Archived Papers for Journal
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY >>
Vol.3, No.3
Publisher: CIRWORLD
Publishing Date: 2013-01-01
- Performance Evolution of Intrusion Detection system on MANET Using Genetic EvolutionAuthors: Kirti Singh;Poonam Yadav
- ANALYSIS OF STUDENT ACTIVITIES ON COMPUTER - A STUDY ON PANJAB UNIVERSITY, INDIAAuthors: Dr Gunmala Suri;Sneha Sharma
- A Feature Selection process Optimization in multi-class Miner for Stream Data ClassificationAuthors: Manish Rai;Rekha Pandit;Vineet Richhariya
- COORDINATED DISTRIBUTED SCHEDULING IN WIRELESS MESH NETWORKAuthors: Usha Kumari;Udai Shankar
- An Overview of Data Analysis of EMR, Its Clinical Ontologies & Security in Database with respect to Today’s Ehealth AppsAuthors: Onkar Kemkar;Dr P B Dahikar
- CLASSIFICATION OF DATA WAREHOUSE TESTING APPROACHESAuthors: Dr. S. L. Gupta;Dr. Payal Pahwa;Ms. Sonali Mathur
- A Study Paper on Communication Network and overview of Packet Switching TechnologyAuthors: Sandeep Panwar;Amit Garg;Naresh Kumar
- A REVIEW ON COMPUTER AIDED DETECTION AND DIAGNOSIS OF LUNG CANCER NODULESAuthors: S.Shaik Parveen;Dr. C Kavitha
- Modeling an Object Oriented for Maintenance PurposesAuthors: Hamed J. Al-Fawareh
- SOFTWARE AUDIT SYSTEMAuthors: Gaurav NIgam
- DISTRIBUTED BUSINESS INTELLIGENCE ? A NEW APPROACH IN ECONOMICAL EDUCATIONAuthors: Logica Banica;Daniela Pirvu;Cristian Stefan
- A Comparative study on secure routing algorithms SAODV and A-SAODV in Mobile AdHoc Networks (MANET) ? The Enhancements of AODVAuthors: JARUPULA RAJESHWAR;Dr NARSIMHA
- Information ManagementAuthors: Barjinder Kaur
- IMPLEMENTATION OF FINGER TOKEN AUTHENTICATION TECHNIQUE USING ARTIFICIAL INTELLIGENCE APPROACH IN NTT MICROSYSTEMSAuthors: Sumit Chaudhary;Monika Garg;Neha Singh
- A Statistical-Based Map Matching AlgorithmAuthors: Vijaya Samundeeswari;T.Tamizh Chelvam
- BUSINESS TO BUSINESS (B2B) AND BUSINESS TO CONSUMER (B2C) MANAGEMENTAuthors: Dr. Vinod Kumar;Er. Gagandeep Raheja
- Fuzzy Approach for pattern recognition using Classification AlgorithmsAuthors: Akhilesh Latoria;Alok Chauhan;Dr. Anand Saxena
- A STUDY OF ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENTAuthors: Mauro Melo;Zair Abdelouahab
- Possible Challenges of Developing Migration ProjectsAuthors: S. Geetha
- THYROID DISEASE DETECTION USING MODIFIED FUZZY HYPERLINE SEGMENT CLUSTERING NEURAL NETWORKAuthors: Satish N. Kulkarni;Dr. A. R. Karwankar
- A STUDY BASIC PROGRAMMABLE LOGIC CONTROLLER (PLC) FOR EFFECTIVE LEARNINGAuthors: Syifaul Fuada;Miftakhul Huda;Rista Aprilowena
- DATABASE MANAGEMENTAuthors: Dr. Vinod Kumar;Er. Gagandeep Raheja;Mrs. Shalini Sachdeva
- HEART RATE MONITORING: THE ANALYSIS OF FINGERTIP VIDEO CAPTURED VIA SMARTPHONEAuthors: Ihab Zaqout
- CONTENT-BASED IMAGE EXTRACTION AND ANALYSIS FOR MEDICAL RADIOGRAPHIC IMAGESAuthors: Aziz Barbar, Ph.D.;Gerges Tannous
- Bin packing approach for solving VLSI circuit partitioning problem using Genetic algorithmAuthors: Prof. Sharadindu Roy;Prof. Samar Sen Sarma;Siddhartha Das
- THE IMPACT OF KNOWLEDGE MANAGEMENT PRACTICES IN SOFTWARE ENGINEERINGAuthors: Mrs. M. Vasumathy
- AI Based Model for Software Project PlanningAuthors: Sukhjit Sehra;Sumeet Sehra
- Conceptual Translation as a part of Gene ExpressionAuthors: Sukhjit Sehra;Sumeet Sehra