Open Academic Journals Index
Advanced search
Open Academic Journals Index

Recently Added Articles

Propaganda in the World and Local Conflicts
European Journal of Medicine. Series B

Register Journal

Visitors Counter

This weekThis week
Last WeekLast week
This monthThis month
Last monthLast month
All daysAll days

International Journal of Computer Techniques

Number Vol2Issue6, 2015

  • 1-7
    Multiple Outputs Techniques Evaluation for Arabic Character Recognition
    Authors: Zeyad Q. Al-Zaydi , Dr. Hisham Salam
    Number of views: 236
  • 1-7
    Strength Test Performance Modification MAX 400KG For Sports Measurement and Evaluation Digital Base
    Authors: - IJCTEndang Rini Sukamti, Siswantoyo,Herlambang Sigit P,Sb. Pranatahadi, Guntur
    Number of views: 75
  • 1-7
    Synthesis of Planar Mechanisms, Part IX: Path Generation using 6 Bar � 2 Sliders Mechanism
    Authors: - IJCTGalal Ali Hassaan
    Number of views: 162
  • 1-11
    Resilience of Various Attacks on Watermarks Using Hybrid Video Watermarking Algorithm
    Authors: - IJCTC.N.Sujatha , Dr. P. Satyanarayana
    Number of views: 69
  • 1-4
    Unary Association Rules Survey of Mining Services
    Authors: - IJCTP.Padmapriya, R.Kalpana
    Number of views: 50
  • 1-10
    Query authentication based on Apriori algorithm in outsourcing spatial database
    Authors: - IJCTYaolongShi ,QingqingGan
    Number of views: 78
  • 8-12
    An Essential Guide to Automated GUI Testing Of Android Mobile Applications
    Authors: Anureet Kaur
    Number of views: 68

Number Vol2Issue5, 2015

  • 1-5
    Learning Media Introduction of Yogyakarta Culture For Early Childhood 2-3 Years
    Authors: Lisna Zahrotun, Yana Hendriana, Damba Saputra
    Number of views: 220
  • 6-19
    Image Compression Using Hybrid Combinations of DCT SVD and RLE
    Authors: Raghavendra.M.J , Dr.Prasantha .H.S , Dr.S.Sandya
    Number of views: 218
  • 20-26
    A Survey of ETL Tool
    Authors: Mr. Nilesh Mali, Mr.SachinBojewar
    Number of views: 470
  • 27-29
    Towards measuring learner's concentration in E-learning systems
    Authors: Saoutarrih Marouane, Sedrat Najlaa, Tahiri Abderrahim , Elkadiri Kamal Eddine
    Number of views: 227
  • 30-33
    A Study on Behavioral Malware Detection by Using Delay Tolerant Networks
    Authors: K.Ravikumar,V. Vinothkumar
    Number of views: 213
  • 34-36
    Sybil Belief: A Semi- Creation New Approach for Structure - Based Sybil Detection
    Authors: K.Ravikumar, B. Selvam
    Number of views: 206
  • 37-39
    Multi Agent System in Distributed Agent Network
    Authors: K.Ravikumar, A. Surendar
    Number of views: 230
  • 40-43
    Analysis to Online Stock for Decision Approach of Investor
    Authors: G.Magesh , S. Saradha
    Number of views: 223
  • 44-52
    Cluster Ensemble Approach for Clustering Mixed Data
    Authors: Honorine Mutazinda A,Mary Sowjanya ,O.Mrudula
    Number of views: 245
  • 52-60
    An Improved Collaborative Filtering Algorithm Based on Tags and User Ratings
    Authors: CaiyunGuo, HuijinWang
    Number of views: 230
  • 61-66
    Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks
    Authors: Hadi Ghadimkhani, Ali Habiboghli, Rouhollah Mostafaei
    Number of views: 238
  • 67-71
    Vibration Analysis of a Horizontal Washing Machine, Part IV: Optimal Damped Vibration Absorber
    Authors: Galal Ali Hassaan
    Number of views: 209
  • 72-76
    Prediction of Heart Disease Using Enhanced Association Rule Based Algorithm
    Authors: Karandeep Kaur, Ms. Poonamdeep Kaur, Ms. Lovepreet Kaur
    Number of views: 240
  • 77-80
    Enhancing Security in Wireless Sensor Network Using Load Balanced Data Aggregation Tree Approach
    Authors: A.Senthilkumar, K. Madhurabhasini
    Number of views: 192
  • 81-83
    Online Shopping Product Aspect and Ranking Using Support Vector Machine Algorithm
    Authors: R. Bharathi
    Number of views: 304
  • 84-88
    Resilient Key Sharing Approach Based on Multimode Authentication Scheme
    Authors: A.Senthilkumar , R.Divya
    Number of views: 200
  • 89-92
    Secure Multiparty Computation on Multiple Clouds
    Authors: K.Ravikumar, S. Thamizharasi
    Number of views: 163
  • 93-97
    A Survey on Log Mining: A Data Mining Approach for Intrusion Detection
    Authors: Smita P. Bhapkar, Shubhangi S. Dhamane, Yogita S. Kandekar, Khushbu S. Lodha
    Number of views: 215
  • 98-102
    Bluetooth Message Hopping Chat Application
    Authors: Kirti Karande, Ibrahim Shaikh, Tanzeel Shaikh, Hardik Vaghela
    Number of views: 222
  • 103-110
    Urbain Traffic Congestion Estimating Using Simplified CRONOS Model: Algorithm and Implementation
    Authors: Abdallah Lakhouili , Hicham Medromi , El Hassan Essoufi
    Number of views: 189

