About Us
Menu
- Home
- About IJTC
- Call For Paper
- Archives
- Volume 1 (2015)
- October Edition (Volume 1 2015)
- A New Approach to Enhance Security against Mischievous Nodes Using Cooperative Bait Detection Scheme
- To Study The Effect Of Holding Time And Holding Temperature On Hardness And Micro Structure Of Alloy Steel AISI4340
- Detecting forgery in images using alphabetic ordering of extracted blocks
- Optimum Power Utilization for MIMO Wireless Network using signal-to-interference-and-noise (SINR) ratio and optimal transmission power (OTP)
- Overview Of Sybil Attack: Analysis And Detection
- Comparative Study And Analysis Of AODV AND OLSR Protocols In MESH Networks
- REVIEW OF IDS SYSTEM IN LARGE SCALE ADHOC NETWORKS
- Web Service Recommendation System In Data Mining
- Identify The DOS (Denial Of Service) Attack In Wireless ADHOC Network And Tumbling The Influence Of Flooding Caused By DOS Attack In MANETS
- Surface Detection Using Ultrasonic Waves For The Advancement Of Robotics
- Email With Classification Detection Power
- November Edition (Volume 1 2015)
- December Edition (Volume 1 2015)
- October Edition (Volume 1 2015)
- A New Approach to Enhance Security against Mischievous Nodes Using Cooperative Bait Detection Scheme
- To Study The Effect Of Holding Time And Holding Temperature On Hardness And Micro Structure Of Alloy Steel AISI4340
- Detecting forgery in images using alphabetic ordering of extracted blocks
- Optimum Power Utilization for MIMO Wireless Network using signal-to-interference-and-noise (SINR) ratio and optimal transmission power (OTP)
- Overview Of Sybil Attack: Analysis And Detection
- Comparative Study And Analysis Of AODV AND OLSR Protocols In MESH Networks
- REVIEW OF IDS SYSTEM IN LARGE SCALE ADHOC NETWORKS
- Web Service Recommendation System In Data Mining
- Identify The DOS (Denial Of Service) Attack In Wireless ADHOC Network And Tumbling The Influence Of Flooding Caused By DOS Attack In MANETS
- Surface Detection Using Ultrasonic Waves For The Advancement Of Robotics
- Email With Classification Detection Power
- November Edition (Volume 1 2015)
- December Edition (Volume 1 2015)
- October Edition (Volume 1 2015)
- Volume 2 (2016)
- January Edition (Volume 2 2016)
- March Edition (Volume 2 2016)
- April Edition (Volume 2 2016)
- Restoration of Image Using KNN Algorithm
- A Review Paper on Different Classification Techniques Used in News Sentiment Analysis
- Survey Paper on Frequent Pattern Mining on Web Server Logs
- A Novel Method For Enhancing LEACH Protocol With Traffic Management System
- A New Era To Balance The Load On Cloud Using Vector Dot Load Balancing Method
- Performance Enhancement of RECLAT Algorithm Using Map Reduce Technique
- Prevention of ICMP Based Attack Using Leader Election Based Algorithm with MAC Authentication
- Implementation of Model Cloning in Software Models using UML diagrams
- May Edition (Volume 2 2016)
- Functional Test Cases Generation Based on Automated Generated Use Case Diagram using DFS algorithm
- Performance evaluation of Apriori algorithm using association rule mining technique
- A Co-operative Various Attacks Detect for Location Based Application in Secure Network
- Energy Optimization of Leach Protocol in WSN Using NS2 Simulator
- Heat Transfer in Rectangular Micro Channels at Different Plenum Shapes
- Experimental Investigation of Rectangular Microchannels with Different Manifold Arrangements
- Optimization of Friction Stirs Welding of Aluminum 6063 by Using Taguchi Approach
- Introduction to Web Data Mining and Apriori Algorithm
- Self-Offloading of Andriod Applications Exploiting the Resources of Cloud
- Image Registration Evaluation and Comparison of Non-Rigid Transformation Algorithms
- REVIEW ON IMAGE FUSION
