Archived Papers for Journal
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY >>
Vol.4, No.2
Publisher: CIRWORLD
Publishing Date: 2013-01-01
- A framework for a multi-tier Internet Service architecture for doctors’ directoryAuthors: B. O. Oguntunde;M. O. Odim
- A Methodology for Enhancing Template Extraction accuracy Of Heterogeneous Web PagesAuthors: Vidya Kadam;Prof. Prakash R. Devale
- Enhanced System to Secure Summative E-AssessmentAuthors: Hiba Husseiny;Ashraf Qaddoumi;Walid Salameh
- Electronic Student Attendance Recording SystemAuthors: Dr. AkramAbedelKarim Ahmad AbdelQader;Dr. Mohammed Al-Husainy
- Feature Level Fusion of Multimodal Biometrics for Personal Authentication: A ReviewAuthors: Dapinder Kaur;Gaganpreet Kaur
- Bacterial Cell Growth Analysis and Cell Division Time Determination using Fuzzy Inference SystemAuthors: Parashuram Bannigidad;P.S. Hiremath
- Arabic Race Classification of Face ImagesAuthors: Ahmad Awwad;Ashraf Ahmad;Walid a. Salameh
- Enhanced discussion on different techniques of spam detectionAuthors: Gurmeet Maan;Gaurav Tak
- Round-Robin Data Center Selection in Single Region for Service Proximity Service Broker in CloudAnalystAuthors: Vaishali Sharma;Dr. Rakesh Rathi;Sumit Bola
- RSFTS: RULE-BASED SEMANTIC FAULT TOLERANT SCHEDULING FOR CLOUD ENVIRONMENTAuthors: Pandeeswari R;Mohamadi Begum. Y
- OPEN SOURCE SIMULATOR FOR NETWORK ON CHIPAuthors: Monika Gupta;S. R. Biradar;B. P. Singh
- Survey on Decision Tree Classification algorithms for the Evaluation of Student PerformanceAuthors: Anju Rathee;Robin Mathur
- Major Energy Efficient Routing Schemes in Wireless Sensor Networks: Survey and IdeaAuthors: Jahangeer Ali;Gulshan Kumar;Dr. Mritunjay Kumar Rai
- IDARP: ID-based Address Resolution ProtocolAuthors: Imtiyaz Lone;Jahangeer Ali;Kalimullah Lone
- Maximizing Network Lifetime Operator for Wireless Sensor NetworksAuthors: Dr. Deepali Virmani
- HIGH SPEED CARRY SAVE MULTIPLIER BASED LINEAR CONVOLUTION USING VEDIC MATHAMATICSAuthors: Bharathi Reddy;D. Leela Rani;Prof. S. Varadarajan
- Given a raga recording, can we scientifically verify which school of Vadi-Samvadi selection is supported by the artist?Authors: Soubhik Chakraborty;Rayalla Ranganayakulu;Shivee Chauhan;Sandeep Solanki;Kartik Mahto
- Realization of different diversity technique for mimo based mobile ad-hoc network using space time block codesAuthors: Swati Chowdhuri;Nilanjan Byabartal;Dr. S.S. Choudhury;Dr. P.K. Banerjee
- Business Intelligence framework to support Chronic Liver Disease TreatmentAuthors: Ayman Khedr
- Change Detection on SAR data using PCA AlgorithmAuthors: Saurabh Srivastava;Vijay Kumar;Rahul Gupta;Supreet Kaur
- Conceptual Overlapping Clustering for Effective Selection of Parental Rice VarietiesAuthors: Madhavi Dabbiru;Shashi Mogalla;PRM Rao
- DESIGN OF CMOS LOW DROP-OUT REGULATORS: A COMPARATIVE STUDYAuthors: Ashvani Mishra;Rishikesh Pandey
- Evaluating the Effectiveness of Self and Peer Assessment using PBL on Student Performance and Preference: Malaysian’s ExperienceAuthors: CHE KU NURAINI CHE KU MOHD;Faaizah Shahbodin
- Analysis of MAC Protocol for Reliable BroadcastAuthors: Savita Savita;Anjali Anjali;Gurpal Singh
- ANALYSIS OF SOM & SOFM TECHNIQUES USED IN SATELLITE IMAGERYAuthors: Rachita Sharma;Sanjay Dubey
- An UML Approach to Overcome Issues of Concurrency in Distributed SystemsAuthors: Om Kumar;Peyakunta Reddy
- Determination of Optimal Number of Relays Using a New Energy Model for WSNAuthors: Partha Bhattacharya;Shilpi Gupta;Nupur Pal
- TAXONOMY FOR WSN SECURITY-A SURVEYAuthors: Kshitija Chaple
- Composite Lowpass Filter Realized by Image Parameter method and Integrated with Defected Ground StructuresAuthors: Chandan Ghosh;Arabinda Roy;Susanta Parui
- CONCEPTUAL THREE PHASE KDD MODEL AND FINANCIAL RESEARCHAuthors: Dr. Simmi Bagga
- Robust Singular Value Decomposition Algorithm for Unique FacesAuthors: Ibrahim Patel;Raghavendra Kulkarni;Dr.P. Nageswar Rao
- An Adaptive and Interactive Agent Based ITS for Cognitive Skill Prediction and ImprovementAuthors: Mrs. R. Gowri;Dr. S. Kanmani;M. Santhosh;S. Naresh
- Segmentation of Palmprint into Region of Interest (ROI): A SurveyAuthors: Sneha M. Ramteke;Prof. S. S. Hatkar
