Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Articles

Unimetro
Propaganda in the World and Local Conflicts
European Journal of Medicine. Series B
Economica



Register Journal



Visitors Counter

TodayToday
1045
YesterdayYesterday
1896
This weekThis week
2941
Last WeekLast week
12449
This monthThis month
32631
Last monthLast month
56962
All daysAll days
2529818

International Journal of Computer Techniques

Number Vol2Issue6, 2015

  • 1-7
    Multiple Outputs Techniques Evaluation for Arabic Character Recognition
    Authors: Zeyad Q. Al-Zaydi , Dr. Hisham Salam
    Number of views: 236
  • 1-7
    Strength Test Performance Modification MAX 400KG For Sports Measurement and Evaluation Digital Base
    Authors: - IJCTEndang Rini Sukamti, Siswantoyo,Herlambang Sigit P,Sb. Pranatahadi, Guntur
    Number of views: 75
  • 1-7
    Synthesis of Planar Mechanisms, Part IX: Path Generation using 6 Bar � 2 Sliders Mechanism
    Authors: - IJCTGalal Ali Hassaan
    Number of views: 162
  • 1-11
    Resilience of Various Attacks on Watermarks Using Hybrid Video Watermarking Algorithm
    Authors: - IJCTC.N.Sujatha , Dr. P. Satyanarayana
    Number of views: 69
  • 1-4
    Unary Association Rules Survey of Mining Services
    Authors: - IJCTP.Padmapriya, R.Kalpana
    Number of views: 50
  • 1-10
    Query authentication based on Apriori algorithm in outsourcing spatial database
    Authors: - IJCTYaolongShi ,QingqingGan
    Number of views: 78
  • 8-12
    An Essential Guide to Automated GUI Testing Of Android Mobile Applications
    Authors: Anureet Kaur
    Number of views: 68

Number Vol2Issue5, 2015

  • 1-5
    Learning Media Introduction of Yogyakarta Culture For Early Childhood 2-3 Years
    Authors: Lisna Zahrotun, Yana Hendriana, Damba Saputra
    Number of views: 220
  • 6-19
    Image Compression Using Hybrid Combinations of DCT SVD and RLE
    Authors: Raghavendra.M.J , Dr.Prasantha .H.S , Dr.S.Sandya
    Number of views: 218
  • 20-26
    A Survey of ETL Tool
    Authors: Mr. Nilesh Mali, Mr.SachinBojewar
    Number of views: 470
  • 27-29
    Towards measuring learner's concentration in E-learning systems
    Authors: Saoutarrih Marouane, Sedrat Najlaa, Tahiri Abderrahim , Elkadiri Kamal Eddine
    Number of views: 227
  • 30-33
    A Study on Behavioral Malware Detection by Using Delay Tolerant Networks
    Authors: K.Ravikumar,V. Vinothkumar
    Number of views: 213
  • 34-36
    Sybil Belief: A Semi- Creation New Approach for Structure - Based Sybil Detection
    Authors: K.Ravikumar, B. Selvam
    Number of views: 206
  • 37-39
    Multi Agent System in Distributed Agent Network
    Authors: K.Ravikumar, A. Surendar
    Number of views: 230
  • 40-43
    Analysis to Online Stock for Decision Approach of Investor
    Authors: G.Magesh , S. Saradha
    Number of views: 223
  • 44-52
    Cluster Ensemble Approach for Clustering Mixed Data
    Authors: Honorine Mutazinda A,Mary Sowjanya ,O.Mrudula
    Number of views: 245
  • 52-60
    An Improved Collaborative Filtering Algorithm Based on Tags and User Ratings
    Authors: CaiyunGuo, HuijinWang
    Number of views: 230
  • 61-66
    Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks
    Authors: Hadi Ghadimkhani, Ali Habiboghli, Rouhollah Mostafaei
    Number of views: 238
  • 67-71
    Vibration Analysis of a Horizontal Washing Machine, Part IV: Optimal Damped Vibration Absorber
    Authors: Galal Ali Hassaan
    Number of views: 209
  • 72-76
    Prediction of Heart Disease Using Enhanced Association Rule Based Algorithm
    Authors: Karandeep Kaur, Ms. Poonamdeep Kaur, Ms. Lovepreet Kaur
    Number of views: 240
  • 77-80
    Enhancing Security in Wireless Sensor Network Using Load Balanced Data Aggregation Tree Approach
    Authors: A.Senthilkumar, K. Madhurabhasini
    Number of views: 192
  • 81-83
    Online Shopping Product Aspect and Ranking Using Support Vector Machine Algorithm
    Authors: R. Bharathi
    Number of views: 304
  • 84-88
    Resilient Key Sharing Approach Based on Multimode Authentication Scheme
    Authors: A.Senthilkumar , R.Divya
    Number of views: 200
  • 89-92
    Secure Multiparty Computation on Multiple Clouds
    Authors: K.Ravikumar, S. Thamizharasi
    Number of views: 163
  • 93-97
    A Survey on Log Mining: A Data Mining Approach for Intrusion Detection
    Authors: Smita P. Bhapkar, Shubhangi S. Dhamane, Yogita S. Kandekar, Khushbu S. Lodha
    Number of views: 215
  • 98-102
    Bluetooth Message Hopping Chat Application
    Authors: Kirti Karande, Ibrahim Shaikh, Tanzeel Shaikh, Hardik Vaghela
    Number of views: 222
  • 103-110
    Urbain Traffic Congestion Estimating Using Simplified CRONOS Model: Algorithm and Implementation
    Authors: Abdallah Lakhouili , Hicham Medromi , El Hassan Essoufi
    Number of views: 189

