Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

INMATEH - Agricultural Engineering
Animal Research International
Revista Ensayos Pedagógicos
Cell Journal (Yakhteh)



Register Journal



Visitors Counter

TodayToday
1267
YesterdayYesterday
1463
This weekThis week
6107
Last WeekLast week
9202
This monthThis month
26999
Last monthLast month
43360
All daysAll days
5803285

International Journal of Computer Techniques

Number Vol2Issue3, 2015

  • 1-5
    A Review on 3-D Digital Video Water Marking
    Authors: Ravi Kumar, Shweta Sharma
    Number of views: 571
  • 6-13
    Multifractal-Based Featuresfor Medical ImagesClassification
    Authors: Saad Al-Momen , Loay E. George , Raid K. Naji
    Number of views: 479
  • 14-18
    Social Properties Based Routing in Delay Tolerant Network
    Authors: Aliasger k. Dhilawala, Vishal shah
    Number of views: 453
  • 19-24
    Improving AASR protocol for Adversarial Environments in MANETS
    Authors: NiravKotadia and KeyurUpadhyay
    Number of views: 491
  • 25-32
    Synthesis of Planar Mechanisms, Part II: Specified Stroke, Time Ratio and Transmission Angle
    Authors: Galal Ali Hassaan
    Number of views: 504
  • 33-35
    Sensor Based Traffic Prediction and Accident Detection using GPS and GSM Technology
    Authors: Geetanjali Shintre, Gowrima E., Prabhudev R., Shilpa M.S,Mrs.Bhat Geetalaxmi Jayram(Associate Professor)
    Number of views: 485
  • 36-46
    Reducing Energy Consumption and extending WSN lifetime using CBEEPSS
    Authors: Priyanka M.Tambat, Arati M.Dixit
    Number of views: 451
  • 47-50
    Fast Premium Immediate Money Transfer Using Mobile Number
    Authors: Mahendra Deore,Priyanka Dharurkar,Lajawanti Lanjekar,Minal Chavan,Raksha Gound.
    Number of views: 477
  • 51-54
    E-learning in Distance Education using Cloud Computing
    Authors: Arshad Ali, Amit Bajpeye , Amit Kumar Srivastava
    Number of views: 507
  • 56-60
    Duplicate Record Detection in XML using AI Techniques
    Authors: Pradeep A and George T
    Number of views: 635
  • 61-67
    Click jacking Vulnerability Analysis and Providing Security against WEB Attacks Using White listing URL analyzer
    Authors: D.Kavitha, S.Ravikumar
    Number of views: 530
  • 68-71
    A Review OnGUI Implementation of Efficient Robust Digital Watermarking using 3-Discrete wavelet Technique
    Authors: Ravi Kumar,Garima Garg
    Number of views: 490
  • 72-77
    BER Evaluation of FSO Link for different Duty Cycles of RZ pulse in different conditions of Rainfall
    Authors: Er. Rajeev Thakur
    Number of views: 665
  • 78-85
    Optimization of Association Rules using Hybrid BPSO
    Authors: Jyotsana Dixit, Abha Choubey
    Number of views: 496
  • 86-89
    A Survey on Frequent Pattern Mining Methods Apriori, Eclat, FP growth
    Authors: Siddhrajsinh Solanki, Neha Soni
    Number of views: 828
  • 90-98
    Comparative Analysis and Implementation of DSDV and AODV Routing Protocol for MANET
    Authors: Snehal Goverdhan , Aakanksha Choubey
    Number of views: 432
  • 99-105
    Frequent itemset mining using eclat with relative profit and price
    Authors: Siddhrajsinh Solanki, Neha Soni
    Number of views: 590
  • 106-109
    Generation of Graph for APB via SPI Verification Using Trek
    Authors: Gowtham R, Govindaraj V
    Number of views: 529
  • 110-115
    Controller Tuning for Disturbance Rejection Associated with a Delayed Double Integrating Process, Part I: PD-PI Controller
    Authors: Galal Ali Hassaan
    Number of views: 503
  • 116-122
    An Efficient Algorithm for Identification of Most Valuable Itemsets from WebTransaction Log Data
    Authors: Litty Tressa George, Asha Rose Thomas
    Number of views: 495

