IJCST ONLINE
DOWNLOADS
Call for Paper :

Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-volume-13 Issue 2 / MAR - APR 2025
|
S.No
|
Title/Author Name
|
Page No
|
|
1
|
A Smart Mobile Application For Early Detection Of Skin Diseases Among Higher Education Students
- W. K. ElSaid, Nahed Amasha, Nada Emara
10.33144/23478578/IJCST-V13I2P1 [Abstract] [
|
1 |
|
2
|
Disease Prediction System Using Machine Learning: A Comprehensive Approach
- Seema Saroj, Sakshi Sahu, Sanjana Patel, Suraj Sahu
10.33144/23478578/IJCST-V13I2P2 [Abstract] [
|
10 |
|
3
|
Earlier Diagnosis Of Diabetic Eye Infection Using Cnn Models
- DR.D.J.SAMATHA NAIDU, M.LAHYA
10.33144/23478578/IJCST-V13I2P3 [Abstract] [
|
12 |
|
4
|
A Comprehensive Study of Substitution and Transposition Techniques in Cryptographic Systems
- Binita Thakkar
10.33144/23478578/IJCST-V13I2P4 [Abstract] [
|
15 |
|
5
|
Evaluating The Impact of Open Science Practices on Research Collaboration and Innovation in Tanzania: A Case Study for Kampala International University in Tanzania
- Charles Masoud Mwadudu,Rashid Kiliza,Victor Turiabe,Cecil Segero,Godfrey Ochwoto,Godson Samuel
10.33144/23478578/IJCST-V13I2P5 [Abstract] [
|
20 |
|
6
|
Smart PCB Defect Detection For Industry Using CNN Algorithm
- Kishore S,Akilesh G,Kugan K,Bharathi V
10.33144/23478578/IJCST-V13I2P6 [Abstract] [
|
30 |
|
7
|
Artificial Intelligence in Healthcare Industry
- Vardant Tyagi, Pradeep Singh Bisht
10.33144/23478578/IJCST-V13I2P7 [Abstract] [
|
34 |
|
8
|
Ancient Indian Diagnosis Techniques for Brain Disorders (Autism, ADHD, Cerebral Palsy, Speech Disorder) with Artificial Intelligence
- Dr. Jaswinder Singh (B.E.M.S., M.D.), Dr. Sandeep Kumar Gupta (M.C.A., B.Tech. CSE)
10.33144/23478578/IJCST-V13I2P8 [Abstract] [
|
43 |
|
9
|
NEURASCAN-AI: A Deep Learning Powered Web Platform for Pneumonia and COVID-19 Detection from Chest X-Rays.
- Abdul Majid,Muhib A.Lambay,Shaikh Nabil Ahmed,Shaikh Mohd Talha, Kaldane Abdussalam,Hasan Muchale
10.33144/23478578/IJCST-V13I2P9 [Abstract] [
|
49 |
|
10
|
Enhancing Digital Organization: A Review of Automated File Sorting Systems
- Asim Khan,Yahya Bandarkar,Mazin Deshmukh, Mustaqeem Pachapuri,Muhib Anwar Lambay
10.33144/23478578/IJCST-V13I2P10 [Abstract] [
|
54 |
|
11
|
NeuroRush: A Comprehensive Review of Fast-Paced Decision-Making in Gaming
- Mohd Qaif Siddique, Umair Faquih, Mehmood Khot, Adil Shaikh,Muhib A. Lambay
10.33144/23478578/IJCST-V13I2P11 [Abstract] [
|
60 |
|
12
|
Botnet Attack Prevention in Internet of Things (IOT) devices Using AI: A Systematic Review
- Sanjeev kumar,Prof. Shivank Soni
10.33144/23478578/IJCST-V13I2P12 [Abstract] [
|
68 |
|
13
|
The Future of Learning: A Systematic Review of Machine Learning-Powered Educational Platform
- Asim Khan,Kaif Khan,Omkar Shedge,Sandesh Khargaonkar,Muhib Anwar Lambay
10.33144/23478578/IJCST-V13I2P13 [Abstract] [
|
80 |
|
14
|
Node.js Research Paper
- ARYAN,SHAILY,SONIKA,TANISHK
10.33144/23478578/IJCST-V13I2P14 [Abstract] [
|
86 |
|
15
|
Pneumonia Detection Using Flask and CNN on Chest X-Rays
- KHYATI SINGH,SHRAIYA GOYAL,SONAL TYAGI
10.33144/23478578/IJCST-V13I2P15 [Abstract] [
|
89 |
|
16
|
Application of advance encryption algorithm for enhanced Cloud security
- Yashraj Mishra, Sanjay Pal
10.33144/23478578/IJCST-V13I2P16 [Abstract] [
|
101 |
|
17
|
Edge Computing for IoT: Challenges and Future Directions
- Suhail,Sahdev,Abhinay Kumar,Shivam Saini,Ashutosh Pradhan
10.33144/23478578/IJCST-V13I2P17 [Abstract] [
|
110 |
|
18
|
Blockchain Technology for Secure Data Sharing in Healthcare Systems
- Hritik Sagar,Rishabh Tyagi,Jaya Pival,Nikita Bharti
10.33144/23478578/IJCST-V13I2P18 [Abstract] [
|
114 |
|
19
|
Artificial Intelligence for Detecting Cheating Patterns in Online Exams
- Dev Raj, Kamta Prasad Varun, Vivek Nishad, Monu Pandey
10.33144/23478578/IJCST-V13I2P19 [Abstract] [
|
118 |
|
20
|
Mathematical Approach to Steganography for Embedding RGB Images
- P.Meenakshi Sundari
10.33144/23478578/IJCST-V13I2P20 [Abstract] [
|
121 |
|
21
|
Student Performance Prediction in OBE Framework Based On Deep Learning Model
- Dr.R.Hemalatha, M.V.Sethu Ramalingam
10.33144/23478578/IJCST-V13I2P21 [Abstract] [
|
125 |
|
22
|
Designing Dynamic Honeypots for Cyber Threats Detection
- Ms. Pradhiksha S, Ms. C.Vishnu Priya
10.33144/23478578/IJCST-V13I2P22 [Abstract] [
|
130 |
|
23
|
AI-Powered Cybersecurity in IoT Devices for Smart Cities
- Rohit Kumar Saurabh Kumar, Deepanshu Chaudhary
10.33144/23478578/IJCST-V13I2P23 [Abstract] [
|
135 |
|
24
|
Intelligence Forensics: Ai- Powered Classification of Cyber Attacks
- Ms. Hinduja J, Ms. Elampirai Gopika S.