- EFFICIENT RESTORATION TECHNIQUE OF IMAGE USING KNN ALGORITHM
- A Review Paper on a Novel Cluster Based Approach for Preventing DOS Attack in VANET
- A REVIEW PAPER TO DETECT AN ISOLATE ATTACK IN WSN AND PROVIDING SECURITY USING RSA AND MD5 ALGORITHMS
- A REVIEW ON SOFTWARE FAULT PREDICTION TECHNIQUE USING DIFFERENT DATASET
- A COLORED IMAGE DENOISING APPROACH BASED ON FUZZY LOGIC
- STUDY OF WEAR BEHAVIOUR OF ALUMINIUM BASED MICRO AND NANO COMPOSITES FABRICATED BY STIR CASTING TECHNIQUE
- AN ENHANCED PAGE RANKING ALGORITHM USING DYNAMIC APPROACH
- EVALUATION OF DESIGN FACTOR FOR PARTIALLY OPEN GROUND STOREY REINFORCED CONCRETE BUILDINGS
- June Edition (Volume 2 2016)
- A REVIEW ON THE VANET TRAFFIC CONGESTION METHODS
- DETECTION AND LOCALIZATION OF SOUND USING ADAPTIVE LEARNING TECHNIQUE
- A REVIEW ON RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
- A REVIEW ON MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
- AN EMPIRICAL INVESTIGATION OF BAD SMELLS IN CODE ON MAINTENANCE EFFORT
- July Edition (Volume 2 2016)
- A NEW ERA FOR RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
- LOAD BALANCING IN MPLS PROTOCOL ACROSS WIRED AND WIRELESS NETWORKS: A SURVEY
- A SURVEY ON FACE RECOGNITION TECHNOLOGIES AND TECHNIQUES
- A REVIEW ON FACE IDENTIFICATIONS SYSTEM USING FUSION METHOD
- A REVIEW ON CLOUD BASED LOAD BALANCING SYSTEM USING HYBRID (OLB+LBMM) TECHNIQUE
- PAGE RANK ALGORITHM BASED ON THE DYNAMIC APPROACH
- A REVIEW ON BALANCING THE LOAD ON CLOUD USING ACCLB HYBRID LOAD BALANCING TECHNIQUE
- LITERATURE SURVEY OF MANETS ROUTING PROTOCOLS
- August Edition (Volume 2 2016)
- REVIEW OF WIRELESS SENSOR NETWORK AND HIERARCHICAL ROUTING PROTOCOLS
- A SYSTEMATIC WAY FOR MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
- IDENTIFICATION OF AODV BASED BLACK HOLE AND GRAY HOLE ATTACKS AND PREVENTION TECHNIQUES IN MANET
- Machine Printed Gurumukhi Numerals Recognition using Convolutional Neural Networks
- Pattern Recognition based Scheduling in Cloud Computing
- K-Nearest Neighbor (kNN) based Product Ranking Model with Minimum Cost Evaluation
- A Systemmatic way to balance the load on cloud using Hybrid (OLB+LBMM) Technique
- A New Era to Balance the Load on Cloud using ACCLB Hybrid Load Balancing Technique
- An Efficient Model for Web Vulnerabilities Detection based on Probabilistic Classification
- Multiple Attribute Based Security of Data in Cloud Computing
- Design and development of overhead detection and improvement system for AOP
- Automated formulation and prioritisation of test path using UML and AOP
- September Edition (Volume 2 2016)
- Web Usage Mining Through FP Split and APRIORI Algorithm
- Base Paper on Estimation of Vehicle Orientation Using Stereo Vision
- A Detailed Improved Structure of Page Ranking Algorithm Using Dynamic Approach
- Dual Layered Response for WBANs based upon Authentication and Authorization Layers
- Evaluate the Performance of COMBO Load Balancing Algorithm in Cloud
- An Approach for Visualization of Big Data Using Nanocubes
- Retinal Vessel Segmentation employing Neural Network and Feature Extraction
- A New Era for Face Identifications System Using Fusion Method
- Implementation of Turbo Codes in MIMO –OFDM system for 4G applications
- Adaptive End-to-End Authentication for the Cloud-based Healthcare Networks
- October Edition (Volume 2 2016)
- Predicting Students’ Performance Using Classification Techniques in Data Mining
- Secure and Proficient Unnamed Air Vehicles Using Encryption Technique and Particle Swarm Optimization Based on Wireless Mesh Network
- A Systematic way to Design New Approach for Technical Steganography based on ACO Algorithm
- Enhanced TPA Scheme to Improve Access Permissions Development Overcloud Architecture