Number Vol2Issue2, 2015

  • 1-6
    An Efficient Approach for Data Sharing in Cloud Computing Using Digital Signature
    Authors: Elayaraja.D,J.Caroline EL Fiorenza(Assistant Professor)
    Number of views: 397
  • 7-11
    Envisage The Lung Tumor Evolution In PET-CT Images During Radiotherapy
    Authors: M.Indra,G.Hariharan
    Number of views: 464
  • 12-19
    NEO WSN: Network Lifetime Enhancement with OSPFV3 Authentication Scheme in Wireless Sensor Networks
    Authors: Hema M, Natchadalingam R
    Number of views: 404
  • 20-22
    Role of Mobile Cloud Applications and Challenges in BYOD
    Authors: P.Soumya Sree Laxmi, K.Kala Bharathi,CH.Mary Pushpa
    Number of views: 435
  • 23-29
    Service Delegating Log Management-For Secure Logging In Cloud Environment
    Authors: -B.Sudha,Mr.S.ArunKumar
    Number of views: 995
  • 30-35
    Privacy Enhancing and Protected Distributed of Personal Health Record Using ABE
    Authors: Vijayakumar K,S.Sivamohan,(Assistant Professor)
    Number of views: 549
  • 36-39
    Proficient Approach of Data Integrity Protection in Cloud Storage Using Regenerating Code
    Authors: Karthik N, S.Sivamohan
    Number of views: 538
  • 40-44
    Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
    Authors: Siva Ramakrishnan S,Vinoth Kumar P
    Number of views: 491
  • 45-50
    Study of Symmetric key Cryptography Algorithms
    Authors: Rejani.R Deepu,V. Krishnan
    Number of views: 733
  • 51-54
    Bundle Security Protocol of Space DTNs Using Cryptographic Algorithm
    Authors: E.Mukundhan,R.Veeramani
    Number of views: 527
  • 55-59
    Enabling Data Privacy and Data Confidentiality on Database
    Authors: Vinodh Kumar.J, Sivamohan.S
    Number of views: 493
  • 60-65
    Captcha as Graphical Password Using Carp Technique
    Authors: Mr.T.Kumesh(Assistant Professor), Amala Rani.S
    Number of views: 717
  • 66-71
    Privacy Preserving Health Monitoring Data Using a Proxy Re-encryption
    Authors: Lakshmipriya.V, Praveena.V(Assistant Professor)
    Number of views: 436
  • 72-80
    Honey Pot Based Network Architecture For Key loggers Detection
    Authors: Ms.C.Sathya, Mr.R.B.Saroo Raj
    Number of views: 668
  • 81-86
    Lung Segmentation for Tuberculosis by Using Active Appearance Model (AAM) In Chest Radiographs
    Authors: S.Syeda Khatija kubra,P.murugan
    Number of views: 529
  • 87-90
    Hashing Heterogeneity Aware Dynamic Capacity Provisioning in the Cloud
    Authors: Vinoth Kumar.P,Sujitha.M
    Number of views: 457
  • 91-95
    A Customized Filter to apply on Online Social Network (OSN) user walls
    Authors: Priya.K, Mr.R.Jayaraj (Asst. Professor)
    Number of views: 443
  • 96-102
    Dynamic Resource Recovery in Grid
    Authors: Malika.K.S, MRS.V.Elavarasi
    Number of views: 416
  • 103-108
    Intellect Face Recognition With Structurally Measures Hankel Matrix Decomposition
    Authors: Ramkumar.G, S.P Maniraj (Assistant Professor)
    Number of views: 475
  • 109-113
    IMPROVING THE ATTACK DETECTION ACCURACY USING HLA IN WIRELESS AD HOC NETWORK
    Authors: Veeramani.R(Assistant Professor), Sindhu Bharathy.B
    Number of views: 481
  • 114-120
    Context Representation and Maximize Power Efficiency in Mobile Sensing
    Authors: S.N.Nandhini, Mr.R. Augustian Issac
    Number of views: 407
  • 121-127
    Adjustment of the Force Transmissibility of a SDOF Vibrating System; Part II: Fraction Transmissibility
    Authors: Galal Ali Hassaan
    Number of views: 757
  • 128-141
    An Improved Search Algorithm for Resource Allocation in Cloud Databases
    Authors: Radhya Sahal, Sherif M. Khattab, Fatma A. Omara
    Number of views: 437
  • 142-155
    DynMR: A Dynamic Slot Allocation Framework for MapReduce Clusters in Big Data Management using DHSA and SEPB
    Authors: Anil Sagar T, Ramakrishna V Moni
    Number of views: 495
  • 156-162
    Authentication With Enhanced Privacy Using File Stream Sequencing Technique
    Authors: Manikandan.R, R.J.Poovaraghan
    Number of views: 478
  • 163-165
    Voice morphing
    Authors: Ms.P V Gujarathi , Mrs.S S Dinde
    Number of views: 707
  • 166-169
    Using Image Processing for Detecting Defects in Printed Circuit Board
    Authors: Sonal D Kalro, Meghashree B S, Prathiksha B G, Suhasini A,Dr.H D Phaneendra
    Number of views: 601
  • 170-175
    Tuning Condition Modification of Damped and Un-damped Adaptive Vibration Absorber
    Authors: Mohammed Abdel-Hafiz, Galal Ali Hassaan
    Number of views: 512

