IJCST ONLINE
DOWNLOADS
Call for Paper :

Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 7 Issue 4 / Jul-Aug 2019
|
S.No
|
Title/Author Name
|
Page No
|
|
1
|
Cyberwarfare History and APT Profiling
- Azhar Ushmani
10.33144/23478578/IJCST-V7I4P1 [Abstract] [
|
1 |
|
2
|
A Survey on Image Processing using Artificial Neural Network (ANN)
- Jiten Kumar, Inderdeep Kaur
10.33144/23478578/IJCST-V7I4P2 [Abstract] [
|
4 |
|
3
|
Conceptural Oriented Analysis On The Industrial Standard Cyber Security
- Dr.K.Sai Manoj, Ms. K. Mrudula, Mrs. G.Maanasa, Prof.K.Phani Srinivas
10.33144/23478578/IJCST-V7I4P3 [Abstract] [
|
12 |
|
4
|
Fuzzy Collision Avoidance Autopilot
- Qousay Benshi, Oulfat Jolaha, Jabr Hanna
10.33144/23478578/IJCST-V7I4P4 [Abstract] [
|
19 |
|
5
|
Analysis of the Technique for the Improvement of the Data Confidentiality in the Cloud Computing Environment
- Dr.K.Sai Manoj
10.33144/23478578/IJCST-V7I4P5 [Abstract] [
|
27 |
|
6
|
A Virtual Energy Trading Platform for Smart Homes
- Shruti Hegde, Ashwini B V, Shylaja Madasu
10.33144/23478578/IJCST-V7I4P6 [Abstract] [
|
30 |
|
7
|
Black Hole Attack (Dark opening assault) in MOBILE A-hoc NET
- Khushbu, Dr. R.K. Bathla
10.33144/23478578/IJCST-V7I4P7 [Abstract] [
|
34 |
|
8
|
Review on Breast Cancer Prediction Using Data Mining Algorithms
- Nitasha
10.33144/23478578/IJCST-V7I4P8 [Abstract] [
|
42 |
|
9
|
A Review of: Integrating ICT in Sudanese Kindergartens In order To Improve Cognitive Development
- Suhanda Saf Aldeen Mohammed Drar, Prof: Piet Kommers, Dr: Amgad Atta Abdelmageed Mohammed
10.33144/23478578/IJCST-V7I4P9 [Abstract] [
|
46 |
|
10
|
Integrating ICT in Sudanese Kindergartens In Order To Improve Cognitive Development (Case Study Khartoum, Sudan)
- Suhanda Saf Aldeen Mohammed Drar, Prof: Piet Kommers, Dr: Amgad Atta Abdelmageed Mohammed
10.33144/23478578/IJCST-V7I4P10 [Abstract] [
|
53 |
|
11
|
Power Aware Encrypted Security Improved with Optimal Time Bound Ad-Hoc on-demand Distance Vector Routing Protocol (PA-En-SIm-OptiB AODV)
- Dr. B.Karthikeyan
10.33144/23478578/IJCST-V7I4P11 [Abstract] [
|
58 |
|
12
|
A New Security Captcha As Graphical Passwords On Hard AI Problems
- M.sneha Divya, Mr.P.Joshua Raju
10.33144/23478578/IJCST-V7I4P12 [Abstract] [
|
69 |
|
13
|
Enhancement the Efficiency of Data Hiding Using Data Compression and Dividing Data
- Ola Haydar, Kinda Aboukassem
10.33144/23478578/IJCST-V7I4P13 [Abstract] [
|
84 |
|
14
|
Methodology to Describe and Verify Systems Behaviour by Integrating Several Formal Languages
- Bassem KOSAYBA, Waseem Ahmad
10.33144/23478578/IJCST-V7I4P14 [Abstract] [
|
89 |
|
15
|
Study of Age Estimation Using Fixed Rank Representation (FRR)
- Rohini G.Bhaisare
10.33144/23478578/IJCST-V7I4P15 [Abstract] [
|
93 |
|
16
|
A Novel Hybrid Approach for Global Optimization
- Jaswinder Singh, Shaminder Singh
10.33144/23478578/IJCST-V7I4P16 [Abstract] [
|
97 |
|
17
|
Towards an Improved Understanding of Data Availability in P2P Storage Systems
- Rama Alkhayer, Ahmad Saker Ahmad
10.33144/23478578/IJCST-V7I4P17 [Abstract] [
|
106 |
|
18
|
Studying of EDFA Performance for Different Concentrations of Erbium Atoms in the Energy Levels
- Nagham Abbas, Hadeel Issa, Afif sakkour, Faek Arraj
10.33144/23478578/IJCST-V7I4P18 [Abstract] [
|
111 |


