Computer Sciences and Telecommunications GESJ:
GEO RUS
News Contents Conception Information for authors Editorial Board Journal Themes
Previous issues Contacts Send Articles For Editors Links to other journals
Computer Sciences and Telecommunications GESJ:
According to the CONCEPTION of the journal: "If the publication of the article infringes someone's rights or standard norms of scientific ethics, the journal has the right to withdraw published article."
All kind of expenses, including reviewing, examination and publication of the articles are subsidized by Georgian Technical University . For authors publication of the article is free of charge.

Recently received articles for publishing in future issues:


ALGORITHM FOR SOLVING THE SCHOOL MATH PROBLEM (Language: Georgian)
Date: 2018-11-26;  ID: 3172 new



AN ANALYSIS OF THREATS AND CHALLENGES IN THE DEPLOYMENT OF CLOUD COMPUTING(NGO YANG CHONG AND DR. HUMAYUN BAKHT)
Date: 2018-11-26;  ID: 3171 new



CALCULATION OF THE PROBABILISTIC-LOGICAL CONCEPTS
Date: 2018-11-12;  ID: 3164 new



SIMULATION MODELING SOFTWARE OF THE EQUIVALENT VIBRATION SYSTEM OF DRIVE AXLE (Language: Georgian)
Date: 2018-10-21;  ID: 3160 new



RESEARCH OF THE DYNAMIC SYSTEM DESCRIBING MATHEMATICAL MODEL OF SETTLEMENT OF THE CONFLICT BY MEANS OF ECONOMIC COOPERATION
Date: 2018-10-13;  ID: 3155 new



NEURAL NETWORK BASED COMPLEX VIDEO EVENT DETECTION
Date: 2018-08-09;  ID: 3141 new



DATA MODEL FOR EMBEDDING METADATA IN WEB DOCUMENTS BY RNEWS STANDARD
Date: 2018-07-15;  ID: 3135 new



COMPARATIVE ANALYSIS OF PRINCIPAL COMPONENT ANALYSIS AND KERNEL PRINCIPAL COMPONENT ANALYSIS FOR FACE RECOGNITION SYSTEM
Date: 2018-07-09;  ID: 3134 new



DATAMINING APPROACH TO HUMAN CANCER DIAGNOSIS: A REVIEW
Date: 2018-07-01;  ID: 3128 sent back to author for processing



EVALUATION OF NETWORK AND SYSTEMS SECURITY USING PENETRATION TESTING IN A SIMULATION ENVIRONMENT
Date: 2018-05-03;  ID: 3100 new



DATAMINING APPROACH TO HUMAN CANCER DIAGNOSIS: A REVIEW
Date: 2018-05-01;  ID: 3099 sent back to author for processing



A SURVEY ON ABUSE OF CLOUD SERVICES THREAT
Date: 2018-02-12;  ID: 3073 sent back to author for processing



MODELING OF IN-PLAY TENNIS ODDS
Date: 2018-02-11;  ID: 3072 sent back to author for processing



INTRODUCING NONDETERMINISM IN A PROGRAMMING LANGUAGE
Date: 2017-12-13;  ID: 3052 sent back to author for processing



CLOUD SECURITY VULNERABILITIES, CHALLENGES AND SOLUTION
Date: 2017-12-12;  ID: 3051 sent back to author for processing



BOUNDARY LAYER FLOW OF MHD TANGENT HYPERBOLIC FLUID OF HEAT AND MASS TRANSFER PAST A STRETCHING CYLINDER WITH SUCTION/INJECTION: SPECTRAL RELAXATION METHOD
Date: 2017-09-27;  ID: 3017 not corresponding with the themes of journal



STRUCTURING METHODS FOR GEOMETRIC MODELING TASKS OF ATLAS DETECTOR (Language: Georgian)
Date: 2017-06-08;  ID: 2973 sent back to author for processing



MOBILE IP: HYBRID CRYPTOGRAPHY SOLUTION FOR SECURED AND SEAMLESS MOBILE COMMUNICATION
Date: 2017-03-22;  ID: 2918 sent back to author for processing



CRIMINAL PROFILING IN DIGITAL FORENSICS: ASSUMPTIONS, CHALLENGES AND PROBABLE SOLUTION.
Date: 2017-03-02;  ID: 2907 not corresponding with the themes of journal



ECONOMETRIC MODELING OF MID-TERM FORECASTING OF ENERGY RESOURCES CONSUMPTION IN GEORGIA AND ITS PRACTICAL REALIZATION (Language: Georgian)
Date: 2016-10-19;  ID: 2845 sent back to author for processing



STOCHASTIC APPROXIMATION METHOD TO CONFIGURE THE POWER OF NONLINEAR PROGRAMMING TASKS (Language: Georgian)
Date: 2016-09-19;  ID: 2831 sent back to author for processing



CLOUD COMPUTING: WEB MINING, STORAGE PROCESS AND APPLICATIONS
Date: 2016-06-26;  ID: 2797 sent back to author for processing



E-RETAIL WEBSITE LAYOUT INFLUENCE ON CUSTOMER BUYING BEHAVIOUR (Language: Georgian)
Date: 2016-05-23;  ID: 2779 sent back to author for processing



WEB MINING: PROCESS, TECHNIQUES AND APPLICATIONS
Date: 2016-05-05;  ID: 2766 sent back to author for processing



ANALYSIS OF READY QUEUE LENGTH IN MULTIPROCESSOR ENVIRONMENT USING VARIOUS STATISTICAL ESTIMATORS
Date: 2016-02-07;  ID: 2720 checking



A COMPARATIVE STUDY BASED OF DEFICIT ROUND ROBIN (DRR) AND SURPLUS ROUND ROBIN (SRR) ALGORITHMS UNDER MARKOV CHAIN MODEL
Date: 2015-06-26;  ID: 2585 sent back to author for processing



A SURVEY ON CLOUD COMPUTING SECURITY FROM SINGLE TO MULTI-CLOUDS
Date: 2015-03-20;  ID: 2516 sent back to author for processing


Creative Commons License
Copyright © Internet Academy 2001-2018
ISSN 1512-1232
Rambler's Top100