Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Drugs in Context
INMATEH - Agricultural Engineering
Animal Research International
International Journal of Emotional Education



Register Journal



Visitors Counter

TodayToday
1103
YesterdayYesterday
1361
This weekThis week
2464
Last WeekLast week
12540
This monthThis month
35896
Last monthLast month
43360
All daysAll days
5812182

International Journal of Computer Techniques

Number Vol3Issue2, 2016

  • 1-14
    Aggregate Estimation in Hidden Databases with Checkbox Interfaces
    Authors: - IJCTR .Navin kumar, Mohamed Faseel.VK
    Number of views: 240
  • 1-14
    Mechanical Engineering in Ancient Egypt: Part VI: Jewellery Industry (Royal crowns and Headdresses from 19th to 30th Dynasties)
    Authors: - IJCTGalal Hassaan
    Number of views: 441
  • 1-5
    The Encryption Algorithm Based on Principal Component Analysis of Times Series
    Authors: - IJCTXiao Bin-bin ,Jiang Xiao-qi
    Number of views: 289
  • 1-6
    Machine Learning For Real Estate Contracts Automatic Categorization of Text
    Authors: - IJCTC.Mani, J.Jayasudha
    Number of views: 264
  • 1-9
    Human Action Recognition Based on the Adaptive Weighted Dynamic Time Warping Algorithm
    Authors: - IJCTZhaoLiang Li,QingFeng Zhang,WenTian Huang
    Number of views: 287
  • 1-5
    Emerging Trends in Social Media
    Authors: - IJCTJingqian Zhang, Sung Wook Han, Jiarui Chang
    Number of views: 439
  • 1-7
    Visualization of Association Relation and its Application in Tax Field
    Authors: - IJCTLiang Wu,MingXin He
    Number of views: 215
  • 1-8
    Personalized Expense Managing Assistant Using Android
    Authors: - IJCTN.ZahiraJahan, K.I.Vinodhini
    Number of views: 2162
  • 1-8
    Use of Unsupervised Clustering to Characterize Graduate Students Profiles based on Educational Outcomes
    Authors: - IJCTLotfi Najdi, Dr. Brahim Er-Raha
    Number of views: 336
  • 1-5
    Artificial Intelligence for Document Segregation
    Authors: - IJCTC.Navamani., Naveendiran.K
    Number of views: 393
  • 1-8
    Online City Scale Taxi Ridesharing
    Authors: - IJCTC.Navamani, M.Srimathi
    Number of views: 230
  • 1-6
    —Storage Refuge, Provable Data Possession, Interactive Protocol, Zero-knowledge, Multiple Cloud, Co-operative.
    Authors: - IJCTN.ZahiraJahan, R.Vinodhini
    Number of views: 251
  • 1-8
    Machine Learning For Real Estate Contract-Entity Recognition Using Search Engine
    Authors: - IJCTC. Navamani, J.Sindhuja
    Number of views: 319
  • 1-7
    Attribute-based Encryption with Decryption and Revocation Outsource in Cloud Environment
    Authors: - IJCTLixian Liu, Guowei Wu
    Number of views: 262
  • 1-5
    Cluster-Based License Revocation With Vindication Ability For Mobile Ad Hoc Networks
    Authors: - IJCTS.Jagadeesan, A.Mohan
    Number of views: 242
  • 1-5
    Review Paper: Hybrid Amplifiers in FSO System
    Authors: - IJCTS.Jagadeesan, A.Mohan
    Number of views: 482
  • 1-9
    Molecular dynamics Parallel simulation of Carbon Nanotubes based on GPU
    Authors: - IJCTSheng Lai, Xiaohua Meng, Dongqin Zheng
    Number of views: 221
  • 1-8
    An Optimal Approach for Secure and Energy Efficient Data Transfer in WSN using Hierarchical and Dynamic Elliptic Curve Cryptosystem
    Authors: - IJCTO. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. Jenifer
    Number of views: 238
  • 1-5
    Design and Analysis of Patch Antenna for Wire-Less Applications
    Authors: - IJCTGidijala Sai Kumar,Gadiraju Mounika, Dusi Leela Rani, K.T.P.S.Kumar
    Number of views: 258
  • 1-5
    Comparative Analysis of Gateway Placement Approaches for Wireless Mesh Network
    Authors: - IJCTSwati Govil, Dr.Paramjeet Rawat
    Number of views: 249
  • 1-6
    A New Approach For Reducing Routing Overhead In MANET
    Authors: - IJCTShraddha Dabhade, Shilpa Verma
    Number of views: 282
  • 1-7
    Design of Full Adder in 180nm Technology Using TG and Adiabatic Logic
    Authors: - IJCTBaljinder Kaur
    Number of views: 425
  • 1-5
    Time multiplexing CNN simulator using RK7(5)
    Authors: - IJCTOsama H. Abdelwahed, M. El-Sayed Wahed
    Number of views: 258
  • 1-8
    Unprivileged Black-Box Detection of User-Space Key loggers
    Authors: - IJCTMr.S.Jagadeesan,S.Rubiya
    Number of views: 343
  • 1-5
    Role of Data Mining Techniques in Human Disease Diagnosis
    Authors: - IJCTSunny Sharma
    Number of views: 261
  • 1-6
    A Detailed Analysis of Lossless Image Compression Techniques
    Authors: - IJCTPalwinder Singh
    Number of views: 245
  • 1-6
    An Experimental Analysis of pair programming
    Authors: - IJCTKulbirKaur, AnureetKaur
    Number of views: 216
  • 1-4
    Information Security Management of an organization with a focus on Human perspective
    Authors: - IJCTKarandeep Kaur
    Number of views: 402
  • 1-4
    Machine Learning Spectrum for Web Data Analytics
    Authors: - IJCTSunny Sharma
    Number of views: 225
  • 1-8
    A Comprehensive Review on Multi-Objective Optimization Using Genetic Algorithms
    Authors: - IJCTAmarbir Singh
    Number of views: 259
  • 1-6
    Analysis of Various Tools in Big Data Scenario
    Authors: - IJCTAmarbir Singh,Palwinder Singh
    Number of views: 249
  • 1-3
    An evaluation of selective security issues in Internet of Things based on Cloud
    Authors: - IJCTKarandeep Kaur
    Number of views: 251
  • 1-8
    Speckle Reduction Techniques for Ultrasound Images
    Authors: - IJCTPalwinder Singh
    Number of views: 339
  • 1-6
    Framework for Evaluation of Academic Website
    Authors: - IJCTKalpana Devi, Aman Kumar Sharma
    Number of views: 241
  • 1-7
    Taxonomy of Cross-Platform Mobile Applications Development Tools
    Authors: - IJCTAmarbir Singh
    Number of views: 331
  • 1-5
    Ultrasound-Image De-noising Technique’s best mix selection using Genetic Algorithm Approach
    Authors: - IJCTAmritpal Singh, Prithvipal Singh
    Number of views: 238

