Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

International Journal of Engineering Research and General Science
Animal Research International
International Journal of Intelligent Engineering and Systems
Drugs in Context



Register Journal



Visitors Counter

TodayToday
747
YesterdayYesterday
2079
This weekThis week
10549
Last WeekLast week
12540
This monthThis month
43981
Last monthLast month
43360
All daysAll days
5820267

International Journal of Computer Techniques

Number Vol3Issue6, 2016

  • 1-4
    Congestion Control and Avoidance Using TCP-VEGAS in Adhoc Social Network
    Authors: - IJCTE.Praisy , C.Gopala krishnan
    Number of views: 248
  • 5-11
    Detecting and Analyzing Password Database crack Using Honeyindex
    Authors: - IJCTPriyanka Anil Ghule, Prof. Sonali Bhutad
    Number of views: 310
  • 12-16
    Distributed database system on web server: A Review
    Authors: - IJCTKirandeep kaur, Harwant Singh
    Number of views: 373
  • 17-22
    Exploiting Semantic Web Technology for Personalized Recommendation System
    Authors: - IJCTPreeti Deshmukh, Shivani Deosthale, Lukesh Kadu
    Number of views: 302
  • 23-29
    Toward Instantaneous Facial Expression Recognition Using Privileged Information
    Authors: - IJCTMichele Mukeshimana, Xiaojuan Ban, Yitong Li
    Number of views: 226
  • 30-34
    Secure Data Aggregation Using Multi objective Metaheuristic Approach for WSN
    Authors: - IJCT Jaybhaye Chaitali ,P.M.Pawar
    Number of views: 303
  • 51-62
    Design Optimization of Planar Mechanisms
    Authors: - Dr. Kailash Chaudhary
    Number of views: 250
  • 63-69
    An Extensive Survey on Edge Detection Techniques
    Authors: - Dr. Ruksar Fatima, Prof. Feroza.D.Mirajkar, Prof. Hashmathunissa Begum, Prof .Ashwini.S.Math
    Number of views: 238
  • 70-74
    Streamlined Traffic Control System for the Urban Cities in Misamis Oriental
    Authors: - Marjun S. Sequera ,Darwin Aboc ,Melchor Abrogatal Jr. , Leojean Amolong ,Keene Zernan Alviola ,Louie Sumile
    Number of views: 254
  • 75-85
    Mechanical Engineering in Ancient Egypt, Part 57: Footwear Industry
    Authors: - Galal Ali Hassaan
    Number of views: 277
  • 90-96
    A Review on Advance Welding Processes
    Authors: - Dr. Kailash Chaudhary
    Number of views: 293
  • 97-101
    Seebeck Constant of Modified CuZnferrite Study
    Authors: - Edie Sasito Sarwodidoyo , Rachmad ImbangTritjahjono
    Number of views: 262
  • 102-106
    CFD Analysis of Shell and Tube Heat Exchanger for Heat Transfer Capabilities
    Authors: - Mr.Santosh K Katarki ,Mr. Anandkumar S Malipatil
    Number of views: 359
  • 107-110
    Implication of Virtualization and Cloud Computing in Technical Education
    Authors: - Upendra Singh , Prashant Kumar Baheti
    Number of views: 236
  • 111-117
    Process Automation: A Case of Analogue Signal Conditioning using Variable Frequency Drive Controller
    Authors: - Camilo Jose S. Salvana111
    Number of views: 292
  • 118-126
    Anaerobic Co-Digestion of Agricultural Biomass waste for Biogas Production
    Authors: - Antonio-Abdu Sami M. Magomnang , Sergio C. Capareda, Eliseo P. Villanueva
    Number of views: 238
  • 127-131
    Design and Development of an Automated Food Cart for Small-Scale Restaurant: An Experimental Prototyping
    Authors: - Christine Marie J. Madrid
    Number of views: 231
  • 132-135
    Development of an RFID Automated Baggage Counter
    Authors: - Raymund Ray Saldua
    Number of views: 230
  • 136-143
    Optimization of an Innovative Gaseous and Particulates Monitoring Device of Air Quality Set within National Ambient Air Quality Standards (NAAQS) in the Barangay of Villanueva, Misamis Oriental
    Authors: - Kathleen E. Padrigalan , Erich P. Abad , Jay E.salvador
    Number of views: 253
  • 144-149
    Utilizer-Accommodation Rating Prognostication by Exploring Gregarious User's Rating Comportments
    Authors: - Mohammad Naheed Tabasum ,Ramchandar Rao , I. Narasimha Rao
    Number of views: 237
  • 150-154
    Attribute Based Hybrid Encryption With Data Sharing in Cloud Computing Using Circuit Ciphertext-Policy
    Authors: - Addagatla.Shwetha , M.Sridevi
    Number of views: 211
  • 155-159
    Aggressive Hash Table Predicated Social Analyze for Defended Cloud Cache
    Authors: - Sainni Usharani , M.Sridevi
    Number of views: 224
  • 160-165
    Rep-Oriented Data Uploading and Remote Integrity Check in Cloud Based on Identity
    Authors: - Donthu Prashanthi , M.Sridevi
    Number of views: 239
  • 166-171
    Cost Optimization Case Study for Online Social Networks Ongeo-Istributed Clouds
    Authors: - Chirumamilla.Mamata ,M.Sridevi
    Number of views: 230

