IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 7 Issue 3 / May-June 2019
S.No
|
Title/Author Name
|
Page No
|
s
1
|
Using Intelligent Transportation Systems the Modern Traffic Safety on the Highway in the Sudan
- Dr. Mumdouh Mirghani Mohamed Hassan1, Dr. Yusuf Perwej, Dr. Awad Haj Ali Ahmed, Dr. Firoj Parwej [Abstract] [ PDF] [Cite/Export] |
1 |
2
|
A Study of NLP Methods for Converting Natural Language into Programming Language
- Mrinal [Abstract] [ PDF] [Cite/Export] |
1 |
3
|
Result Prediction Using Different Machine Learning Algorithms
- Ashna KJ, Aswathy Vs, Sruthi Rajeev, Abhishek A A [Abstract] [ PDF] [Cite/Export] |
18 |
4
|
Detecting And Preventing Of Dos Attacks By Dynamic Path Identifier Networks
- P.Sudharsanarao, S.Durga Prasad [Abstract] [ PDF] [Cite/Export] |
29 |
5
|
A Review on Web Content Filtering, Its Technique and Prospects
- Ankur Baishya, Dr. Sangeeta Kakoty [Abstract] [ PDF] [Cite/Export] |
37 |
6
|
TibbOntoExpo: An Expert System based on Ontology Representation to use Prophetic Medicine
- Raad F. Alwan [Abstract] [ PDF] [Cite/Export] |
41 |
7
|
VOTE BLOCKS: A Blockchain Based E – Voting System
- Arya Raj, Gispriya T George, Praful Konnully, Sreelakshmi R Nair [Abstract] [ PDF] [Cite/Export] |
49 |
8
|
Effectiveness of Penetration Testing Tools, Cyber Security
- Prof. Alex Roney Mathew [Abstract] [ PDF] [Cite/Export] |
55 |
9
|
An Augmented Reality Experience in Bey-Battle Gaming
- Mr. Prashantkumar M. Gavali, Mr. Vivek V. Kheradkar, Dr. S. K. Shirgave [Abstract] [ PDF] [Cite/Export] |
58 |
10
|
Reduced Energy Consumption In Operating Systems for Wireless Sensor Networks
- Md. Khalid Hassan, Seema Sinha, Dr. Saket Bihari Singh [Abstract] [ PDF] [Cite/Export] |
63 |
11
|
Geometric Range Queries For Security And Privacy Of Encrypted Spatial Data
- M Uday Kumar , S.DurgaPrasad [Abstract] [ PDF] [Cite/Export] |
75 |
12
|
An Elicit Elucidation of Machine Learning &Techniques
- Preeti karma,Reasearch Scholar,Sant Baba Bagh Singh [Abstract] [ PDF] [Cite/Export] |
80 |
13
|
The Third Eye – An Assistive Technology for the Blind
- Amith Kumar V A, Kailas P A, Nidhin John, Mohammed Sahl Saju Kasim [Abstract] [ PDF] [Cite/Export] |
85 |
14
|
Analysis of Emotion Mining using Data Mining Techniques
- Harsimranjit Singh, Jatinder Singh Bal, Vijay Rana [Abstract] [ PDF] [Cite/Export] |
90 |
15
|
Deztino (An Intelligent Bus Transportation System)
- Jini Sara George, K Lekshmi Sasidharan, Krishnapriya S, Krishnapriya S [Abstract] [ PDF] [Cite/Export] |
94 |
16
|
Cooperative Platooning in Connected Vehicles
- Mr. Harikrishnan Vijayan, Mr. Roshan Josey, Mr. Sankar P G, Mr. Sreehari N P, Dr. Sreela Sreedhar, Mr. Abin Oommen Philip [Abstract] [ PDF] [Cite/Export] |
98 |
17
|
MRI Based Brain Tumor Detection and Classification
- Arya R, Milana Rebecca Isaacs, Rose Sunil, and Sarga V. K. [Abstract] [ PDF] [Cite/Export] |
102 |
18
|
Smart Constructor Helmet
- Arjun Menon, Visakh S Nath, Winu Kavanal , VysakhVenugopal [Abstract] [ PDF] [Cite/Export] |
110 |
19
|
Speech Based Emotion Recognition
- Aishwarya Prabha Kumar, Aiswarya Milton Lopez, Akhila Anjanan, Aneena Thereesa [Abstract] [ PDF] [Cite/Export] |
114 |
20
|
ROBRA – The Snake Robot
- James M.V , Nandukrishna S, Noyal Jose, Ebin Biju [Abstract] [ PDF] [Cite/Export] |
119 |
21
|
Design of neural nonlinear PFC Controller to control speed of Autonomous Car
- Isam Asaad, Bilal Chiha [Abstract] [ PDF] [Cite/Export] |
125 |
22
|
Developing Video Surveillance System with Processing-Aware Network-On-Chip Using Parallel Coordinate Descent PCDN
- Eng. Rony Kassam, Talal Alaalateky, Radwan Dandah [Abstract] [ PDF] [Cite/Export] |
134 |
23
|
Prediction of the Data Analysis Using Decision Tree
- P.T.V.Lakshmi, B.Nivegeetha [Abstract] [ PDF] [Cite/Export] |
141 |
24
|
Towards Describing Visual Explanation Using Machine Learning
- Miss. Dhanashree Sh.Vispute , Prof.Amit H.Palve [Abstract] [ PDF] [Cite/Export] |
144 |
25
|
Conceptual Oriented Analysis on the Modern Tools and Techniques to Enrich Security Vulnerabilities in Ethical Hacking
- Dr.K.Sai Manoj, Ms. K. Mrudula, Mrs G.Maanasa, Prof.K.Phani Srinivas [Abstract] [ PDF] [Cite/Export] |
150 |
26
|
Testing Ambiguity through Horizontal and Vertical Ambiguity Using Grammar Approximation
- M. Tiwari, S. Shukla, A. Pandey [Abstract] [ PDF] [Cite/Export] |
155 |
27
|
Classification of Pattern Recognition Techniques Used Deep Learning and Machine Learning
- Dr. Mariam M. Saii [Abstract] [ PDF] [Cite/Export] |
165 |
Under in review process... |