Number Vol3Issue1, 2016

  • 1-5
    Load balancing with Modify Approach
    Authors: - IJCTRanjan Kumar Mondal, Enakshmi Nandi, Payel Ray, Debabrata Sarddar
    Number of views: 265
  • 1-8
    Missing Value Imputation Based on MINNS-SVM
    Authors: - IJCTXueLing Chan, YanjunZhong,YujuanQuan
    Number of views: 301
  • 1-11
    Improve hop-by-hop message authentication using GECC algorithms
    Authors: - IJCTK.E. Eswari, R.G.Subarna
    Number of views: 258
  • 1-11
    End-To-End Routing Analysis Through Greedy Forwarding In Wireless Sensor Networks With High Quality Links
    Authors: - IJCTN.ZahiraJahan, S.R.Dhanapriya
    Number of views: 288
  • 1-4
    Method to Automate Tender System With Calculation of Best Bidderunder E-Governance
    Authors: - IJCTJ.R.Yemul , Aishwarya Badkundri ,Sayali Chaudhari ,VaradaDatar
    Number of views: 278
  • 1-9
    Optimal Routing and Energy Allocation for Lifetime Maximization of Wireless Sensor Networks With Nonideal Batteries
    Authors: - IJCTR.Navin Kumar, P.Mohanapriya
    Number of views: 299
  • 1-9
    Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
    Authors: - IJCTK.E.Eswari , V.Thamayanthi
    Number of views: 265
  • 1-10
    A Result Paper On Mall Shopping System Using NFC
    Authors: - IJCTJayesh B Mahajan, Bhagwat Kakde
    Number of views: 297
  • 1-4
    Face Detection - A Literature Survey
    Authors: - IJCTKavi Dilip Pandya
    Number of views: 740

