DOWNLOADS


IJCST IJCST




Call for Paper : Call for papers
Welcomes Conference ProposalsConference Proposals
Call for papers

International Journal of Computer Science Trends and Technology

IJCST-Volume 7 Issue 5 / Sep-Oct 2019

S.No
Title/Author Name
Page No
1
Efficient method in web service Recommendation systems
- G.Sailaja, A.Hari Kumar

10.33144/23478578/IJCST-V7I5P1

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


1
2
Requirement and Design of Secure Encounter-based Mobile Social Networks
- Kilaparthy.Punyavathi Pushpa, Panthangi.Pavithra

10.33144/23478578/IJCST-V7I5P2

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


16
3
Secure Dynamic Data Deduplication in Cloud Services
- N.Madhuri, Krishna Rupendra Singh

10.33144/23478578/IJCST-V7I5P3

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


21
4
Comparative Study of Quantity and Cost on Post Tensioned Slab and Reinforced Concrete Slab in Structures
- Nyome Tin

10.33144/23478578/IJCST-V7I5P4

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


42
5
A Prediction Model of Students level at Graduation Using Educational Data Mining
- Haitham Alagib Alsuddig, Piet Kommers

10.33144/23478578/IJCST-V7I5P5

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


47
6
Semantic based Consolidated Framework for Legal Practitioner Service
- Omotosho, O. I, Akinola, M. R

10.33144/23478578/IJCST-V7I5P6

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


52
7
Monitoring Managing and Co-ordinating Mega Data Centers With Multiple Controller
- S.Ravi Kumar, Yarraguntla Jayalakshmi

10.33144/23478578/IJCST-V7I5P7

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


58
8
A Circumstantial study on Supervised Machine Learning Algorithms
- Rednam s s Jyothi, Eswar Patnala, V.Vikas

10.33144/23478578/IJCST-V7I5P8

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


72
9
Conceptual Oriented Investigation on the Improvement of the Cloud Data Storage Security
- Mrinal

10.33144/23478578/IJCST-V7I5P9

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


79
10
Blockchain and its Influence on Market
- Dr. Asif Perwej, Dr. Kashiful Haq, Dr. Yusuf Perwej

10.33144/23478578/IJCST-V7I5P10

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


82
11
Analyze the Impact of Landslide Using High-D Tool
- Rakesh Deore, B. H. Barhate, Madhusudhan Amrutsagar

10.33144/23478578/IJCST-V7I5P11

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


92
12
Steganography and Cryptography An Art of Hiding Data
- Tahamina Yesmin

10.33144/23478578/IJCST-V7I5P12

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


92
13
Building A Model for Multi-Core Architecture Using Systemc
- Mouhsen Ibrahim, Mohammad Sobeih

10.33144/23478578/IJCST-V7I5P13

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


101
14
A Cost-Effective Analysis of Machine Learning Workloads in Public Clouds: Is AutoML Always Worth Using
- Madan Mohan Tito Ayyalasomayajula, Sathish Kumar Chintala,Sailaja Ayyalasomayajula

10.33144/23478578/IJCST-V7I5P14

[Abstract]  [IJCST  PDF]  [IJCSTCite/Export] Google Scholar


107