posted by user: aircc_cfp || 16942 views || tracked by 15 users: [display]

IJCSIT 2024 : International Journal of Computer Science and Information Technology -h-index 51

FacebookTwitterLinkedInGoogle

Link: https://airccse.org/journal/ijcsit.html
 
When N/A
Where N/A
Submission Deadline Mar 30, 2024
Notification Due Apr 20, 2024
Final Version Due Apr 27, 2024
Categories    computer science   databases   information technology   software engineering
 

Call For Papers

International Journal of Computer Science and Information Technology (IJCSIT)

World Journal Clout Index (WJCI) Impact Factor : 0.242 (2020); 0.115 (2019)

----INSPEC,WJCI Indexed ----

Citations, h-index, i10-index of IJCSIT

Citations 12100 h-index 54  i10-index 282

Scope and Topics

The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.

IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: case studies, technical reports etc.

Topics of interest include but are not limited to, the following

  • Algorithms and Bioinformatics
  • Computer Architecture and Real Time Systems
  • Database and Data Mining
  • Dependable, Reliable and Autonomic Computing
  • Distributed and Parallel Systems & Algorithms
  • DSP/Image Processing/Pattern Recognition/Multimedia
  • Embedded System and Software
  • Game and Software Engineering
  • Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS)
  • Grid and Scalable Computing
  • Intelligent Information & Database Systems
  • IT policy and Business Management
  • Mobile and Ubiquitous Computing
  • Modeling and Simulation
  • Multimedia Systems and Services
  • Networking and Communications
  • Parallel and Distributed Systems
  • Security and Information Assurance
  • Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)
  • Software Engineering
  • Web and Internet Computing
  • Blockchain
  • Data Mining
  • Deep Learning
  • Big Data
  • Internet of Things
  • Machine Learning & Applications
  • NLP

Paper Submission

Authors are invited to submit papers for this journal through Email: ijcsit@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

Submission Deadline:March 30, 2024
Authors Notification: April 20, 2024
Final Manuscript Due: April 27, 2024
Publication Date:Determined by the Editor-in-Chief


Related Journal

Current Issue

February 2024, Volume 16, Number 1

Exploring the EV Charging Ecosystem and Performing an Experimental Assessment of its Cloud and Mobile
Application Infrastructure Security
Full Text
Pooja Patil1, Sara Acikkol Dogan1, Samir Tout1, and Ranu Parmar2, 1Eastern Michigan University, USA, 2Hitachi Energy, USA

Image Segmentation and Classification using Neural Network Full Text
Fatema Tuj Zohra, Rifa Tasfia Ratri, Shaheena Sultana, and Humayara Binte Rashid, Notre Dame University, Bangladesh

From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics Full Text
Rushit Dave, Marcho Handoko, Ali Rashid and Cole Schoenbauer, Minnesota State University, USA

A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3 Full Text
Christopher Le1 and Tauheed Khan Mohd2, 1Augustana College, USA, 2Eastern Michigan University, USA

Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using
Machine Learning
Full Text
Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt and Rushit Dave, Minnesota State University, USA


December 2023, Volume 15, Number 6

An Adaptive Network-Based Approach for Advanced Forecasting of Cryptocurrency Values Full Text
Ali Mehrban1 and Pegah Ahadian2, 1Newcastle University, UK, 2Kent State University, USA

Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-Based Techniques Full Text
Omar Shatnawi, Al al-Bayt University, Jordan

The Alignment between International and National Academic Accreditations - An Application in Information Systems Bachelor Program at Kingdom of Saudi Arabia Full Text
Rania A. Aboalela, King Abdulaziz University, Saudi Arabia

Revealing the Foundations: The Strategic Influence of Test Design in Automation Full Text
Rohit Khankhoje, Independent Reseacher, USA


October 2023, Volume 15, Number 5

Secure Arcade: A Gamified Defense Against Cyber Attacks Full Text
Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber and Mounika Vanamala, University of Wisconsin-Eau Claire, USA


