Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Issue
Current
Archives
Authors
Submissions
Author Guidelines
WORD TEMPLATE
LATEX TEMPLATE
How to submit your article(Video help)
Reviewers
Join as Reviewer
How to review (video help)
Editors
Editorial Team
Editorial Workflow (help video's)
Journal Policies
Peer Review Policy
Open Access Policy
Plagiarism Policy
Digital Archiving Policy
Rights and License
Privacy Statement
Publication Ethics
About
About the Journal
Announcements
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 3 No. 3 (2012)
Vol. 3 No. 3 (2012)
Published:
2012-11-03
Editorial
Annual Reviewer Acknowledgement
Chief Editor
PDF
Research Articles
Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution
Kirti Singh, Poonam Yadav
351-353
PDF
ANALYSIS OF STUDENT ACTIVITIES ON COMPUTER - A STUDY ON PUNJAB UNIVERSITY, INDIA
Dr Gunmala Suri, Sneha Sharma
354-358
PDF
A Feature Selection process Optimization in multi-class Miner for Stream Data Classification
Manish Rai, Rekha pandit, Vineet Richhariya
359-364
PDF
COORDINATED DISTRIBUTED SCHEDULING IN WIRELESS MESH NETWORK
Usha Kumari, Udai Shankar
368-374
PDF
An Overview of Data Analysis of EMR, Its Clinical Ontologies & Security in Database with respect to Todays Ehealth Apps
Onkar S Kemkar, Dr P B Dahikar
375-380
PDF
CLASSIFICATION OF DATA WAREHOUSE TESTING APPROACHES
Dr. S. L. Gupta, Dr. Payal Pahwa, Ms. Sonali Mathur
381-386
PDF
A Study Paper on Communication Network and overview of Packet Switching Technology
Sandeep Panwar, Amit Garg, Naresh Kumar
387-392
PDF
A REVIEW ON COMPUTER AIDED DETECTION AND DIAGNOSIS OF LUNG CANCER NODULES
S.Shaik Parveen, Dr. C Kavitha
393-400
PDF
Modeling an Object Oriented for Maintenance Purposes
Hamed J. Al-Fawareh
401-405
PDF
SOFTWARE AUDIT SYSTEM
Gaurav Kumar NIgam
406-412
PDF
DISTRIBUTED BUSINESS INTELLIGENCE A NEW APPROACH IN ECONOMICAL EDUCATION
Logica Banica, Daniela Pirvu, Cristian Stefan
413-418
PDF
A Comparative study on secure routing algorithms SAODV and A-SAODV in Mobile AdHoc Networks (MANET) – The Enhancements of AODV
JARUPULA RAJESHWAR, Dr G NARSIMHA
419-423
PDF
Information Management
Barjinder Kaur
424-427
PDF
IMPLEMENTATION OF FINGER TOKEN AUTHENTICATION TECHNIQUE USING ARTIFICIAL INTELLIGENCE APPROACH IN NTT MICROSYSTEMS
Sumit Chaudhary, Monika Garg, Neha Singh
428-432
PDF
Make a Submission
Make a Submission
journalmetrics
ABOUT THE IJCT
EDITORIAL TEAM
AUTHOR GUIDELINES
AUTHOR FEE
RIGHT AND LICENSE
FOCUS AND SCOPE
PEER REVIEW POLICY
INDEXING
PLAGIARISM POLICY
OPEN ACCESS STATEMENT
WORD TEMPLATE
LATEX TEMPLATE
Information
For Readers
For Authors
For Librarians
flagcounter
Current Issue
suggestedtools
Suggested tools
Mendeley
Zotero
JabRef
Grammarly