Number Vol3Issue5, 2016

  • 1-5
    A Review of Image Segmentation of Underwater Images Using Fuzzy C- Means Clustering
    Authors: - IJCTVikram Dwivedi ,Dr. Paresh Rawat
    Number of views: 270
  • 1-4
    Congestion Control and Avoidance Using TCP-VEGAS in Adhoc Social Network
    Authors: - IJCTE.Praisy , C.Gopala krishnan
    Number of views: 309
  • 6-12
    Recycling Organic Waste
    Authors: - IJCTMs. Akila .S, Ms. Siva sankari A.
    Number of views: 259
  • 13-19
    Theft Alert System and Auto Arresting System for Museums or Jewellery Shop
    Authors: - IJCTMs. Kalpanagayathri M.,Mrs. Sangeetha Lakshmi G.
    Number of views: 1497
  • 20-28
    A Location- and Diversity-Aware News Feed System for Mobile Users
    Authors: - IJCTMs. Sangeetha .R, Mrs. Sangeetha Lakshmi G.
    Number of views: 371
  • 29-32
    Image Set Creation Using Different Image Enhancement Technique for Underwater Image Segmentation
    Authors: - IJCTVikram Dwivedi , Dr. Paresh Rawat , Nashrah Fatima
    Number of views: 267
  • 33-36
    Implementation of PSO & HB Image Enhancement Techniques For Tumor Detection
    Authors: - IJCTNisha Kumari Dogra , Maninder Kaur
    Number of views: 272
  • 33-36
    A Novel Approach to Resist Shoulder Surfing Attack
    Authors: - IJCTSmitesh salian, Shivani Deosthale , Kranti Ghag
    Number of views: 350
  • 37-43
    Image Steganography using IWT along with AES Encryption
    Authors: - IJCTSamruddhi Yadav, Prof.Swati Deshpande , Prof.Smita Bansod
    Number of views: 400
  • 44-52
    A Novel Method of Gradient-Based Illumination Invariant Face Recognition
    Authors: - IJCTKong Rui , Cheng Lin ,Jie Yingda
    Number of views: 281
  • 52-56
    Analysis of Big Data Processing Using Data Mining
    Authors: - IJCTShashank Dubey ,Vidya Chitre
    Number of views: 280

