S.no | Research Topic | Paper ID |
1 | Preparation of Data Warehouse of Rainfall Data & Prediction of Rainfall Using Fuzzy Based Regression Techniques Saurabh Sharma1, Dr. Manish Pandey2, Sachin Chauhan3 | IJSTM/2016/0001 |
2 | SRCE: SKETCH RECOGNITION AND CODE EDITOR FOR SOFTWARE DESIGN V.R.RATNAKANTH.G, BHARAT VERMA, UPMA GROVER | IJSTM/2016/0002 |
3 | SPAMMER DETECTION IN ONLINE VIDEO SHARING SYSTEMS V.R.RATNAKANTH.G, AGAM SINGH AHLUWALIA,PARMINDER KAUR | IJSTM/2016/0003 |
4 | A REVIEW OF ENERGY EFFICIENT RESOURCE MANAGEMENT IN VIRTUALIZED CLOUD DATACENTER ISHA AWASTHI, SAHIL VASHIST, GAGANDEEP SINGH | IJSTM/2016/0004 |
5 | A SURVEY ON VOICE CODECS OVER WIRELESS MESH NETWORK SUMIT KUMAR, GAGANDEEP SINGH, SHANU MALHOTRA | IJSTM/2016/0005 |
6 | A SURVEY ON SERVICE FLOW SUPPORT BASED NETWORKS GAGANDEEP SINGH, SUMIT KUMAR,SHANU MALHOTRA | IJSTM/2016/0006 |
7 | REVIEW ON VARIOUS CRYPTOGRAPHIC ENCRYPTION CIPHERS RUCHI GARG, MANDEEP KAUR | IJSTM/2016/0007 |
8 | THE NEXT MOBILE REVOLUTION: NEAR FIELD COMMUNICATION (NFC)S SHABNAM KAUR, ABHISHEK ANAND | IJSTM/2016/0008 |
9 | A SURVEY ON VARIOUS FINGERPRINT MATCHING AND RECOGNITION TECHNIQUES ANEESHA KARAR, AMARJEET KAUR | IJSTM/2016/0009 |
10 | DETAILED STUDY OF DETECTION AND REMOVAL TECHNIQUES OF UNDERLINES AND ANNOTATIONS IN SCANNED DOCUMENTS TADBEER KAUR,DR.RINKESH MITTAL | IJSTM/2016/0010 |
11 | EFFECT OF MODULATION TECHNIQUES ON PERFORMANCE EVALUATION OF WIMAX ROUTING PROTOCOLS NAVEED ABDULLAH, HARDEEP SINDHER, SUMIT KUMAR | IJSTM/2016/0011 |
12 | GREEN NETWORKING : A SURVEY SAKSHI RATHI, PREETI GULATI | IJSTM/2016/0012 |
13 | A REVIEW ON DDOS AND ITS DETECTION AND DEFENCE METHODS SHIKA, MANDEEP KAUR, ROHINI SHARMA | IJSTM/2016/0013 |
14 | AN EXTENSIVE STUDY ON THE CRYPTOGRAPHY ALGORITHMS JASPREET SINGH | IJSTM/2016/0014 |
15 | A REVIEW ON SIMILARITY INDEXING OF HIGH-DIMENSIONAL DATA SET USING DATA PARTITIONING NUMA BAJA,NIKITA RISHI,ANANTA SINGH | IJSTM/2016/0015 |
16 | ANALYSIS OF ASYMMETRIC NETWORKS OVER MEDIUM ACCESS CONTROL LAYER MEENU TALWAR,DAPINDER KAUR | IJSTM/2016/0016 |
17 | ANALYSIS OF ENHANCED MULTIMODAL BIOMETRICS SYSTEM FOR SPEECH & SIGNATURE USING NOISY SAMPLES MEENU TALWAR,DAPINDER KAUR | IJSTM/2016/0017 |
18 | ROUTING METHODS AND ATTACKS IN WIRELESS SENSOR NETWORKS SIKANDER NAGPAL,TEJPAL SHARMA | IJSTM/2016/0018 |
19 | IDENTIFICATION OF LAND USE/LAND COVER FEATURE IN SATELLITE IMAGE USING HYBRID ACO2/PSO TOOL AND UPLOAD THE IMAGE ON GOOGLE EARTH MANPREET KAUR | IJSTM/2016/0019 |
20 | REVIEW ON REGRESSION TESTING TECHNIQUES ATUL KUMAR PAL,MAKUL MAHAJAN | IJSTM/2016/0020 |
21 | STUDY FOR PERFORMANCE ANALYSIS OF AODV WITH AND WITHOUT BLACK HOLE NODES SHIKHA SHARMA | IJSTM/2016/0021 |
22 | A GREEN APPROACH TOWARDS HYBRID CLOUD OPERABILITY ROHIT GOYAL | IJSTM/2016/0022 |
23 | AN INTRODUCTION OF SLEEP DEPRIVATION ATTACK IN AODV NAVNEET SANDHU,MEENU TALWAR | IJSTM/2016/0023 |
24 | APPLICATION OF CLOUD COMPUTING IN MICROBIOLOGICAL STUDIES (VIBRIO SPECIES) OF YAMUNA WATER USING PCR TECHNIQUES URVASHI,SIYA RAM, PRITY PANT,SONALI NAGAR | IJSTM/2016/0024 |
25 | Reducing Theoretical Complexity Metric for Component Based Softwares DEEKSHA RANI, DR. VINOD KUMAR BHALLA, VIJAY KUMAR SINHA | IJSTM/2016/0025 |
26 | HANDLING THE THREATS ON MOBILE SECURITY: AES, DES, BLOWFISH- SYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS ANSHU GOYAL, MANDEEP KAUR,ASHIMA NARANG | IJSTM/2016/0026 |
27 | REVIEW OF ADAPTIVE AND NON ADAPTIVE IMAGE INTERPOLATION TECHNIQUES PANZY,PREETI GULATI | IJSTM/2016/0027 |
28 | A SURVEY: AN ANT BASED ROUTE DISCOVERY IN VANET-WIMAX YOGESH,PARMINDER SINGH | IJSTM/2016/00028 |