Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Issue
Current
Archives
Authors
Submissions
Author Guidelines
WORD TEMPLATE
LATEX TEMPLATE
How to submit your article(Video help)
Reviewers
Join as Reviewer
How to review (video help)
Editors
Editorial Team
Editorial Workflow (help video's)
Journal Policies
Peer Review Policy
Open Access Policy
Plagiarism Policy
Digital Archiving Policy
Rights and License
Privacy Statement
Publication Ethics
About
About the Journal
Announcements
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 4 No. 2 (2013)
Vol. 4 No. 2 (2013)
Published:
2013-03-30
Research Articles
Major Energy Efficient Routing Schemes in Wireless Sensor Networks: Survey and Idea
261-266
PDF
Maximizing Network Lifetime Operator for Wireless Sensor Networks
Dr. Deepali Virmani
267-272
PDF
IDARP: ID-based Address Resolution Protocol
Imtiyaz Ahmad Lone, Jahangeer Ali, Kalimullah Lone
277-283
PDF
HIGH SPEED CARRY SAVE MULTIPLIER BASED LINEAR CONVOLUTION USING VEDIC MATHAMATICS
Bharathi Reddy, D. Leela Rani, Prof. S. Varadarajan
284-287
PDF
Given a raga recording, can we scientifically verify which school of Vadi-Samvadi selection is supported by the artist?
Soubhik Chakraborty, Rayalla Ranganayakulu, Shivee Chauhan, Sandeep Singh Solanki, Kartik Mahto
288-300
PDF
Realization of different diversity technique for mimo based mobile ad-hoc network using space time block codes
Swati Chowdhuri, Nilanjan Byabartal, Dr. S.S. Choudhury, Dr. P.K. Banerjee
301-306
PDF
Business Intelligence framework to support Chronic Liver Disease Treatment
Ayman Khedr
307-312
PDF
Change Detection on SAR data using PCA Algorithm
Saurabh Srivastava, Vijay Kumar, Rahul Gupta, Supreet Kaur
313-315
PDF
Conceptual Overlapping Clustering for Effective Selection of Parental Rice Varieties
Madhavi Dabbiru, Shashi Mogalla, PRM Rao
316-323
PDF
DESIGN OF CMOS LOW DROP-OUT REGULATORS: A COMPARATIVE STUDY
Ashvani Kumar Mishra, Rishikesh Pandey
324-330
PDF
Evaluating the Effectiveness of Self and Peer Assessment using PBL on Student Performance and Preference: Malaysians Experience
CHE KU NURAINI CHE KU MOHD, Faaizah Shahbodin
331-339
PDF
A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY
Bohar Singh, Mandeep Kaur, Chetan Batra
340-344
PDF
Web Client and Web Server approaches to Prevent XSS Attacks
Jyoti Snehi, Dr. Renu Dhir
345-352
PDF
A Soft- Computing Approach for Multi Criteria Project Selection Problem with Grey Number
TULI BAKSHI, BIJAN SARKAR, SUBIR KUMAR SANYAL
353-362
PDF
RELATIVE STUDY OF SOLVERS FOR FINITE ELEMENT ANALYSIS
Harpal Singh
363-370
PDF
A Statistical Analysis of Bhairav-The first morning Raga
Soubhik Chakraborty, Swarima Tewari
371-386
PDF
A View of Cloud Computing
Bhagwan Singh, Sumeet Dhawan, Anish Arora, Abhishek Patail
387-392
PDF
Security Test by using F T M and Data Allocation Strategies on Leakage Detection
Pallavali Radha, G. Sireesha
393-400
PDF
Web Service Negotiation Using AHP for Business Oriented Design of Service Level Agreements
Mr. R. Raju, Ms. D. Dhivya, Ms. R. Saranya, Ms. S. I. Abbinaya
401-407
PDF
AN APPROACH TO GENERATE MST WITHOUT CHECKING CYCLE
Sharadindu Roy, Prof. Samar Sen Sarma
408-418
PDF
Security from Denial of Sleep Attack in Wireless Sensor Network
Simerpreet Kaur, Md. Ataullah, Monika Garg
419-425
PDF
THE IMPROVEMENT OF THE STABILITY PROBLEM OF RESHA GENERATION PLANT IN JORDAN
Anwar Almofleh, Mahmoud Awad
426-434
PDF
Providing security for Web Service Composition using Finite State Machine
435-444
PDF
A Graphical Tool Designed to Deploy Wireless Sensors in Homogeneous Grid Selected from Irregular Polygon
DR. Nitin
445-453
PDF
Investigations into Hybrid Magneto-hydrodynamic (MHD) Antenna
Sunil Bist, Dr. Rajveer Singh Yaduvanshi
454-459
PDF
Rejuvenating Public-Private Partnerships (PPPs) in Asia
Dr. (Mrs) Satinder Bhatia
460-469
PDF
ENLIGHTENING THE CLOUD COMPUTING DOMAIN
