International
Journal of Computer Techniques
IJCT
-Volume 3, Issue 2 / March - April 2016
S.No
|
Title/Author Name
|
Page No
|
1
|
Aggregate Estimation in Hidden Databases with Checkbox Interfaces - R .Navin kumar, Mohamed Faseel.VK
|
1-14 |
2
|
Mechanical Engineering in Ancient Egypt: Part VI: Jewellery Industry (Royal crowns and Headdresses from 19th to 30th Dynasties) - Galal Hassaan
|
15-28 |
3
|
The Encryption Algorithm Based on Principal Component Analysis of Times Series - Xiao Bin-bin ,Jiang Xiao-qi
|
29-33 |
4
|
Machine Learning For Real Estate Contracts Automatic Categorization of Text - C.Mani, J.Jayasudha
|
34-39 |
5
|
Human Action Recognition Based on the Adaptive Weighted Dynamic Time Warping Algorithm - ZhaoLiang Li,QingFeng Zhang,WenTian Huang
|
40-48 |
6
|
Emerging Trends in Social Media - Jingqian Zhang, Sung Wook Han, Jiarui Chang
|
49-53 |
7
|
Visualization of Association Relation and its Application in Tax Field - Liang Wu,MingXin He
|
54-59 |
8
|
Personalized Expense Managing Assistant Using Android - N.ZahiraJahan, K.I.Vinodhini
|
60-67 |
9
|
Use of Unsupervised Clustering to Characterize Graduate Students Profiles based on Educational Outcomes - Lotfi Najdi, Dr. Brahim Er-Raha
|
68-75 |
10
|
Artificial Intelligence for Document Segregation - C.Navamani., Naveendiran.K
|
76-80 |
11
|
Online City Scale Taxi Ridesharing - C.Navamani, M.Srimathi
|
81-88 |
12
|
Smartphone Tracking Application Using Short Message Service - N.ZahiraJahan, R.Vinodhini
|
89-94 |
13
|
Machine Learning For Real Estate Contract-Entity Recognition Using Search Engine - C. Navamani, J.Sindhuja
|
95-102 |
14
|
Attribute-based Encryption with Decryption and Revocation Outsource in Cloud Environment - Lixian Liu, Guowei Wu
|
103-109 |
15
|
Cluster-Based License Revocation With Vindication Ability For Mobile Ad Hoc Networks - S.Jagadeesan, A.Mohan
|
110-114 |
16
|
Review Paper: Hybrid Amplifiers in FSO System - S.Jagadeesan, A.Mohan
|
115-123 |
17
|
Molecular dynamics Parallel simulation of Carbon Nanotubes based on GPU - Sheng Lai, Xiaohua Meng, Dongqin Zheng
|
124-132 |
18
|
An Optimal Approach for Secure and Energy Efficient Data Transfer in WSN using Hierarchical and Dynamic Elliptic Curve Cryptosystem - O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. Jenifer
|
133-140 |
19
|
Exponential Stabilization of the Coupled Dynamical Neural Networks with Nodes of Different Dimensions and Time Delays - Jieyin Mai, Xiaojun Li
|
141-147 |
20
|
Design and Analysis of Patch Antenna for Wire-Less Applications - Gidijala Sai Kumar,Gadiraju Mounika, Dusi Leela Rani, K.T.P.S.Kumar
|
148-152 |
21
|
Comparative Analysis of Gateway Placement Approaches for Wireless Mesh Network - Swati Govil, Dr.Paramjeet Rawat
|
153-157 |
22
|
A New Approach For Reducing Routing Overhead In MANET - Shraddha Dabhade, Shilpa Verma
|
158-163 |
23
|
Design of Full Adder in 180nm Technology Using TG and Adiabatic Logic - Baljinder Kaur
|
164-170 |
24
|
Time multiplexing CNN simulator using RK7(5) - Osama H. Abdelwahed, M. El-Sayed Wahed
|
171-175 |
25
|
Unprivileged Black-Box Detection of User-Space Key loggers - Mr.S.Jagadeesan,S.Rubiya
|
176-183 |
26
|
Role of Data Mining Techniques in Human Disease Diagnosis - Sunny Sharma
|
184-188 |
27
|
A Detailed Analysis of Lossless Image Compression Techniques - Palwinder Singh
|
189-194 |
28
|
An Experimental Analysis of pair programming - KulbirKaur, AnureetKaur
|
195-200 |
29
|
Information Security Management of an organization with a focus on Human perspective - Karandeep Kaur
|
201-204 |
30
|
Machine Learning Spectrum for Web Data Analytics - Sunny Sharma
|
205-208 |
31
|
A Comprehensive Review on Multi-Objective Optimization Using Genetic Algorithms - Amarbir Singh
|
209-216 |
32
|
Analysis of Various Tools in Big Data Scenario - Amarbir Singh,Palwinder Singh
|
217-222 |
33
|
An evaluation of selective security issues in Internet of Things based on Cloud - Karandeep Kaur
|
223-225 |
34
|
Speckle Reduction Techniques for Ultrasound Images - Palwinder Singh
|
226-233 |
35
|
Framework for Evaluation of Academic Website - Kalpana Devi, Aman Kumar Sharma
|
234-239 |
36
|
Taxonomy of Cross-Platform Mobile Applications Development Tools - Amarbir Singh
|
240-246 |
37
|
Ultrasound-Image De-noising Technique’s best mix selection using Genetic Algorithm Approach - Amritpal Singh, Prithvipal Singh
|
247-251 |