DOWNLOADS


IJCST IJCST




Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 8 Issue 3 / May-Jun 2020

S.No
Title/Author Name
Page No
1
A New Approach to Encrypt Grayscale Images using Visual Cryptography

- U. Udayakumar, G.S. Gayathri, K. Vijayarangan

10.33144/23478578/IJCST-V8I3P1

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


1
2
An Optimization of a Ghost Worker Detection System Using Hybrid Technology

- Idoko Nnamdi .A, Onyedeke Obinna Cyril, Kingsley Chukwuemeka Ubani, Dr. Njideka Mbeledogu . N

10.33144/23478578/IJCST-V8I3P2

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


4
3
Detection and Classification of Retinal Lesions in Fundus Images

- Sangeetha.K, P.Padmavathy, C.Sindhu, R.Swathi Sri

10.33144/23478578/IJCST-V8I3P3

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


18
4
YOLOv2 based Real Time Object Detection

- Sakshi Gupta, Dr. T. Uma Devi

10.33144/23478578/IJCST-V8I3P4

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


26
5
A Mobile Application for Organic Farming

- B M Vidyavathi, D Ganesh, A Prasanna, K Aravind Kumar, Gangadhara

10.33144/23478578/IJCST-V8I3P5

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


31
6
Evaluate the Performance of Handover Management Algorithms in 5G Wireless Networks

- Lama Douba, Ahmad Saker Ahmad

10.33144/23478578/IJCST-V8I3P6

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


34
7
Wireless LED Signage Board using Internet of Things (IoT) Technology

- Ku Siti Syahidah Ku Mohd Noh, Muhammad Arman Abdul Manah, Mohammad Lukman Mohd Yassin

10.33144/23478578/IJCST-V8I3P1

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


38
8
Energy-Efficient Architecture for Wireless Sensor Networks in Healthcare Applications

- R. Sivaranjani,Dr. A.V. Senthil Kumar

10.33144/23478578/IJCST-V8I3P8

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


42
9
Adaptive Detect and Protect Against Jamming Attacks on Ad Hoc Networks using Game Theory and Channel Switching (GTCS)

- Alaa Mahfoud, Boushra Maala, Haisam Alradwan

10.33144/23478578/IJCST-V8I3P9

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


49
10
Performance Evaluation of Augmented Reality on Fog Computing Platform

- Kinan Nabeh Abbas, Ahmad Saker Ahmad

10.33144/23478578/IJCST-V8I3P10

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


57
11
Performance Evaluation of Load Balancing Algorithms on Fog Computing Platform

- Obada Qusai Hatem, Ahmad Saker Ahmad

10.33144/23478578/IJCST-V8I3P11

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


64
12
Applying Sentiment Analysis on Arabic comments in Sudanese Dialect

- Islam Saif Aldin Mukhtar Heamida, EL Samani Abd Elmutalib Ahmed, Mamdoh Noureldin Elsayed Mohamed, Abd Alhameed Adam Ahmed Salih

10.33144/23478578/IJCST-V8I3P12

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


69
13
Detecting COVID-19 in X-ray images with Keras, Tensor Flow, and Deep Learning

- Pranali Manapure , Kiran Likhar, Hemlata Kosare

10.33144/23478578/IJCST-V8I3P13

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


74
14
Authenticating Insurance Documents Using Ciphertext-Policy Based Attribute Signcryption

- G.Princiya, G.Rubini, B.Santhana Lakshmi, Kavitha Subramani

10.33144/23478578/IJCST-V8I3P14

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


79
15
Human Burn Diagnosis using Machine Learning

- Saraswathi D, Naimisha U, Yukthashree, Jyothi P, Sahana G

10.33144/23478578/IJCST-V8I3P15

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


87
16
A Type 2 Fuzzy Logic Based System for Basal Metabolic Rate Prediction of Diabetes Patients in Sudan

- Heba Abdelgader Mohammeds, Hani Hagras

10.33144/23478578/IJCST-V8I3P16

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


95

Under in review process...