INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
container_jh2yw2w72rbdreebtgswzt7fkq
CIRWORLD
Showing first 25 out of 1,203 results
OPPORTUNISTIC APPROACH TO EXPLOIT WIRELESS SPECTRUM BY USE OF COGNITIVE RADIO
Tanu Preet Singh Preet, Prof. R.K Singh, Jaspreet Kaur, Vishal Sharma
2003
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v2i3b.2700
Evaluation of economic advantage for produced electrical energy usage by solar cell in compression with steam power plant in home in Isfahan city
Abbas Ali Abounoori, Shahram Javadi, Hassan Ahmadi, Hadi Parhizi Gashti
2004
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v3i2a.2808
A Mobile Technology for Hazard Management System
Ajay Kumar, Amit Kumar Battan, Kumar Rahul
2004
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v3i1a.2728
Enhanced Tiny Encryption Algorithm with Embedding (ETEA)
Dr. Deepali Virmani, Nidhi Beniwal, Gargi Mandal, Saloni Talwar
2008
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v7i1.3479
Performance Improvement of Face Recognition System using Selective Local Feature Vectors
Vasudha S, Neelamma K. Patil, Dr. Lokesh R. Boregowda
2011
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v10i2.3299
Enhanced Adaptive Mechanisms to Improve QOS in Distributed Multimedia Applications
Dr. Syed Abdul Sattar, Mirza Anwarullah Baig
2013
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v12i10.2987
Factors Affecting the Segmentation of the Heart Ventricles in Short Axis Cardiac Perfusion MRI Images
Doaa Mousa, Nourhan Zayed, Inas A. Yassine
2016
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v15i11.4376
SECURITY MECHANISMS AND ANALYSIS FOR INSECURE DATA STORAGE AND UNINTENDED DATA LEAKAGE FOR MOBILE APPLICATIONS
Vanessa M. Santana, Paolina Centonze
2016
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v15i8.3754
Computer Aided Diagnosis of Melanoma Skin Cancer using Clinical Photographic Images
Mai S. Mabrouk, Mariam Sheha, Amr A. Sharawy
2011
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v10i8.1474
Knowledge based System for Improving Design and Manufacturing Processes for Electrochemical MachiningIn Computer based Concurrent Engineering
Morteza Sadegh Amalnik, M.H Khoshgoftarmanesh, M Mirzaei
2015
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v14i5.1934
Routing Strategies in Survivable Optical Networks
Ifrah Amin, Gulzar Ahmad dar, Hrdeep Singh Saini
2010
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v9i2.4169
Digital Fingerprinting In Encrypted Domain
Kranthi Kumar Murala, Dr.M. Kamaraju, Dr.K. Ramanjaneyulu
2013
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v12i1.3360
Classification of Cancer of The Lungs Using SVM and ANN
Olusayo Deborah Fenwa, Funmilola A. Ajala, Adebisi A. Adigun
2016
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v15i1.1715
Performance Comparison of PI and Fuzzy-PI Logic Speed Control of Induction Motor
Yaduvir Singh, Darshan Singh, Dalveer Kaur
2007
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v6i3.4464
A Survey on SmartPhone Honeypot
Dr.Hanaa Mohsin Ahmed, Dr. Nidaa Flaih Hassan, Assmaa A. Fahad
2012
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v11i4.3131
RANKING of the E-TRUST FACTORS in ELECTRONIC TRANSACTIONS in the CONTEXT of B2C E-COMMERCE (from the consumers' point of view and by using Friedman's ranking method)
Najafi Issa
2014
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v13i8.7076
A Survey on Design Methods for Secure Software Development
Ola M.Surakhi, Amjad Hudaib, Mohammad AlShraideh, Mohammad Khanafseh
2017
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v16i7.6467
Determination of Optimal Number of Relays Using a New Energy Model for WSN
Partha Pratim Bhattacharya, Shilpi Gupta, Nupur Pal
2005
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v4i2c1.4174
Improvement of Physical Clock Synchronization Algorithm by Two-Level Synchronization
M. Praveen Kumar Reddy, K. Ashwin Kumar, S. Rajesh Kumar, RA.K. Saravanaguru
2012
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v11i6.3039
A Soft- Computing Approach for Multi Criteria Project Selection Problem with Grey Number
TULI BAKSHI, BIJAN SARKAR, SUBIR KUMAR SANYAL
2005
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v4i2b1.3223
Filtering and Transformation Model for Opinion Summarization
Ms. Ashwini Rao, Dr. Ketan Shah
2014
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v13i2.2912
Skin Color detection Using Stepwise Neural Network and Color Mapping Co-occurrence Matrix
Ghazali Osman, Muhammad Suzuri Hitam
2013
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v12i7.3076
EXTENDED SUBCLASS OF CYCLIC SEPARABLE GOPPA CODES
Ajay Sharma, O. P. VINOCHA
2016
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v15i5.1651
DEVELOPMENT OF AN INTRUSION DETECTION SYSTEM IN A COMPUTER NETWORK
Babatunde R.S, Adewole K.S, Abdulsalam S.O, Isiaka R.M
2013
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v12i5.2918
Investigation of Mobility Model Against Reactive Routing Protocols in MANETs
Shruti Bajaj, Er. Rajdeep Singh, Er. Parveen Kakkar
2009
|
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
doi:10.24297/ijct.v8i1.3436
« Previous
Showing results 0 — 25 out of 1,203 results
Next »