Vol 10, No 2 (2017)

Table of Contents

Vol 10, No 2 (2017)

Articles

Modeling and Simulation of Fiber Bragg Grating (Fbg) as A Strain Sensor
Muhammad Arif Bin Jalil
DOI:10.13005/ojcst/10.02.01 ,  Vol 10, No 2 (2017), Pagination: 260-263
ABSTRACT |  PDF Abstract Views: 309  |  PDF Views: 1
Trends of Manufacturing Systems with Distributed Computing
Abedalhakeem T. E. Issa
DOI:10.13005/ojcst/10.02.02 ,  Vol 10, No 2 (2017), Pagination: 264-270
ABSTRACT |  PDF Abstract Views: 301  |  PDF Views: 1
Approximation Query Layer (AQLayer):Design and Architecture
Tamanna Siddiqui, Mohammad AlKadri
DOI:10.13005/ojcst/10.02.03 ,  Vol 10, No 2 (2017), Pagination: 271-275
ABSTRACT |  PDF Abstract Views: 310  |  PDF Views: 0
Cellular Automata Based Study of Spectral Signatures of Dal_Lake Infrared Imagery
Fasel Qadir
DOI:10.13005/ojcst/10.02.04 ,  Vol 10, No 2 (2017), Pagination: 276-281
ABSTRACT |  PDF Abstract Views: 331  |  PDF Views: 0
Enhancing the Classification Accuracy of Noisy Dataset by Fusing Correlation Based Feature Selection with K-Nearest Neighbour
Samir Kumar Singha, Syed Imtiaz Hassan
DOI:10.13005/ojcst/10.02.05 ,  Vol 10, No 2 (2017), Pagination: 282-290
ABSTRACT |  PDF Abstract Views: 302  |  PDF Views: 0
Impact of Biometric Attendance System on Secondary and HigherSecondary Educational Institutions Across J&K
Mudasir M. Kirmani
DOI:10.13005/ojcst/10.02.06 ,  Vol 10, No 2 (2017), Pagination: 291-297
ABSTRACT |  PDF Abstract Views: 318  |  PDF Views: 1
Assessment of Accuracy Enhancement of Back Propagation Algorithm by Training the Model using Deep Learning
Baby Kahkeshan, Syed Imtiaz Hassan
DOI:10.13005/ojcst/10.02.07 ,  Vol 10, No 2 (2017), Pagination: 298-304
ABSTRACT |  PDF Abstract Views: 297  |  PDF Views: 0
Automatic Feedback Generation in Softwar-e Performance Engineering:A Review
Javaid Iqbal, Syed Abrar Ul Haq
DOI:10.13005/ojcst/10.02.08 ,  Vol 10, No 2 (2017), Pagination: 305-310
ABSTRACT |  PDF Abstract Views: 290  |  PDF Views: 1
Intelligent Information Retrieval Using Hybrid of Fuzzy Set and Trust
Suruchi Chawla
DOI:10.13005/ojcst/10.02.09 ,  Vol 10, No 2 (2017), Pagination: 311-325
ABSTRACT |  PDF Abstract Views: 287  |  PDF Views: 0
A New Distributed Intrusion Detection System in Computer Network: An Approach to Detect Malicious Intrusion Threats at Initial Stage
Parveen Sadotra, Chandrakant Sharma
DOI:10.13005/ojcst/10.02.10 ,  Vol 10, No 2 (2017), Pagination: 326-332
ABSTRACT |  PDF Abstract Views: 326  |  PDF Views: 1
Classification of Human Organ Using Image Processing
Sindhu, V. Vaidhehi
DOI:10.13005/ojcst/10.02.11 ,  Vol 10, No 2 (2017), Pagination: 333-337
ABSTRACT |  PDF Abstract Views: 309  |  PDF Views: 1
Detection and Isolation of Zombie Attack under Cloud Environment
Sunil Kumar, Maninder Singh
DOI:10.13005/ojcst/10.02.12 ,  Vol 10, No 2 (2017), Pagination: 338-344
ABSTRACT |  PDF Abstract Views: 325  |  PDF Views: 4
Enhanced Content Based Double Encryption Algorithm Using Symmetric Key Cryptography
