About the IJCST

International Journal of Computer Science and Telecommunications is a peer-reviewed, open access scholarly journal that publishes original research works and review articles in all areas of the computer science including computer networks, communications, telecommunications and its applications for wired and wireless networks. IJCST mainly focuses and prefers papers with successful practical work, comprehensible description, and clear framework for mathematical modeling and algorithm. IJCST provides a challenging forum for academic, scientists and industrial professionals to discuss recent progress in the area of future generation communication, information security and networking. Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences.
The topics covered by this journal include, but not limited to, the following topics:

TOPICS COVERED

  • Computer Networks and
    Protocols
  • Control and Simulation
  • Computer Architecture and Embedded System
  • Computer Vision
  • Data  Structure and Algorithms
  • Distributed Sensor Networks
  • High-Speed Network
    Architecture
  • Human Computer Interaction
  • Industrial Applications of
    Neural Networks
  • Information Technology
    and their application
  • Bluetooth Technology
  • Intelligent Control System
  • Emerging Issues in 3G
    and 4G Networks
  • Pattern Recognition
  • Internet Services and
    Applications
  • Management information systems
  • Mobile and Wireless Networks
  • Multimedia Communications
  • Machine Learning
  • Network Modeling and
    Simulation
  • Optical Networks
  • Operating Systems
  • Real-Time Multimedia
    Signal Processing
  • Theoretical Computer Science
  • Theory of Automata and Compiler
  • User Interfaces and
    Interaction Models
  • Vision-Based Applications
  • Character Recognition
  • Routing, and Communication
    Primitives in Ad-hoc and
    Sensor Networks
  • Cryptography, Security and Privacy
    of Mobile & Wireless Networks
  • Performance Evaluations of Protocols &
    Security Application
  • Cognitive Radio Systems
  • Recent Trends in Mobile and Wireless
    Applications
  • Distributed algorithms of mobile
    computing
  • Broadband Access Networks
  • Peer-to-Peer Network Security
  • Database and System Security
  • Ubiquitous Computing Security
  • Wired/Wireless Sensor Networks
  • Web Engineering
  • Rationing Methods and Data Mining
  • Ontologies: Methods & Applications

  •     ABSTRACTING AND INDEXING


    JournalTOCs
    JournalTOCs.jpg

    Index Copernicus
    Index_Copernicus.png

    Ulrich's
    Logo-ulrichs.png

    SiteSeer

    Google Scholar
    scholarLogo.jpg

    Computing-ProQuest
    Proquest.jpg

    NewJournal

    WorldCat

    Academic Index

    (DOAJ) - Computer Science
    DOAJ.jpg

    iSEEK
    iSEEK.png

    Genamics- Journal Seek
    Genamics.png

    GIF- Global Impact Factor
    GIF.gif

    Academic Search
    Academic.png

    ResearchGate
    ResearchGate.jpg

    Academia.edu
    Academia.gif

    Computer Science Directory
    CompScience.gif

    LibTOC
    LibTOC.png

    I-Share
    I-Share.gif

    ScienceCentral.com
    ScienceCentral.gif

    Scribd.
    Scribd.jpg

    arXiv.org
    arXiv.gif

    .docstoc
    docstoc.jpg

    docin
    docin.gif

    Bibliothekssystem Uni.
    UHH-Katalog.jpg

    WILDAU
    WILDAU.jpg

    EZB-Elektronische
    EZB-Elektronische.png

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

    CURRENT ISSUE

    Volume 7, Issue 1, January 2016

    Tree Reconfiguration with Network Resources Constraint
    Pages: 1-4 (4) | [Full Text] PDF (430K)
    Joel Christian Ad├ępo, Boko Aka and Michel Babri
     Index Terms - Interruption, Reconfiguration, TRwRC and Constraint
    Towards a Perspective of the Role of Mathematics in Computer Science and Engineering (CSE) Education
    Pages: 5-9 (5) | [Full Text] PDF (258K)
    Nana Yaw Asabere, Amevi Acakpovi, Wisdom Kwawu Torgby, Edwin Mends-Brew and Kwame Owusu Ampadu
     Index Terms - Computer Science, Engineering, Education, Mathematics and Students
    The Evaluation of Useful Method of Effort Estimation in Software Projects
    Pages: 10-14 (5) | [Full Text] PDF (378K)
    A. Moradbeiky and V. Khatibi Bardsiri
     Index Terms - Development Effort Estimation, Software Project, Analogy-Based Method and Regression
    The Study of Self-protection Patterns and Techniques in Self-adaptive Software Systems
    Pages: 15- (-) | [Full Text] PDF (K)
    Roya Bagheri and Ali Broumandnia
     Index Terms - Autonomic Computing, Self-protection, Self-adaptive and Security Attacks
    Feature Based Automatic Multiview Image Registration
    Pages: - (-) | [Full Text] PDF (K)
    Sruthi Krishna and Abraham Varghese
     Index Terms - Image Registration, SURF, PCA-SIFT, MSER, RMSE, Thin Plate Spline and Affine Transformation