{"title":"VAPT & Exploits, along with Classification of Exploits","authors":"Sheetakshi Shukla, Tasneem Bano Rehman","doi":"10.14445/23488387/ijcse-v9i3p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v9i3p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114223550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Career Prediction Classifiers based on Academic Performance and Skills using Machine Learning","authors":"Akanksha Pandey, Maurya L S","doi":"10.14445/23488387/ijcse-v9i3p102","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v9i3p102","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124757082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Palm Print Recognition Using Texture and Shape Features","authors":"Rajeshwari M, R. K","doi":"10.14445/23488387/ijcse-v9i2p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v9i2p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124414989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sunantha Krishnan, Gianna Drego, I. Kaur, Mushira Shaikh
{"title":"Proposing Value-based Pricing Strategy for Business-to-Business Data Exchange in eBusiness","authors":"Sunantha Krishnan, Gianna Drego, I. Kaur, Mushira Shaikh","doi":"10.14445/23488387/ijcse-v8i12p102","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i12p102","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114324708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Sarcasm through Tone Analysis on video and Audio files: A Comparative Study On Ai Models Performance","authors":"Ayush Jain, P. Patil, Ganesh Masud, Sunantha Krishnan, Vijaya Bharathi Jagan","doi":"10.14445/23488387/ijcse-v8i12p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i12p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129901431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Routing using ISMO for Wireless Sensor Networks","authors":"S. M., A. T","doi":"10.14445/23488387/ijcse-v8i12p103","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i12p103","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129647986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of Tendon Profile on Deflections in Prestressed Concrete Beams using C Programme","authors":"Murugan Usha Rani","doi":"10.14445/23488387/ijcse-v8i11p102","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i11p102","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130075238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Cyber Security Measures For Online Learning Platforms","authors":"Vencelin Gino V, A. K. Ghosh","doi":"10.14445/23488387/ijcse-v8i11p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i11p101","url":null,"abstract":"Cybersecurity is the mechanism to protect information technology equipment and data from unauthorized access. The most difficult task in today's IT sector is to keep information and data safe from prying eyes. When thinking about cyber security in today's world, the first thing that comes to mind is cybercrime, hacking, and data breaches, which are on the rise day by day. To combat this cybercriminal, all governments around the world are enacting cyber laws . Despite the numerous steps taken to prevent such practices, cybercrime is on the rise. This paper primarily concentrates on the cybersecurity issues that will impact online learning on various platforms. Also, this paper goes over some techniques, policies, and practices that institutions and individuals can use to prevent or protect themselves from cybercriminals.","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127312288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vimal Kumar Stephen, Ramesh Palanisamy, S. Jayapal, Mohamed Ruknudeen Rafi
{"title":"Adoption of Iot In 5g And Wifi-6 Technology Towards Smart Cities","authors":"Vimal Kumar Stephen, Ramesh Palanisamy, S. Jayapal, Mohamed Ruknudeen Rafi","doi":"10.14445/23488387/ijcse-v8i10p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i10p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121862259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Connection between ICT Practices and Climate Change in a Developing Nation","authors":"I. Muraina, B. O. Lesi, Moses Adeolu. Agoi","doi":"10.14445/23488387/ijcse-v8i9p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v8i9p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129504692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}