- Performance Analysis of Spark using k-means
- A Review Paper on Translucent Windshield
- Reasons for Lower Literacy among Girls in Himachal Pradesh
- November Edition (Volume 2 2016)
- December Edition (Volume 2 2016)
- Black hole Prevention Mechanism using Hybridization of rule set with Evolutionary Method
- An Approach for Intrusion Detection System using Genetic Algorithm with SVM classification
- A Systematic Review on the Field of Digital Marketing
- Review on Novel Approach of Ethical feedback Analysis
- Technique to Enhance Map Reduce ECLAT Algorithm
- Research into Pattern Recognition Theory and Practical Algorithms based on scheduling in Cloud
- Issue 1 - January Edition (Volume 2 2016)
- Issue 3 - March Edition (Volume 2 2016)
- Issue 4 - April Edition (Volume 2 2016)
- Restoration of Image Using KNN Algorithm
- A Review Paper on Different Classification Techniques Used in News Sentiment Analysis
- Survey Paper on Frequent Pattern Mining on Web Server Logs
- A Novel Method For Enhancing LEACH Protocol With Traffic Management System
- A New Era To Balance The Load On Cloud Using Vector Dot Load Balancing Method
- Performance Enhancement of RECLAT Algorithm Using Map Reduce Technique
- Prevention of ICMP Based Attack Using Leader Election Based Algorithm with MAC Authentication
- Implementation of Model Cloning in Software Models using UML diagrams
- Issue 5 - May Edition (Volume 2 2016)
- Functional Test Cases Generation Based on Automated Generated Use Case Diagram using DFS algorithm
- Performance evaluation of Apriori algorithm using association rule mining technique
- A Co-operative Various Attacks Detect for Location Based Application in Secure Network
- Energy Optimization of Leach Protocol in WSN Using NS2 Simulator
- Heat Transfer in Rectangular Micro Channels at Different Plenum Shapes
- Experimental Investigation of Rectangular Microchannels with Different Manifold Arrangements
- Optimization of Friction Stirs Welding of Aluminum 6063 by Using Taguchi Approach
- Introduction to Web Data Mining and Apriori Algorithm
- Self-Offloading of Andriod Applications Exploiting the Resources of Cloud
- Image Registration Evaluation and Comparison of Non-Rigid Transformation Algorithms
- REVIEW ON IMAGE FUSION
- EFFICIENT RESTORATION TECHNIQUE OF IMAGE USING KNN ALGORITHM
- A Review Paper on a Novel Cluster Based Approach for Preventing DOS Attack in VANET
- A REVIEW PAPER TO DETECT AN ISOLATE ATTACK IN WSN AND PROVIDING SECURITY USING RSA AND MD5 ALGORITHMS
- A REVIEW ON SOFTWARE FAULT PREDICTION TECHNIQUE USING DIFFERENT DATASET
- A COLORED IMAGE DENOISING APPROACH BASED ON FUZZY LOGIC
- STUDY OF WEAR BEHAVIOUR OF ALUMINIUM BASED MICRO AND NANO COMPOSITES FABRICATED BY STIR CASTING TECHNIQUE
- AN ENHANCED PAGE RANKING ALGORITHM USING DYNAMIC APPROACH
- EVALUATION OF DESIGN FACTOR FOR PARTIALLY OPEN GROUND STOREY REINFORCED CONCRETE BUILDINGS
- Issue 6 - June Edition (Volume 2 2016)
- A REVIEW ON THE VANET TRAFFIC CONGESTION METHODS
- DETECTION AND LOCALIZATION OF SOUND USING ADAPTIVE LEARNING TECHNIQUE
- A REVIEW ON RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
- A REVIEW ON MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
- AN EMPIRICAL INVESTIGATION OF BAD SMELLS IN CODE ON MAINTENANCE EFFORT
- Issue 7 - July Edition (Volume 2 2016)
- A NEW ERA FOR RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
- LOAD BALANCING IN MPLS PROTOCOL ACROSS WIRED AND WIRELESS NETWORKS: A SURVEY
- A SURVEY ON FACE RECOGNITION TECHNOLOGIES AND TECHNIQUES
- A REVIEW ON FACE IDENTIFICATIONS SYSTEM USING FUSION METHOD
- A REVIEW ON CLOUD BASED LOAD BALANCING SYSTEM USING HYBRID (OLB+LBMM) TECHNIQUE
- PAGE RANK ALGORITHM BASED ON THE DYNAMIC APPROACH
- A REVIEW ON BALANCING THE LOAD ON CLOUD USING ACCLB HYBRID LOAD BALANCING TECHNIQUE
