![ijct](http://www.ijctjournal.org/images/title_good1.jpg)
![ijct](http://www.ijctjournal.org/images/newbut.gif)
![ijct](http://www.ijctjournal.org/images/newbut.gif)
International
Journal of Computer Techniques
IJCT
-Volume 3, Issue 1 / Jan - Feb 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
Load
balancing with Modify Approach - ![]()
![]() ![]() ![]() |
1-5 |
2
|
Missing
Value Imputation Based on MINNS-SVM - ![]()
![]() ![]() ![]() |
6-13 |
3
|
Improve
hop-by-hop message authentication using GECC algorithms - ![]()
![]() ![]() ![]() |
14-24 |
4
|
End-To-End
Routing Analysis Through Greedy Forwarding In Wireless
Sensor Networks With High Quality Links - ![]()
![]() ![]() ![]() |
25-35 |
5
|
Method
to Automate Tender System With Calculation of Best
Bidderunder E-Governance - ![]()
![]() ![]() ![]() |
36-38 |
6
|
Optimal Routing and Energy Allocation for Lifetime Maximization of Wireless Sensor Networks With Nonideal Batteries - ![]()
![]() ![]() ![]() |
39-47 |
7
|
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage - ![]()
![]() ![]() ![]() |
48-56 |
8
|
A Result Paper On Mall Shopping System Using NFC - ![]()
![]() ![]() ![]() |
57-66 |
9
|
Face Detection - A Literature Survey - ![]()
![]() ![]() ![]() |
67-70 |