Analysis of the Relationship between Self-Esteem and Depression Full Text
Rosalba Cuapa C., Adair Ponce, Meliza Contreras, Mireya Tovar and Fernando Zacarias F., Universidad Autónoma de Puebla, México


August 2023, Volume 15, Number 4

Recent Advancements in the Field of Deepfake Detection Full Text
Natalie Krueger1, Mounika Vanamala1 and Rushit Dave2, 1University of Wisconsin-Eau Claire, USA, 2Minnesota State University, USA

Detection of Structured Query Language Injection Attacks Using Machine Learning Techniques Full Text
Taapopi John Angula and Valerianus Hashiyana, University of Namibia, Namibia

Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning Approach Full Text
Md. Tofael Ahmed1,2, Nahida Akter1, Maqsudur Rahman1, Abu Zafor Muhammad Touhidul Islam2, Dipankar Das2 and Md. Golam Rashed2, 1Comilla University, Bangladesh, 2University of Rajshahi, Bangladesh

Wi-Fi Data Analysis based on Machine Learning Full Text
Nanumura Gedara Umal Anuraga Nanumura, University of South Wales, United Kingdom

Analysing Chatgpt’s Potential Through the Lens of Creating Research Papers Full Text
Alexander Veach and Munther Abualkibash, Eastern Michigan University, USA

Exploring Cloud Computing Adoption in Higher Educational Environment: An Extension of the Tpb Model With Trust,
Peer Influences, Perceived Usefulness and Ease of Use
Full Text
Waleed Al-Ghaith, Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia

Understanding the Role of Customer Trust in E-Commerce Full Text
Istiak Khan and Noor Azizah Binti Mohamadali, International Islamic University Malaysia, Malaysia

Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary Indicator in Municipalities of North Cotabato, Philippines Full Text
Michaelangelo R. Serrano, Nero L. Hontiveros, EJ Ryle C. Mosquera, Aura Mae M. Celestino, John Louie D. Vilar, Junuel S. Baroy and Mitziel C. Gelbolingo, Notre Dame of Midsayap College, Philippines

A Systematic Review on the Effectiveness of Using User-Generated Content in E-Commerce Marketing Full Text
Jubaer Akhter and Noor Azizah Binti Mohamadali, International Islamic University Malaysia, Malaysia

June 2023, Volume 15, Number 3

A Novel Exploit Traffic Traceback Method Based on Session Relationship Full Text
Yajing Liu, Ruijie Cai, Xiaokang Yin and Shengli Liu, State Key Laboratory of Mathematical Engineering and Advanced Computing, China

Confidential Computing in Edge- Cloud Hierarchy Full Text
Yeghisabet Alaverdyan1,2 Suren Poghosyan2 and Vahagn Poghosyans2,3, 1EKENG CJSC, Armenia, 2Institute for
Informatics and Automation Problems of NAS RA, Armenia, 3Synopsys, Armenia

The Design of a Lighting System for Hong Kong International Airport APM Tunnel for Energy Saving with
Artificial Intelligence (AI) Lighting Defect Detection System
Full Text
Tony Tsang and Chan Shui Hin, Hong Kong College of Technology, Hong Kong

Reinforcement Learning in Education 4.0: Open Applications and Deployment Challenges Full Text
Delali Kwasi Dake, University of Education, Ghana

A PC-kriging-HDMR Integrated with an Adaptive Sequential Sampling Strategy for High-Dimensional Approximate
Modeling
Full Text
Yili Zhang, Hanyan Huang, Mei Xiong, Zengquan Yao, Sun Yat-Sen University, China

Development of a Prototype for Census and Enumeration: A Case Study of Namibia Full Text
Theodora Mukaya, Johanna Nelulu, V Hashiyana and Chris M, Mazila, University of Namibia, Namibia

April 2023, Volume 15, Number 2

Application Security Self-Efficacy of Software Developers: A Correlational Study Full Text
Wisdom Umeugo, Independent Researcher, Canada