Number Vol2Issue4, 2015

  • 1-5
    Discrete Wavelet Transform-based Satellite Image Resolution Enhancement Method
    Authors: Saudagar Arshed Salim , Prof. Mr. Vinod Shinde
    Number of views: 261
  • 6-24
    Using change point analysis to determine perception accuracyinsocial media opinions
    Authors: Philip Sallis , William Claster
    Number of views: 244
  • 25-31
    Analysis of RSA and ELGAMAL Algorithm for Wireless Sensor Network
    Authors: Surekha J; Anita Madona M
    Number of views: 300
  • 32-39
    Evolving a Ultra-Flow Software Development Life Cycle Model
    Authors: Divya G.R.*, Kavitha S.**
    Number of views: 255
  • 40-46
    Design and Analysis of Recommender System for Business Data
    Authors: Prabhat Kumar , Dr. KiranJyoti
    Number of views: 247
  • 54-59
    A Case Study for Traffic Control Signal at Four-Way Intersection Road
    Authors: Kamlesh Kumar Pandey; Rajat Kumar Yadu; Pradeep Kumar Shukla; Narendra Pradhan
    Number of views: 425
  • 60-66
    Design and Implementation of Obstetrical Central Station Client Based on Android
    Authors: Huijin Wang, Chao Han
    Number of views: 230
  • 67-70
    Filling the database with application of protocol buffers
    Authors: Bulat Umurzakov, Naila Maksutkaliyeva
    Number of views: 204
  • 71-73
    Feasible Path finding for different transport modality using A-Star algorithm
    Authors: Vemula Divya,Dr. G. Venkatarami Reddy
    Number of views: 172
  • 74-79
    An Information Exchange Model Based on HL7 v3 and Ontology in the Public Health Emergency Alarm System
    Authors: Ya-ju Zhang, Zhan Huang
    Number of views: 271
  • 80-85
    Multimodal Biometrics System Based on Sliding Neighborhood Operation, FAST Features, Region Properties
    Authors: Swapnali G. Garud, Ravindra A. Nikam
    Number of views: 220
  • 86-89
    The Design and Implementation of Dynamic Printing Based on Fast Report
    Authors: XiaoDong Lv,HuiJin Wang
    Number of views: 311
  • 90-95
    Disturbance Rejection Associated with a Highly Oscillating Second-order-like Process; Part I: Feedforward Second-order Compensator
    Authors: Galal Ali Hassaan
    Number of views: 200
  • 96-99
    UWB Microwave Signal Components Estimation in Various Mediums
    Authors: Sabiapreet Bedi ,Sandeep Kaushal
    Number of views: 278

