Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Articles

International Archives of Integrated Medicine
Radovi Zavoda za znanstvenoistraživački i umjetnički rad u Bjelovaru
Revista Espiga
International Journal of Ayurveda and Pharmaceutical Chemistry



Register Journal



Visitors Counter

TodayToday
938
YesterdayYesterday
1621
This weekThis week
12648
Last WeekLast week
14248
This monthThis month
46394
Last monthLast month
58985
All daysAll days
2157277

International Journal of Computer Techniques

Number Vol5Issue2, 2018

  • 1-15
    Knowledge Management System in Rental Company with Socialization, Externalization, Combination, Internalization Method Case Study: PT Surya Sudeco
    Authors: Erick Indra Tara, Diky Wardhani, Sofian Lusa
    Number of views: 12
  • 16-22
    Optimization Online Analytical Processing (OLAP) Data Sales Door Case Study CV Adilia Lestari
    Authors: Setiawansyah, Ayi Bayyinah, Nuroji
    Number of views: 6
  • 23-27
    Design Model of Payroll System Integrated with Attendance System at PT. XYZ
    Authors: Sulis Sandiwarno
    Number of views: 7
  • 28-32
    Design Model of Booking Rooms and Ship for Trip to Island XYZ
    Authors: Sulis Sandiwarno
    Number of views: 7
  • 33-39
    SAware: Sensor-based Context Awareness for Smartphone Access Control
    Authors: Minqiang Deng
    Number of views: 10
  • 40-43
    Consumer Behaviour Marketing Analysis Using Data mining Concepts
    Authors: G.Silambarasan, P.Santhosh Raj
    Number of views: 7
  • 44-53
    Techniques for Extending Computation and Resources in Mobile Devices
    Authors: Mr.S.Jagadeesan, G.Nandhini
    Number of views: 7
  • 54-60
    Credit Card Nearest Neighbor Based Outlier Detection Techniques
    Authors: Mrs.C.Navamani, S.Krishnan
    Number of views: 7
  • 61-73
    Detecting Malware and Searching Rank Fraudulent Behavior In Google Play
    Authors: Mr.S.Jagadeesan, B.VishnuVarthini
    Number of views: 6
  • 74-82
    Enhancement and Performance Analysis of VoIP Algorithms in Wireless Networks
    Authors: Maghrib Abidalreda Maky Alrammahi, Haider Abdul Hassan Hadi Al Kim
    Number of views: 7
  • 83-85
    Multilevel Security for Data as a Service (Spacebox) Using Cryptography
    Authors: Prof. Sachin H. Darekar, Sayali Zende, Prerana Pawar, Akanksha Pinglaskar
    Number of views: 7
  • 86-91
    Prototype Knowledge Management System with Quality Function Deployment Method: a Case Study at K Software House
    Authors: Tutik Lestari, Sofian Lusa, Arni Retno Mariana, Nunung Nurmaesah
    Number of views: 7
  • 92-97
    Machine Learning for Real Estate Contracts – Automatic Categorization of Text
    Authors: B.Gayathri, Prof.Kanchana Devi.V
    Number of views: 8
  • 98-101
    Review Mining and Summarization
    Authors: G.Ezhilarasi, S.Manivelan
    Number of views: 5
  • 102-104
    A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
    Authors: G.Gayathri, A.Soundarrajan
    Number of views: 7

