INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
The International Journal of Computers & Technology (IJCT) solicits original research papers addressing theoretical and practical implementations in information system applications for the Upcoming Edition of IJCT. IJCT is a bi-monthly journal and if the manuscript does not suit in the current issue then it can be considered for the next upcoming issue. Authors are invited to submit their original manuscripts. Please see the Instructions for Authors(Manuscript Template) before submitting their papers.
The journal welcomes the submission of manuscripts that meet the criteria of technical and scientific excellence. Our review process allows the authors and editors an opportunity to use their expertise in a number of significant ways.
IMPORTANT DATES
- Submission deadline : Open
- Notification : 1-3 weeks of submission
- Final manuscript due : By 1 weeks after notification
- Publication date : Bi Monthly ( October 31, December 31, February 28. April 30, June 30, August 31)
SUBMIT YOUR PAPERS AT IJCT
There are two ways you can make submission at www.ijctonline.com
Recommended Method 1: Register at IJCT by clicking here -> Register . Then you can make a submission by clicking New Submission link in your "User Home"
Method 2: You can directly mail your paper with all your details (Name, address, contact no, email id, qualifications etc ) at editor@ijctonline.com,editorijctonline@gmail.com.
Scope & Topics
IJCT is an international technological e-journal that is devoted to fields of Computer Science and Information Technology. The IJCT is a peer-reviewed journal published in electronic form. The mission of this journal is to publish original contributions of high technicality in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCT provides rapid publication of articles after every two months.
IJCT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc. (Topics of Interest)
.............................. .............................. ..............................
VOL 3, NO 1: JULY - AUG 2012
TABLE OF CONTENTS
ARTICLES
| Printed Arabic Characters Classification using A Statistical Approach | |
| Author: Ihab Zaqout | 1-5 |
| A Collective Statistical Analysis of Outdoor Path Loss Models | |
| Author: Saifuddin Abdullah, Dr. Fuad Al-Najjar | 6-10 |
| Low Cost VoIP Architecture Using Open Source Software Component in Tertiary Institutions | |
| Author: Ebtesam Najim AlShemmary, Bahaa Qasim Al-Musawi | 11-14 |
| A tool for prototyping a precision GPS system | |
| Author: Héctor Nelson Acosta, Juan Manuel Toloza | 15-23 |
| A New Model of the Lifetime of Wireless Sensor Networks in Pure Water Communications | |
| Author: Abdelrahman Elleithy, Gonhsin Liu, Ali Elrashidi | 24-33 |
| RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing | |
| Author: Abhishek Patial, Sunny Behal | 34-38 |
| Performance Evaluation of Ciphers Using CRYPTOOL 2.0 | |
| Author: Kulwinder Kaur | 39-43 |
| IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEM | |
| Author: N. P. Jagtap, S. J. Patil, A. K. Bhavsar | 44-47 |
| Finite State Testing and Syntax Testing | |
| Author: Amandeep Singh, Harmanjit Singh | 48-51 |
| Development Platforms for Mobile Applications: Status and Trends | |
| Author: Richa Sharma | 52-54 |
| Integration of Human Resource Information System to DSS, CMS and other applications to increase productivity | |
| Author: Joydeep Chowdhury, Parimalendu Bandhyapadhya, Gunamoy Hazra | 55-59 |