Number Vol2Issue3, 2015

  • 1-5
    A Review on 3-D Digital Video Water Marking
    Authors: Ravi Kumar, Shweta Sharma
    Number of views: 360
  • 6-13
    Multifractal-Based Featuresfor Medical ImagesClassification
    Authors: Saad Al-Momen , Loay E. George , Raid K. Naji
    Number of views: 271
  • 14-18
    Social Properties Based Routing in Delay Tolerant Network
    Authors: Aliasger k. Dhilawala, Vishal shah
    Number of views: 268
  • 19-24
    Improving AASR protocol for Adversarial Environments in MANETS
    Authors: NiravKotadia and KeyurUpadhyay
    Number of views: 298
  • 25-32
    Synthesis of Planar Mechanisms, Part II: Specified Stroke, Time Ratio and Transmission Angle
    Authors: Galal Ali Hassaan
    Number of views: 319
  • 33-35
    Sensor Based Traffic Prediction and Accident Detection using GPS and GSM Technology
    Authors: Geetanjali Shintre, Gowrima E., Prabhudev R., Shilpa M.S,Mrs.Bhat Geetalaxmi Jayram(Associate Professor)
    Number of views: 268
  • 36-46
    Reducing Energy Consumption and extending WSN lifetime using CBEEPSS
    Authors: Priyanka M.Tambat, Arati M.Dixit
    Number of views: 269
  • 47-50
    Fast Premium Immediate Money Transfer Using Mobile Number
    Authors: Mahendra Deore,Priyanka Dharurkar,Lajawanti Lanjekar,Minal Chavan,Raksha Gound.
    Number of views: 276
  • 51-54
    E-learning in Distance Education using Cloud Computing
    Authors: Arshad Ali, Amit Bajpeye , Amit Kumar Srivastava
    Number of views: 284
  • 56-60
    Duplicate Record Detection in XML using AI Techniques
    Authors: Pradeep A and George T
    Number of views: 457
  • 61-67
    Click jacking Vulnerability Analysis and Providing Security against WEB Attacks Using White listing URL analyzer
    Authors: D.Kavitha, S.Ravikumar
    Number of views: 332
  • 68-71
    A Review OnGUI Implementation of Efficient Robust Digital Watermarking using 3-Discrete wavelet Technique
    Authors: Ravi Kumar,Garima Garg
    Number of views: 276
  • 72-77
    BER Evaluation of FSO Link for different Duty Cycles of RZ pulse in different conditions of Rainfall
    Authors: Er. Rajeev Thakur
    Number of views: 405
  • 78-85
    Optimization of Association Rules using Hybrid BPSO
    Authors: Jyotsana Dixit, Abha Choubey
    Number of views: 309
  • 86-89
    A Survey on Frequent Pattern Mining Methods Apriori, Eclat, FP growth
    Authors: Siddhrajsinh Solanki, Neha Soni
    Number of views: 620
  • 90-98
    Comparative Analysis and Implementation of DSDV and AODV Routing Protocol for MANET
    Authors: Snehal Goverdhan , Aakanksha Choubey
    Number of views: 246
  • 99-105
    Frequent itemset mining using eclat with relative profit and price
    Authors: Siddhrajsinh Solanki, Neha Soni
    Number of views: 387
  • 106-109
    Generation of Graph for APB via SPI Verification Using Trek
    Authors: Gowtham R, Govindaraj V
    Number of views: 275
  • 110-115
    Controller Tuning for Disturbance Rejection Associated with a Delayed Double Integrating Process, Part I: PD-PI Controller
    Authors: Galal Ali Hassaan
    Number of views: 308
  • 116-122
    An Efficient Algorithm for Identification of Most Valuable Itemsets from WebTransaction Log Data
    Authors: Litty Tressa George, Asha Rose Thomas
    Number of views: 278