Number Vol5Issue1, 2018

  • 1-4
    Designing of Library Information System to Support Learning in High School
    Authors: Ariyani Wardhana
    Number of views: 31
  • 5-13
    Multi-task Offloading and Resource Allocation for Energy-Efficiency in Mobile Edge Computing
    Authors: Huanjie Li
    Number of views: 8
  • 14-19
    A Method of DTW Based Gait Recognition and Gait Data from Kinect
    Authors: YiFei Hu
    Number of views: 6
  • 20-24
    Comparison Methods of DCT, DWT and FFT Techniques Approach on Lossy Image Compression
    Authors: Fifit Alfiah, Saepudin, Sutarya, Indra Purnama, Ryan Anggara
    Number of views: 7
  • 25-29
    Anonymous Authentication in the SAML 2. 0 Protocol Based On Algebraic MAC
    Authors: Shiwei Wen
    Number of views: 8
  • 30-35
    Optimization of 5G Wireless Mobile Network Energy with ULTRA-LEAN Design
    Authors: Jonathan, Sarif Hidayat, Daril Willianson, Greg Martin, Hari Suryantoro
    Number of views: 10
  • 36-43
    Complex Background Image Detection and Processing Based on Machine Vision
    Authors: Lei Tai
    Number of views: 8
  • 44 - 49
    The Creation Of Data Pattern Of Kerosene-mixed Gasoline By Utilizing Gas Sensor And Fast Fourier Transform Method To Detect The Purity Of Gasoline
    Authors: Derisma, Hilda Rahmiati, Andrizal
    Number of views: 9
  • 50 - 57
    Temperature Monitoring In Water Heating System Using Control Temperature With Pid Ziegler Nichols Method Web Based
    Authors: Agus Riyanto, Muhammad Ramdhan, Galih Surono, Ayu Ratna Juwita, Adi Rizky Pratama
    Number of views: 6
  • 58 - 64
    Digital Image Segmentation based Worm Count and Identified Diseases of worms in Human
    Authors: R. Augasthega, R. Ravi
    Number of views: 10
  • 65 - 70
    Modification Application of Key Metrics 13x13 Cryptographic Algorithm Playfair Cipher and Combination with Linear Feedback Shift Register (LFSR) on Data Security Based on Mobile Android
    Authors: Denni Kurniawan, April Lia Hananto, Bayu Priyatna
    Number of views: 9

Number Vol4Issue6, 2017

  • 1-5
    Information Confidentiality Using Fuzzy Based Data Transformation Method
    Authors: - IJCT Mrs. TamilSelvi. S. Mrs. Anette Regina I.
    Number of views: 28
  • 6-10
    Cross-Domain Sentiment Classification Using Web Usage Mining
    Authors: - IJCT Mrs. Saraswathi.S, Mrs. Anette Regina.I
    Number of views: 44
  • 11-17
    RFID Tag Ownership Transfer Protocol of Multi-owner and Multi-tag Based on EPC C1G2 Protocol
    Authors: - IJCT MENG Ke, HUANGXincheng ,CHEN Shun'er, HUANG Hongbing, LIU Weiping
    Number of views: 29
  • 18-23
    Towards a Skill-oriented Educational Scenario: Vocational Training as Use Case
    Authors: - IJCT MoncefBentaleb, MeriemHnida, Mohammed KhalidiIdrissi
    Number of views: 29
  • 24-29
    Discrete Cosine Transform DCT Methods on Compression RGB and Grayscale image
    Authors: - IJCT Fifit Alfiah, Ade Setiadi, Saepudin, Ajay Supriadi, Ihsan Maulana
    Number of views: 80
  • 30-39
    A Survey on Techniques and Applications of Data mining in Banking Field
    Authors: - IJCT Md. Shakeel Ahamad, Sk. Wasim Akram
    Number of views: 35
  • 40-46
    Kids EduLink - Android application to provide extra knowledge for kids based on the Local Syllabus
    Authors: - IJCT S.D Samarasinghe, K.M.C Konara, W.G.M Sudarshani, T.D Liyanapathiranage, N. Ellepola
    Number of views: 32
  • 47-51
    Assessment of Efficiency of Part & Geometry Models for Groupwise Registration
    Authors: - IJCTSteve A.Adeshna , Timothy F.Cootes
    Number of views: 45
  • 52-58
    Sensor Networks for Emergency Response: Challenges and Opportunities
    Authors: - IJCTR.Karthikeyan ,Shanmugapriya M ,Indhu P
    Number of views: 40
  • 59-71
    Factors in Faculty Performance Analysis
    Authors: - IJCTSuman Bhatnagar, Prashant Sahai Saxena
    Number of views: 48
  • 72-79
    Analysis of CMOS Based Full Adders for Mobile Communications
    Authors: - IJCTV. Manojna, Mr. P. Koteswara Rao, Dr. Ch. Subrahmanyam
    Number of views: 35
  • 80-88
    A Survey of Data Integration
    Authors: - IJCTRenHao Chen
    Number of views: 32
  • 89-94
    A Novel Method of Moving Object Detection
    Authors: - IJCTJielongHuang , Hongqi Li ,Lianglu Yin , Yuanliang Huang
    Number of views: 33
  • 95-101
    Personal Identification Based on IRIS Texture Analysis
    Authors: R.Karthikeyan , Sivasankar R , Sathya G
    Number of views: 43
  • 103-118
    Performance optimization in distributed DataWarehouses with MapReduce: Treatment of data partitioning and distribution problems
    Authors: Sara Riahi , Azzeddine Riahi
    Number of views: 29

