![ijct](http://www.ijctjournal.org/images/title_good1.jpg)
![ijct](http://www.ijctjournal.org/images/newbut.gif)
![ijct](http://www.ijctjournal.org/images/newbut.gif)
International Journal of Computer Techniques
IJCT -Volume 2, Issue 5 / Sep - Oct - 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
Learning Media Introduction of Yogyakarta Culture For Early Childhood 2-3 Years
- ![]()
![]() ![]() ![]() |
1-5 |
2
|
Image Compression Using Hybrid Combinations of DCT SVD and RLE
- ![]()
![]() ![]() ![]() |
16-19 |
3
|
A Survey of ETL Tools
- ![]()
![]() ![]() ![]() |
20-26 |
4
|
Towards measuring learner?s concentration in E-learning systems
- ![]()
![]() ![]() ![]() |
27-29 |
5
|
A Study on Behavioral Malware Detection by Using Delay Tolerant Networks
- ![]()
![]() ![]() ![]() |
30-33 |
6
|
Sybil Belief: A Semi- Creation New Approach for Structure ?Based Sybil Detection
- ![]()
![]() ![]() ![]() |
34-36 |
7
|
Multi Agent System in Distributed Agent Network
- ![]()
![]() ![]() ![]() |
37-39 |
8
|
Analysis to Online Stock for Decision Approach of Investor
- ![]()
![]() ![]() ![]() |
40-42 |
9
|
Cluster Ensemble Approach for Clustering Mixed Data
- ![]()
![]() ![]() ![]() |
43-51 |
10
|
An Improved Collaborative Filtering Algorithm Based on Tags and User Ratings
- ![]()
![]() ![]() ![]() |
52-60 |
11
|
Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks
- ![]()
![]() ![]() ![]() |
61-66 |
12
|
Vibration Analysis of a Horizontal Washing Machine, Part IV: Optimal Damped Vibration Absorber
- ![]()
![]() ![]() ![]() |
67-71 |
13
|
Prediction of Heart Disease Using Enhanced Association Rule Based Algorithm
- ![]()
![]() ![]() ![]() |
72-76 |
14
|
Enhancing Security in Wireless Sensor Network Using Load Balanced Data Aggregation Tree Approach
- ![]()
![]() ![]() ![]() |
77-80 |
15
|
Online Shopping Product Aspect and Ranking Using Support Vector Machine Algorithm
- ![]()
![]() ![]() ![]() |
81-83 |
15
|
Online Shopping Product Aspect and Ranking Using Support Vector Machine Algorithm
- ![]()
![]() ![]() ![]() |
81-83 |
16
|
Resilient Key Sharing Approach Based on Multimode Authentication Scheme
- ![]()
![]() ![]() ![]() |
84-88 |
17
|
Secure Multiparty Computation on Multiple Clouds
- ![]()
![]() ![]() ![]() |
89-92 |
18
|
A Survey on Log Mining: A Data Mining Approach for Intrusion Detection
- ![]()
![]() ![]() ![]() |
93-97 |
19
|
Bluetooth Message Hopping Chat Application
- ![]()
![]() ![]() ![]() |
98-102 |
20
|
Urbain Traffic Congestion Estimating Using Simplified CRONOS Model: Algorithm and Implementation
- ![]()
![]() ![]() ![]() |
103-110 |