- Energy Efficient Wireless Sensor Network Protocols for Node Cluster AnalysisAuthors: Harkeerat Kaur;Himanshu Sharma
- Comparative Study of Web application under Data Reverse EngineeringAuthors: Pooja Bakshi;Dr. Dheerendra Singh
- Cloud Computing IssuesAuthors: Rini Mahajan;Dr. Dheerendra Singh
- Hybrid ANFIS Controller for 6-DOF Manipulator with 3D ModelAuthors: Yousif Al Mashhadany
- Performance Evaluation of Log-normal And Negative Exponential Channel Modeling Using Various Modulation Techniques in OFDM-FSO CommunicationAuthors: Nitin Singh;Gurpartap Singh
- Analysing The Quality Attributes of AOP using CYVIS ToolAuthors: Hinam Garg;Mohit Garg
- Evaluation of Operation of Lake Tana Reservoir Future Water Use under Emerging Scenario with and without climate Change Impacts, Upper Blue NileAuthors: Getachew Tegegne;Dr. Ing. Dereje Hailu;Prof. Dr. S. Moses Aranganathan
- Online Signature Verification: State of the artAuthors: Ibrahim El-Henawy;Magdy Rashad;Omima Nomir;Kareem Ahmed
- ANALYSIS AND COMPARISION OF SRG AND DFIG FOR WIND GENERATION APPLICATIONAuthors: Dr. N. C. Lenin;K. Prathap
- Fuzzy Weighted Ordered Weighted Average-Gaussian Mixture Model for Feature ReductionAuthors: Charles. S;Dr. L. Arockiam
- HEAP: Hybrid Energy-efficient Aggregation Protocol for Large Scale Wireless Sensor NetworksAuthors: Santhosh Simon;K Paulose Jacob
- Artificial Neural Network Based Method for Classification of Gene Expression Data of Human Diseases along with Privacy PreservingAuthors: Sathish Subramanian;Duraipandian N
- Incremental Frequent Pattern Mining using Graph based approachAuthors: Sanjay Patel;Dr. Ketan Kotecha
- Analysis of Load Balancing Techniques in Cloud ComputingAuthors: Amandeep Sidhu;Supriya Kinger
- A Graphical Tool Designed to Deploy Wireless Sensors in Homogeneous Grid Selected from Irregular PolygonAuthors: DR. Nitin
- Investigations into Hybrid Magneto-hydrodynamic (MHD) AntennaAuthors: Sunil Bist;Dr. Rajveer Yaduvanshi
- Rejuvenating Public-Private Partnerships (PPPs) in AsiaAuthors: Dr. (Mrs) Satinder Bhatia
- ENLIGHTENING THE CLOUD COMPUTING DOMAINAuthors: AmanPreet Kaur;Dr. Dheerendra Singh
- Enhancing the performance of web Focused CRAWLer Using OntologyAuthors: Prasant Yadav;Mrs Mala Kalra;Dr. K.P Yadav
- A Simulated Novel Approach for Identifying Black Hole Attack in AODV based MANETAuthors: Kanika Lakhani
- RE-MAC: A Reliable Energy Efficient MAC Protocol For Wireless Sensor NetworksAuthors: Santhosh Simon;K Paulose Jacob
- Using 3GPP- A Secure IDS for MANETsAuthors: Monika Garg;Karanvir Kaur;Simerpreet Kaur
- Optimal Tasks Assignment for Multiple Heterogeneous Processors with Dynamic Re-assignmentAuthors: Harendra Kumar;M. P. Singh;Pradeep Yadav
- Analysis and Comparison of Color Features for Content Based Image RetrievalAuthors: Milind Lande;Prof. PraveenBhanodiya;Mr. Pritesh Jain
- A Review Of Internet Gateway Discovery Approaches For Mobile Adhoc NetworksAuthors: Deepak Patel;Rakesh Kumar
- A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITYAuthors: Bohar Singh;Mandeep Kaur;Chetan Batra
- Web Client and Web Server approaches to Prevent XSS AttacksAuthors: Jyoti Snehi;Dr. Renu Dhir
- A Soft- Computing Approach for Multi Criteria Project Selection Problem with Grey NumberAuthors: TULI BAKSHI;BIJAN SARKAR;SUBIR SANYAL
- RELATIVE STUDY OF SOLVERS FOR FINITE ELEMENT ANALYSISAuthors: Harpal Singh
- A Statistical Analysis of Bhairav-The first morning RagaAuthors: Soubhik Chakraborty;Swarima Tewari
- A View of Cloud ComputingAuthors: Bhagwan Singh;Sumeet Dhawan;Anish Arora;Abhishek Patail
- Security Test by using F T M and Data Allocation Strategies on Leakage DetectionAuthors: Pallavali Radha;G. Sireesha
- Web Service Negotiation Using AHP for Business Oriented Design of Service Level AgreementsAuthors: Mr. R. Raju;Ms. D. Dhivya;Ms. R. Saranya;Ms. S. I. Abbinaya
- AN APPROACH TO GENERATE MST WITHOUT CHECKING CYCLEAuthors: Sharadindu Roy;Prof. Samar Sarma
- Security from Denial of Sleep Attack in Wireless Sensor NetworkAuthors: Simerpreet Kaur;Md. Ataullah;Monika Garg
- THE IMPROVEMENT OF THE STABILITY PROBLEM OF RESHA GENERATION PLANT IN JORDANAuthors: Anwar Almofleh;Mahmoud Awad
- Providing security for Web Service Composition using Finite State MachineAuthors: Priya Sundar;R Raju;P Mahalakshmi;G Lalitha