Sex Detection in the Early Stage of Fertilized Chicken Eggsvia Image Recognition Full Text
Ufuk Asil and Efendi Nasibov, Dokuz Eylul University, Turkey

Linear Feedback Shift Register Genetically Adjusted for Sequence Copying Full Text
Ugalde-Franco Juan Manuel, Martinez-Gonzalez Ricardo Francisco and Mejia-Perez Juan Francisco, TecNM – Instituto Tecnologico de Veracruz, Mexico

The Development of Climate Agrometeorological Application for Farmers in Namibia Full Text
Valerianus Hashiyana, Nalina Suresh and Abel Natangwe Mwedihanga, University of Namibia, Namibia

February 2023, Volume 15, Number 1

Big Data and Metaverse Revolutionizing the Futuristic Fintech Industry Full Text
Nikhitha Yathiraju and Bibhu Dash, University of the Cumberlands, USA

Prediction of Anemia using Machine Learning Algorithms Full Text
Prakriti Dhakal, Santosh Khanal, and Rabindra Bista, Kathmandu University, Nepal


Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms Full Text
Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, KY USA


Understanding the Worldwide Paths Towards the Creation of True Intelligence for Machines Full Text
Kouassi Konan Jean-Claude, Bircham International University, Spain

Using Airport Collaborative Decision Making (A-CDM) Network to Improved Aviation Industry Service Quality Full Text
Thongchai Jeeradist, Kasem Bundit University, Thailand

Behavioural Analytics in Cyber Security for Digital Forensics Application Full Text
Martin Luther Bwangah, Kabarak University, Kenya

December 2022, Volume 14, Number 6

Effective Malware Detection Approach based on Deep Learning in Cyber-Physical Systems Full Text
Srinivas Aditya Vaddadi, Pandu Ranga Rao Arnepalli, Ramya Thatikonda, Adithya Padthe,
University of the Cumberlands, USA

Electronic Letter of Guarantee for Banking System Full Text
Sherif Kamel Hussein1,Abdullah Alhayan2, 1October University for Modern Sciences and Arts, Egypt, & Arab East Colleges for Graduate Studies, KSA, 2Arab East Colleges for Graduate Studies, KSA

Testing-as-a-Service (TaaS) – Capabilities and Features for Real-Time Testing in Cloud Full Text
Pawankumar Sharma1,Pawankumar Sharma2,3,and Lotfollah Najjar1University of the Cumberlands, USA2Northwest Missouri State University, USA, 3University of Nebraska, USA

Using Singular Value Decomposition in a Convolutional Neural Network to Improve Brain Tumor Segmentation Accuracy Full Text
Pegah Ahadian, Maryam Babaei and Kourosh Parand, Shahid Beheshti University, Iran

Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning Full Text
Arshiya Khan and Chase Cotton, University of Delaware, USA

October 2022, Volume 14, Number 5

Quantifying the Theory Vs. Programming Disparity using Spectral Bipartivity Analysis and Principal Component Analysis Full Text
Natarajan Meghanathan, Jackson State University, USA

Edge Controller Placement for Next Generation Wireless Sensor Networks Full Text
Mohamed S. Abouzeid, Heba A. El-khobby, Mahmoud A. A. Ali and Mohamed E. Nasr, Tanta University, Egypt

Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Studying and Analyzing the Social Media Data Full Text
Sherif Kamel Hussein1,2, Sultanah AL-Sedairi2 and Nawal AL-Rahimi2, 1October University for Modern Sciences and Arts, Egypt 2Arab East Colleges for Graduate Studies, KSA

Dyslexic Reading Assistance with Language Processing Algorithms Full Text
Sharada Lakshmanan, Equifax, USA


Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems Full Text
Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria


August 2022, Volume 14, Number 4

Compact Preservation of Scrambled CD-Rom Data Full Text
Jacob Hauenstein, The University of Alabama in Huntsville, USA

