IJCST ONLINE
DOWNLOADS
Call for Paper :
Welcomes Conference Proposals
International Journal of Computer Science Trends and Technology
IJCST-Volume 7 Issue 5 / Sep-Oct 2019
S.No
|
Title/Author Name
|
Page No
|
1
|
Efficient method in web service Recommendation systems
- G.Sailaja, A.Hari Kumar 10.33144/23478578/IJCST-V7I5P1 [Abstract] [ PDF] [Cite/Export] |
1 |
2
|
Requirement and Design of Secure Encounter-based Mobile Social Networks
- Kilaparthy.Punyavathi Pushpa, Panthangi.Pavithra 10.33144/23478578/IJCST-V7I5P2 [Abstract] [ PDF] [Cite/Export] |
16 |
3
|
Secure Dynamic Data Deduplication in Cloud Services
- N.Madhuri, Krishna Rupendra Singh 10.33144/23478578/IJCST-V7I5P3 [Abstract] [ PDF] [Cite/Export] |
21 |
4
|
Comparative Study of Quantity and Cost on Post Tensioned Slab and Reinforced Concrete Slab in Structures
- Nyome Tin 10.33144/23478578/IJCST-V7I5P4 [Abstract] [ PDF] [Cite/Export] |
42 |
5
|
A Prediction Model of Students level at Graduation Using Educational Data Mining
- Haitham Alagib Alsuddig, Piet Kommers 10.33144/23478578/IJCST-V7I5P5 [Abstract] [ PDF] [Cite/Export] |
47 |
6
|
Semantic based Consolidated Framework for Legal Practitioner Service
- Omotosho, O. I, Akinola, M. R 10.33144/23478578/IJCST-V7I5P6 [Abstract] [ PDF] [Cite/Export] |
52 |
7
|
Monitoring Managing and Co-ordinating Mega Data Centers With Multiple Controller
- S.Ravi Kumar, Yarraguntla Jayalakshmi 10.33144/23478578/IJCST-V7I5P7 [Abstract] [ PDF] [Cite/Export] |
58 |
8
|
A Circumstantial study on Supervised Machine Learning Algorithms
- Rednam s s Jyothi, Eswar Patnala, V.Vikas 10.33144/23478578/IJCST-V7I5P8 [Abstract] [ PDF] [Cite/Export] |
72 |
9
|
Conceptual Oriented Investigation on the Improvement of the Cloud Data Storage Security
- Mrinal 10.33144/23478578/IJCST-V7I5P9 [Abstract] [ PDF] [Cite/Export] |
79 |
10
|
Blockchain and its Influence on Market
- Dr. Asif Perwej, Dr. Kashiful Haq, Dr. Yusuf Perwej 10.33144/23478578/IJCST-V7I5P10 [Abstract] [ PDF] [Cite/Export] |
82 |
11
|
Analyze the Impact of Landslide Using High-D Tool
- Rakesh Deore, B. H. Barhate, Madhusudhan Amrutsagar 10.33144/23478578/IJCST-V7I5P11 [Abstract] [ PDF] [Cite/Export] |
92 |
12
|
Steganography and Cryptography An Art of Hiding Data
- Tahamina Yesmin 10.33144/23478578/IJCST-V7I5P12 [Abstract] [ PDF] [Cite/Export] |
92 |
13
|
Building A Model for Multi-Core Architecture Using Systemc
- Mouhsen Ibrahim, Mohammad Sobeih 10.33144/23478578/IJCST-V7I5P13 [Abstract] [ PDF] [Cite/Export] |
101 |
14
|
A Cost-Effective Analysis of Machine Learning Workloads in Public Clouds: Is AutoML Always Worth Using
- Madan Mohan Tito Ayyalasomayajula, Sathish Kumar Chintala,Sailaja Ayyalasomayajula 10.33144/23478578/IJCST-V7I5P14 [Abstract] [ PDF] [Cite/Export] |
107 |