AmanPreet Kaur, Dr. Dheerendra Singh
470-476
PDF
Enhancing the performance of web Focused CRAWLer Using Ontology
477-482
PDF
A Simulated Novel Approach for Identifying Black Hole Attack in AODV based MANET
Kanika Lakhani
489-494
PDF
A Review Of Internet Gateway Discovery Approaches For Mobile Adhoc Networks
Deepak Kumar Patel, Rakesh Kumar
495-508
PDF
RE-MAC: A Reliable Energy Efficient MAC Protocol For Wireless Sensor Networks
Santhosh Simon, K Paulose Jacob
509-517
PDF
Using 3GPP- A Secure IDS for MANETs
Monika Garg, Karanvir Kaur, Simerpreet Kaur
518-521
PDF
Analysis and Comparison of Color Features for Content Based Image Retrieval
Milind Vijayrao Lande, Prof. PraveenBhanodiya, Mr. Pritesh Jain
522-527
PDF
Optimal Tasks Assignment for Multiple Heterogeneous Processors with Dynamic Re-assignment
Harendra Kumar, M. P. Singh, Pradeep Kumar Yadav
528-535
PDF
Analysis of MAC Protocol for Reliable Broadcast
Savita Savita, Anjali Anjali, Gurpal Singh
536-543
PDF
ANALYSIS OF SOM & SOFM TECHNIQUES USED IN SATELLITE IMAGERY
Rachita Sharma, Sanjay Kumar Dubey
563-565
PDF
Determination of Optimal Number of Relays Using a New Energy Model for WSN
Partha Pratim Bhattacharya, Shilpi Gupta, Nupur Pal
572-579
PDF
TAXONOMY FOR WSN SECURITY-A SURVEY
Kshitija Ajabrao Chaple
580-582
PDF
Composite Lowpass Filter Realized by Image Parameter method and Integrated with Defected Ground Structures
Chandan Kumar Ghosh, Arabinda Roy, Susanta Kumar Parui
583-591
PDF
CONCEPTUAL THREE PHASE KDD MODEL AND FINANCIAL RESEARCH
Dr. Simmi Bagga
592-595
PDF
Robust Singular Value Decomposition Algorithm for Unique Faces
Ibrahim Patel, Raghavendra Kulkarni, Dr.P. Nageswar Rao
596-603
PDF
An Adaptive and Interactive Agent Based ITS for Cognitive Skill Prediction and Improvement
Mrs. R. Gowri, Dr. S. Kanmani, M. Santhosh, S. Naresh
604-612
PDF
Segmentation of Palmprint into Region of Interest (ROI): A Survey
Sneha M. Ramteke, Prof. S. S. Hatkar
613-619
PDF
Cloud Computing Issues
Rini Mahajan, Dr. Dheerendra Singh
626-630
PDF
Hybrid ANFIS Controller for 6-DOF Manipulator with 3D Model
Yousif Al Mashhadany
631-638
PDF
Performance Evaluation of Log-normal And Negative Exponential Channel Modeling Using Various Modulation Techniques in OFDM-FSO Communication
Nitin Shankar Singh, Gurpartap Singh
639-647
PDF
Analysing The Quality Attributes of AOP using CYVIS Tool
Hinam Garg, Mohit Garg
648-653
PDF
Evaluation of Operation of Lake Tana Reservoir Future Water Use under Emerging Scenario with and without climate Change Impacts, Upper Blue Nile
Getachew Tegegne, Dr. Ing. Dereje Hailu, Prof. Dr. S. Moses Aranganathan
654-663
PDF
Online Signature Verification: State of the art
Ibrahim El-Henawy, Magdy Rashad, Omima Nomir, Kareem Ahmed
664-678
PDF
ANALYSIS AND COMPARISION OF SRG AND DFIG FOR WIND GENERATION APPLICATION
Dr. N. C. Lenin, K. Prathap
679-693
PDF
Fuzzy Weighted Ordered Weighted Average-Gaussian Mixture Model for Feature Reduction
Charles. S, Dr. L. Arockiam
694-712
PDF
HEAP: Hybrid Energy-efficient Aggregation Protocol for Large Scale Wireless Sensor Networks
Santhosh Simon, K Paulose Jacob
713-721
PDF
Artificial Neural Network Based Method for Classification of Gene Expression Data of Human Diseases along with Privacy Preserving
Sathish Kumar Subramanian, Duraipandian N
722-730
PDF
Incremental Frequent Pattern Mining using Graph based approach
Sanjay Patel, Dr. Ketan Kotecha
731-736
PDF
Analysis of Load Balancing Techniques in Cloud Computing
Amandeep Sidhu, Supriya Kinger
737-741
PDF
Make a Submission
Make a Submission
journalmetrics
ABOUT THE IJCT
EDITORIAL TEAM
AUTHOR GUIDELINES
AUTHOR FEE
RIGHT AND LICENSE
FOCUS AND SCOPE
PEER REVIEW POLICY
INDEXING
PLAGIARISM POLICY
OPEN ACCESS STATEMENT
WORD TEMPLATE
LATEX TEMPLATE
Information
For Readers
For Authors
For Librarians
flagcounter
Current Issue
suggestedtools
Suggested tools
Mendeley
Zotero
JabRef
Grammarly