Number Vol2Issue6, 2015

  • 1-7
    Multiple Outputs Techniques Evaluation for Arabic Character Recognition
    Authors: Zeyad Q. Al-Zaydi , Dr. Hisham Salam
    Number of views: 441
  • 1-7
    Strength Test Performance Modification MAX 400KG For Sports Measurement and Evaluation Digital Base
    Authors: - IJCTEndang Rini Sukamti, Siswantoyo,Herlambang Sigit P,Sb. Pranatahadi, Guntur
    Number of views: 308
  • 1-7
    Synthesis of Planar Mechanisms, Part IX: Path Generation using 6 Bar � 2 Sliders Mechanism
    Authors: - IJCTGalal Ali Hassaan
    Number of views: 389
  • 1-11
    Resilience of Various Attacks on Watermarks Using Hybrid Video Watermarking Algorithm
    Authors: - IJCTC.N.Sujatha , Dr. P. Satyanarayana
    Number of views: 239
  • 1-4
    Unary Association Rules Survey of Mining Services
    Authors: - IJCTP.Padmapriya, R.Kalpana
    Number of views: 217
  • 1-10
    Query authentication based on Apriori algorithm in outsourcing spatial database
    Authors: - IJCTYaolongShi ,QingqingGan
    Number of views: 246
  • 8-12
    An Essential Guide to Automated GUI Testing Of Android Mobile Applications
    Authors: Anureet Kaur
    Number of views: 242

Number Vol2Issue5, 2015

  • 1-5
    Learning Media Introduction of Yogyakarta Culture For Early Childhood 2-3 Years
    Authors: Lisna Zahrotun, Yana Hendriana, Damba Saputra
    Number of views: 417
  • 6-19
    Image Compression Using Hybrid Combinations of DCT SVD and RLE
    Authors: Raghavendra.M.J , Dr.Prasantha .H.S , Dr.S.Sandya
    Number of views: 412
  • 20-26
    A Survey of ETL Tool
    Authors: Mr. Nilesh Mali, Mr.SachinBojewar
    Number of views: 692
  • 27-29
    Towards measuring learner's concentration in E-learning systems
    Authors: Saoutarrih Marouane, Sedrat Najlaa, Tahiri Abderrahim , Elkadiri Kamal Eddine
    Number of views: 430
  • 30-33
    A Study on Behavioral Malware Detection by Using Delay Tolerant Networks
    Authors: K.Ravikumar,V. Vinothkumar
    Number of views: 419
  • 34-36
    Sybil Belief: A Semi- Creation New Approach for Structure - Based Sybil Detection
    Authors: K.Ravikumar, B. Selvam
    Number of views: 398
  • 37-39
    Multi Agent System in Distributed Agent Network
    Authors: K.Ravikumar, A. Surendar
    Number of views: 409
  • 40-43
    Analysis to Online Stock for Decision Approach of Investor
    Authors: G.Magesh , S. Saradha
    Number of views: 401
  • 44-52
    Cluster Ensemble Approach for Clustering Mixed Data
    Authors: Honorine Mutazinda A,Mary Sowjanya ,O.Mrudula
    Number of views: 445
  • 52-60
    An Improved Collaborative Filtering Algorithm Based on Tags and User Ratings
    Authors: CaiyunGuo, HuijinWang
    Number of views: 425
  • 61-66
    Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks
    Authors: Hadi Ghadimkhani, Ali Habiboghli, Rouhollah Mostafaei
    Number of views: 443
  • 67-71
    Vibration Analysis of a Horizontal Washing Machine, Part IV: Optimal Damped Vibration Absorber
    Authors: Galal Ali Hassaan
    Number of views: 452
  • 72-76
    Prediction of Heart Disease Using Enhanced Association Rule Based Algorithm
    Authors: Karandeep Kaur, Ms. Poonamdeep Kaur, Ms. Lovepreet Kaur
    Number of views: 431
  • 77-80
    Enhancing Security in Wireless Sensor Network Using Load Balanced Data Aggregation Tree Approach
    Authors: A.Senthilkumar, K. Madhurabhasini
    Number of views: 386
  • 81-83
    Online Shopping Product Aspect and Ranking Using Support Vector Machine Algorithm
    Authors: R. Bharathi
    Number of views: 514
  • 84-88
    Resilient Key Sharing Approach Based on Multimode Authentication Scheme
    Authors: A.Senthilkumar , R.Divya
    Number of views: 402
  • 89-92
    Secure Multiparty Computation on Multiple Clouds
    Authors: K.Ravikumar, S. Thamizharasi
    Number of views: 354
  • 93-97
    A Survey on Log Mining: A Data Mining Approach for Intrusion Detection
    Authors: Smita P. Bhapkar, Shubhangi S. Dhamane, Yogita S. Kandekar, Khushbu S. Lodha
    Number of views: 397
  • 98-102
    Bluetooth Message Hopping Chat Application
    Authors: Kirti Karande, Ibrahim Shaikh, Tanzeel Shaikh, Hardik Vaghela
    Number of views: 421
  • 103-110
    Urbain Traffic Congestion Estimating Using Simplified CRONOS Model: Algorithm and Implementation
    Authors: Abdallah Lakhouili , Hicham Medromi , El Hassan Essoufi
    Number of views: 425

