IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-volume 10 Issue 1 / Jan - Feb 2022
S.No
|
Title/Author Name
|
Page No
|
1
|
The Use of Artificial Intelligence and Big Data in Crisis Management
- Yew Kee Wong 10.33144/23478578/IJCST-V10I1P1 [Abstract] [ PDF] [Cite/Export] |
1 |
2
|
Understanding The Relationships of Ai, Machine Learning and Deep Learning
- Yew Kee Wong 10.33144/23478578/IJCST-V10I1P2 [Abstract] [ PDF] [Cite/Export] |
6 |
3
|
Object Detection in Images Using a Machine Learning based Convolutional Neural Networks (CNN)
- G.Krishnaveni , T.Satya Nagamani 10.33144/23478578/IJCST-V10I1P3 [Abstract] [ PDF] [Cite/Export] |
14 |
4
|
An Intelligent System for Diagnosing Anemia Diseases
- R.A.E. Ibrahim , A. E. E. El Alfi, A.A.E. Abdallah 10.33144/23478578/IJCST-V10I1P4 [Abstract] [ PDF] [Cite/Export] |
19 |
5
|
Computational Intelligence applied in Bioinformatics
- C. Sunitha Ram, Swetha Gayathri Kuchimanchi 10.33144/23478578/IJCST-V10I1P5 [Abstract] [ PDF] [Cite/Export] |
27 |
6
|
Challenges of Time Synchronization in Wireless Sensor Networks and overcoming the issues
- Asir Sathia Regin.d, Dr. Vikram jain 10.33144/23478578/IJCST-V10I1P6 [Abstract] [ PDF] [Cite/Export] |
35 |
7
|
Managing Information Security in Small and Medium Enterprise in East Africa
-Masese Chuma Benard, Nguleni Faith, Masoud Charles, Michael Nyasimi, Wasike Smith 10.33144/23478578/IJCST-V10I1P7 [Abstract] [ PDF] [Cite/Export] |
41 |
8
|
Breast Cancer Detection using Histopathological Images
- Jitendra Maan , Harsh Maan 10.33144/23478578/IJCST-V10I1P8 [Abstract] [ PDF] [Cite/Export] |
53 |
9
|
Advanced Gossip-based Approach for Resource Management in Cloud Ambience
- Mr. Monilal S 10.33144/23478578/IJCST-V10I1P9 [Abstract] [ PDF] [Cite/Export] |
59 |
10
|
Cloud Security by overcoming issues of Bloom filter through Deduplication and DNA encryption
- Sangeeta Kumari , Harjinder Kaur 10.33144/23478578/IJCST-V10I1P10 [Abstract] [ PDF] [Cite/Export] |
63 |
11
|
Speech Emotion Recognition Using Machine Learning
- Dr. C sunitha ram, B. Varshini, B. Varsha 10.33144/23478578/IJCST-V10I1P11 [Abstract] [ PDF] [Cite/Export] |
70 |
12
|
Early Detection of Alzheimer’s disease using Deep Learning Frameworks
- Hemalatha. R, Subathra devi. L 10.33144/23478578/IJCST-V10I1P12 [Abstract] [ PDF] [Cite/Export] |
75 |
13
|
Supervised Learning Technique for Recommendation Systems based on Amazon Product Reviews
- Dr.R. Hemalatha, Mrs. Jasmin Thomas 10.33144/23478578/IJCST-V10I1P13 [Abstract] [ PDF] [Cite/Export] |
79 |
14
|
A Performance Comparison on DoS and DDoS attacks in Internet of Things
- S.chithra, Dr.R.Kalaiarasi 10.33144/23478578/IJCST-V10I1P14 [Abstract] [ PDF] [Cite/Export] |
86 |
15
|
Device for DEAF & Hearing-Impaired People
- Laveesh Chauhan, Anushka Chauhan 10.33144/23478578/IJCST-V10I1P15 [Abstract] [ PDF] [Cite/Export] |
98 |
16
|
Orphanage Helping System
- Indhu.K, Rohan Periyasamy.R, Yogesh Kumar. B,Ms. K. Srigurulekha, Ms. Yogalakshmi, Ms. Kirubadevi 10.33144/23478578/IJCST-V10I1P16 [Abstract] [ PDF] [Cite/Export] |
99 |
17
|
Paradigm based Part of Speech Tagging with priorities: Implantation for Gujarati Script
- Kapadia Utkarsh N , Deasi Apurva A 10.33144/23478578/IJCST-V10I1P17 [Abstract] [ PDF] [Cite/Export] |
104 |
18
|
A Review on Recent Advancements of Image Steganography
- Rahul Kumar,Devendra Singh Rathore,Mukesh Kumar 10.33144/23478578/IJCST-V10I1P18 [Abstract] [ PDF] [Cite/Export] |
113 |
19
|
Dual Level Image Steganography for Data Hiding using AES & LSB
- Rahul Kumar,Devendra Singh Rathore,Mukesh Kumar 10.33144/23478578/IJCST-V10I1P19 [Abstract] [ PDF] [Cite/Export] |
120 |
20
|
Distributed Cryptocurrency Mining Framework for Enterprise Data Centers
- Rahul R. Sharma 10.33144/23478578/IJCST-V10I1P20 [Abstract] [ PDF] [Cite/Export] |
127 |