About the IJCST

International Journal of Computer Science and Telecommunications is a peer-reviewed, open access scholarly journal that publishes original research works and review articles in all areas of the computer science including computer networks, communications, telecommunications and its applications for wired and wireless networks. IJCST mainly focuses and prefers papers with successful practical work, comprehensible description, and clear framework for mathematical modeling and algorithm. IJCST provides a challenging forum for academic, scientists and industrial professionals to discuss recent progress in the area of future generation communication, information security and networking. Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences.
The topics covered by this journal include, but not limited to, the following topics:

TOPICS COVERED

  • Computer Networks and
    Protocols
  • Control and Simulation
  • Computer Architecture and Embedded System
  • Computer Vision
  • Data  Structure and Algorithms
  • Distributed Sensor Networks
  • High-Speed Network
    Architecture
  • Human Computer Interaction
  • Industrial Applications of
    Neural Networks
  • Information Technology
    and their application
  • Bluetooth Technology
  • Intelligent Control System
  • Emerging Issues in 3G
    and 4G Networks
  • Pattern Recognition
  • Internet Services and
    Applications
  • Management information systems
  • Mobile and Wireless Networks
  • Multimedia Communications
  • Machine Learning
  • Network Modeling and
    Simulation
  • Optical Networks
  • Operating Systems
  • Real-Time Multimedia
    Signal Processing
  • Theoretical Computer Science
  • Theory of Automata and Compiler
  • User Interfaces and
    Interaction Models
  • Vision-Based Applications
  • Character Recognition
  • Routing, and Communication
    Primitives in Ad-hoc and
    Sensor Networks
  • Cryptography, Security and Privacy
    of Mobile & Wireless Networks
  • Performance Evaluations of Protocols &
    Security Application
  • Cognitive Radio Systems
  • Recent Trends in Mobile and Wireless
    Applications
  • Distributed algorithms of mobile
    computing
  • Broadband Access Networks
  • Peer-to-Peer Network Security
  • Database and System Security
  • Ubiquitous Computing Security
  • Wired/Wireless Sensor Networks
  • Web Engineering
  • Rationing Methods and Data Mining
  • Ontologies: Methods & Applications

  •     ABSTRACTING AND INDEXING


    JournalTOCs
    JournalTOCs.jpg

    Index Copernicus
    Index_Copernicus.png

    Ulrich's
    Logo-ulrichs.png

    SiteSeer

    Google Scholar
    scholarLogo.jpg

    Computing-ProQuest
    Proquest.jpg

    NewJournal

    WorldCat

    Academic Index

    (DOAJ) - Computer Science
    DOAJ.jpg

    iSEEK
    iSEEK.png

    Genamics- Journal Seek
    Genamics.png

    GIF- Global Impact Factor
    GIF.gif

    Academic Search
    Academic.png

    ResearchGate
    ResearchGate.jpg

    Academia.edu
    Academia.gif

    Computer Science Directory
    CompScience.gif

    LibTOC
    LibTOC.png

    I-Share
    I-Share.gif

    ScienceCentral.com
    ScienceCentral.gif

    Scribd.
    Scribd.jpg

    arXiv.org
    arXiv.gif

    .docstoc
    docstoc.jpg

    docin
    docin.gif

    Bibliothekssystem Uni.
    UHH-Katalog.jpg

    WILDAU
    WILDAU.jpg

    EZB-Elektronische
    EZB-Elektronische.png

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

    CURRENT ISSUE

    Volume 8, Issue 2, March 2017

    Comparative Analysis of Two Popular Agile Process Models: Extreme Programming and Scrum
    Pages: 1-7 (7) | [Full Text] PDF (355K)
    Faiza Anwer, Shabib Aftab, Syed Shah Muhammad Shah and Usman Waheed
     Index Terms - Extreme Programming, Scrum, Agile Models and Comparison
    Design of a Fingerprint Biometric Authentication Technique for Electronic Examination
    Pages: 8-15 (7) | [Full Text] PDF (595K)
    Mohammed Babatunde Ibrahim, Abubakar Usman Othman, Olumide Sunday Adewale and Bukola Fatimah Balogun
     Index Terms - Fingerprint, Biometric, Electronic Examination, Learning and Authentication
    A Survey of Embedded Cellular Technologies and Cellular Companies in Pakistan
    Pages: 16-21 (6) | [Full Text] PDF (427K)
    Rida Khalid and Irum Manzoor
     Index Terms - Comparison, Frequency, GSM, Organization, Subscribers and 3G
    Psychiatric Outreach Expert (Rule-Based System)
    Pages: 22-26 (5) | [Full Text] PDF (314K)
    Abdulhameed Idris A., Oladejo Bolanle F. and Iwayemi Ayodeji
     Index Terms - Psychiatry, Psychiatric Expert System and Human Expert
    Automatic Parallelization Model for Processors
    Pages: 27-33 (7) | [Full Text] PDF (278K)
    Asif Ali and Zahid Anwar
     Index Terms - Automatic Parallelization, Multi-Threaded Execution and Performance Improvements
    An Improved KNN Classifier for Anomaly Intrusion Detection System Using Cluster Optimization
    Pages: 34-38 (5) | [Full Text] PDF (575K)
    Oladeji Patrick Akomolafe and Adeleke Ifeoluwa Adegboyega
     Index Terms - Anomaly Intrusion Detection, High False Alerts, Known/Unknown Intrusions, Known Nearest Neighbor Classifier, KDD, Clustering Optimizer and Genetic Algorithm
    Pipeline Infrastructure Vandalism Monitoring using Wireless Sensor Networks Technique
    Pages: 39-43 (5) | [Full Text] PDF (375K)
    Yunana, K., Adewale, O. S., Abdullahi, M.B., and Alfa, A. A.
     Index Terms - Wireless Sensor Networks, Pipeline, Pipeline Infrastructure, Nigeria and Monitoring