IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 7 Issue 4 / Jul-Aug 2019
S.No
|
Title/Author Name
|
Page No
|
1
|
Cyberwarfare History and APT Profiling
- Azhar Ushmani ![]() [Abstract] [ ![]() ![]() ![]() |
1 |
2
|
A Survey on Image Processing using Artificial Neural Network (ANN)
- Jiten Kumar, Inderdeep Kaur ![]() [Abstract] [ ![]() ![]() ![]() |
4 |
3
|
Conceptural Oriented Analysis On The Industrial Standard Cyber Security
- Dr.K.Sai Manoj, Ms. K. Mrudula, Mrs. G.Maanasa, Prof.K.Phani Srinivas ![]() [Abstract] [ ![]() ![]() ![]() |
12 |
4
|
Fuzzy Collision Avoidance Autopilot
- Qousay Benshi, Oulfat Jolaha, Jabr Hanna ![]() [Abstract] [ ![]() ![]() ![]() |
19 |
5
|
Analysis of the Technique for the Improvement of the Data Confidentiality in the Cloud Computing Environment
- Dr.K.Sai Manoj ![]() [Abstract] [ ![]() ![]() ![]() |
27 |
6
|
A Virtual Energy Trading Platform for Smart Homes
- Shruti Hegde, Ashwini B V, Shylaja Madasu ![]() [Abstract] [ ![]() ![]() ![]() |
30 |
7
|
Black Hole Attack (Dark opening assault) in MOBILE A-hoc NET
- Khushbu, Dr. R.K. Bathla ![]() [Abstract] [ ![]() ![]() ![]() |
34 |
8
|
Review on Breast Cancer Prediction Using Data Mining Algorithms
- Nitasha ![]() [Abstract] [ ![]() ![]() ![]() |
42 |
9
|
A Review of: Integrating ICT in Sudanese Kindergartens In order To Improve Cognitive Development
- Suhanda Saf Aldeen Mohammed Drar, Prof: Piet Kommers, Dr: Amgad Atta Abdelmageed Mohammed ![]() [Abstract] [ ![]() ![]() ![]() |
46 |
10
|
Integrating ICT in Sudanese Kindergartens In Order To Improve Cognitive Development (Case Study Khartoum, Sudan)
- Suhanda Saf Aldeen Mohammed Drar, Prof: Piet Kommers, Dr: Amgad Atta Abdelmageed Mohammed ![]() [Abstract] [ ![]() ![]() ![]() |
53 |
11
|
Power Aware Encrypted Security Improved with Optimal Time Bound Ad-Hoc on-demand Distance Vector Routing Protocol (PA-En-SIm-OptiB AODV)
- Dr. B.Karthikeyan ![]() [Abstract] [ ![]() ![]() ![]() |
58 |
12
|
A New Security Captcha As Graphical Passwords On Hard AI Problems
- M.sneha Divya, Mr.P.Joshua Raju ![]() [Abstract] [ ![]() ![]() ![]() |
69 |
13
|
Enhancement the Efficiency of Data Hiding Using Data Compression and Dividing Data
- Ola Haydar, Kinda Aboukassem ![]() [Abstract] [ ![]() ![]() ![]() |
84 |
14
|
Methodology to Describe and Verify Systems Behaviour by Integrating Several Formal Languages
- Bassem KOSAYBA, Waseem Ahmad ![]() [Abstract] [ ![]() ![]() ![]() |
89 |
15
|
Study of Age Estimation Using Fixed Rank Representation (FRR)
- Rohini G.Bhaisare ![]() [Abstract] [ ![]() ![]() ![]() |
93 |
16
|
A Novel Hybrid Approach for Global Optimization
- Jaswinder Singh, Shaminder Singh ![]() [Abstract] [ ![]() ![]() ![]() |
97 |
17
|
Towards an Improved Understanding of Data Availability in P2P Storage Systems
- Rama Alkhayer, Ahmad Saker Ahmad ![]() [Abstract] [ ![]() ![]() ![]() |
106 |
18
|
Studying of EDFA Performance for Different Concentrations of Erbium Atoms in the Energy Levels
- Nagham Abbas, Hadeel Issa, Afif sakkour, Faek Arraj ![]() [Abstract] [ ![]() ![]() ![]() |
111 |