Junestarfield Lyngdoh Kynshi, Deepa V. Jose
DOI:10.13005/ojcst/10.02.13 ,  Vol 10, No 2 (2017), Pagination: 345-351
ABSTRACT |  PDF Abstract Views: 301  |  PDF Views: 7
Software Upgradation Model Based on Agile Methodology
Manvender Singh Rathore, Deepa V. Jose
DOI:10.13005/ojcst/10.02.14 ,  Vol 10, No 2 (2017), Pagination: 352-358
ABSTRACT |  PDF Abstract Views: 268  |  PDF Views: 3
Secure ASP.NET Web Application by Discovering Broken Authentication and Session Management Vulnerabilities
Rupal R. Sharma, Ravi K. Sheth
DOI:10.13005/ojcst/10.02.15 ,  Vol 10, No 2 (2017), Pagination: 359-363
ABSTRACT |  PDF Abstract Views: 277  |  PDF Views: 0
i-v Fuzzy Shortest Path in a Multigraph
Siddhartha Sankar Biswas
DOI:10.13005/ojcst/10.02.16 ,  Vol 10, No 2 (2017), Pagination: 364-370
ABSTRACT |  PDF Abstract Views: 325  |  PDF Views: 3
An Optimal Resource Provisioning Algorithm for Cloud Computing Environment
Shivangi Nigam, Abhishek Bajpai
DOI:10.13005/ojcst/10.02.17 ,  Vol 10, No 2 (2017), Pagination: 371-384
ABSTRACT |  PDF Abstract Views: 299  |  PDF Views: 0
An Automated Testing Model Using Test Driven Development Approach
C. P. Patidar, Arun Dev Dongre
DOI:10.13005/ojcst/10.02.18 ,  Vol 10, No 2 (2017), Pagination: 385-390
ABSTRACT |  PDF Abstract Views: 276  |  PDF Views: 2
Breast Cancer Detection using Image Processing Techniques
Prannoy Giri, K. Sravanakumar
DOI:10.13005/ojcst/10.02.19 ,  Vol 10, No 2 (2017), Pagination: 391-399
ABSTRACT |  PDF Abstract Views: 344  |  PDF Views: 1
Wavelet Statistical Feature Based Malware Class Recognition and Classification using Supervised Learning Classifier
Aziz Makandar, Anita Patrot
DOI:10.13005/ojcst/10.02.20 ,  Vol 10, No 2 (2017), Pagination: 400-406
ABSTRACT |  PDF Abstract Views: 272  |  PDF Views: 0
Plastic Money Security Issues In India
Reena Hooda, Deepak Dhaka
DOI:10.13005/ojcst/10.02.21 ,  Vol 10, No 2 (2017), Pagination: 408-412
ABSTRACT |  PDF Abstract Views: 264  |  PDF Views: 2
Comparative Study on Classification of Digital Images
H. B. Basanth Kumar
DOI:10.13005/ojcst/10.02.22 ,  Vol 10, No 2 (2017), Pagination: 413-416
ABSTRACT |  PDF Abstract Views: 239  |  PDF Views: 1
Major Challenges of Mobile Adhoc Networks
Dharmesh Bhatt, Bijendra Agrawal
DOI:10.13005/ojcst/10.02.23 ,  Vol 10, No 2 (2017), Pagination: 417-421
ABSTRACT |  PDF Abstract Views: 258  |  PDF Views: 0
Agile Practices in Indian Organizations
Uma Kumari
DOI:10.13005/ojcst/10.02.24 ,  Vol 10, No 2 (2017), Pagination: 422-428
ABSTRACT |  PDF Abstract Views: 237  |  PDF Views: 1
A Review on Electronic Dictionary and Machine Translation System Developed in North-East India
Saiful Islam, Bipul Syam Purkayastha
DOI:10.13005/ojcst/10.02.25 ,  Vol 10, No 2 (2017), Pagination: 429-437
ABSTRACT |  PDF Abstract Views: 244  |  PDF Views: 2
Hybrid Intrusion Detection System for Private Cloud & Public Cloud
Riddhi Gaur, Uma Kumari
DOI:10.13005/ojcst/10.02.26 ,  Vol 10, No 2 (2017), Pagination: 438-445