Number Vol2Issue4, 2015

  • 1-5
    Discrete Wavelet Transform-based Satellite Image Resolution Enhancement Method
    Authors: Saudagar Arshed Salim , Prof. Mr. Vinod Shinde
    Number of views: 261
  • 6-24
    Using change point analysis to determine perception accuracyinsocial media opinions
    Authors: Philip Sallis , William Claster
    Number of views: 244
  • 25-31
    Analysis of RSA and ELGAMAL Algorithm for Wireless Sensor Network
    Authors: Surekha J; Anita Madona M
    Number of views: 300
  • 32-39
    Evolving a Ultra-Flow Software Development Life Cycle Model
    Authors: Divya G.R.*, Kavitha S.**
    Number of views: 255
  • 40-46
    Design and Analysis of Recommender System for Business Data
    Authors: Prabhat Kumar , Dr. KiranJyoti
    Number of views: 247
  • 54-59
    A Case Study for Traffic Control Signal at Four-Way Intersection Road
    Authors: Kamlesh Kumar Pandey; Rajat Kumar Yadu; Pradeep Kumar Shukla; Narendra Pradhan
    Number of views: 425
  • 60-66
    Design and Implementation of Obstetrical Central Station Client Based on Android
    Authors: Huijin Wang, Chao Han
    Number of views: 230
  • 67-70
    Filling the database with application of protocol buffers
    Authors: Bulat Umurzakov, Naila Maksutkaliyeva
    Number of views: 204
  • 71-73
    Feasible Path finding for different transport modality using A-Star algorithm
    Authors: Vemula Divya,Dr. G. Venkatarami Reddy
    Number of views: 172
  • 74-79
    An Information Exchange Model Based on HL7 v3 and Ontology in the Public Health Emergency Alarm System
    Authors: Ya-ju Zhang, Zhan Huang
    Number of views: 271
  • 80-85
    Multimodal Biometrics System Based on Sliding Neighborhood Operation, FAST Features, Region Properties
    Authors: Swapnali G. Garud, Ravindra A. Nikam
    Number of views: 220
  • 86-89
    The Design and Implementation of Dynamic Printing Based on Fast Report
    Authors: XiaoDong Lv,HuiJin Wang
    Number of views: 311
  • 90-95
    Disturbance Rejection Associated with a Highly Oscillating Second-order-like Process; Part I: Feedforward Second-order Compensator
    Authors: Galal Ali Hassaan
    Number of views: 200
  • 96-99
    UWB Microwave Signal Components Estimation in Various Mediums
    Authors: Sabiapreet Bedi ,Sandeep Kaushal
    Number of views: 278