Number Vol4Issue5, 2017

  • 1-5
    Proficient Possessions Supervision Using Various Clustering Techniques
    Authors: - IJCT T.Karunakaran , J.John Clotilda
    Number of views: 31
  • 6-9
    A Review on Identity-Based Proxy-Oriented Data Uploading and Inaccessible Data Integrity Inspection in Public Cloud
    Authors: - IJCT K. Ravikumar, I. Renuka
    Number of views: 40
  • 10-17
    Ontology - based Semantic Value Conversion
    Authors: - IJCT JieWang
    Number of views: 27
  • 18-21
    Event Data Analysis Using Data Mining
    Authors: - IJCT A.Arokia Marshal Roach , G.Raja Raja Cholan
    Number of views: 42
  • 22-25
    The Application of Deep Learning in Natural Language Processing
    Authors: - IJCT Yongxing Peng
    Number of views: 43
  • 26-30
    Drop-by-Drop Irrigation Technology Powered by Photovoltaic Solar Panels
    Authors: - IJCT Marius Marcu , Charles Rostand Mvongo Mvodo , Valteri Audrey Voula ,Marius Cucaila
    Number of views: 62
  • 31-35
    Designing English Rush Game as an Android-Based English Learning Media for Primary School Students
    Authors: - IJCT Muhammad Sholeh , EdhySutanta , Sulistyowati
    Number of views: 42
  • 36-45
    Radiographic Model Matching with Markov Graph Shape Model
    Authors: - IJCT Steve A. Adeshina, Timothy F. Cootes
    Number of views: 30
  • 46-51
    An Adaptive Congestion Control Algorithm with CoAP for the Internet of Thing
    Authors: - IJCT He Meng , Huang HongBing , Liu WeiPing
    Number of views: 47
  • 52-57
    Assessment of Different Structures for Predicting Bone Age using Statistical Appearance Models
    Authors: - IJCT Steve A. Adeshina, Timothy F. Cootes , Judith E. Adams
    Number of views: 32
  • 62-67
    Probability of Genetic Diagnosis
    Authors: - IJCT GanSiqing , SunHeng
    Number of views: 30