Identify the Beehive Sound using Deep Learning Full Text
Shah Jafor Sadeek Quaderi1, Sadia Afrin Labonno2, Sadia Mostafa2 and Shamim Akhter3, 1University of Malaya, Malaysia, 2AISIP Lab, International University of Business Agriculture and Technology, Bangladesh, 3Stamford University Bangladesh, Bangladesh

SwarMED: A High-Throughput Interoperability Architecture Over Ethereum and Swarm for Big Biomedical Data Full Text
Arghya Kusum Das, University of Alaska Fairbanks, USA

Arabic Dataset for Farmers' Intent Identification Toward Developing a Chatbot Full Text
Abdelrahman Elsayed and Susan F. Ellakwa, Agricultural Research Center, Giza, Egypt

Impact of 4IR Technology and its Impact on the Current Deployment Full Text
Bandar Alsulaimani1 and Amanul Islam2, 1King Fahad University of Petroleum and Minerals (KFUPM), Saudi Arabia, 2University of Malaya, Malaysia

A Short Survey on Constructing an IoT based Intelligent Road System Full Text
F. O. Okorodudu, G. C. Omede, S. A. Otegbalor, Delta State University, Nigeria

Impact of Pandemic on E-Commerce in Asia Full Text
Bilal Ahmed Wani and Noor Azizah BT. Mohamad Ali, Kulliyyah of Information and Communication Technology International Islamic University of Malaysia, Malaysia


June 2022, Volume 14, Number 3

Formal Specification for Implementing Atomic Read/Write Shared Memory in Mobile Ad Hoc Networks
Using the Mobile Unity
Full Text
Reham.A.Shihata, EL Menoufia University, Egypt

The Digital Carbon Footprint: Threat to an Environmentally Sustainable Future Full Text
Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, USA

Combining Machine Learning and Semantic Analysis for Efficient Misinformation Detection of Arabic Covid-19 Tweets Full Text
Abdulrahim Alhaizaey and Jawad Berri, King Saud University, Saudi Arabia

Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing Full Text
Jacob Bushur and Chao Chen, Purdue University Fort Wayne Fort Wayne, USA

Security in Wireless Sensor Networks: Comparative Study Full Text
Fatimah Khalil Aljwari, Hajer Abdullah Alwadei and Aseel Abdullah Alfaidi, Jeddah University, Saudi Arabia

Big Data and Cloud Readiness Full Text
Hazirah Bee Yusof Ali and Lili Marziana Abdullah, Kulliyyah of Information and Communication Technology (KICT), International Islamic University Malaysia, Malaysia

The Professionalization of the Hacker Industry Full Text
Tyson Brooks, Syracuse University, USA

Visually Impaired People Monitoring in a Smart Home using Electronic White Cane Full Text
Mikaël A. Mousse, Institut Universitaire de Technologie, Université de Parakou, Benin

Covid-19 Sparked the E-Commerce Revolution; Some Benefited, While Others Left in Cold Full Text
Bilal Ahmed Wani and Dr. Noor Azizah BT. MohamadAli, International Islamic University of Malaysia, Malaysia

April 2022, Volume 14, Number 2

Smsecurity: Security System and SMS Notification Cum Face Recognition Full Text
Winston G. Domingo1, Arnold Dela Cruz2, Klaida Nicolas2, Jennifer A. Gamay MIT2, Erwin N. Lardizabal2 and Virdi C. Gonzales3, 1Quirino State University, Philippines, 2Cagayan Valley Computer and Information Technology, Philippines,3Southern Isabela Medical Center, Philippines

Remote Work and Innovation During this Covid-19 Pandemic: An Employers’ Challenge Full Text
Bibhu Dash, University of the Cumberlands, USA

Failure Free Cloud Computing Architectures Full Text
Yolam Zimba1, Hastings Maboshe Libati2 and Derrick Ntalasha2, 1University of Lusaka, Zambia, 2Copperbelt University, Zambia