Number Vol3Issue4, 2016

  • 1-5
    Review of Map Reduce Scheduling Algorithms
    Authors: - IJCTAnusha Itnal , Sujata Umarani
    Number of views: 387
  • 1-5
    A New Digital Investigation Frameworks Comparison Method
    Authors: - IJCTOmrani Takwa,Chibani Rhaimi Belgacem,Dallali Adel
    Number of views: 387
  • 1-10
    Concepts for the Model-Driven Generation of Graphical Editors in Eclipse by Using the Graphiti Framework
    Authors: - IJCTMarkus Gerhart, Marko Boger
    Number of views: 228
  • 1-5
    An Industrial Employee Development Application Protocol Using Wireless Sensor Networks
    Authors: - IJCTN.Roja Ramani, A.Stenila
    Number of views: 258
  • 1-4
    Mobile APP Recommendation and Discovery of Ranking in Multivariate Time Series
    Authors: - IJCTS.Baskaran, V.Anita Shyni
    Number of views: 245
  • 1-5
    Design and Development of Solar based Power Maximization using Solar Tracking System
    Authors: - IJCTBhavana Gujarkar,S.M.Borkar
    Number of views: 268
  • 1-6
    Software Program Plagiarism Detection Using Longest Common Subsequence Method
    Authors: - IJCTMahalakshmi S, Kavitha S
    Number of views: 746
  • 1-9
    Intelligent Automated Sliding Door Robot Control System
    Authors: - IJCTMrs. Sangeetha Lakshmi .G, Ms. Arun kumari .G
    Number of views: 1160
  • 1-9
    Head Movements Based Control of an Intelligent Wheelchair in a Street Environment
    Authors: - IJCTMs. Sivasankari. A, Mrs. Kavitha .S.K
    Number of views: 508
  • 1-9
    Software Susceptibility Forecast Using Attribute Subset Collection and Support Vector Machine
    Authors: - IJCTMs. Asma Banu R., Mrs. Shoba S. A
    Number of views: 247
  • 1-8
    Evaluation of IDE Debugging Tools: ECLIPSE VS NETBEANS
    Authors: - IJCTMrs. Komathi A, Mrs. Shoba. S. A.,
    Number of views: 464
  • 1-9
    Dynamic Intrusion Analysis and Imprecise Information Breakthrough of Manet
    Authors: - IJCTMrs. Sandhiya V., Ms. Abarna N.
    Number of views: 222
  • 1-10
    Least Frequent Sip Proxy Based VOIP Using DNS Caching for DOS
    Authors: - IJCTMs. Swathi G.,Ms. Abarna N.
    Number of views: 246
  • 1-8
    Automatic Test Packet Generation
    Authors: - IJCTMrs. Vidhya A., Ms. Abarna N.
    Number of views: 351
  • 1-4
    Tamil Language Support for the Open Source Operating System
    Authors: - IJCTK.Ravi Kumar, P.Karthik.
    Number of views: 630
  • 1-4
    Attacks Identification Detections Based on Disruption Tolerant Networks
    Authors: - IJCTA.Senthil Kumar, R.Sathya.
    Number of views: 233
  • 1-6
    A Review and Survey on IOT Techniques for Automating Devices
    Authors: - IJCTRachel Hannah ,Praveen Jayasankar ,Prashanth Jayaraman.
    Number of views: 224
  • 1-8
    A Detection Model For SQL Attacks
    Authors: - IJCTMs. Sangeetha .R, Mrs. Sangeetha Lakshmi G.
    Number of views: 253
  • 1-9
    Smart Theft Alert For Android Based Devices
    Authors: - IJCTMrs. Sharmila K., Ms. Sivasankari A.
    Number of views: 510
  • 1-7
    A Smart Mobile Apps For Blind User
    Authors: - IJCTMs. Kalpanagayathri M., Ms. Sangeetha Lakshmi G.
    Number of views: 233
  • 1-14
    Signature Verification Through Smartphones
    Authors: - IJCTMs. Akila .S, Ms. Siva sankari A.
    Number of views: 228
  • 1-8
    Comparative Study on Wireless Sensor Network Integrated With Cloud Computing Using Middleware Services
    Authors: - IJCTMrs. Elavarasi J, Ms. Lavanya S.
    Number of views: 285
  • 1-7
    Mechanical Engineering in Ancient Egypt: Part XVII: Ladies Headdress in the Old, Middle Kingdoms, Third Intermediate and Late Periods
    Authors: - IJCTGalal Ali Hassaan.
    Number of views: 350
  • 1-8
    Performance Analysis of Hybrid Mechanism to Improve Reliability in Wireless Sensor Network
    Authors: - IJCTMs. Ramya R, Ms. Lavanya S.
    Number of views: 311
  • 1-6
    Method of Image Block Denoising Based on Adaptive Total Variation
    Authors: - IJCTPAN Jinquan, CHEN Shun'er, FENG Yuanhua, LIU Weiping.
    Number of views: 267
  • 1-6
    Shortest Path Based Dynamic Route Adjustment Scheme for Data Collection in a Wireless Sensor Network with a Multiple Mobile Sink
    Authors: - IJCTSanjana B.M , Vikas C. Yatnalli.
    Number of views: 249
  • 1-9
    Neural Networks for Location Prediction in Mobile Networks in AES Techniques
    Authors: - IJCTPavithra R , Shahin A.
    Number of views: 230
  • 1-7
    Robot Based Wireless Monitoring and Safety System for Human Detection in Rescue Operation of Disaster
    Authors: - IJCTMs. Sivasankari A.,Ms. Deepika R.
    Number of views: 236
  • 1-9
    WAR Field Spying Robot Dissertation
    Authors: - IJCTMrs. Sangeetha Lakshmi G, Ms. Nisha .S
    Number of views: 913
  • 1-7
    Wild Animal Monitoring Using Sensor Networks
    Authors: - IJCTMrs. Sharmila K., Ms. Sivasankari A.
    Number of views: 452

