Naresh, A.N.Lakshmipathi, Ch.Siva Koteswara Rao

IJCST/4/Spl4/C-0103
45 Uncertainty of Abrupt Motion Tracking Using Hidden Markov Model

B. Nandana Kumar, P.S.Surya Teja

IJCST/4/Spl4/C-0104
46 Novel Techniques on Feature Clustering Algorithms
for text classification

Bhagyasri. A, P. Praneetha

IJCST/4/Spl4/C-0105
47 Packet-by-Packet Adaptive Routing in Communication Networks Using Backpressure-based Technique

D. Sri Lakshmi, G. Krishna Veni

IJCST/4/Spl4/C-0106
48 Organization of Web Services: Prenominal Accost of Constructing Dependable Web Operations

D. Srinivasa Rao, Dr. S.Krishna Rao

IJCST/4/Spl4/C-0107
49 Preventing Jamming Attacks in Wireless Networks by Using Cryptographic Primitives

D. Suseela Sagar, T. Satya NagaMani

IJCST/4/Spl4/C-0108
50 Keynote Trust Management for Network Security

G. Pavan

IJCST/4/Spl4/C-0109
51 Advanced Prediction-Based System for Cloud Bandwidth and Cost Reduction

G.Krishnaveni, D.SriLakshmi

IJCST/4/Spl4/C-0110
52 A Trusted Mechanism For Providing Security Over Cloud Computin

G.Vihari, P.Ramaiah Chowdary, Dr. S.Krishna Rao

IJCST/4/Spl4/C-0111
53

This Paper is Removed due to Copyright Issue

 

IJCST/4/Spl4/C-0112
54 Anonymous Communication and Cell Counting Attack Against Tor

K. Rajesh Kumar, B. Praveen

IJCST/4/Spl4/C-0113
55 Identification of Security Flaws in Android By Using Reverse Engineering of Malware

K.Anuchandana, E.Shailini

IJCST/4/Spl4/C-0114
56 Secured Resource Accessing Through VPN Technology

K.Praveen Kumar, B.Premamayudu, P.Subbarao

IJCST/4/Spl4/C-0115
57 A New approach for Monitoring System for Wireless Sensor Networks Using K-anonymity

K.Purna Prakash

IJCST/4/Spl4/C-0116
58 An Efficient Technique for Medical Image Segmentation Using Mixture Models

K.Srinivas, Dr. PVGD Prasad Reddy, Dr. G.P.S.Varma

IJCST/4/Spl4/C-0117
59 Automatic Image Pixel Clustering Using Genetic Algorithms

Koreddi Venkatesh, G.Sudhakar, A.Prakashni, P.Shyamala Madhuri

IJCST/4/Spl4/C-0118
60 Developing A Generic Model and Ordering Test Cases For Embedded Software

M.Satyanarayana, V.Sri Lakshmi

IJCST/4/Spl4/C-0119
61 Spatial Data in Peer to Peer Systems

N V S K Vijaya Lakshmi.K, J.Malathi

IJCST/4/Spl4/C-0120
62 Efficient Tree Based Data Collection in WSNs

N. Prasad

IJCST/4/Spl4/C-0121
63 Prediction of Tuberculosis Using Data Mining Techniques on Indian Patient’s Data

Nagabhushanam D, Naresh N, Raghunath A, Praveen Kumar K

IJCST/4/Spl4/C-0122
64 A Concise Fuzzy Model Approach for Estimating Software Effort

P.Ramaiah Chowdary, G.Vihari

IJCST/4/Spl4/C-0123
65 A Survey on Routing Protocols and Security Issues in Mobile Ad-Hoc Networks

P.V.Venkateswaramma, Dr. I. Ravi Prakash Reddy

IJCST/4/Spl4/C-0124
66 Empowering Rural Women Through Mobile Technology

Padmini. Chattu, Salamuddeen. SK, Janardhan. Ummadi, S. Suresh Babu

IJCST/4/Spl4/C-0125
67 A New Pre Key Distribution in Wireless Sensor Networks

Premamayudu B, Venkata Rao K, Suresh Varma P

IJCST/4/Spl4/C-0126
68 Defenses Against Large-Scale Online Password Guessing Attacks

R. Mohan Krishna Ayyappa, M. Ganesh Babu

IJCST/4/Spl4/C-0127
69 Performance Comparison of DSDV, I-DSDV in Ad-Hoc Networks Using Random Walk Mobility Model

Satyanarayana Kotha, Yesubabu Adimulam, Kiran Kumar Reddi

IJCST/4/Spl4/C-0128
70 An Efficient Cut Detection Assessment in Wireless Sensor Networks

Sk. MeeraVali

IJCST/4/Spl4/C-0129
71 Effective Load Balancing Based on Cloud Partitioning for the Public Cloud

T.Satya Nagamani, D.Suseela Sagar

IJCST/4/Spl4/C-0130
72 Effective User Navigation Through Website Structure Improvement

T.Vijaya Madhavi, M.Vanaja

IJCST/4/Spl4/C-0131
73 A Cross Platform Based System for Supervising the Factors of A Geographical Area through Wireless Sensor Network

Ummadi Janardhan Reddy, Satukumati, Padmini. Chattu, Salamuddeen. SK

IJCST/4/Spl4/C-0132
74 A Novelty Approach on E-Studio Calendar

V.Bhavani Himaja, S.Satayarayana, PVRD Prasada Rao

IJCST/4/Spl4/C-0133
75 Improving Software Reliability Using Crowd Sourced Testing

Y. Vamsidhar, Dr. Y.Srinivas, S. N. V. Satyanarayana P.

IJCST/4/Spl4/C-0134
76 Software Reliability Enhancement By Using Effective NHPP Models

Y.Vamsidhar, Dr.Y.Srinivas, P.Srinivasa Rao

IJCST/4/Spl4/C-0135
77 Fast Asymmetric Algorithm in ECC for Wireless Sensor Network

K. Lakshmaji

IJCST/4/Spl4/C-0136
78 Advanced Attribute-based Encryption For Secure and Scalable Sharing of Personal Health Records in Cloud Computing

M.Vanaja, T.Vijaya Madhavi

IJCST/4/Spl4/C-0137
79 A Confidential Sharing and Repairng of Document Images

T.Shailendra, M.Madhava Rao

IJCST/4/Spl4/C-0138