IJCST ONLINE
DOWNLOADS
QR Code

Visitors
Call for Paper :
Welcomes Conference Proposals
IJCST Xplore Online Research Paper Database
S.No
|
Title/Author Name
|
Page No
|
1
|
Research on E-commerce Platform of Online Shopping Consumers
- Aastha Tyagi, Khushee Tyagi, Sushant Pal, Parteek Sharma ![]() [Abstract] [ ![]() ![]() ![]() |
1 |
2
|
Online book store
- Apurva Mahato,Vikas,Shivam ![]() [Abstract] [ ![]() ![]() ![]() |
7 |
3
|
E-Donation in India: Trends, Challenges, and Opportunities
- Sumit Dutt, Aanchal Rao, Sadhana Kumari, Sonali ![]() [Abstract] [ ![]() ![]() ![]() |
14 |
4
|
Enhancing Cloud Security: A Review of Hybrid Intrusion Detection Approaches
- Himanshu Jaiswal, Sreeja Nair, Ritu Ranjani Singh ![]() [Abstract] [ ![]() ![]() ![]() |
21 |
5
|
ML DJango Framework Integration for IOT Attacks
- Mr.Gokulnath D, Ms.Fathima G ![]() [Abstract] [ ![]() ![]() ![]() |
29 |
6
|
Entity Recognition by Natural Language Processing and Machine Learning
- Sharmila Dalave, Prof. S. A. Gaikwad ![]() [Abstract] [ ![]() ![]() ![]() |
34 |
7
|
A Brief Study on Formulation of Some Transportation Problem in Linear Programming
- Anil Raj, Dr. Krishnandan Prasad ![]() [Abstract] [ ![]() ![]() ![]() |
38 |
8
|
Object Detection Techniques: A Review
- Tanuj Kumar Bharadwaj, Shubham Sharma ![]() [Abstract] [ ![]() ![]() ![]() |
45 |
9
|
Power Business Intelligence Developed by Microsoft: A Case Study
- Amit Kumar Singh, Ankita Kumari, Anit Tyagi, Tanisk Tyagi, Ashutosh Pradhan ![]() [Abstract] [ ![]() ![]() ![]() |
54 |
10
|
Facial Expression Based Stress Detection Using Machine Learning
- Rishabh Biltoriya, Sagar, Sachin Singh, Mohit updhyay ![]() [Abstract] [ ![]() ![]() ![]() |
66 |
11
|
Deep Fake Image Detection Using Supervised Machine Learning Technique: A Study
- Sharad Shrivastava, Prof. Sandeep Piplotia ![]() [Abstract] [ ![]() ![]() ![]() |
72 |
12
|
DEA-RNN: A Hybrid Deep Learning Approach For Cyberbullying Detection in Twitter Social Media Platform
- Bujunuru Sudheer Kumar, Dr.s. Latha ![]() [Abstract] [ ![]() ![]() ![]() |
78 |
13
|
Incremental Core Transformation: A Modular First Approach to Legacy Modernization in Banking
- Ashish G. Vishwakarma ![]() [Abstract] [ ![]() ![]() ![]() |
83 |
14
|
Botnet Attack Prevention in Internet of Things (IOT) Devices Using AI
- Sanjeev Kumar, Prof. Shivank Soni ![]() [Abstract] [ ![]() ![]() ![]() |
91 |
15
|
An Analysis Of A Novel And Secure Graphical Password Authentication Scheme With Improved Usability And IRIS Recognition
- Patchamatla Sai Sanjeevi Naga Prasad Varma, Mrs G Vijaya Kumari, Mr G Tatayyanaidu,Mr S N V S S S T Murthy, ![]() [Abstract] [ ![]() ![]() ![]() |
100 |
16
|
Python-Based Detection of Paddy Leaf Diseases: A Computational Approach
- Srikant Singh, Ekta Jayantibhai Patel, Rohit Kumar Awasthi ![]() [Abstract] [ ![]() ![]() ![]() |
104 |
17
|
Self-Attention Mechanisms for Detecting Anomalies in Encrypted Network Traffic: A Systematic Review
- Sabuhee, Pratik Buchke ![]() [Abstract] [ ![]() ![]() ![]() |
114 |
18
|
Experimental Analysis of Classical Segmentation Technique for Bacterial Colony Counting
- M. Sivapriya, N. Senthilkumaran ![]() [Abstract] [ ![]() ![]() ![]() |
126 |
19
|
Advancing Software Quality through Hybrid CNN-LSTM Bug Prediction: Beyond Traditional Models
- Rinku Taide, Imran Ali Khan ![]() [Abstract] [ ![]() ![]() ![]() |
135 |
Under in review process... |