Number Vol2Issue1, 2015

  • 1-7
    A Location-Based Personal Task Reminder for Mobile Users In Wireless College Campus Environment(Indoor And Outdoor)
    Authors: Tejaswinee Ugale, Nikhil Patil, Lohit Lende
    Number of views: 566
  • 20-23
    Detection Of Optic Disc In Retina Using Digital Image Processing
    Authors: Vijaya R.Patil,Vaishali Kumbhakarna ,Dr.Seema Kawathekar
    Number of views: 389
  • 24-27
    Review on Speckle Noise Reduction Techniques for Medical Ultrasound Image Processing
    Authors: Vaishali Kumbhakarna,Vijaya R.Patil ,Dr.Seema Kawathekar
    Number of views: 456
  • 28-33
    Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing
    Authors: Sonali V.Satonkar, Dr.seema Kawathekar
    Number of views: 644
  • 34-37
    Image Resolution Improvement Using DWT & SWT Transform
    Authors: Miss.Thorat Ashwini Anil, Prof.Katariya S. S.
    Number of views: 455
  • 38-41
    Image Fusion Using Absolute Maximum Fusion Rule Using Biorthogonal Wavelet Transform
    Authors: Miss. Kawade Sonam P,Prof. Ubale V.S
    Number of views: 405
  • 42-47
    Fusion of Iris and Palmprint Traits for Human Identification
    Authors: Ms. Apurva D. Dhawale, Prof. Dr. K. V. Kale
    Number of views: 408
  • 48-55
    Analysis of Crosspoint Cost and Buffer Cost of Omega Network Using MLMIN
    Authors: Smilly Soni,Abhilash Sharma,Ashish Jalota
    Number of views: 444
  • 56-62
    Vehicle Dynamics Response to Road Hump using a 10 Degrees of Freedom Full-Car Model
    Authors: Galal Ali Hassaan , Nasser Abdul-Azim Mohammed
    Number of views: 484
  • 63-68
    Securing a Storage Area Networks
    Authors: R.Sumangali, Dr.B.Srinivasan
    Number of views: 440
  • 69-74
    Comparative Study of Genetic Operators and Parameters for Multiprocessor Task Scheduling
    Authors: Bhawna Gupta
    Number of views: 418
  • 75-79
    Image Fusion Based on Medical Images Using DWT and PCA Methods
    Authors: Mr. Roshan P. Helonde, Prof. M.R. Joshi
    Number of views: 462
  • 80-91
    Modelling and Simulation of Subsea Umbilical Dynamics: A Numerical Approach
    Authors: O. O. Ajayi , O. O. Aribike
    Number of views: 471
  • 92-97
    Mining Text using Levenshtein Distance in Hierarchical Clusteing
    Authors: Simranjit Kaur, Prof. Kiranjyoti
    Number of views: 393
  • 98-100
    Survey on Silent Software Installation and LAN control using Android App
    Authors: Prof.S.S.Chaudhari,ChaitaleeAthare,AnushriGaikwad,SnehaShegar, PranaliWakchaure
    Number of views: 509
  • 100-106
    A Survey on Wireless Routing Protocols(AODV, DSR, DSDV)
    Authors: Sejal D Mello,Priyanka B. Patil,Tarannum Parveen S. Shaikh,Heena S. Shaikh,Shahnawaz M. Malik
    Number of views: 460
  • 107-112
    An Comparative study and evaluation on performance of Intrusion Detection Schemes in MANET
    Authors: Deepika Goyal, Mr. Deepak Kumar Xaxa(Assistant Professor)
    Number of views: 395
  • 113-119
    A Comparative study of Classification Techniques for Detecting Suspicious Criminal Activities on Emails
    Authors: Hitesh Mahanand, Mr. Deepak Kumar Xaxa (Assistant Professor)
    Number of views: 541
  • 121-125
    Digital Image Steganography using a Novel Uniform Distortion Function with all Possible DCT Magnitudes
    Authors: N.Jeyakumar,M.Thangasivagamaselvi
    Number of views: 551
  • 126-133
    DOMI: A Dynamic Ordering Multi-field Index for Data Processing
    Authors: SuraI.Mohammed, Hussien M. Sharaf, Fatma A. Omara
    Number of views: 432
  • 134-141
    IT Governance Ontology Building Process : Example of developing Audit Ontology
    Authors: Chergui Meriyem, Sayouti Adil, Medromi Hicham
    Number of views: 477
  • 142-150
    A Novel Classification Algorithm based on Contextual Information using FCM Classifier for Brain Tumor Diagnosis using MR Images
    Authors: Dinesh Babu G L, Hariharan G
    Number of views: 485
  • 151-157
    Optimal Kinematic Synthesis of Planar Mechanism, Part I: Offset Crank-Slider Mechanism
    Authors: Galal Ali Hassaan
    Number of views: 565
  • 170-176
    SOURCE PRIVACY THROUGH SELECTION OF SET AND LIVELY ROUTING PATH
    Authors: G.B.Karthik Ragu, K.Supriya
    Number of views: 412