Number Vol4Issue4, 2017

  • 1-5
    Enhancing Data Security in Cloud Computing Growth Security
    Authors: - IJCT M.Subhashini, Dr.P.Srivaramangai.
    Number of views: 30
  • 6-9
    A Review on Different Spam Detection Approaches
    Authors: - IJCT K.Ravikumar, P.Gandhimathi
    Number of views: 38
  • 10-13
    Incorporated Keyword Search Using Characteristic Based Encryption for Electronic Health Records in Vapours
    Authors: - IJCT A.Senthil Kumar, S.Abirami
    Number of views: 29
  • 14-18
    CRM Through Customer Online Reviews and Analysis
    Authors: - IJCT S. Alexander Suresh
    Number of views: 33
  • 27-30
    Server-Designation Preventive Scheme for Public key Encryption with Keyword Search Cryptographic Primordial
    Authors: - IJCT A.Senthil Kumar, S.Vimal
    Number of views: 30
  • 31-37
    Watermarking and Multiobjective Based Secure Data Aggregation for Wireless Sensor Network
    Authors: - IJCT Jaybhaye Chaitali, Dr. P. M. Pawar
    Number of views: 24
  • 38-44
    A Study on Genes Identification with Expression Levels Related to Breast Cancer Prognosis Using Data Mining Techniques
    Authors: - IJCT N.Sureshbabu , S.Sivakumar
    Number of views: 31
  • 45-47
    Partial Face Recognition Using Robust Point Set Matching
    Authors: - IJCT A.K.Mariselvam , A.Akhil , S.Vishnumohan Reddy , B.Rishvita Reddy
    Number of views: 45
  • 48-54
    EEG Based Hearing Threshold Determination Using Artificial Neural Network
    Authors: - IJCT .Ezhilarasi V., Shahin A.
    Number of views: 30
  • 55-61
    Improving Energy-Effiency in Wireless Body Area Network for M-Gear Using Multihop Link Efficient Protocol (MLEP)
    Authors: - IJCT Suganya Devi D, Lavanya S
    Number of views: 42
  • 62-70
    Cascade-Forward Algorithm to Extract Hidden Rules of Gastric Cancer Information Based on Ontology
    Authors: - IJCT Ms.Janani A., Mrs. Shoba S.A.
    Number of views: 27
  • 71-78
    Effective Use of Data Mining on Biological and Clinical Data Analysis
    Authors: - IJCT Ms. Lavanya M, Mrs. Shoba S.A.,
    Number of views: 28
  • 79-87
    Amplification Misplaced Answers to Crowd DB Using Fuzzylogic and K-Means Clustering Algorithm
    Authors: - IJCT Ms.Pavithra P., Ms. Abarna N.
    Number of views: 33
  • 88-95
    Mechanical Investigation of Packet Production
    Authors: - IJCTMs. Ramya P., Saravanan A. M.
    Number of views: 27
  • 96-103
    Adapted Collaborative Filtering for Web Service Recommendation Using QOS Prediction Method
    Authors: - IJCTMs. Sangeetha A, Mrs. Abarna N.
    Number of views: 31
  • 104-110
    Modified Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds
    Authors: - IJCT B.Sudha
    Number of views: 28
  • 111-114
    DEYPOS: Deduplicatable Efficiency of Dynamic Proof of Storage for Multi-User Knowledge
    Authors: - IJCT A. Senthil Kumar, P.Raju
    Number of views: 48
  • 115-120
    Enhanced Classification Model for Cervical Cancer Dataset based on Cost Sensitive Classifier
    Authors: - IJCT Hayder K. Fatlawi
    Number of views: 75
  • 121-130
    SDDMCSS: Secure and Data De-duplicated Multi-Cloud Storage System
    Authors: - IJCT Priyanka Sunil Rokade , Biplab Kumar Sarkar , Prof. Dr. Bej Raj Singh Patel
    Number of views: 26
  • 130-135
    A Study on Data Mining Optimizing Visual Search Re-Ranking Via Pair Wise Learning Image Datas
    Authors: - IJCT L.Dhivyajayadharshini
    Number of views: 38
  • 131-136
    A Review and New Subjective Evaluation Experiment of Objective Metricsused to Evaluate Histogram Equalization-based Contrast Enhancement Techniques
    Authors: - IJCT Hasan Thabit Rashid Kurmasha , Abbas Fadhil Alharan
    Number of views: 36
  • 137-143
    A New Group Signature Scheme using IBE
    Authors: - IJCT Girish , Dr.Phaneendra H.D
    Number of views: 41
  • 144-153
    The Research on Accelerated Routing Lookup Algorithms
    Authors: - IJCT Yaqiong Li , Xiaohua Meng , Jie Li
    Number of views: 28
  • 154-158
    Public Key Infrastructure Using Wireless Communication Networks
    Authors: - IJCT R.Karthikeyan , Dr.T.Geetha , Shanmugapriya M , Vimala M
    Number of views: 26


1 2 3 4 5  Следующая страница  В конец
© 2013-2017, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us