Archived Papers for Journal
International Journal of Computer Techniques >>
Vol.2, No.5
Publisher: International Research Group
Publishing Date: 2015-09-01
- Learning Media Introduction of Yogyakarta Culture For Early Childhood 2-3 YearsAuthors: Lisna Zahrotun; Yana Hendriana; Damba Saputra
- Image Compression Using Hybrid Combinations of DCT SVD and RLEAuthors: Raghavendra.M.J; Dr.Prasantha .H.S; Dr.S.Sandya
- A Survey of ETL ToolsAuthors: Nilesh Mali; SachinBojewar
- Towards measuring learner's concentration in E-learning systemsAuthors: Saoutarrih Marouane; Sedrat Najlaa; Tahiri Abderrahim; Elkadiri Kamal Eddine
- A Study on Behavioral Malware Detection by Using Delay Tolerant NetworksAuthors: K.Ravikumar; V. Vinothkumar
- Sybil Belief: A Semi- Creation New Approach for Structure - Based Sybil DetectionAuthors: K.Ravikumar; B. Selvam
- Multi Agent System in Distributed Agent NetworkAuthors: K.Ravikumar; A. Surendar
- Analysis to Online Stock for Decision Approach of InvestorAuthors: G.Magesh; S. Saradha
- Cluster Ensemble Approach for Clustering Mixed DataAuthors: Honorine Mutazinda A; Mary Sowjanya; O.Mrudula
- An Improved Collaborative Filtering Algorithm Based on Tags and User RatingsAuthors: CaiyunGuo; HuijinWang
- Performance of data mining algorithms in unauthorized intrusion detection systems in computer networksAuthors: Hadi Ghadimkhani; Ali Habiboghli; Rouhollah Mostafaei
- Vibration Analysis of a Horizontal Washing Machine, Part IV: Optimal Damped Vibration AbsorberAuthors: Galal Ali Hassaan
- Prediction of Heart Disease Using Enhanced Association Rule Based AlgorithmAuthors: Karandeep Kaur; Poonamdeep Kaur; Lovepreet Kaur
- Enhancing Security in Wireless Sensor Network Using Load Balanced Data Aggregation Tree ApproachAuthors: A.Senthilkumar; K. Madhurabhasini
- Online Shopping Product Aspect and Ranking Using Support Vector Machine AlgorithmAuthors: R. Bharathi
- Resilient Key Sharing Approach Based on Multimode Authentication SchemeAuthors: A.Senthilkumar; R.Divya
- Secure Multiparty Computation on Multiple CloudsAuthors: K.Ravikumar; S. Thamizharasi
- A Survey on Log Mining: A Data Mining Approach for Intrusion DetectionAuthors: Smita P. Bhapkar; Shubhangi S. Dhamane; Yogita S. Kandekar; Khushbu S. Lodha
- Bluetooth Message Hopping Chat ApplicationAuthors: Kirti Karande; Ibrahim Shaikh; Tanzeel Shaikh; Hardik Vaghela
- Urbain Traffic Congestion Estimating Using Simplified CRONOS Model: Algorithm and ImplementationAuthors: Abdallah Lakhouili; Hicham Medromi; El Hassan Essoufi