International Journal of Computer (IJC

)

ISSN 2307-4531
http://gssrr.org/index.php?journal=InternationalJournalOfComputer&page=index

Volume 8 , No 1, 2012 Table of Contents Articles
Decision Support Systems To Increase Democratic Transparency
Mercy amoorthi
PDF

Information Security And Strategic IT Modeling For Senior Management
Hans Asproth

PDF

Data Mining Supported By Meta-Learning
Aron Borglund

PDF

Performance Evaluation For Multimedia Database System
Raut Singh

PDF

Internet Addiction Among Jordanian University Students.
Feras Fares

PDF

New Tfidf Algorithm For Text Categorization
Schreiber Gunter

PDF

Effect Of Sand Or Soil As A Dietary Component On Potassium Utilization
Moade Shubita

PDF

Hiding Text In Audio
Karmen Biswas

PDF

An Algorithm For Mining Fuzzy Association Rules
Xiao Zhang, Ge Xiuquan, Li Guoqing

PDF

Control of A Cart-Ball System
Liang Yang, Wanli Chen, Fu Wen

PDF

Machine Learning Classification Technique for Cancer Prediction
Suneeta Dieter, Vetrivelan Pandu, Agarwal Beaven

PDF

Analysis Techniques for Power Quality Signals
Luke Watson, Chelsea Bennett, Jose Long

PDF

Energy Reduction in Wireless Sensor Networks
Luke Watson

PDF

Automation of Requirements Analysis
Wolfgang Frankfurter

PDF

New Protection idea for Wireless Sensor Networks from Internal Attacks
Athénaïs Roux, Eya Bertrand

PDF

The Role Of GIS In Geology: Pros And Cons
Verma Vaghela

PDF

Comparing Two Methods Used For Investigation Of The Presence Of Rod-Shaped Bacteria On Food Surface

PDF

International Journal of Computer (IJC) (2013) Volume 00, No 00, pp 00-00
Fang Chan

E-Learning and Its Effects on Teaching
Peigang Zhang

PDF

Analysis of Wireless Routing Protocols
Teodor Streba

PDF

Hand Gesture Recognition Method
Osokam Shadrach

PDF

An Intelligent Plant Identification System
Cao Yukun

PDF

New Security System for Critical Computers
Avgoustos Dieter

PDF

New Multiple Hand Gesture Recognition System
Anupam Agrawal

PDF

Simulation of Traction System for High-Speed Train
Sihui Mu

PDF

SQL Injection in SQL Server: An exploration of vulnerabilities
George Rouskas

PDF

Securing Authentication of TCP/IP Layer
Bharti Nagpal

PDF

E-learning for universities
Cik Vikas

PDF

Internal Location Based System For Mobile Devices
Fang Garcia

PDF

An Optimized Clustering Algorithm
Bogdan Barbier

PDF

Engineering Frameworks for Self Adaptive Systems
Dong Chan

PDF

Reliable Routing For Wireless Adhoc Network
Andrew Shalinie

PDF

A New Fingerprint Identification System
Koladiya Larsson

PDF

Using Genetic Programming To Improve The Quality Of Large Datasets
Javier Garcia

PDF

Feature Detection Using Multilayer Neural Network
Samuel Schmitt

PDF

Bandwidth Recycling Methods In Wide Area Networks
Koladiya Vaghela, Charde Bhargavi

PDF

Improving Intrusion Detection Effectiveness Using Mobile Agents
San Kumar

PDF

Malware Detection Techniques
Maria Osborn

PDF

New Expert System for Spam Detection
Genya Coffey

PDF

APRAM: An Image Segmentation Method
Peter Lamal

PDF

Manufacturing Execution System for Mobiles
Hirsch Robert, Hoch Sebastian, Jager Tim

PDF

Data Mining: A Survey
Shih Cheng

PDF

peer-to-peer systems: Analysis And a Survey
Mendez Reyes

PDF

International Journal of Computer (IJC) (2013) Volume 00, No 00, pp 00-00

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.