Number Vol3Issue3, 2016

  • 1-7
    Exponential Stabilization of the Coupled Dynamical Neural Networks with Nodes of Different Dimensions and Time Delays
    Authors: - IJCTJieyin Mai, Xiaojun Li
    Number of views: 245
  • 1-4
    Role of Cloud Computing in Bioinformatics
    Authors: - IJCTSunny Sharma, Karandeep Kaur, Amritpal Singh
    Number of views: 472
  • 1-5
    Domain Specific (Performance Perspective) Considerations of Cloud Computing
    Authors: - IJCTPrithvipal Singh, Sunny Sharma, Amritpal Singh, Karandeep Kaur
    Number of views: 230
  • 1-4
    Boiler Monitoring in Power Plant Using Internet of Things
    Authors: - IJCTL.Navaneeth M.E, V.Rukkumani
    Number of views: 294
  • 1-8
    Vampire Attacks: Detection And Prevention
    Authors: - IJCTDevikarani Roy, Shilpa Verma
    Number of views: 435
  • 1-7
    Efficient Routing and Congestion Control in Multi-Flow MANET Environment
    Authors: - IJCTAlok Kumar Dwivedi, Gouri Sankar Prajapati
    Number of views: 287
  • 1-15
    Zeta - A Set of Textual DSLs to Define Graphical DSLs
    Authors: - IJCTMarkus Gerhart, Marko Boger
    Number of views: 256
  • 1-5
    Minimizing the Test Packet Failures by Applying Threshold on Test Packet Generation in Debugging and Network Testing
    Authors: - IJCTP. Anjaneyulu, T. Venkata Naga Jayudu
    Number of views: 236
  • 1-4
    Databases in Cloud Computing Architecture using Oracle
    Authors: - IJCTIonut Taranu, Manole Velicanu, Adela Bara
    Number of views: 247
  • 1-5
    Efficient Density Based Clustering of Tweets and Sentimental Analysis Based on Segmentation
    Authors: - IJCTAnumolBabu, Rose V Pattani
    Number of views: 266

