ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Techniques >>

Vol.2, No.5

Publisher: International Research Group

Publishing Date: 2015-09-01

  1. Learning Media Introduction of Yogyakarta Culture For Early Childhood 2-3 Years

    Authors: Lisna Zahrotun; Yana Hendriana; Damba Saputra

  2. Image Compression Using Hybrid Combinations of DCT SVD and RLE

    Authors: Raghavendra.M.J; Dr.Prasantha .H.S; Dr.S.Sandya

  3. A Survey of ETL Tools

    Authors: Nilesh Mali; SachinBojewar

  4. Towards measuring learner's concentration in E-learning systems

    Authors: Saoutarrih Marouane; Sedrat Najlaa; Tahiri Abderrahim; Elkadiri Kamal Eddine

  5. A Study on Behavioral Malware Detection by Using Delay Tolerant Networks

    Authors: K.Ravikumar; V. Vinothkumar

  6. Sybil Belief: A Semi- Creation New Approach for Structure - Based Sybil Detection

    Authors: K.Ravikumar; B. Selvam

  7. Multi Agent System in Distributed Agent Network

    Authors: K.Ravikumar; A. Surendar

  8. Analysis to Online Stock for Decision Approach of Investor

    Authors: G.Magesh; S. Saradha

  9. Cluster Ensemble Approach for Clustering Mixed Data

    Authors: Honorine Mutazinda A; Mary Sowjanya; O.Mrudula

  10. An Improved Collaborative Filtering Algorithm Based on Tags and User Ratings

    Authors: CaiyunGuo; HuijinWang

  11. Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks

    Authors: Hadi Ghadimkhani; Ali Habiboghli; Rouhollah Mostafaei

  12. Vibration Analysis of a Horizontal Washing Machine, Part IV: Optimal Damped Vibration Absorber

    Authors: Galal Ali Hassaan

  13. Prediction of Heart Disease Using Enhanced Association Rule Based Algorithm

    Authors: Karandeep Kaur; Poonamdeep Kaur; Lovepreet Kaur

  14. Enhancing Security in Wireless Sensor Network Using Load Balanced Data Aggregation Tree Approach

    Authors: A.Senthilkumar; K. Madhurabhasini

  15. Online Shopping Product Aspect and Ranking Using Support Vector Machine Algorithm

    Authors: R. Bharathi

  16. Resilient Key Sharing Approach Based on Multimode Authentication Scheme

    Authors: A.Senthilkumar; R.Divya

  17. Secure Multiparty Computation on Multiple Clouds

    Authors: K.Ravikumar; S. Thamizharasi

  18. A Survey on Log Mining: A Data Mining Approach for Intrusion Detection

    Authors: Smita P. Bhapkar; Shubhangi S. Dhamane; Yogita S. Kandekar; Khushbu S. Lodha

  19. Bluetooth Message Hopping Chat Application

    Authors: Kirti Karande; Ibrahim Shaikh; Tanzeel Shaikh; Hardik Vaghela

  20. Urbain Traffic Congestion Estimating Using Simplified CRONOS Model: Algorithm and Implementation

    Authors: Abdallah Lakhouili; Hicham Medromi; El Hassan Essoufi