IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-volume-12 Issue 3 / May - Jun 2024
S.No
|
Title/Author Name
|
Page No
|
1
|
Predicting Drug Addiction Using Multimodal Data Fusion and Machine Learning Techniques
- Dhanya S,Pooja Kartha,Pooja Nair P,Reba Ann Reji,Sandra Suresh S ![]() [Abstract] [ ![]() ![]() ![]() |
1 |
2
|
HandyPresenter- An Integrated Virtual Interaction Suite
- Sumimol L, Sneha G S, Vaishnavi P, Vinaya Nair, Theertha Sreekumar ![]() [Abstract] [ ![]() ![]() ![]() |
6 |
3
|
Online Payment Fraud Detection System Using Convolution Neural Network
- Sanskar Soni,Shweta Kanojiya,Siddharth Yadav,Prof Rajendra Arakh,Prof Richa Shukla ![]() [Abstract] [ ![]() ![]() ![]() |
12 |
4
|
A Machine Learning Based Classification And Prediction Technique For Ddos Attack Using Xg Boost Algorithm
- Bhuwaneaswari K, Pavithra A ![]() [Abstract] [ ![]() ![]() ![]() |
16 |
5
|
Stock Market Trends Prediction Using LSTM
- Arjita Sable,Riya Gupta,Prof Aproov Khare,Prof Richa Shukla ![]() [Abstract] [ ![]() ![]() ![]() |
23 |
6
|
Biometrics security and Its Implementation in Linux PC Systems
- Md. Yasir Shaukat, Mr. Tabrej Ahamad Khan ![]() [Abstract] [ ![]() ![]() ![]() |
29 |
7
|
Comparative Study of Functional and Object-Oriented Paradigms
- Prof. Shabana Pathan,Yash Ukhare,Saurav Nerkar ![]() [Abstract] [ ![]() ![]() ![]() |
33 |
8
|
Enhancing User Security Through Phishing Email Detection With Bi-Lstm
- Annie Florance V, Fathima G ![]() [Abstract] [ ![]() ![]() ![]() |
39 |
9
|
Heterogenous Data Handling on Cloud
- Avinash Saini, Manish Tiwari ![]() [Abstract] [ ![]() ![]() ![]() |
45 |
10
|
Osint Automation on A Full-Fledged Hacking Mobile Device Running Net-Hunter Os
- Abu Wenisch P, Sathya Srinivas ![]() [Abstract] [ ![]() ![]() ![]() |
48 |
11
|
Semantic Segmentation Of Remote Sensing Images Based On Deep Learning
- M. Rega, Dr. S. Sivakumar ![]() [Abstract] [ ![]() ![]() ![]() |
52 |
12
|
DevOps Assuring Culture of Change and Synergy: A Review
- Seema Sharma, Priti Sharma, Pramila Joshi ![]() [Abstract] [ ![]() ![]() ![]() |
58 |
13
|
RF-LR Ensemble Classifier for Breast Cancer Detection
- Thachayani M, Chaitanya Sai Jangam, Kalyan T, SriManjunadh Maddukuri, Sangadi Manikanta ![]() [Abstract] [ ![]() ![]() ![]() |
62 |
14
|
Overview of Gen AI in Healthcare Information Security
- Azhar Ushmani ![]() [Abstract] [ ![]() ![]() ![]() |
65 |
15
|
Handling Regulated data in Cloud Computing Environment with Potential Problem and Proposed Solution
- Azhar Ushmani ![]() [Abstract] [ ![]() ![]() ![]() |
68 |
16
|
Overview of Responsible AI in Information Security
- Azhar Ushmani ![]() [Abstract] [ ![]() ![]() ![]() |
70 |
17
|
Traffic Light Analysis And Signal Adaptation
- Dhanya S, Adithya S, Ashwini A R, Athira B Menon, Devabala M B ![]() [Abstract] [ ![]() ![]() ![]() |
72 |
18
|
Fault-tolerant Gateway Connectivity Using Honey Badger Optimization Algorithm in LoRaWAN
- Mr.A.Ramesh, Dr.K.Kamali ![]() [Abstract] [ ![]() ![]() ![]() |
76 |
19
|
E-Cert: Blockchain Enabled E- Certificate Generation System
- Sujakumari N R, Maria Philo James, Shahana Sheref, Sona Johnson, Varsha B ![]() [Abstract] [ ![]() ![]() ![]() |
82 |
20
|
Intelligent System for Improving Educational Videos Performance
- Bassant Mohamed Elamir, Amany Fawzy Elgamal, Marwa Hussein Abdelfattah ![]() [Abstract] [ ![]() ![]() ![]() |
86 |
21
|
Evolution of Cloud Computing: Trends, Issues, and Future Directions: A Systematic Literature Review
-Amina S. Omar, Flugence Mwakondo ![]() [Abstract] [ ![]() ![]() ![]() |
102 |
22
|
Edge Detection Using Canny Edge Detector Algorithm In Image Processing
-M. Rega, Dr. S. Sivakumar ![]() [Abstract] [ ![]() ![]() ![]() |
112 |