- LITERATURE SURVEY OF MANETS ROUTING PROTOCOLS
- Issue 8 - August Edition (Volume 2 2016)
- REVIEW OF WIRELESS SENSOR NETWORK AND HIERARCHICAL ROUTING PROTOCOLS
- A SYSTEMATIC WAY FOR MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
- IDENTIFICATION OF AODV BASED BLACK HOLE AND GRAY HOLE ATTACKS AND PREVENTION TECHNIQUES IN MANET
- Machine Printed Gurumukhi Numerals Recognition using Convolutional Neural Networks
- Pattern Recognition based Scheduling in Cloud Computing
- K-Nearest Neighbor (kNN) based Product Ranking Model with Minimum Cost Evaluation
- A Systemmatic way to balance the load on cloud using Hybrid (OLB+LBMM) Technique
- A New Era to Balance the Load on Cloud using ACCLB Hybrid Load Balancing Technique
- An Efficient Model for Web Vulnerabilities Detection based on Probabilistic Classification
- Multiple Attribute Based Security of Data in Cloud Computing
- Design and development of overhead detection and improvement system for AOP
- Automated formulation and prioritisation of test path using UML and AOP
- Issue 9 - September Edition (Volume 2 2016)
- Web Usage Mining Through FP Split and APRIORI Algorithm
- Base Paper on Estimation of Vehicle Orientation Using Stereo Vision
- A Detailed Improved Structure of Page Ranking Algorithm Using Dynamic Approach
- Dual Layered Response for WBANs based upon Authentication and Authorization Layers
- Evaluate the Performance of COMBO Load Balancing Algorithm in Cloud
- An Approach for Visualization of Big Data Using Nanocubes
- Retinal Vessel Segmentation employing Neural Network and Feature Extraction
- A New Era for Face Identifications System Using Fusion Method
- Implementation of Turbo Codes in MIMO –OFDM system for 4G applications
- Adaptive End-to-End Authentication for the Cloud-based Healthcare Networks
- Issue 10 - October Edition (Volume 2 2016)
- Predicting Students’ Performance Using Classification Techniques in Data Mining
- Secure and Proficient Unnamed Air Vehicles Using Encryption Technique and Particle Swarm Optimization Based on Wireless Mesh Network
- A Systematic way to Design New Approach for Technical Steganography based on ACO Algorithm
- Enhanced TPA Scheme to Improve Access Permissions Development Overcloud Architecture
- Performance Analysis of Spark using k-means
- A Review Paper on Translucent Windshield
- Reasons for Lower Literacy among Girls in Himachal Pradesh
- Issue 11 - November Edition (Volume 2 2016)
- Issue 12 - December Edition (Volume 2 2016)
- Black hole Prevention Mechanism using Hybridization of rule set with Evolutionary Method
- An Approach for Intrusion Detection System using Genetic Algorithm with SVM classification
- A Systematic Review on the Field of Digital Marketing
- Review on Novel Approach of Ethical feedback Analysis
- Technique to Enhance Map Reduce ECLAT Algorithm
- Research into Pattern Recognition Theory and Practical Algorithms based on scheduling in Cloud
- Volume 3 (2017)
- Feburary Edition (Volume 3 2017)
- A Systematic Review on An Artificial Bee Colony optimized approach for segmentation of blood vessels using Neural Networks
- Review Paper on Transliteration Method of Nouns
- To Maintain the Privacy in Moveable Sink to Prevent Active and Passive Attacks
- Black Hole and Gray Hole attacks and Prevention Techniques in WSN
- An Evaluation Study on Compression Techniques in Hadoop
- Improvement in Dynamic Clustering using Genetic Analysis Based Mechanism
- March Edition (Volume 3 2017)
- Review Paper on Batch Processing and Stream Processing
- Spatio Spectral Features Based Skin Lesions Segmentation Using Euclidean Distance
- Optimum Power Utilization for MIMO Wireless Network
- Quick Response Content based Image Retrieval (QR-CBIR) using Hybrid Feature Descriptor