Number Vol2Issue4, 2015

  • 1-5
    Discrete Wavelet Transform-based Satellite Image Resolution Enhancement Method
    Authors: Saudagar Arshed Salim , Prof. Mr. Vinod Shinde
    Number of views: 457
  • 6-24
    Using change point analysis to determine perception accuracyinsocial media opinions
    Authors: Philip Sallis , William Claster
    Number of views: 451
  • 25-31
    Analysis of RSA and ELGAMAL Algorithm for Wireless Sensor Network
    Authors: Surekha J; Anita Madona M
    Number of views: 531
  • 32-39
    Evolving a Ultra-Flow Software Development Life Cycle Model
    Authors: Divya G.R.*, Kavitha S.**
    Number of views: 445
  • 40-46
    Design and Analysis of Recommender System for Business Data
    Authors: Prabhat Kumar , Dr. KiranJyoti
    Number of views: 450
  • 54-59
    A Case Study for Traffic Control Signal at Four-Way Intersection Road
    Authors: Kamlesh Kumar Pandey; Rajat Kumar Yadu; Pradeep Kumar Shukla; Narendra Pradhan
    Number of views: 1084
  • 60-66
    Design and Implementation of Obstetrical Central Station Client Based on Android
    Authors: Huijin Wang, Chao Han
    Number of views: 418
  • 67-70
    Filling the database with application of protocol buffers
    Authors: Bulat Umurzakov, Naila Maksutkaliyeva
    Number of views: 425
  • 71-73
    Feasible Path finding for different transport modality using A-Star algorithm
    Authors: Vemula Divya,Dr. G. Venkatarami Reddy
    Number of views: 387
  • 74-79
    An Information Exchange Model Based on HL7 v3 and Ontology in the Public Health Emergency Alarm System
    Authors: Ya-ju Zhang, Zhan Huang
    Number of views: 462
  • 80-85
    Multimodal Biometrics System Based on Sliding Neighborhood Operation, FAST Features, Region Properties
    Authors: Swapnali G. Garud, Ravindra A. Nikam
    Number of views: 409
  • 86-89
    The Design and Implementation of Dynamic Printing Based on Fast Report
    Authors: XiaoDong Lv,HuiJin Wang
    Number of views: 512
  • 90-95
    Disturbance Rejection Associated with a Highly Oscillating Second-order-like Process; Part I: Feedforward Second-order Compensator
    Authors: Galal Ali Hassaan
    Number of views: 413
  • 96-99
    UWB Microwave Signal Components Estimation in Various Mediums
    Authors: Sabiapreet Bedi ,Sandeep Kaushal
    Number of views: 482


 В начало  Предыдущая страница  1 2 3 4 5  Следующая страница  В конец
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us