Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Issue
Current
Archives
Authors
Submissions
Author Guidelines
WORD TEMPLATE
LATEX TEMPLATE
How to submit your article(Video help)
Reviewers
Join as Reviewer
How to review (video help)
Editors
Editorial Team
Editorial Workflow (help video's)
Journal Policies
Peer Review Policy
Open Access Policy
Plagiarism Policy
Digital Archiving Policy
Rights and License
Privacy Statement
Publication Ethics
About
About the Journal
Announcements
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 3 No. 1 (2012)
Vol. 3 No. 1 (2012)
Published:
2012-08-01
Research Articles
Printed Arabic Characters Classification using A Statistical Approach
Ihab Zaqout
1-5
PDF
A Collective Statistical Analysis of Outdoor Path Loss Models
Saifuddin Abdullah, Dr. Fuad Al-Najjar
6-10
PDF
Low Cost VoIP Architecture Using Open Source Software Component in Tertiary Institutions
Ebtesam Najim AlShemmary, Bahaa Qasim Al-Musawi
11-14
PDF
A tool for prototyping a precision GPS system
Héctor Nelson Acosta, Juan Manuel Toloza
15-23
PDF
A New Model of the Lifetime of Wireless Sensor Networks in Pure Water Communications
Abdelrahman Elleithy, Gonhsin Liu, Ali Elrashidi
24-33
PDF
RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing
Abhishek Patial, Sunny Behal
34-38
PDF
Performance Evaluation of Ciphers Using CRYPTOOL 2.0
Kulwinder Kaur
39-43
PDF
IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEM
N. P. Jagtap, S. J. Patil, A. K. Bhavsar
44-47
PDF
Finite State Testing and Syntax Testing
Amandeep Singh, Harmanjit Singh
48-54
PDF
Integration of Human Resource Information System to DSS, CMS and other applications to increase productivity
Joydeep Chowdhury, Parimalendu Bandhyapadhya, Gunamoy Hazra
55-59
PDF
Providing Security in Data Aggregation using RSA algorithm
60-65
PDF
A Mobile Technology for Hazard Management System
Ajay Kumar, Amit Kumar Battan, Kumar Rahul
66-75
PDF
Investigations on Receiver sensitivity of 10 Gbps SOA based optical communication system
Sukhbir Singh, Kulwinder Singh
76-83
PDF
Classical Encryption Techniques
Ramandeep Sharma, Richa Sharma, Harmanjit Singh
84-90
PDF
Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach
Manoj Patel, Dr. Maneesh Shrivastava, Kavita Deshmukh
91-94
PDF
Diagnosis of Dynamic Topology MANETs in Faulty Environment
Kanwarpal Singh, Sumeet Kaur, Er. Rishma Chawla
95-99
PDF
GRAYSCALE IMAGE WATERMARK DETECTION
Randeep Kaur, Kamaljit Kaur Dhillon
100-105
PDF
An Effective Approach to Contention Based Bandwidth Request Mechanism in WiMAX Networks
106-112
PDF
FPGA IMPLEMENTATION OF INTELLIGENT EMBEDDED SYSTEM FOR DISTRIBUTED ELECTRICAL APPLIANCES
Swathi Vejendla, Dr. M. Kamaraju
113-116
PDF
Design of IIR Filter using Remez Algorithm
Aashu Gupta, Dr. Vijay Lamba, Er. Munish Verma
117-120
PDF
In Search of a Better Heuristic Algorithm for Simplification of Switching Function - A Challenge to ESPRESSO
Subhajit Guha, Uma Mitra, Pinki Dey, Samar Sen Sarma
121-126
PDF
Software Quality
Sukhvir Kaur
127-131
PDF
Alternative Vidhi to Conversion of Cyclic CNF->GNF
Avinash Bansal
132-133
PDF
HRMS: IS THE ROLE CHANGING FROM BEING ADMINISTRATIVE TO STRATEGIC?
Goldy Mahajan, Prof. Versha Mehta
133-139
PDF
NLP TOKEN MATCHING ON DATABASE USING BINARY SEARCH
Ekta Aggarwal, Shreeja Nair
140-143
PDF
Process of Web Usage Mining to find Interesting Patterns from Web Usage Data
Ketul Patel, Dr. A. R. Patel
144-148
PDF
Content Based Image Retrieval using Texture, Color and Shape for Image Analysis
Amanbir Sandhu, Aarti Kochhar
149-152
PDF
LSB Embedding in Spatial Domain - A Review of Improved Techniques
Himani Goyal, Shaveta Chutani
153-157
PDF
Detecting the Sybil Attack in Wireless Sensor Network :Survey
A.V Pramod, Md. Abdul Azeem, M. Om Prakash
158-161
PDF
Performance Evaluation of Image Enhancement Techniques in Spatial and Wavelet Domains
Amardeep Singh Virk, Mandeep Kaur, Lovely Passrija
162-166
PDF
Traveling Salesman Problem: A Case Study
Dr. Leena jain, Mr. Amit Bhanot
167-169
PDF
Review of Various SEO Techniques for Websites
Manraj Singh, Harmanjit Singh
170-172
PDF
Green computing – The New Era of Energy Efficient Computing
Rupali Dhir
173-175
PDF
A NEW SIMPLIFIED APPROACH TO FIND THE EQUIVALENT RESISTANCE OF ANY COMPLEX EQUAL RESISTIVE NETWORK
Karan Aneja, Vipin Kumar
176-178
PDF
Role of Adjacency Matrix & Adjacency List in Graph Theory
Harmanjit Singh, Richa Sharma
179-183
PDF
ARTIFICIAL NEURAL NETWORK BASED CHARACTER RECOGNITION USING BACKPROPAGAT
Murtaza Abbas Rizvi, Madhup Shrivastava, Monika Sahu
184-187
PDF
Make a Submission
Make a Submission
journalmetrics
ABOUT THE IJCT
EDITORIAL TEAM
AUTHOR GUIDELINES
AUTHOR FEE
RIGHT AND LICENSE
FOCUS AND SCOPE
PEER REVIEW POLICY
INDEXING
PLAGIARISM POLICY
OPEN ACCESS STATEMENT
WORD TEMPLATE
LATEX TEMPLATE
Information
For Readers
For Authors
For Librarians
flagcounter
Current Issue
suggestedtools
Suggested tools
Mendeley
Zotero
JabRef
Grammarly