Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Issue
Current
Archives
Authors
Submissions
Author Guidelines
WORD TEMPLATE
LATEX TEMPLATE
How to submit your article(Video help)
Reviewers
Join as Reviewer
How to review (video help)
Editors
Editorial Team
Editorial Workflow (help video's)
Journal Policies
Peer Review Policy
Open Access Policy
Plagiarism Policy
Digital Archiving Policy
Rights and License
Privacy Statement
Publication Ethics
About
About the Journal
Announcements
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 6 No. 2 (2013)
Vol. 6 No. 2 (2013)
Published:
2013-05-20
Research Articles
Secured Data Transmission Using Wavelet Based Steganography And Cryptography
Mittapalli Indrasena Reddy, V. Uday Kumar, K. Subba Reddy, P. Venkat Vijay Kumar
311-316
PDF
Usability Evaluation Approach for VLS: A Conceptual Framework
Kelvin Kabeti Omieno, Laban Oenga, Dr. George Raburu
317-320
PDF
MULTIPLE-ACCESS TECHNOLOGY OF CHOICE IN 3GPP LTE
Ibikunle Frank, Dike Ike, Ajayi Jimi, Onasoga Kayode
321-328
PDF
Survey paper on intrusion detection techniques
Rachna Kulhare, Dr. Divakar Singh
329-335
PDF
Simulation and Analysis of MC-CDMA System under AWGN and Rayleigh Fading Channel
Bhavana Kulhare, Dr. Poonam Sinha
336-342
PDF
IDENTIFICATION AND IMPLEMENTATION OF DESIGN PATTERNS IN MOBILE BANKING
M. Hemalatha, A. Vikneshraj, N. Adithya Prasanna
343-350
PDF
Make a Submission
Make a Submission
journalmetrics
ABOUT THE IJCT
EDITORIAL TEAM
AUTHOR GUIDELINES
AUTHOR FEE
RIGHT AND LICENSE
FOCUS AND SCOPE
PEER REVIEW POLICY
INDEXING
PLAGIARISM POLICY
OPEN ACCESS STATEMENT
WORD TEMPLATE
LATEX TEMPLATE
Information
For Readers
For Authors
For Librarians
flagcounter
Current Issue
suggestedtools
Suggested tools
Mendeley
Zotero
JabRef
Grammarly