IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-volume 10 Issue 1 / Jan - Feb 2022
S.No
|
Title/Author Name
|
Page No
|
1
|
The Use of Artificial Intelligence and Big Data in Crisis Management
- Yew Kee Wong ![]() [Abstract] [ ![]() ![]() ![]() |
1 |
2
|
Understanding The Relationships of Ai, Machine Learning and Deep Learning
- Yew Kee Wong ![]() [Abstract] [ ![]() ![]() ![]() |
6 |
3
|
Object Detection in Images Using a Machine Learning based Convolutional Neural Networks (CNN)
- G.Krishnaveni , T.Satya Nagamani ![]() [Abstract] [ ![]() ![]() ![]() |
14 |
4
|
An Intelligent System for Diagnosing Anemia Diseases
- R.A.E. Ibrahim , A. E. E. El Alfi, A.A.E. Abdallah ![]() [Abstract] [ ![]() ![]() ![]() |
19 |
5
|
Computational Intelligence applied in Bioinformatics
- C. Sunitha Ram, Swetha Gayathri Kuchimanchi ![]() [Abstract] [ ![]() ![]() ![]() |
27 |
6
|
Challenges of Time Synchronization in Wireless Sensor Networks and overcoming the issues
- Asir Sathia Regin.d, Dr. Vikram jain ![]() [Abstract] [ ![]() ![]() ![]() |
35 |
7
|
Managing Information Security in Small and Medium Enterprise in East Africa
-Masese Chuma Benard, Nguleni Faith, Masoud Charles, Michael Nyasimi, Wasike Smith ![]() [Abstract] [ ![]() ![]() ![]() |
41 |
8
|
Breast Cancer Detection using Histopathological Images
- Jitendra Maan , Harsh Maan ![]() [Abstract] [ ![]() ![]() ![]() |
53 |
9
|
Advanced Gossip-based Approach for Resource Management in Cloud Ambience
- Mr. Monilal S ![]() [Abstract] [ ![]() ![]() ![]() |
59 |
10
|
Cloud Security by overcoming issues of Bloom filter through Deduplication and DNA encryption
- Sangeeta Kumari , Harjinder Kaur ![]() [Abstract] [ ![]() ![]() ![]() |
63 |
11
|
Speech Emotion Recognition Using Machine Learning
- Dr. C sunitha ram, B. Varshini, B. Varsha ![]() [Abstract] [ ![]() ![]() ![]() |
70 |
12
|
Early Detection of Alzheimer’s disease using Deep Learning Frameworks
- Hemalatha. R, Subathra devi. L ![]() [Abstract] [ ![]() ![]() ![]() |
75 |
13
|
Supervised Learning Technique for Recommendation Systems based on Amazon Product Reviews
- Dr.R. Hemalatha, Mrs. Jasmin Thomas ![]() [Abstract] [ ![]() ![]() ![]() |
79 |
14
|
A Performance Comparison on DoS and DDoS attacks in Internet of Things
- S.chithra, Dr.R.Kalaiarasi ![]() [Abstract] [ ![]() ![]() ![]() |
86 |
15
|
Device for DEAF & Hearing-Impaired People
- Laveesh Chauhan, Anushka Chauhan ![]() [Abstract] [ ![]() ![]() ![]() |
98 |
16
|
Orphanage Helping System
- Indhu.K, Rohan Periyasamy.R, Yogesh Kumar. B,Ms. K. Srigurulekha, Ms. Yogalakshmi, Ms. Kirubadevi ![]() [Abstract] [ ![]() ![]() ![]() |
99 |
17
|
Paradigm based Part of Speech Tagging with priorities: Implantation for Gujarati Script
- Kapadia Utkarsh N , Deasi Apurva A ![]() [Abstract] [ ![]() ![]() ![]() |
104 |
18
|
A Review on Recent Advancements of Image Steganography
- Rahul Kumar,Devendra Singh Rathore,Mukesh Kumar ![]() [Abstract] [ ![]() ![]() ![]() |
113 |
19
|
Dual Level Image Steganography for Data Hiding using AES & LSB
- Rahul Kumar,Devendra Singh Rathore,Mukesh Kumar ![]() [Abstract] [ ![]() ![]() ![]() |
120 |
20
|
Distributed Cryptocurrency Mining Framework for Enterprise Data Centers
- Rahul R. Sharma ![]() [Abstract] [ ![]() ![]() ![]() |
127 |