| Providing Security in Data Aggregation using RSA algorithm | |
| Author: Sukhpreet Singh, Er. Kumar Saurabh | 60-65 |
| A Mobile Technology for Hazard Management System | |
| Author: Ajay Kumar, Amit Kumar Battan, Kumar Rahul | 66-75 |
| Investigations on Receiver sensitivity of 10 Gbps SOA based optical communication system | |
| Author: Sukhbir Singh, Kulwinder Singh | 76-83 |
| Classical Encryption Techniques | |
| Author: Ramandeep Sharma, Richa Sharma, Harmanjit Singh | 84-90 |
| Simulation And Auditing of Network Security Based On Probabilistic Neural Network Approach | |
| Author: Manoj Patel, Dr. Manish Shrivastava, Kavita Deshmukh | 91-94 |
| Diagnosis of Dynamic Topology MANETs in Faulty Environment | |
| Author: Kanwarpal Singh, Sumeet Kaur, Er. Rishma Chawla | 95-99 |
| GRAYSCALE IMAGE WATERMARK DETECTION | |
| Author: Randeep Kaur, Kamaljit Kaur Dhillon | 100-105 |
| An Effective Approach to Contention Based Bandwidth Request Mechanism in WiMAX Networks | |
| Author: Sonia Panchal, Satinder Pal | 106-112 |
| FPGA IMPLEMENTATION OF INTELLIGENT EMBEDDED SYSTEM FOR DISTRIBUTED ELECTRICAL APPLIANCES | |
| Author: Swathi Vejendla, Dr. M. Kamaraju | 113-116 |
| Design of IIR Filter using Remez Algorithm | |
| Author: Aashu Gupta, Dr. Vijay Lamba, Er. Munish Verma | 117-120 |
| In Search of a Better Heuristic Algorithm for Simplification of Switching Function - A Challenge to ESPRESSO | |
| Author: Subhajit Guha, Uma Mitra, Pinki Dey, Samar Sen Sarma | 121-126 |
| Software Quality | |
| Author: Sukhvir Kaur | 127-131 |
| Alternative Vidhi to Conversion of Cyclic CNF->GNF | |
| Author: Avinash Bansal | 131-132 |
| HRMS: IS THE ROLE CHANGING FROM BEING ADMINISTRATIVE TO STRATEGIC? | |
| Author: Goldy Mahajan, Prof. Versha Mehta | 133-139 |
| NLP TOKEN MATCHING ON DATABASE USING BINARY SEARCH | |
| Author: Ekta Aggarwal, Shreeja Nair | 140-143 |
| Process of Web Usage Mining to find Interesting Patterns from Web Usage Data | |
| Author: Ketul Patel, Dr. A. R. Patel | 144-148 |
| Content Based Image Retrieval using Texture, Color and Shape for Image Analysis | |
| Author: Amanbir Sandhu, Aarti Kochhar | 149-152 |
| Review of Various SEO Techniques for Websites | |
| Author: Manraj Singh, Harmanjit Singh | 170-172 |
| Green computing – The New Era of Energy Efficient Computing | |
| Author: Rupali Dhir | 173-175 |
| A NEW SIMPLIFIED APPROACH TO FIND THE EQUIVALENT RESISTANCE OF ANY COMPLEX EQUAL RESISTIVE NETWORK | |
| Author: Karan Aneja, Vipin Kumar | 176-178 |
| Role of Adjacency Matrix & Adjacency List in Graph Theory | |
| Author: Harmanjit Singh, Richa Sharma | 179-183 |
| ARTIFICIAL NEURAL NETWORK BASED CHARACTER RECOGNITION USING BACKPROPAGAT | |
| Author: Murtaza Abbas Rizvi, Madhup Shrivastava, Monika Sahu | 184-187 |
REVIEW ARTICLE
| LSB Embedding in Spatial Domain - A Review of Improved Techniques | |
| Author: Himani Goyal, Shaveta Chutani | 153-157 |
CASE STUDIES
| Detecting the Sybil Attack in Wireless Sensor Network :Survey | |
| Author: A.V Pramod, Md. Abdul Azeem, M. Om Prakash | 158-161 |
| Performance Evaluation of Image Enhancement Techniques in Spatial and Wavelet Domains | |
| Author: Amardeep Singh Virk, Mandeep Kaur, Lovely Passrija | 162-166 |
| Traveling Salesman Problem: A Case Study | |
| Author: Dr. Leena Jain, Mr. Amit Bhanot | 167-169 |
Best Regards,
Editorial Support Team,
International Journal of Computers & Technology,
Council for Innovative Research, USA.
www.ijctonline.com