Pub Date : 2022-03-25DOI: 10.14445/23488387/ijcse-v9i3p101
Sheetakshi Shukla, Tasneem Bano Rehman
{"title":"VAPT & Exploits, along with Classification of Exploits","authors":"Sheetakshi Shukla, Tasneem Bano Rehman","doi":"10.14445/23488387/ijcse-v9i3p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v9i3p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114223550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-25DOI: 10.14445/23488387/ijcse-v9i3p102
Akanksha Pandey, Maurya L S
{"title":"Career Prediction Classifiers based on Academic Performance and Skills using Machine Learning","authors":"Akanksha Pandey, Maurya L S","doi":"10.14445/23488387/ijcse-v9i3p102","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v9i3p102","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124757082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-25DOI: 10.14445/23488387/ijcse-v9i2p101
Rajeshwari M, R. K
{"title":"Palm Print Recognition Using Texture and Shape Features","authors":"Rajeshwari M, R. K","doi":"10.14445/23488387/ijcse-v9i2p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v9i2p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124414989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-25DOI: 10.14445/23488387/ijcse-v8i12p102
Sunantha Krishnan, Gianna Drego, I. Kaur, Mushira Shaikh
{"title":"Proposing Value-based Pricing Strategy for Business-to-Business Data Exchange in eBusiness","authors":"Sunantha Krishnan, Gianna Drego, I. Kaur, Mushira Shaikh","doi":"10.14445/23488387/ijcse-v8i12p102","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i12p102","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114324708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Sarcasm through Tone Analysis on video and Audio files: A Comparative Study On Ai Models Performance","authors":"Ayush Jain, P. Patil, Ganesh Masud, Sunantha Krishnan, Vijaya Bharathi Jagan","doi":"10.14445/23488387/ijcse-v8i12p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i12p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129901431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-25DOI: 10.14445/23488387/ijcse-v8i12p103
S. M., A. T
{"title":"Secure Routing using ISMO for Wireless Sensor Networks","authors":"S. M., A. T","doi":"10.14445/23488387/ijcse-v8i12p103","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i12p103","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129647986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.14445/23488387/ijcse-v8i11p102
Murugan Usha Rani
{"title":"Effect of Tendon Profile on Deflections in Prestressed Concrete Beams using C Programme","authors":"Murugan Usha Rani","doi":"10.14445/23488387/ijcse-v8i11p102","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i11p102","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130075238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.14445/23488387/ijcse-v8i11p101
Vencelin Gino V, A. K. Ghosh
Cybersecurity is the mechanism to protect information technology equipment and data from unauthorized access. The most difficult task in today's IT sector is to keep information and data safe from prying eyes. When thinking about cyber security in today's world, the first thing that comes to mind is cybercrime, hacking, and data breaches, which are on the rise day by day. To combat this cybercriminal, all governments around the world are enacting cyber laws . Despite the numerous steps taken to prevent such practices, cybercrime is on the rise. This paper primarily concentrates on the cybersecurity issues that will impact online learning on various platforms. Also, this paper goes over some techniques, policies, and practices that institutions and individuals can use to prevent or protect themselves from cybercriminals.
{"title":"Enhancing Cyber Security Measures For Online Learning Platforms","authors":"Vencelin Gino V, A. K. Ghosh","doi":"10.14445/23488387/ijcse-v8i11p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i11p101","url":null,"abstract":"Cybersecurity is the mechanism to protect information technology equipment and data from unauthorized access. The most difficult task in today's IT sector is to keep information and data safe from prying eyes. When thinking about cyber security in today's world, the first thing that comes to mind is cybercrime, hacking, and data breaches, which are on the rise day by day. To combat this cybercriminal, all governments around the world are enacting cyber laws . Despite the numerous steps taken to prevent such practices, cybercrime is on the rise. This paper primarily concentrates on the cybersecurity issues that will impact online learning on various platforms. Also, this paper goes over some techniques, policies, and practices that institutions and individuals can use to prevent or protect themselves from cybercriminals.","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127312288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-25DOI: 10.14445/23488387/ijcse-v8i10p101
Vimal Kumar Stephen, Ramesh Palanisamy, S. Jayapal, Mohamed Ruknudeen Rafi
{"title":"Adoption of Iot In 5g And Wifi-6 Technology Towards Smart Cities","authors":"Vimal Kumar Stephen, Ramesh Palanisamy, S. Jayapal, Mohamed Ruknudeen Rafi","doi":"10.14445/23488387/ijcse-v8i10p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i10p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121862259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-25DOI: 10.14445/23488387/ijcse-v8i9p101
I. Muraina, B. O. Lesi, Moses Adeolu. Agoi
{"title":"Review of Connection between ICT Practices and Climate Change in a Developing Nation","authors":"I. Muraina, B. O. Lesi, Moses Adeolu. Agoi","doi":"10.14445/23488387/ijcse-v8i9p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i9p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129504692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}