International Journal of Computer Techniques
IJCT -Volume 2, Issue 5 / Sep - Oct - 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
Learning Media Introduction of Yogyakarta Culture For Early Childhood 2-3 Years
- Lisna Zahrotun, Yana Hendriana, Damba Saputra
|
1-5 |
2
|
Image Compression Using Hybrid Combinations of DCT SVD and RLE
- Raghavendra.M.J, Dr.Prasantha .H.S , Dr.S.Sandya
|
16-19 |
3
|
A Survey of ETL Tools
- Mr. Nilesh Mali, Mr.SachinBojewar
|
20-26 |
4
|
Towards measuring learner?s concentration in E-learning systems
- Saoutarrih Marouane, Sedrat Najlaa, Tahiri Abderrahim , Elkadiri Kamal Eddine
|
27-29 |
5
|
A Study on Behavioral Malware Detection by Using Delay Tolerant Networks
- K.Ravikumar,V. Vinothkumar
|
30-33 |
6
|
Sybil Belief: A Semi- Creation New Approach for Structure ?Based Sybil Detection
- K.Ravikumar, B.Selvam
|
34-36 |
7
|
Multi Agent System in Distributed Agent Network
- K.Ravikumar, A. Surendar
|
37-39 |
8
|
Analysis to Online Stock for Decision Approach of Investor
- G.Magesh , S. Saradha
|
40-42 |
9
|
Cluster Ensemble Approach for Clustering Mixed Data
- Honorine Mutazinda A,Mary Sowjanya ,O.Mrudula
|
43-51 |
10
|
An Improved Collaborative Filtering Algorithm Based on Tags and User Ratings
- CaiyunGuo, HuijinWang
|
52-60 |
11
|
Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks
- Hadi Ghadimkhani, Ali Habiboghli, Rouhollah Mostafaei
|
61-66 |
12
|
Vibration Analysis of a Horizontal Washing Machine, Part IV: Optimal Damped Vibration Absorber
- Galal Ali Hassaan
|
67-71 |
13
|
Prediction of Heart Disease Using Enhanced Association Rule Based Algorithm
- Karandeep Kaur, Ms. Poonamdeep Kaur, Ms. Lovepreet Kaur
|
72-76 |
14
|
Enhancing Security in Wireless Sensor Network Using Load Balanced Data Aggregation Tree Approach
- A.Senthilkumar, K. Madhurabhasini
|
77-80 |
15
|
Online Shopping Product Aspect and Ranking Using Support Vector Machine Algorithm
- R. Bharathi
|
81-83 |
15
|
Online Shopping Product Aspect and Ranking Using Support Vector Machine Algorithm
- R. Bharathi
|
81-83 |
16
|
Resilient Key Sharing Approach Based on Multimode Authentication Scheme
- A.Senthilkumar , R.Divya
|
84-88 |
17
|
Secure Multiparty Computation on Multiple Clouds
- K.Ravikumar, S. Thamizharasi
|
89-92 |
18
|
A Survey on Log Mining: A Data Mining Approach for Intrusion Detection
- Smita P. Bhapkar, Shubhangi S. Dhamane, Yogita S. Kandekar, Khushbu S. Lodha
|
93-97 |
19
|
Bluetooth Message Hopping Chat Application
- Prof. Govind Wakure, Tanzeel Shaikh , Kirti Karande ,Ibrahim Shaikh , Hardik Vaghela
|
98-102 |
20
|
Urbain Traffic Congestion Estimating Using Simplified CRONOS Model: Algorithm and Implementation
- Abdallah Lakhouili , Hicham Medromi , El Hassan Essoufi
|
103-110 |