ABSTRACT |  PDF Abstract Views: 208  |  PDF Views: 0
A Novel Approach to Address Sensor Interoperability Using Gabor Filter
Neha Bhatia, Himani, Chander Kant
DOI:10.13005/ojcst/10.02.27 ,  Vol 10, No 2 (2017), Pagination: 446-453
ABSTRACT |  PDF Abstract Views: 222  |  PDF Views: 2
A Review on IoT Security Issues and Countermeasures
J. Yashaswini
DOI:10.13005/ojcst/10.02.28 ,  Vol 10, No 2 (2017), Pagination: 454-459
ABSTRACT |  PDF Abstract Views: 226  |  PDF Views: 1
A Tpa-Authentication Scheme for Public Cloud Using Kerberos Protocol
Arpit Agrawal, Shubhangi Verma
DOI:10.13005/ojcst/10.02.29 ,  Vol 10, No 2 (2017), Pagination: 460-466
ABSTRACT |  PDF Abstract Views: 208  |  PDF Views: 0
Component Based Software Development Life Cycle Models:A Comparative Review
Preeti Gulia, Palak
DOI:10.13005/ojcst/10.02.30 ,  Vol 10, No 2 (2017), Pagination: 467-473
ABSTRACT |  PDF Abstract Views: 227  |  PDF Views: 2
Enhanced K-Means Clustering Algorithm Using Collaborative Filtering Approach
Ankush Saklecha, Jagagdish Raikwal
DOI:10.13005/ojcst/10.02.31 ,  Vol 10, No 2 (2017), Pagination: 474-479
ABSTRACT |  PDF Abstract Views: 197  |  PDF Views: 1
Research Summary of A Study for the Estimation of Legacy Programs for Effective Reengineering
Harmeet Kaur, Shahanawaj Ahamad, Govinder N. Verma
DOI:10.13005/ojcst/10.02.32 ,  Vol 10, No 2 (2017), Pagination: 480-490
ABSTRACT |  PDF Abstract Views: 245  |  PDF Views: 2
Intrusion Detection System Based on Data Mining Techniques
Abhinav Kumra, W. Jeberson, Klinsega Jeberson
DOI:10.13005/ojcst/10.02.33 ,  Vol 10, No 2 (2017), Pagination: 491-496
ABSTRACT |  PDF Abstract Views: 195  |  PDF Views: 0
Geographical Information Based Expert System to Estimate Submersible Pump System Specifications
Gurpreet Kaur, Derminder Singh, Rajan Aggarwal
DOI:10.13005/ojcst/10.02.34 ,  Vol 10, No 2 (2017), Pagination: 497-501
ABSTRACT |  PDF Abstract Views: 186  |  PDF Views: 5
Iris Biometric Modality:A Review
Iqra Altaf Mattoo, Parularul Agarwal
DOI:10.13005/ojcst/10.02.35 ,  Vol 10, No 2 (2017), Pagination: 502-506
ABSTRACT |  PDF Abstract Views: 210  |  PDF Views: 0
Survey on Packet Marking Algorithms for IP Traceback
Y. Bhavani, V. Janaki, R. Sridevi
DOI:10.13005/ojcst/10.02.36 ,  Vol 10, No 2 (2017), Pagination: 507-512
ABSTRACT |  PDF Abstract Views: 208  |  PDF Views: 7
A Survey on User Authentication Techniques
K. Sharmila, V. Janaki, A. Nagaraju
DOI:10.13005/ojcst/10.02.37 ,  Vol 10, No 2 (2017), Pagination: 513-519
ABSTRACT |  PDF Abstract Views: 245  |  PDF Views: 5
Cardiovascular Disease Prediction Using Data Mining Techniques:A Review
Mudasir M. Kirmani
DOI:10.13005/ojcst/10.02.38 ,  Vol 10, No 2 (2017), Pagination: 520-528
ABSTRACT |  PDF Abstract Views: 309  |  PDF Views: 5
Website Design of Indian Central Universities:Issues and Challenges
Mudasir M. Kirmani
DOI:10.13005/ojcst/10.02.39 ,  Vol 10, No 2 (2017), Pagination: 529-538
ABSTRACT |  PDF Abstract Views: 226  |  PDF Views: 3