Number Vol1Issue1, 2014

  • 1-6
    Embedded based Controller for Induction Generator
    Authors: Rupinder kaur, Shruti Aggarwal
    Number of views: 476
  • 6-12
    Sliding Mode Control BasedWind Energy Power Generation
    Authors: Nisha Mannan, Shipra Khurana, Mamta Rani
    Number of views: 434
  • 12-17
    Raise The Temporal Database From Architecture
    Authors: Lalit Kumar Saini, Vishal Shrivastava
    Number of views: 423
  • 17-21
    Statcom For Wind Energy Systems
    Authors: Prof. S.M.Sangve, Sushil Warkar, Amit Shirke
    Number of views: 464
  • 21-26
    Sudoku Puzzles by using x-wing techniques
    Authors: Dr. Zubair Khan1, Ashish Kumar2, Sunny Kumar
    Number of views: 647

Number Vol1Issu2 , 2014

  • 1-6
    Survey on Types of Inheritance Using Object Oriented Programming with C++
    Authors: Manoj Kumar Sah, Vishal Garg
    Number of views: 528
  • 7-13
    Comparing the Performance of Real-Time Applications based on IPv4 and IPv6Networks
    Authors: Comparing the Performance of Real-Time Applications based on IPv4 and IPv6Networks
    Number of views: 647
  • 14-18
    Comparison of adiabatic and Conventional CMOS
    Authors: Gurpreet Kaur,Narinder Sharma
    Number of views: 424
  • 19-27
    Car Dynamics using Quarter Model and Passive Suspension, Part I: Effect of Suspension Damping and Car Speed
    Authors: Prof.Galal Ali Hassaan
    Number of views: 375
  • 28-33
    Design And Analysis of 4:1 Multiplexer Using An Efficient Reversible Logic in 180NM
    Authors: Gurpreet Kaur,Narinder Sharma
    Number of views: 730


 В начало  Предыдущая страница  1 2 3 4 5
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us