20121010

Call for Papers ISSN 2277–3061 (online)


INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY

The International Journal of Computers & Technology (IJCT) solicits original research papers addressing theoretical and practical implementations in information system applications for the Upcoming Edition of IJCT. IJCT is a bi-monthly journal and if the manuscript does not suit in the current issue then it can be considered for the next upcoming issue. Authors are invited to submit their original manuscripts. Please see the Instructions for Authors(Manuscript Template) before submitting their papers.
The journal welcomes the submission of manuscripts that meet the criteria of technical and scientific excellence. Our review process allows the authors and editors an opportunity to use their expertise in a number of significant ways.

IMPORTANT DATES

  • Submission deadline : Open
  • Notification : 1-3 weeks of submission
  • Final manuscript due : By 1 weeks after notification
  • Publication date : Bi Monthly ( October 31, December 31, February 28. April 30, June 30, August 31)

SUBMIT YOUR PAPERS AT IJCT

There are two ways you can make submission at www.ijctonline.com
Recommended Method 1: Register at IJCT by clicking here -> Register . Then you can make a submission by clicking New Submission link in your "User Home"
Method 2: You can directly mail your paper with all your details (Name, address, contact no, email id, qualifications etc ) at editor@ijctonline.com,editorijctonline@gmail.com.

Scope & Topics

IJCT is an international technological e-journal that is devoted to fields of Computer Science and Information Technology. The IJCT is a peer-reviewed journal published in electronic form. The mission of this journal is to publish original contributions of high technicality in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCT provides rapid publication of articles after every two months.

IJCT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc. (Topics of Interest)
..........................................................................................

VOL 3, NO 1: JULY - AUG 2012

TABLE OF CONTENTS

ARTICLES

A Collective Statistical Analysis of Outdoor Path Loss ModelsPDF
Author: Saifuddin Abdullah, Dr. Fuad Al-Najjar6-10
Low Cost VoIP Architecture Using Open Source Software Component in Tertiary InstitutionsPDF
Author: Ebtesam Najim AlShemmary, Bahaa Qasim Al-Musawi11-14
A tool for prototyping a precision GPS systemPDF
Author: Héctor Nelson Acosta, Juan Manuel Toloza15-23
A New Model of the Lifetime of Wireless Sensor Networks in Pure Water CommunicationsPDF
Author: Abdelrahman Elleithy, Gonhsin Liu, Ali Elrashidi24-33
IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEMPDF
Author: N. P. Jagtap, S. J. Patil, A. K. Bhavsar44-47
Finite State Testing and Syntax TestingPDF
Author: Amandeep Singh, Harmanjit Singh48-51
Providing Security in Data Aggregation using RSA algorithmPDF
Author: Sukhpreet Singh, Er. Kumar Saurabh60-65
A Mobile Technology for Hazard Management SystemPDF
Author: Ajay Kumar, Amit Kumar Battan, Kumar Rahul66-75
Classical Encryption TechniquesPDF
Author: Ramandeep Sharma, Richa Sharma, Harmanjit Singh84-90
Simulation And Auditing of Network Security Based On Probabilistic Neural Network ApproachPDF
Author: Manoj Patel, Dr. Manish Shrivastava, Kavita Deshmukh91-94
Diagnosis of Dynamic Topology MANETs in Faulty EnvironmentPDF
Author: Kanwarpal Singh, Sumeet Kaur, Er. Rishma Chawla95-99
GRAYSCALE IMAGE WATERMARK DETECTIONPDF
Author: Randeep Kaur, Kamaljit Kaur Dhillon100-105
Design of IIR Filter using Remez AlgorithmPDF
Author: Aashu Gupta, Dr. Vijay Lamba, Er. Munish Verma117-120
Software QualityPDF
Author: Sukhvir Kaur127-131
HRMS: IS THE ROLE CHANGING FROM BEING ADMINISTRATIVE TO STRATEGIC?PDF
Author: Goldy Mahajan, Prof. Versha Mehta133-139
NLP TOKEN MATCHING ON DATABASE USING BINARY SEARCHPDF
Author: Ekta Aggarwal, Shreeja Nair140-143
Review of Various SEO Techniques for WebsitesPDF
Author: Manraj Singh, Harmanjit Singh170-172
Role of Adjacency Matrix & Adjacency List in Graph TheoryPDF
Author: Harmanjit Singh, Richa Sharma179-183
ARTIFICIAL NEURAL NETWORK BASED CHARACTER RECOGNITION USING BACKPROPAGATPDF
Author: Murtaza Abbas Rizvi, Madhup Shrivastava, Monika Sahu184-187

REVIEW ARTICLE

CASE STUDIES

Detecting the Sybil Attack in Wireless Sensor Network :SurveyPDF
Author: A.V Pramod, Md. Abdul Azeem, M. Om Prakash158-161
Performance Evaluation of Image Enhancement Techniques in Spatial and Wavelet DomainsPDF
Author: Amardeep Singh Virk, Mandeep Kaur, Lovely Passrija162-166
Traveling Salesman Problem: A Case StudyPDF
Author: Dr. Leena Jain, Mr. Amit Bhanot167-169
--
Best Regards,
Editorial Support Team,
International Journal of Computers & Technology,
Council for Innovative Research, USA.
www.ijctonline.com