IJCST Logo




IJCST













International Journal of Computer Science and Technology
Vol 7.4 Ver -2 (Oct-Dec 2016)

S.No. Research Topic Paper ID Download
27

Neural Network in Data Mining

Karan S Nayak

Abstract

IJCST/74/2/A-0763
28

Enhanced Routing Algorithm for Best Relay Node Selection In WSN

Marri Sireesha, SSN Usha Devi

Abstract

IJCST/74/2/A-0764
29

Camera Base Message Transfer using QR Code

Meghana V Bandiwadekar, Hemant A Tirmare

Abstract

IJCST/74/2/A-0765
30

Monitoring and Analysis of Dynamic Traffic Analyzer using Twitter

B Sureesha, V Priyadarshini

Abstract

IJCST/74/2/A-0766
31

The Recognition of Unauthorized User and Distribute Authenticity for Data in WSN

Mamidi Jaya Ram, KesavaraoSeerapu, Dr. A. Chandra Sekhar

Abstract

IJCST/74/2/A-0767
32

Enabling Fine Grained Multi Keyword Search in Cloud for Secure Data Transmission by Trapdoor Encryption.

P. Saroja, Dr. GV. Padmaraju

Abstract

IJCST/74/2/A-0768
33

The Secure Integrity Verification in Cloud Storage Auditing with Deduplication

Pyla. Naresh, K. Ravindra, Dr. A. Chandra Sekhar

Abstract

IJCST/74/2/A-0769
34

Experiments in Telugu Language using Language Dependent and Independent Models

Swapna Narala, B. Padmaja Rani, K. Ramakrishna

Abstract

IJCST/74/2/A-0770
35

Study on Drive Towards Eco Processing – Denims for Green Fashion

Dr. Chandra Shekar K E

Abstract

IJCST/74/2/A-0771
36

An Effective Answerable Query Processor to Empower Ordinary Users

Kodati Sunanda, Javvadi Rajanikanth

Abstract

IJCST/74/2/A-0772
37

A Survey on Visual Information Retrieval Tools With Wavelets

M.Anjan Kumar, Dr. R.Kamalakar

Abstract

IJCST/74/2/A-0773
38

The Data Sharing with Access Privilege to User Revocation of Cloud Data

Pitta Kantarao, Dakineni Durga Prasad

Abstract

IJCST/74/2/A-0774
39

Some Intelligent Computing Methods for Classification of Students in ITS

Kiran Mishra, Bhavtosh Mishra, Nikita Kanwar

Abstract

IJCST/74/2/A-0775
40

A New Protocol for Mitagate Attacks and Efficient Data Forwading in WSN

M.Padma, T.Veeraju

Abstract

IJCST/74/2/A-0776
41

Secure Multi-keyword Ranked Search Over Encrypted Cloud Data

Katre Sharad, Hipparkar Pradip, Sagare Ravi, Hiwale Sumit, Smita Bhosale

Abstract

IJCST/74/2/A-0777
42

The Data Analysis and Encrypting Data using Efficient Algorithm in Big Sensor Network Data

B. Bhavani, V. Mahesh, Dr. A. Chandra Sekhar

Abstract

IJCST/74/2/A-0778
43

Video Summarization of Surveillance Videos Using Key Frame Extraction

K.S.R.Manjusha, K. Pavan Kumar, D. Uma

Abstract

IJCST/74/2/A-0779
44

An Exploiting Hybrid Model in Twitter for Tweet Segmentation in Named Entity Recognition

P.Manindra Kumar, Dr. K.V.Krishnam Raju

Abstract

IJCST/74/2/A-0780
45

Revocable IBE Scheme for Efficient Identity Based Encryption on Cloud Infrastructure

M.T. Ramakrishna Raju, Jeevana sujitha

Abstract

IJCST/74/2/A-0781
46

The Effect of Different Types of Building Trust in E-commerce of IT-based Products

Abdullah NARALAN, Hasan Asil

Abstract

IJCST/74/2/A-0782
47

Data Broadcast by utilizing Approximation Algorithms in Multi-hop Wireless Networks

Mude Sandeep Kumar, Kambhampati Sudhakar, Eerla Raghu, S Venkata Siva Satish

Abstract

IJCST/74/2/A-0783
48

Evaluating the Effect of PMBOK Standard and Software Development Methodology on Software Development Teams’ Success (Case Study: Software Companies in Iran)

Ustun Ozen, Hasan Asil

Abstract

IJCST/74/2/A-0784
49

Mining Sequential Patterns with Multiple Minimum Support for Large Sequence Databases

V.Ravikumar, V.Purnachandra Rao

Abstract

IJCST/74/2/A-0785
50

Simplifying Data Recovery with Advance Techniques and Operations

Advait Chandsarkar, Suchitra Patil

Abstract

IJCST/74/2/A-0786
51

Enhanced Filtering Technique to Filter False Data in Wireless Sensor Networks

S.D.Manojna, Dr CH.Satyanarayana

Abstract

IJCST/74/2/A-0787
52

Experimental Analysis of KNN with Naive Bayes, SVM and Naive Bayes Algorithms for Spam Mail Detection

Divya Sharma

Abstract

IJCST/74/2/A-0788