DOWNLOADS


IJCST IJCST




Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals

International Journal of Computer Science Trends and Technology

IJCST-volume 10 Issue 1 / Jan - Feb 2022

S.No
Title/Author Name
Page No
1
The Use of Artificial Intelligence and Big Data in Crisis Management

- Yew Kee Wong

10.33144/23478578/IJCST-V10I1P1

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


1
2
Understanding The Relationships of Ai, Machine Learning and Deep Learning

- Yew Kee Wong

10.33144/23478578/IJCST-V10I1P2

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


6
3
Object Detection in Images Using a Machine Learning based Convolutional Neural Networks (CNN)

- G.Krishnaveni , T.Satya Nagamani

10.33144/23478578/IJCST-V10I1P3

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


14
4
An Intelligent System for Diagnosing Anemia Diseases

- R.A.E. Ibrahim , A. E. E. El Alfi, A.A.E. Abdallah

10.33144/23478578/IJCST-V10I1P4

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


19
5
Computational Intelligence applied in Bioinformatics

- C. Sunitha Ram, Swetha Gayathri Kuchimanchi

10.33144/23478578/IJCST-V10I1P5

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


27
6
Challenges of Time Synchronization in Wireless Sensor Networks and overcoming the issues

- Asir Sathia Regin.d, Dr. Vikram jain

10.33144/23478578/IJCST-V10I1P6

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


35
7
Managing Information Security in Small and Medium Enterprise in East Africa

-Masese Chuma Benard, Nguleni Faith, Masoud Charles, Michael Nyasimi, Wasike Smith

10.33144/23478578/IJCST-V10I1P7

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


41
8
Breast Cancer Detection using Histopathological Images

- Jitendra Maan , Harsh Maan

10.33144/23478578/IJCST-V10I1P8

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


53
9
Advanced Gossip-based Approach for Resource Management in Cloud Ambience

- Mr. Monilal S

10.33144/23478578/IJCST-V10I1P9

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


59
10
Cloud Security by overcoming issues of Bloom filter through Deduplication and DNA encryption

- Sangeeta Kumari , Harjinder Kaur

10.33144/23478578/IJCST-V10I1P10

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


63
11
Speech Emotion Recognition Using Machine Learning

- Dr. C sunitha ram, B. Varshini, B. Varsha

10.33144/23478578/IJCST-V10I1P11

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


70
12
Early Detection of Alzheimer’s disease using Deep Learning Frameworks

- Hemalatha. R, Subathra devi. L

10.33144/23478578/IJCST-V10I1P12

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


75
13
Supervised Learning Technique for Recommendation Systems based on Amazon Product Reviews

- Dr.R. Hemalatha, Mrs. Jasmin Thomas

10.33144/23478578/IJCST-V10I1P13

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


79
14
A Performance Comparison on DoS and DDoS attacks in Internet of Things

- S.chithra, Dr.R.Kalaiarasi

10.33144/23478578/IJCST-V10I1P14

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


86
15
Device for DEAF & Hearing-Impaired People

- Laveesh Chauhan, Anushka Chauhan

10.33144/23478578/IJCST-V10I1P15

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


98
16
Orphanage Helping System

- Indhu.K, Rohan Periyasamy.R, Yogesh Kumar. B,Ms. K. Srigurulekha, Ms. Yogalakshmi, Ms. Kirubadevi

10.33144/23478578/IJCST-V10I1P16

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


99
17
Paradigm based Part of Speech Tagging with priorities: Implantation for Gujarati Script

- Kapadia Utkarsh N , Deasi Apurva A

10.33144/23478578/IJCST-V10I1P17

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


104
18
A Review on Recent Advancements of Image Steganography

- Rahul Kumar,Devendra Singh Rathore,Mukesh Kumar

10.33144/23478578/IJCST-V10I1P18

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


113
19
Dual Level Image Steganography for Data Hiding using AES & LSB

- Rahul Kumar,Devendra Singh Rathore,Mukesh Kumar

10.33144/23478578/IJCST-V10I1P19

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


120
20
Distributed Cryptocurrency Mining Framework for Enterprise Data Centers

- Rahul R. Sharma

10.33144/23478578/IJCST-V10I1P20

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


127