User Experience Evaluation of a Student Information System Full Text
Asaad Alzayed and Bareeq Alghannam, Public Authority for Applied Education and Trainin, Kuwait




February 2022, Volume 14, Number 1

Mobile Device Users’ Susceptibility to Phishing Attacks Full Text
F. Ley Sylvester, Tarrant County College, USA

Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matrix Equation Full Text
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matrix Equation

Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing Applications in the Fog Full Text
Márcio Miguel Gomes1, Rodrigo da Rosa Righi1, Cristiano André da Costa1 and Dalvan Griebler2, 1University of Vale do Rio dos Sinos - Brazil, 2Pontifical Catholic University of Rio Grande do Su1, Brazil

Accuracy of Garmin GPS Running Watches over Repetitive Trials on the Same Route Full Text
Joe Dumas, University of Tennessee at Chattanooga, USA


Safely Scaling Virtual Private Network for a Major Telecom Company during A Pandemic Full Text
Shannon Roberson, Mohammad Abdus Salam, Mathieu Kourouma and Osman Kandara, Southern University and A&M College, USA

Encryption based Watermarking Technique for Security of Medical Image Full Text
Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria

Feature Extraction Methods for IRIS Recognition System: A Survey Full Text
Tara Othman Qadir1, Nik Shahidah Afifi Md Taujuddin1 and Sundas Naqeeb Khan2, 1Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia, 2Universiti Tun Hussein Onn Malaysia, Malaysia



December 2021, Volume 13, Number 6

Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches Full Text
Kyelem Yacouba1, Kabore Kiswendsida Kisito1, Ouedraogo TounwendyamFrédéric2 and Sèdes Florence3,1Université Joseph Ki-Zerbo, Burkina Faso, 2Université Norbert Zongo, Burkina Faso, 3IRIT, Toulouse, France

Provides an Approach based on Adaptive Forwarding and Label Switching to Improve the Speed of Packet Forwarding in NDN Networks Full Text
Hadis Rezaei, Sahar Sadeghi and Leila Badeli,Science and Research Tehran Branch, Iran

Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges of the Novel Usage Models Full Text
Nikola Rendevski, Andrijana Bocevska, Zoran Kotevski and Tome Dimovski, University St. Kliment Ohridski – Bitola, Macedonia

SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines) Full Text
Amelie Anne Gutierrez, Holy Angel University, Philippines

Creating 3D Models with 3D Printing Process Full Text
Filip Popovski1, Svetlana Mijakovska1, Hristina Dimova Popovska2 and Gorica Popovska Nalevska3, 1SS Kliment Ohridski, R. Macedonia, 2SABA High School, R. Macedonia, 3International Slavic University Gavrilo Romanovic Derzavin, R. Macedonia



October 2021, Volume 13, Number 5

Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles Full Text
Mingfu Huang, Rushit Dave, Nyle Siddiqui and Naeem Seliya, University of Wisconsin, USA

Information Retrieval based on Cluster Analysis Approach Full Text
Orabe Almanaseer, The University of Jordan, Jordan


Blockchain Technology in Agriculture: A Case Study of Blockchain Start-Up Companies Full Text
Chandra Sekhar Bhusal, Information Technology and Physical Sciences Federation University, Australia

Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks Full Text
Ali M. Allam, Helwan University, Egypt



August 2021, Volume 13, Number 4


Online Learning During Covid-19 Pandemic, and Possibility of Adopting Computer-Based Test Full Text
Rabea Emdas1 and Ahmed Alruwaili2, 1Swinburne University of Technology, Australia, 2La Trobe University, Australia

Web Scraper Utilizes Google Street View Images to Power a University Tour Full Text
Peiyuan Sun1 and Yu Sun2, 1USA, 2California State Polytechnic University, USA

Cloak-Reduce Load Balancing Strategy for Mapreduce Full Text
Mamadou Diarra and Telesphore Tiendrebeogo, Nazi Boni University, Burkina Faso



