ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY >>

Vol.3, No.3

Publisher: CIRWORLD

Publishing Date: 2013-01-01

  1. Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution

    Authors: Kirti Singh;Poonam Yadav

  2. ANALYSIS OF STUDENT ACTIVITIES ON COMPUTER - A STUDY ON PANJAB UNIVERSITY, INDIA

    Authors: Dr Gunmala Suri;Sneha Sharma

  3. A Feature Selection process Optimization in multi-class Miner for Stream Data Classification

    Authors: Manish Rai;Rekha Pandit;Vineet Richhariya

  4. COORDINATED DISTRIBUTED SCHEDULING IN WIRELESS MESH NETWORK

    Authors: Usha Kumari;Udai Shankar

  5. An Overview of Data Analysis of EMR, Its Clinical Ontologies & Security in Database with respect to Today’s Ehealth Apps

    Authors: Onkar Kemkar;Dr P B Dahikar

  6. CLASSIFICATION OF DATA WAREHOUSE TESTING APPROACHES

    Authors: Dr. S. L. Gupta;Dr. Payal Pahwa;Ms. Sonali Mathur

  7. A Study Paper on Communication Network and overview of Packet Switching Technology

    Authors: Sandeep Panwar;Amit Garg;Naresh Kumar

  8. A REVIEW ON COMPUTER AIDED DETECTION AND DIAGNOSIS OF LUNG CANCER NODULES

    Authors: S.Shaik Parveen;Dr. C Kavitha

  9. Modeling an Object Oriented for Maintenance Purposes

    Authors: Hamed J. Al-Fawareh

  10. SOFTWARE AUDIT SYSTEM

    Authors: Gaurav NIgam

  11. DISTRIBUTED BUSINESS INTELLIGENCE ? A NEW APPROACH IN ECONOMICAL EDUCATION

    Authors: Logica Banica;Daniela Pirvu;Cristian Stefan

  12. A Comparative study on secure routing algorithms SAODV and A-SAODV in Mobile AdHoc Networks (MANET) ? The Enhancements of AODV

    Authors: JARUPULA RAJESHWAR;Dr NARSIMHA

  13. Information Management

    Authors: Barjinder Kaur

  14. IMPLEMENTATION OF FINGER TOKEN AUTHENTICATION TECHNIQUE USING ARTIFICIAL INTELLIGENCE APPROACH IN NTT MICROSYSTEMS

    Authors: Sumit Chaudhary;Monika Garg;Neha Singh

  15. A Statistical-Based Map Matching Algorithm

    Authors: Vijaya Samundeeswari;T.Tamizh Chelvam

  16. BUSINESS TO BUSINESS (B2B) AND BUSINESS TO CONSUMER (B2C) MANAGEMENT

    Authors: Dr. Vinod Kumar;Er. Gagandeep Raheja

  17. Fuzzy Approach for pattern recognition using Classification Algorithms

    Authors: Akhilesh Latoria;Alok Chauhan;Dr. Anand Saxena

  18. A STUDY OF ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT

    Authors: Mauro Melo;Zair Abdelouahab

  19. Possible Challenges of Developing Migration Projects

    Authors: S. Geetha

  20. THYROID DISEASE DETECTION USING MODIFIED FUZZY HYPERLINE SEGMENT CLUSTERING NEURAL NETWORK

    Authors: Satish N. Kulkarni;Dr. A. R. Karwankar

  21. A STUDY BASIC PROGRAMMABLE LOGIC CONTROLLER (PLC) FOR EFFECTIVE LEARNING

    Authors: Syifaul Fuada;Miftakhul Huda;Rista Aprilowena

  22. DATABASE MANAGEMENT

    Authors: Dr. Vinod Kumar;Er. Gagandeep Raheja;Mrs. Shalini Sachdeva

  23. HEART RATE MONITORING: THE ANALYSIS OF FINGERTIP VIDEO CAPTURED VIA SMARTPHONE

    Authors: Ihab Zaqout

  24. CONTENT-BASED IMAGE EXTRACTION AND ANALYSIS FOR MEDICAL RADIOGRAPHIC IMAGES

    Authors: Aziz Barbar, Ph.D.;Gerges Tannous

  25. Bin packing approach for solving VLSI circuit partitioning problem using Genetic algorithm

    Authors: Prof. Sharadindu Roy;Prof. Samar Sen Sarma;Siddhartha Das

  26. THE IMPACT OF KNOWLEDGE MANAGEMENT PRACTICES IN SOFTWARE ENGINEERING

    Authors: Mrs. M. Vasumathy

  27. AI Based Model for Software Project Planning

    Authors: Sukhjit Sehra;Sumeet Sehra

  28. Conceptual Translation as a part of Gene Expression

    Authors: Sukhjit Sehra;Sumeet Sehra