Number Vol2Issue3, 2015

  • 1-5
    A Review on 3-D Digital Video Water Marking
    Authors: Ravi Kumar, Shweta Sharma
    Number of views: 360
  • 6-13
    Multifractal-Based Featuresfor Medical ImagesClassification
    Authors: Saad Al-Momen , Loay E. George , Raid K. Naji
    Number of views: 271
  • 14-18
    Social Properties Based Routing in Delay Tolerant Network
    Authors: Aliasger k. Dhilawala, Vishal shah
    Number of views: 268
  • 19-24
    Improving AASR protocol for Adversarial Environments in MANETS
    Authors: NiravKotadia and KeyurUpadhyay
    Number of views: 298
  • 25-32
    Synthesis of Planar Mechanisms, Part II: Specified Stroke, Time Ratio and Transmission Angle
    Authors: Galal Ali Hassaan
    Number of views: 319
  • 33-35
    Sensor Based Traffic Prediction and Accident Detection using GPS and GSM Technology
    Authors: Geetanjali Shintre, Gowrima E., Prabhudev R., Shilpa M.S,Mrs.Bhat Geetalaxmi Jayram(Associate Professor)
    Number of views: 268
  • 36-46
    Reducing Energy Consumption and extending WSN lifetime using CBEEPSS
    Authors: Priyanka M.Tambat, Arati M.Dixit
    Number of views: 269
  • 47-50
    Fast Premium Immediate Money Transfer Using Mobile Number
    Authors: Mahendra Deore,Priyanka Dharurkar,Lajawanti Lanjekar,Minal Chavan,Raksha Gound.
    Number of views: 276
  • 51-54
    E-learning in Distance Education using Cloud Computing
    Authors: Arshad Ali, Amit Bajpeye , Amit Kumar Srivastava
    Number of views: 284
  • 56-60
    Duplicate Record Detection in XML using AI Techniques
    Authors: Pradeep A and George T
    Number of views: 457
  • 61-67
    Click jacking Vulnerability Analysis and Providing Security against WEB Attacks Using White listing URL analyzer
    Authors: D.Kavitha, S.Ravikumar
    Number of views: 332
  • 68-71
    A Review OnGUI Implementation of Efficient Robust Digital Watermarking using 3-Discrete wavelet Technique
    Authors: Ravi Kumar,Garima Garg
    Number of views: 276
  • 72-77
    BER Evaluation of FSO Link for different Duty Cycles of RZ pulse in different conditions of Rainfall
    Authors: Er. Rajeev Thakur
    Number of views: 405
  • 78-85
    Optimization of Association Rules using Hybrid BPSO
    Authors: Jyotsana Dixit, Abha Choubey
    Number of views: 309
  • 86-89
    A Survey on Frequent Pattern Mining Methods Apriori, Eclat, FP growth
    Authors: Siddhrajsinh Solanki, Neha Soni
    Number of views: 620
  • 90-98
    Comparative Analysis and Implementation of DSDV and AODV Routing Protocol for MANET
    Authors: Snehal Goverdhan , Aakanksha Choubey
    Number of views: 246
  • 99-105
    Frequent itemset mining using eclat with relative profit and price
    Authors: Siddhrajsinh Solanki, Neha Soni
    Number of views: 387
  • 106-109
    Generation of Graph for APB via SPI Verification Using Trek
    Authors: Gowtham R, Govindaraj V
    Number of views: 275
  • 110-115
    Controller Tuning for Disturbance Rejection Associated with a Delayed Double Integrating Process, Part I: PD-PI Controller
    Authors: Galal Ali Hassaan
    Number of views: 308
  • 116-122
    An Efficient Algorithm for Identification of Most Valuable Itemsets from WebTransaction Log Data
    Authors: Litty Tressa George, Asha Rose Thomas
    Number of views: 278