Number Vol2Issue2, 2015

  • 1-6
    An Efficient Approach for Data Sharing in Cloud Computing Using Digital Signature
    Authors: Elayaraja.D,J.Caroline EL Fiorenza(Assistant Professor)
    Number of views: 210
  • 7-11
    Envisage The Lung Tumor Evolution In PET-CT Images During Radiotherapy
    Authors: M.Indra,G.Hariharan
    Number of views: 262
  • 12-19
    NEO WSN: Network Lifetime Enhancement with OSPFV3 Authentication Scheme in Wireless Sensor Networks
    Authors: Hema M, Natchadalingam R
    Number of views: 234
  • 20-22
    Role of Mobile Cloud Applications and Challenges in BYOD
    Authors: P.Soumya Sree Laxmi, K.Kala Bharathi,CH.Mary Pushpa
    Number of views: 263
  • 23-29
    Service Delegating Log Management-For Secure Logging In Cloud Environment
    Authors: -B.Sudha,Mr.S.ArunKumar
    Number of views: 639
  • 30-35
    Privacy Enhancing and Protected Distributed of Personal Health Record Using ABE
    Authors: Vijayakumar K,S.Sivamohan,(Assistant Professor)
    Number of views: 363
  • 36-39
    Proficient Approach of Data Integrity Protection in Cloud Storage Using Regenerating Code
    Authors: Karthik N, S.Sivamohan
    Number of views: 373
  • 40-44
    Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
    Authors: Siva Ramakrishnan S,Vinoth Kumar P
    Number of views: 320
  • 45-50
    Study of Symmetric key Cryptography Algorithms
    Authors: Rejani.R Deepu,V. Krishnan
    Number of views: 445
  • 51-54
    Bundle Security Protocol of Space DTNs Using Cryptographic Algorithm
    Authors: E.Mukundhan,R.Veeramani
    Number of views: 338
  • 55-59
    Enabling Data Privacy and Data Confidentiality on Database
    Authors: Vinodh Kumar.J, Sivamohan.S
    Number of views: 308
  • 60-65
    Captcha as Graphical Password Using Carp Technique
    Authors: Mr.T.Kumesh(Assistant Professor), Amala Rani.S
    Number of views: 525
  • 66-71
    Privacy Preserving Health Monitoring Data Using a Proxy Re-encryption
    Authors: Lakshmipriya.V, Praveena.V(Assistant Professor)
    Number of views: 268
  • 72-80
    Honey Pot Based Network Architecture For Key loggers Detection
    Authors: Ms.C.Sathya, Mr.R.B.Saroo Raj
    Number of views: 327
  • 81-86
    Lung Segmentation for Tuberculosis by Using Active Appearance Model (AAM) In Chest Radiographs
    Authors: S.Syeda Khatija kubra,P.murugan
    Number of views: 302
  • 87-90
    Hashing Heterogeneity Aware Dynamic Capacity Provisioning in the Cloud
    Authors: Vinoth Kumar.P,Sujitha.M
    Number of views: 245
  • 91-95
    A Customized Filter to apply on Online Social Network (OSN) user walls
    Authors: Priya.K, Mr.R.Jayaraj (Asst. Professor)
    Number of views: 260
  • 96-102
    Dynamic Resource Recovery in Grid
    Authors: Malika.K.S, MRS.V.Elavarasi
    Number of views: 237
  • 103-108
    Intellect Face Recognition With Structurally Measures Hankel Matrix Decomposition
    Authors: Ramkumar.G, S.P Maniraj (Assistant Professor)
    Number of views: 291
  • 109-113
    IMPROVING THE ATTACK DETECTION ACCURACY USING HLA IN WIRELESS AD HOC NETWORK
    Authors: Veeramani.R(Assistant Professor), Sindhu Bharathy.B
    Number of views: 289
  • 114-120
    Context Representation and Maximize Power Efficiency in Mobile Sensing
    Authors: S.N.Nandhini, Mr.R. Augustian Issac
    Number of views: 219
  • 121-127
    Adjustment of the Force Transmissibility of a SDOF Vibrating System; Part II: Fraction Transmissibility
    Authors: Galal Ali Hassaan
    Number of views: 443
  • 128-141
    An Improved Search Algorithm for Resource Allocation in Cloud Databases
    Authors: Radhya Sahal, Sherif M. Khattab, Fatma A. Omara
    Number of views: 264
  • 142-155
    DynMR: A Dynamic Slot Allocation Framework for MapReduce Clusters in Big Data Management using DHSA and SEPB
    Authors: Anil Sagar T, Ramakrishna V Moni
    Number of views: 309
  • 156-162
    Authentication With Enhanced Privacy Using File Stream Sequencing Technique
    Authors: Manikandan.R, R.J.Poovaraghan
    Number of views: 275
  • 163-165
    Voice morphing
    Authors: Ms.P V Gujarathi , Mrs.S S Dinde
    Number of views: 313
  • 166-169
    Using Image Processing for Detecting Defects in Printed Circuit Board
    Authors: Sonal D Kalro, Meghashree B S, Prathiksha B G, Suhasini A,Dr.H D Phaneendra
    Number of views: 438
  • 170-175
    Tuning Condition Modification of Damped and Un-damped Adaptive Vibration Absorber
    Authors: Mohammed Abdel-Hafiz, Galal Ali Hassaan
    Number of views: 251


1 2  Следующая страница  В конец
© 2013-2017, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us