DOWNLOADS


IJCST IJCST




Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals

International Journal of Computer Science Trends and Technology

IJCST-volume-12 Issue 3 / May - Jun 2024

S.No
Title/Author Name
Page No
1
Predicting Drug Addiction Using Multimodal Data Fusion and Machine Learning Techniques

- Dhanya S,Pooja Kartha,Pooja Nair P,Reba Ann Reji,Sandra Suresh S

10.33144/23478578/IJCST-V12I3P1

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


1
2
HandyPresenter- An Integrated Virtual Interaction Suite

- Sumimol L, Sneha G S, Vaishnavi P, Vinaya Nair, Theertha Sreekumar

10.33144/23478578/IJCST-V12I3P2

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


6
3
Online Payment Fraud Detection System Using Convolution Neural Network

- Sanskar Soni,Shweta Kanojiya,Siddharth Yadav,Prof Rajendra Arakh,Prof Richa Shukla

10.33144/23478578/IJCST-V12I3P3

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


12
4
A Machine Learning Based Classification And Prediction Technique For Ddos Attack Using Xg Boost Algorithm

- Bhuwaneaswari K, Pavithra A

10.33144/23478578/IJCST-V12I3P4

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


16
5
Stock Market Trends Prediction Using LSTM

- Arjita Sable,Riya Gupta,Prof Aproov Khare,Prof Richa Shukla

10.33144/23478578/IJCST-V12I3P5

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


23
6
Biometrics security and Its Implementation in Linux PC Systems

- Md. Yasir Shaukat, Mr. Tabrej Ahamad Khan

10.33144/23478578/IJCST-V12I3P6

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


29
7
Comparative Study of Functional and Object-Oriented Paradigms

- Prof. Shabana Pathan,Yash Ukhare,Saurav Nerkar

10.33144/23478578/IJCST-V12I3P7

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


33
8
Enhancing User Security Through Phishing Email Detection With Bi-Lstm

- Annie Florance V, Fathima G

10.33144/23478578/IJCST-V12I3P8

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


39
9
Heterogenous Data Handling on Cloud

- Avinash Saini, Manish Tiwari

10.33144/23478578/IJCST-V12I3P9

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


45
10
Osint Automation on A Full-Fledged Hacking Mobile Device Running Net-Hunter Os

- Abu Wenisch P, Sathya Srinivas

10.33144/23478578/IJCST-V12I3P10

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


48
11
Semantic Segmentation Of Remote Sensing Images Based On Deep Learning

- M. Rega, Dr. S. Sivakumar

10.33144/23478578/IJCST-V12I3P11

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


52
12
DevOps Assuring Culture of Change and Synergy: A Review

- Seema Sharma, Priti Sharma, Pramila Joshi

10.33144/23478578/IJCST-V12I3P12

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


58
13
RF-LR Ensemble Classifier for Breast Cancer Detection

- Thachayani M, Chaitanya Sai Jangam, Kalyan T, SriManjunadh Maddukuri, Sangadi Manikanta

10.33144/23478578/IJCST-V12I3P13

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


62
14
Overview of Gen AI in Healthcare Information Security

- Azhar Ushmani

10.33144/23478578/IJCST-V12I3P14

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


65
15
Handling Regulated data in Cloud Computing Environment with Potential Problem and Proposed Solution

- Azhar Ushmani

10.33144/23478578/IJCST-V12I3P15

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


68
16
Overview of Responsible AI in Information Security

- Azhar Ushmani

10.33144/23478578/IJCST-V12I3P16

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


70
17
Traffic Light Analysis And Signal Adaptation

- Dhanya S, Adithya S, Ashwini A R, Athira B Menon, Devabala M B

10.33144/23478578/IJCST-V12I3P17

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


72
18
Fault-tolerant Gateway Connectivity Using Honey Badger Optimization Algorithm in LoRaWAN

- Mr.A.Ramesh, Dr.K.Kamali

10.33144/23478578/IJCST-V12I3P18

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


76
19
E-Cert: Blockchain Enabled E- Certificate Generation System

- Sujakumari N R, Maria Philo James, Shahana Sheref, Sona Johnson, Varsha B

10.33144/23478578/IJCST-V12I3P19

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


82
20
Intelligent System for Improving Educational Videos Performance

- Bassant Mohamed Elamir, Amany Fawzy Elgamal, Marwa Hussein Abdelfattah

10.33144/23478578/IJCST-V12I3P20

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


86
21
Evolution of Cloud Computing: Trends, Issues, and Future Directions: A Systematic Literature Review

-Amina S. Omar, Flugence Mwakondo

10.33144/23478578/IJCST-V12I3P21

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


102
22
Edge Detection Using Canny Edge Detector Algorithm In Image Processing

-M. Rega, Dr. S. Sivakumar

10.33144/23478578/IJCST-V12I3P22

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


112