About the IJCST

International Journal of Computer Science and Telecommunications is a peer-reviewed, open access scholarly journal that publishes original research works and review articles in all areas of the computer science including computer networks, communications, telecommunications and its applications for wired and wireless networks. IJCST mainly focuses and prefers papers with successful practical work, comprehensible description, and clear framework for mathematical modeling and algorithm. IJCST provides a challenging forum for academic, scientists and industrial professionals to discuss recent progress in the area of future generation communication, information security and networking. Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences.
The topics covered by this journal include, but not limited to, the following topics:

TOPICS COVERED

  • Computer Networks and
    Protocols
  • Control and Simulation
  • Computer Architecture and Embedded System
  • Computer Vision
  • Data  Structure and Algorithms
  • Distributed Sensor Networks
  • High-Speed Network
    Architecture
  • Human Computer Interaction
  • Industrial Applications of
    Neural Networks
  • Information Technology
    and their application
  • Bluetooth Technology
  • Intelligent Control System
  • Emerging Issues in 3G
    and 4G Networks
  • Pattern Recognition
  • Internet Services and
    Applications
  • Management information systems
  • Mobile and Wireless Networks
  • Multimedia Communications
  • Machine Learning
  • Network Modeling and
    Simulation
  • Optical Networks
  • Operating Systems
  • Real-Time Multimedia
    Signal Processing
  • Theoretical Computer Science
  • Theory of Automata and Compiler
  • User Interfaces and
    Interaction Models
  • Vision-Based Applications
  • Character Recognition
  • Routing, and Communication
    Primitives in Ad-hoc and
    Sensor Networks
  • Cryptography, Security and Privacy
    of Mobile & Wireless Networks
  • Performance Evaluations of Protocols &
    Security Application
  • Cognitive Radio Systems
  • Recent Trends in Mobile and Wireless
    Applications
  • Distributed algorithms of mobile
    computing
  • Broadband Access Networks
  • Peer-to-Peer Network Security
  • Database and System Security
  • Ubiquitous Computing Security
  • Wired/Wireless Sensor Networks
  • Web Engineering
  • Rationing Methods and Data Mining
  • Ontologies: Methods & Applications

  •     ABSTRACTING AND INDEXING


    JournalTOCs
    JournalTOCs.jpg

    Index Copernicus
    Index_Copernicus.png

    Ulrich's
    Logo-ulrichs.png

    SiteSeer

    Google Scholar
    scholarLogo.jpg

    Computing-ProQuest
    Proquest.jpg

    NewJournal

    WorldCat

    Academic Index

    (DOAJ) - Computer Science
    DOAJ.jpg

    iSEEK
    iSEEK.png

    Genamics- Journal Seek
    Genamics.png

    GIF- Global Impact Factor
    GIF.gif

    Academic Search
    Academic.png

    ResearchGate
    ResearchGate.jpg

    Academia.edu
    Academia.gif

    Computer Science Directory
    CompScience.gif

    LibTOC
    LibTOC.png

    I-Share
    I-Share.gif

    ScienceCentral.com
    ScienceCentral.gif

    Scribd.
    Scribd.jpg

    arXiv.org
    arXiv.gif

    .docstoc
    docstoc.jpg

    docin
    docin.gif

    Bibliothekssystem Uni.
    UHH-Katalog.jpg

    WILDAU
    WILDAU.jpg

    EZB-Elektronische
    EZB-Elektronische.png

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

    CURRENT ISSUE

    Volume 9, Issue 1, January 2018

    Multilayered Cloud Security Model Using Multifactor Session-Long Biometrics Access Control
    Pages: 1-7 (7) | [Full Text] PDF (367K)
    Karthika Venkatraman and Jihad Qaddour
     Index Terms - - Cloud Security, Multilayer Security Model, Identity Management, Multifactor Biometrics Authentications, Session-Long-Authentication, Fine-Grained Replay and Fine-Grained Multi-Factor Authentication
    Link Prediction in Social Networks Using Fuzzy-based SVM
    Pages: 8-13 (6) | [Full Text] PDF (567K)
    Sara Esmaeillou, Ali Soleimani and Ramin Karimi
     Index Terms - Social Networks, Link Prediction and FSVM
    Implementation of SMART Hospital System Using PPSPC and IoT Devices
    Pages: 14-19 (5) | [Full Text] PDF (464K)
    R. Narayanan, V. Balaji Sharath Kumar, C. Hemnath and T. Shantha Kumar
     Index Terms - FAST, Minmax and Maxmin Operation
    Insufficiency of Activity Diagram for Modeling Business Processes
    Pages: - (-) | [Full Text] PDF (576K)
    Mohammed Hamouda Karboos Hamid and Abd elgaffar Hamid Ahmed
     Index Terms - Business Process Modeling, Business Process Model and Notation (BPMN), Unified Modeling Language (UML), Activity Diagram (AD) and Business Modeling Languages