Number Vol3Issue2, 2016

  • 1-14
    Aggregate Estimation in Hidden Databases with Checkbox Interfaces
    Authors: - IJCTR .Navin kumar, Mohamed Faseel.VK
    Number of views: 243
  • 1-14
    Mechanical Engineering in Ancient Egypt: Part VI: Jewellery Industry (Royal crowns and Headdresses from 19th to 30th Dynasties)
    Authors: - IJCTGalal Hassaan
    Number of views: 443
  • 1-5
    The Encryption Algorithm Based on Principal Component Analysis of Times Series
    Authors: - IJCTXiao Bin-bin ,Jiang Xiao-qi
    Number of views: 291
  • 1-6
    Machine Learning For Real Estate Contracts Automatic Categorization of Text
    Authors: - IJCTC.Mani, J.Jayasudha
    Number of views: 266
  • 1-9
    Human Action Recognition Based on the Adaptive Weighted Dynamic Time Warping Algorithm
    Authors: - IJCTZhaoLiang Li,QingFeng Zhang,WenTian Huang
    Number of views: 289
  • 1-5
    Emerging Trends in Social Media
    Authors: - IJCTJingqian Zhang, Sung Wook Han, Jiarui Chang
    Number of views: 442
  • 1-7
    Visualization of Association Relation and its Application in Tax Field
    Authors: - IJCTLiang Wu,MingXin He
    Number of views: 217
  • 1-8
    Personalized Expense Managing Assistant Using Android
    Authors: - IJCTN.ZahiraJahan, K.I.Vinodhini
    Number of views: 2165
  • 1-8
    Use of Unsupervised Clustering to Characterize Graduate Students Profiles based on Educational Outcomes
    Authors: - IJCTLotfi Najdi, Dr. Brahim Er-Raha
    Number of views: 338
  • 1-5
    Artificial Intelligence for Document Segregation
    Authors: - IJCTC.Navamani., Naveendiran.K
    Number of views: 395
  • 1-8
    Online City Scale Taxi Ridesharing
    Authors: - IJCTC.Navamani, M.Srimathi
    Number of views: 232
  • 1-6
    —Storage Refuge, Provable Data Possession, Interactive Protocol, Zero-knowledge, Multiple Cloud, Co-operative.
    Authors: - IJCTN.ZahiraJahan, R.Vinodhini
    Number of views: 253
  • 1-8
    Machine Learning For Real Estate Contract-Entity Recognition Using Search Engine
    Authors: - IJCTC. Navamani, J.Sindhuja
    Number of views: 321
  • 1-7
    Attribute-based Encryption with Decryption and Revocation Outsource in Cloud Environment
    Authors: - IJCTLixian Liu, Guowei Wu
    Number of views: 264
  • 1-5
    Cluster-Based License Revocation With Vindication Ability For Mobile Ad Hoc Networks
    Authors: - IJCTS.Jagadeesan, A.Mohan
    Number of views: 244
  • 1-5
    Review Paper: Hybrid Amplifiers in FSO System
    Authors: - IJCTS.Jagadeesan, A.Mohan
    Number of views: 485
  • 1-9
    Molecular dynamics Parallel simulation of Carbon Nanotubes based on GPU
    Authors: - IJCTSheng Lai, Xiaohua Meng, Dongqin Zheng
    Number of views: 223
  • 1-8
    An Optimal Approach for Secure and Energy Efficient Data Transfer in WSN using Hierarchical and Dynamic Elliptic Curve Cryptosystem
    Authors: - IJCTO. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. Jenifer
    Number of views: 239
  • 1-5
    Design and Analysis of Patch Antenna for Wire-Less Applications
    Authors: - IJCTGidijala Sai Kumar,Gadiraju Mounika, Dusi Leela Rani, K.T.P.S.Kumar
    Number of views: 260
  • 1-5
    Comparative Analysis of Gateway Placement Approaches for Wireless Mesh Network
    Authors: - IJCTSwati Govil, Dr.Paramjeet Rawat
    Number of views: 251
  • 1-6
    A New Approach For Reducing Routing Overhead In MANET
    Authors: - IJCTShraddha Dabhade, Shilpa Verma
    Number of views: 284
  • 1-7
    Design of Full Adder in 180nm Technology Using TG and Adiabatic Logic
    Authors: - IJCTBaljinder Kaur
    Number of views: 427
  • 1-5
    Time multiplexing CNN simulator using RK7(5)
    Authors: - IJCTOsama H. Abdelwahed, M. El-Sayed Wahed
    Number of views: 260
  • 1-8
    Unprivileged Black-Box Detection of User-Space Key loggers
    Authors: - IJCTMr.S.Jagadeesan,S.Rubiya
    Number of views: 345
  • 1-5
    Role of Data Mining Techniques in Human Disease Diagnosis
    Authors: - IJCTSunny Sharma
    Number of views: 263
  • 1-6
    A Detailed Analysis of Lossless Image Compression Techniques
    Authors: - IJCTPalwinder Singh
    Number of views: 247
  • 1-6
    An Experimental Analysis of pair programming
    Authors: - IJCTKulbirKaur, AnureetKaur
    Number of views: 219
  • 1-4
    Information Security Management of an organization with a focus on Human perspective
    Authors: - IJCTKarandeep Kaur
    Number of views: 404
  • 1-4
    Machine Learning Spectrum for Web Data Analytics
    Authors: - IJCTSunny Sharma
    Number of views: 227
  • 1-8
    A Comprehensive Review on Multi-Objective Optimization Using Genetic Algorithms
    Authors: - IJCTAmarbir Singh
    Number of views: 262
  • 1-6
    Analysis of Various Tools in Big Data Scenario
    Authors: - IJCTAmarbir Singh,Palwinder Singh
    Number of views: 250
  • 1-3
    An evaluation of selective security issues in Internet of Things based on Cloud
    Authors: - IJCTKarandeep Kaur
    Number of views: 253
  • 1-8
    Speckle Reduction Techniques for Ultrasound Images
    Authors: - IJCTPalwinder Singh
    Number of views: 341
  • 1-6
    Framework for Evaluation of Academic Website
    Authors: - IJCTKalpana Devi, Aman Kumar Sharma
    Number of views: 244
  • 1-7
    Taxonomy of Cross-Platform Mobile Applications Development Tools
    Authors: - IJCTAmarbir Singh
    Number of views: 332
  • 1-5
    Ultrasound-Image De-noising Technique’s best mix selection using Genetic Algorithm Approach
    Authors: - IJCTAmritpal Singh, Prithvipal Singh
    Number of views: 240


1 2  Следующая страница  В конец
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us