- A Reliable Punjabi to English Machine Transliteration System for Proper Noun
- April Edition (Volume 3 2017)
- Heart Disease Prediction System Using Data Mining Techniques - A Review
- A Review on Various Approaches of Brain Tumor Detection in Medical Images
- To Investigate the Effect of Vibration on Electrical Discharge Machining of AISI H13 Die Steel
- Review paper on Safety issues of Memory Management in Cloud Computing
- May Edition (Volume 3 2017)
- Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
- Classification of Brain tumor using texture features with segmentation & FFNN approach: A Synopsis
- Review Paper on Workload Characteristics and Resource Aware Hadoop Scheduler
- A Review on Energy Efficient Routing in Wireless Sensor Networks
- Trending Routing Protocols in Wireless Communication – A Review
- Extraction Based Lung Cancer Recognition: A Survey
- Review paper on Traffic Route Scheduling in Road Networks
- Copy Move Forgery Image Classification with Orientation Based Features by EM Algorithm
- A Survey on Energy Optimization Approaches in Ad-Hoc Networks
- June Edition (Volume 3 2017)
- Mitigation of Network Security Threat in Cyber World
- A Review on Data Mining Model to Predict Coronary Artery Disease
- Comparative Analysis of Various File Formats in HIVE
- A New Era For Image Enhancement Using Spatial Domain Filtering
- A Systematic Way To Image Enhancement Using Transform Domain Method For X-Ray Images
- Elemental Approach for High Performance Real Time Streaming Analytics Platform
- An evaluation on Shortest Path in Road Transportation Networks
- A Review Study of an Evaluation on Safety Issue in Clod Computing Using Memory Management
- A Review Paper on Routing Protocol and Network Security
- Enhanced Video Classification by Time Domain Features Using SVM & RB Kernel Function
- A Data Mining Model to Predict Coronary Artery Disease using Cleveland CAD dataset
- Data Storage and Integrity Preserving Framework for Cloud Using a Cryptosystem
- Review-Content Based Image Retrieval with Methods and Types
- A Review on Facial Emotion Authentication
- July Edition (Volume 3 2017)
- Segmentation of Retinal Blood Vessels using Sub-blocking and Weighted Sum Method
- The Survey Of The Heart Disease Detection Technques In Data Mining
- An Optimize Feature Extraction Approach for Facial Emotion Detection System
- An Optimized Energy Conservation to Increase Network Lifetime Approach in Mobile Ad-Hoc Networks
- Updated Energy Effective Routing Algorithm for Event-driven Wireless Sensor Networks
- Hybrid Feature based CBIR Model using Color and Texture Oriented Features
- Research Paper on Updated Energy Effective Routing Algorithm for Event-Driven Wireless Sensor Networks with Results
- An Enhanced Approach for Highly Reputed Authenticated Routing in MANET
- A Review on Effectual Techniques in Mobile Ad-Hoc Networks
- A Precise Hybrid Approach for Energy Conservation in Mobile Ad-Hoc Networks
- Evaluation of Optimal Mobility-Speed of Mobile Nodes in GRP Enabled MANET
- A Survey on Safety Intimidations in Mobile Ad-Hoc Networks
- A Review on Uncertainties in Mobile Ad-Hoc Networks
- An Efficient Learning Based Lung Cancer Diagnostics System
- A New Era To Handle The Critical Sections Problem Using Token Based Scheme
- Techniques Of Encryption And Decryption in Cloud Computing- A Review
- Routing Protocols of MANETS: A Review
- A New Data Mining Technique in Cloud Big Data Environment
- August Edition (Volume 3 2017)
- Research Paper on Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
- Review Study on New Era of Android Kotlin
- Classification of Brain Tumor Using Texture Features with Segmentation & FFNN Approach