June 2021, Volume 13, Number 3


Fabric Defect Detection based on Improved Object as Point Full Text
Yuan He, Xin-Yue Huang and Francis Eng Hock Tay, National University of Singapore, Singapore

Circuit Break Connect Monitoring to 5G Mobile Application Full Text
Ton Tsang and Cheung Yip Kan, Hong Kong College of Technology, Hong Kong

Product Sentiment Analysis for Amazon Reviews Full Text
Arwa S. M. AlQahtani, Princess Nourah bint Abdulrahman University, Saudi Arabia



April 2021, Volume 13, Number 2

Newly Proposed Technique for Autism Spectrum Disorder based Machine Learning Full Text
Sherif Kamel1,2 and Rehab Al-harbi2, 1October University for Modern Sciences and Arts, Egypt, 2Arab East Colleges for Graduate Studies, KSA


Big Data Analytics in Health Care: A Review Paper Full Text
Maria Mohammad Yousef, Al-albayt University, Jordan

Monitoring of the Last US Presidential Elections Full Text
Christoph Glauser1, Jacques Savoy2 and Loris Schmid1,2, 1IFAAR Institute, Switzerland, 2University of Neuchatel, Switzerland

Emerging Applications on Smart Phones: The Role of Privacy Concerns and its Antecedents on Smart Phones Usage Full Text
Waleed Al-Ghaith, Shaqra University, (Imam Muhammad Ibn Saud Islamic University), Saudi Arabia

Comparison Analysis of Facebook’s Prophet, Amazon’s DeepAR+ and CNN-QR Algorithms for Successful Real-World Sales Forecasting Full Text
Emir Žunić1,2, Kemal Korjenić1, Sead Delalić1, 2 and Zlatko Šubara1, 1Info Studio d.o.o. Sarajevo, Bosnia and Herzegovina, 2University of Sarajevo, Bosnia and Herzegovina




February 2021, Volume 13, Number 1

Efficient Field of Vision Algorithms for Large 2D Grids Full Text
Evan R.M. Debenham and Roberto Solis-Oba, The University of Western Ontario, Canada

Highly Constrained University Class Scheduling using Ant Colony Optimization Full Text
Al-Mahmud, KUET, Bangladesh

Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh Network-on-Chip Systems Full Text
Walid Mokthar Salh and Azeddien M. Sllame, University of Tripoli Tripoli, Libya

Real Time Vigilance Detection using Frontal EEG Full Text
Siddarth Ganesh1 and Ram Gurumoorthy2, 1Amrita Vishwa Vidyapeetham, India, 2StimScience Inc., USA

Application of a Multilevel Technology Acceptance Management Model for Effective Technology Deployment Full Text
Gilbert Busolo, Lawrence Nderu and Kennedy Ogada, Jomo Kenyatta University of Agriculture and Technology, Kenya



Editor In Chief

  • Jan Zizka, SoNet/DI, FBE, Mendel University in Brno, Czech Republic

Associate Editors

Editorial Board Members

... More

Note:

AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is dedicated to strengthen the field of Computer Science and Information Technology and publishes only good quality papers. IJCSIT is higly selective and maintains less than 20% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJCSIT has received enormous citations and has been regarded as one of the best Journal in Computer Science and Information Technology research field

Citation Count



Related Resources

DSIT 2024   2024 7th International Conference on Data Science and Information Technology (DSIT 2024)
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
FCSIT 2024   2024 3rd Eurasian Conference on Frontiers of Computer Science and Information Technology
CTISC 2024   2024 6th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2024) -EI Compendex
ADMIT 2024   2024 3rd International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2024)
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
SOICT 2024   The 13th International Symposium on Information and Communication Technology
MLANN 2024   2024 2nd Asia Conference on Machine Learning, Algorithms and Neural Networks (MLANN 2024)
ToMS 2024   Transactions on Maritime Science journal
NLE Special Issue 2024   Natural Language Engineering- Special issue on NLP Approaches for Computational Analysis of Social Media Texts for Online Well-being and Social Order