Number Vol2Issue2, 2015

  • 1-6
    An Efficient Approach for Data Sharing in Cloud Computing Using Digital Signature
    Authors: Elayaraja.D,J.Caroline EL Fiorenza(Assistant Professor)
    Number of views: 210
  • 7-11
    Envisage The Lung Tumor Evolution In PET-CT Images During Radiotherapy
    Authors: M.Indra,G.Hariharan
    Number of views: 262
  • 12-19
    NEO WSN: Network Lifetime Enhancement with OSPFV3 Authentication Scheme in Wireless Sensor Networks
    Authors: Hema M, Natchadalingam R
    Number of views: 234
  • 20-22
    Role of Mobile Cloud Applications and Challenges in BYOD
    Authors: P.Soumya Sree Laxmi, K.Kala Bharathi,CH.Mary Pushpa
    Number of views: 263
  • 23-29
    Service Delegating Log Management-For Secure Logging In Cloud Environment
    Authors: -B.Sudha,Mr.S.ArunKumar
    Number of views: 639
  • 30-35
    Privacy Enhancing and Protected Distributed of Personal Health Record Using ABE
    Authors: Vijayakumar K,S.Sivamohan,(Assistant Professor)
    Number of views: 363
  • 36-39
    Proficient Approach of Data Integrity Protection in Cloud Storage Using Regenerating Code
    Authors: Karthik N, S.Sivamohan
    Number of views: 373
  • 40-44
    Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
    Authors: Siva Ramakrishnan S,Vinoth Kumar P
    Number of views: 320
  • 45-50
    Study of Symmetric key Cryptography Algorithms
    Authors: Rejani.R Deepu,V. Krishnan
    Number of views: 445
  • 51-54
    Bundle Security Protocol of Space DTNs Using Cryptographic Algorithm
    Authors: E.Mukundhan,R.Veeramani
    Number of views: 338
  • 55-59
    Enabling Data Privacy and Data Confidentiality on Database
    Authors: Vinodh Kumar.J, Sivamohan.S
    Number of views: 308
  • 60-65
    Captcha as Graphical Password Using Carp Technique
    Authors: Mr.T.Kumesh(Assistant Professor), Amala Rani.S
    Number of views: 525
  • 66-71
    Privacy Preserving Health Monitoring Data Using a Proxy Re-encryption
    Authors: Lakshmipriya.V, Praveena.V(Assistant Professor)
    Number of views: 268
  • 72-80
    Honey Pot Based Network Architecture For Key loggers Detection
    Authors: Ms.C.Sathya, Mr.R.B.Saroo Raj
    Number of views: 327
  • 81-86
    Lung Segmentation for Tuberculosis by Using Active Appearance Model (AAM) In Chest Radiographs
    Authors: S.Syeda Khatija kubra,P.murugan
    Number of views: 302
  • 87-90
    Hashing Heterogeneity Aware Dynamic Capacity Provisioning in the Cloud
    Authors: Vinoth Kumar.P,Sujitha.M
    Number of views: 245
  • 91-95
    A Customized Filter to apply on Online Social Network (OSN) user walls
    Authors: Priya.K, Mr.R.Jayaraj (Asst. Professor)
    Number of views: 260
  • 96-102
    Dynamic Resource Recovery in Grid
    Authors: Malika.K.S, MRS.V.Elavarasi
    Number of views: 237
  • 103-108
    Intellect Face Recognition With Structurally Measures Hankel Matrix Decomposition
    Authors: Ramkumar.G, S.P Maniraj (Assistant Professor)
    Number of views: 291
  • 109-113
    Authors: Veeramani.R(Assistant Professor), Sindhu Bharathy.B
    Number of views: 289
  • 114-120
    Context Representation and Maximize Power Efficiency in Mobile Sensing
    Authors: S.N.Nandhini, Mr.R. Augustian Issac
    Number of views: 219
  • 121-127
    Adjustment of the Force Transmissibility of a SDOF Vibrating System; Part II: Fraction Transmissibility
    Authors: Galal Ali Hassaan
    Number of views: 443
  • 128-141
    An Improved Search Algorithm for Resource Allocation in Cloud Databases
    Authors: Radhya Sahal, Sherif M. Khattab, Fatma A. Omara
    Number of views: 264
  • 142-155
    DynMR: A Dynamic Slot Allocation Framework for MapReduce Clusters in Big Data Management using DHSA and SEPB
    Authors: Anil Sagar T, Ramakrishna V Moni
    Number of views: 309
  • 156-162
    Authentication With Enhanced Privacy Using File Stream Sequencing Technique
    Authors: Manikandan.R, R.J.Poovaraghan
    Number of views: 275
  • 163-165
    Voice morphing
    Authors: Ms.P V Gujarathi , Mrs.S S Dinde
    Number of views: 313
  • 166-169
    Using Image Processing for Detecting Defects in Printed Circuit Board
    Authors: Sonal D Kalro, Meghashree B S, Prathiksha B G, Suhasini A,Dr.H D Phaneendra
    Number of views: 438
  • 170-175
    Tuning Condition Modification of Damped and Un-damped Adaptive Vibration Absorber
    Authors: Mohammed Abdel-Hafiz, Galal Ali Hassaan
    Number of views: 251

1 2  Следующая страница  В конец
© 2013-2017, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us