- A Rotation-Invariant Fingerprint Identifications System Using Neural Network
- A Survey on Different Types of Load Balancing Techniques and Its Characteristics Used In Cloud Computing
- Data Store using Encryption Technique with in Cloud Computing: A Research
- A Fuzzy Neural Network Based Approach for CBIR
- Image Encryption Using Two Dimensional Modified Sine Logistic Map
- Services, Technologies and Issues in M-Banking
- An Assessment of Security Aspects in E-Business through Transaction Monitoring
- E-Banking Adoption: A Study of Privacy and Trust
- Study and Review the Black Hole Attack and Grey Hole Attack
- A Review Paper on Cyber security and Accept it as a Challenge
- A Review Study on Net Trap Description Tool
- A Review Study on Blue Brain Technology
- Searching Of Web Pages by Using the Page Rank Algorithm
- A review study on Boggling
- September Edition (Volume 3 2017)
- A Refined Alternative to the Traditional Database Record System Services
- Text Exclusion from Document Images and Number Plate using MATLAB
- A Study of Protection Issues Behaviour in Cloud Computing Method
- Self Organizing Maps (SOM) with Moving Average features for Stock Market Prediction
- Improved Security of Iris Template using RLE and State Transition Optimization Algorithm
- Analysis of IPV-4 and IPV-6 in Networking
- Categorization of Copy-Move Fake and Normal Images By ORB Features and SVM Classifier
- Implementation to Improve Quality of Compressed Image Using Updated Huffman Algorithm
- A Review Study on Image Filter Scheming for Advanced Feature Recognition and Segmentation using Digital Image Processing
- October Edition (Volume 3 2017)
- Implementation Scaling Image Using Bilinear Interpolation
- An Efficient Optimize Approach to Mitigate the Effect of Sybil Attacks in Highly Dense MANET Systems
- Review the impact of Distributed Denial of Service Attack on Real Networks
- Review Study on Generation of Electricity from an Ordinary Fan
- An Optimize Approach to Reduce the Uncertainties in Mobile Adhoc Networks Using Firefly Optimization
- A Survey of Reliable Transfer on Multi-Radio Multi-Channel Techniques in Wireless Mesh Networks
- Comparative Analysis and Prevention of DDOS Attack in Sensor Network
- Dynamic Query Mechanism for Rapid Data Extraction using ETL Process
- November Edition (Volume 3 2017)
- December Edition (Volume 3 2017)
- Issue 1 - January Edition (Volume 3 2017)
- Issue 2 - February Edition (Volume 3 2017)
- A Systematic Review on An Artificial Bee Colony optimized approach for segmentation of blood vessels using Neural Networks
- Review Paper on Transliteration Method of Nouns
- To Maintain the Privacy in Moveable Sink to Prevent Active and Passive Attacks
- Black Hole and Gray Hole attacks and Prevention Techniques in WSN
- An Evaluation Study on Compression Techniques in Hadoop
- Improvement in Dynamic Clustering using Genetic Analysis Based Mechanism
- Issue 3 - March Edition (Volume 3 2017)
- Review Paper on Batch Processing and Stream Processing
- Spatio Spectral Features Based Skin Lesions Segmentation Using Euclidean Distance
- Optimum Power Utilization for MIMO Wireless Network
- Quick Response Content based Image Retrieval (QR-CBIR) using Hybrid Feature Descriptor
- A Reliable Punjabi to English Machine Transliteration System for Proper Noun
- Issue 4 - April Edition (Volume 3 2017)
- Heart Disease Prediction System Using Data Mining Techniques - A Review
- A Review on Various Approaches of Brain Tumor Detection in Medical Images
- To Investigate the Effect of Vibration on Electrical Discharge Machining of AISI H13 Die Steel
- Review paper on Safety issues of Memory Management in Cloud Computing
- Issue 5 - May Edition (Volume 3 2017)
- Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
