IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 7 Issue 4 / Jul-Aug 2019
S.No
|
Title/Author Name
|
Page No
|
1
|
Cyberwarfare History and APT Profiling
- Azhar Ushmani 10.33144/23478578/IJCST-V7I4P1 [Abstract] [ PDF] [Cite/Export] |
1 |
2
|
A Survey on Image Processing using Artificial Neural Network (ANN)
- Jiten Kumar, Inderdeep Kaur 10.33144/23478578/IJCST-V7I4P2 [Abstract] [ PDF] [Cite/Export] |
4 |
3
|
Conceptural Oriented Analysis On The Industrial Standard Cyber Security
- Dr.K.Sai Manoj, Ms. K. Mrudula, Mrs. G.Maanasa, Prof.K.Phani Srinivas 10.33144/23478578/IJCST-V7I4P3 [Abstract] [ PDF] [Cite/Export] |
12 |
4
|
Fuzzy Collision Avoidance Autopilot
- Qousay Benshi, Oulfat Jolaha, Jabr Hanna 10.33144/23478578/IJCST-V7I4P4 [Abstract] [ PDF] [Cite/Export] |
19 |
5
|
Analysis of the Technique for the Improvement of the Data Confidentiality in the Cloud Computing Environment
- Dr.K.Sai Manoj 10.33144/23478578/IJCST-V7I4P5 [Abstract] [ PDF] [Cite/Export] |
27 |
6
|
A Virtual Energy Trading Platform for Smart Homes
- Shruti Hegde, Ashwini B V, Shylaja Madasu 10.33144/23478578/IJCST-V7I4P6 [Abstract] [ PDF] [Cite/Export] |
30 |
7
|
Black Hole Attack (Dark opening assault) in MOBILE A-hoc NET
- Khushbu, Dr. R.K. Bathla 10.33144/23478578/IJCST-V7I4P7 [Abstract] [ PDF] [Cite/Export] |
34 |
8
|
Review on Breast Cancer Prediction Using Data Mining Algorithms
- Nitasha 10.33144/23478578/IJCST-V7I4P8 [Abstract] [ PDF] [Cite/Export] |
42 |
9
|
A Review of: Integrating ICT in Sudanese Kindergartens In order To Improve Cognitive Development
- Suhanda Saf Aldeen Mohammed Drar, Prof: Piet Kommers, Dr: Amgad Atta Abdelmageed Mohammed 10.33144/23478578/IJCST-V7I4P9 [Abstract] [ PDF] [Cite/Export] |
46 |
10
|
Integrating ICT in Sudanese Kindergartens In Order To Improve Cognitive Development (Case Study Khartoum, Sudan)
- Suhanda Saf Aldeen Mohammed Drar, Prof: Piet Kommers, Dr: Amgad Atta Abdelmageed Mohammed 10.33144/23478578/IJCST-V7I4P10 [Abstract] [ PDF] [Cite/Export] |
53 |
11
|
Power Aware Encrypted Security Improved with Optimal Time Bound Ad-Hoc on-demand Distance Vector Routing Protocol (PA-En-SIm-OptiB AODV)
- Dr. B.Karthikeyan 10.33144/23478578/IJCST-V7I4P11 [Abstract] [ PDF] [Cite/Export] |
58 |
12
|
A New Security Captcha As Graphical Passwords On Hard AI Problems
- M.sneha Divya, Mr.P.Joshua Raju 10.33144/23478578/IJCST-V7I4P12 [Abstract] [ PDF] [Cite/Export] |
69 |
13
|
Enhancement the Efficiency of Data Hiding Using Data Compression and Dividing Data
- Ola Haydar, Kinda Aboukassem 10.33144/23478578/IJCST-V7I4P13 [Abstract] [ PDF] [Cite/Export] |
84 |
14
|
Methodology to Describe and Verify Systems Behaviour by Integrating Several Formal Languages
- Bassem KOSAYBA, Waseem Ahmad 10.33144/23478578/IJCST-V7I4P14 [Abstract] [ PDF] [Cite/Export] |
89 |
15
|
Study of Age Estimation Using Fixed Rank Representation (FRR)
- Rohini G.Bhaisare 10.33144/23478578/IJCST-V7I4P15 [Abstract] [ PDF] [Cite/Export] |
93 |
16
|
A Novel Hybrid Approach for Global Optimization
- Jaswinder Singh, Shaminder Singh 10.33144/23478578/IJCST-V7I4P16 [Abstract] [ PDF] [Cite/Export] |
97 |
17
|
Towards an Improved Understanding of Data Availability in P2P Storage Systems
- Rama Alkhayer, Ahmad Saker Ahmad 10.33144/23478578/IJCST-V7I4P17 [Abstract] [ PDF] [Cite/Export] |
106 |
18
|
Studying of EDFA Performance for Different Concentrations of Erbium Atoms in the Energy Levels
- Nagham Abbas, Hadeel Issa, Afif sakkour, Faek Arraj 10.33144/23478578/IJCST-V7I4P18 [Abstract] [ PDF] [Cite/Export] |
111 |