10.33144/23478578/IJCST-V13I2P24
[Abstract] [
|
141 |
|
25
|
Advanced IIDS Using Hybrid Algorithms
- Ms. Anumantraa Ramar, Mr. Sankara Narayanan S T
10.33144/23478578/IJCST-V13I2P25
[Abstract] [
|
146 |
|
26
|
Advancing Artificial Intelligence with Python: A Case Study
- Naitik Singh, Gaurav Sharma, Anubhav, Aleena shamsul, Ashutosh Pardhan
10.33144/23478578/IJCST-V13I2P26
[Abstract] [
|
152 |
|
27
|
Student Attendance System with Fingerprint Reader
- Rahul Bhatia, Ankit Raghav, Shiva Kumar, Prem Sagar,Shivam
10.33144/23478578/IJCST-V13I2P27
[Abstract] [
|
161 |
|
28
|
AI-Powered Pattern Recognition and Translation of Ancient Indian Manuscripts
- Akash Bharti,Prajal Tyagi, Shubham Yadav, Upasna Aggarwal
10.33144/23478578/IJCST-V13I2P28
[Abstract] [
|
165 |
|
29
|
Internet Of Things(IOT) in Smart Traffic Control System
- Avneesh Kumar, Mukesh Kumar, Himanshu Rajput, Harsh Jadon
10.33144/23478578/IJCST-V13I2P29
[Abstract] [
|
169 |
|
30
|
File Integration Monitoring Using PowerShell
- Ms. Kalaivani R , Mr. Ramesh E R
10.33144/23478578/IJCST-V13I2P30
[Abstract] [
|
177 |
|
31
|
Integrating Cloud Computing with the Internet of Things: A Comparative Review
- Chesta Singhal, Hritik Sharma, Happy, Kajal,Nitish Vashishtha
10.33144/23478578/IJCST-V13I2P31
[Abstract] [
|
182 |
|
32
|
Text- Predictive Analytics in Healthcare: Using Machine Learning to Detect Early-Stage Diseases
- Aadil Ansari , Aayush , Ayush kumar , Tanya Mishra
10.33144/23478578/IJCST-V13I2P32
[Abstract] [
|
193 |
|
33
|
Hybrid Intrusion Detection System with Flask Framework
- Ms. Veda Swetha S, Mr. Marimuthu R
10.33144/23478578/IJCST-V13I2P33
[Abstract] [
|
204 |
|
34
|
Explainable Artificial Intelligence (XAI)
- Sachin, Nikhil, Vishal Ahlawat, Rishabh Tyagi
10.33144/23478578/IJCST-V13I2P34
[Abstract] [
|
208 |
|
35
|
Predicting Software Defects: A Systematic Review of Machine Learning Models and Datasets
- Rinku Taide, Imran Ali Khan
10.33144/23478578/IJCST-V13I2P35
[Abstract] [
|
211 |
|
36
|
AI & Data Privacy Balancing Innovation with User Protection : A Case Study
- Shivani Chauhan, Priyanshu Bacchas, Pradeep Kumar,Ashutosh Pradhan
10.33144/23478578/IJCST-V13I2P36
[Abstract] [
|
223 |
|
37
|
With The Growing Adoption of Cloud Computing, Cybersecurity Strategies Must Shift Toward Zero Trust Architecture to Effectively Mitigate Modern Threats
- Pratibha Singh, Naina Gupta, Nootan Ojha, Pratham Vashisth, Prof. Ashutosh Pradhan
10.33144/23478578/IJCST-V13I2P37
[Abstract] [
|
229 |
|
38
|
Proxy Re-Encryption Approach to Secure File Sharing Based on Blockchain
- Ms. Harini Kumari B, Mrs. Magna Yadlapalli
10.33144/23478578/IJCST-V13I2P38
[Abstract] [
|
234 |
|
39
|
Serverless Deployment: Revolutionizing Modern Application Architectures
- Tanishq Kumar, Sagar Pal, Abhishek Kaushik, Anshul Tyagi
10.33144/23478578/IJCST-V13I2P39
[Abstract] [
|
239 |
|
40
|
Smart Health Monitoring System with Artificial Intelligence: A Case Study
- Ankit Sharma, Ansh Tyagi, Kartik Sharma, Shyam Sharma, Ashutosh Pradhan
10.33144/23478578/IJCST-V13I2P40
[Abstract] [
|
242 |
|
Under in review process... |