- Classification of Brain tumor using texture features with segmentation & FFNN approach: A Synopsis
- Review Paper on Workload Characteristics and Resource Aware Hadoop Scheduler
- A Review on Energy Efficient Routing in Wireless Sensor Networks
- Trending Routing Protocols in Wireless Communication – A Review
- Extraction Based Lung Cancer Recognition: A Survey
- Review paper on Traffic Route Scheduling in Road Networks
- Copy Move Forgery Image Classification with Orientation Based Features by EM Algorithm
- A Survey on Energy Optimization Approaches in Ad-Hoc Networks
- Issue 6 - June Edition (Volume 3 2017)
- Mitigation of Network Security Threat in Cyber World
- A Review on Data Mining Model to Predict Coronary Artery Disease
- Comparative Analysis of Various File Formats in HIVE
- A New Era For Image Enhancement Using Spatial Domain Filtering
- A Systematic Way To Image Enhancement Using Transform Domain Method For X-Ray Images
- Elemental Approach for High Performance Real Time Streaming Analytics Platform
- An evaluation on Shortest Path in Road Transportation Networks
- A Review Study of an Evaluation on Safety Issue in Clod Computing Using Memory Management
- A Review Paper on Routing Protocol and Network Security
- Enhanced Video Classification by Time Domain Features Using SVM & RB Kernel Function
- A Data Mining Model to Predict Coronary Artery Disease using Cleveland CAD dataset
- Data Storage and Integrity Preserving Framework for Cloud Using a Cryptosystem
- Review-Content Based Image Retrieval with Methods and Types
- A Review on Facial Emotion Authentication
- Issue 7 - July Edition (Volume 3 2017)
- Segmentation of Retinal Blood Vessels using Sub-blocking and Weighted Sum Method
- The Survey Of The Heart Disease Detection Technques In Data Mining
- An Optimize Feature Extraction Approach for Facial Emotion Detection System
- An Optimized Energy Conservation to Increase Network Lifetime Approach in Mobile Ad-Hoc Networks
- Updated Energy Effective Routing Algorithm for Event-driven Wireless Sensor Networks
- Hybrid Feature based CBIR Model using Color and Texture Oriented Features
- Research Paper on Updated Energy Effective Routing Algorithm for Event-Driven Wireless Sensor Networks with Results
- An Enhanced Approach for Highly Reputed Authenticated Routing in MANET
- A Review on Effectual Techniques in Mobile Ad-Hoc Networks
- A Precise Hybrid Approach for Energy Conservation in Mobile Ad-Hoc Networks
- Evaluation of Optimal Mobility-Speed of Mobile Nodes in GRP Enabled MANET
- A Survey on Safety Intimidations in Mobile Ad-Hoc Networks
- A Review on Uncertainties in Mobile Ad-Hoc Networks
- An Efficient Learning Based Lung Cancer Diagnostics System
- A New Era To Handle The Critical Sections Problem Using Token Based Scheme
- Techniques Of Encryption And Decryption in Cloud Computing- A Review
- Routing Protocols of MANETS: A Review
- A New Data Mining Technique in Cloud Big Data Environment
- Issue 8 - August Edition (Volume 3 2017)
- Research Paper on Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
- Review Study on New Era of Android Kotlin
- Classification of Brain Tumor Using Texture Features with Segmentation & FFNN Approach
- A Rotation-Invariant Fingerprint Identifications System Using Neural Network
- A Survey on Different Types of Load Balancing Techniques and Its Characteristics Used In Cloud Computing
- Data Store using Encryption Technique with in Cloud Computing: A Research
- A Fuzzy Neural Network Based Approach for CBIR
- Image Encryption Using Two Dimensional Modified Sine Logistic Map
- Services, Technologies and Issues in M-Banking
- An Assessment of Security Aspects in E-Business through Transaction Monitoring
- E-Banking Adoption: A Study of Privacy and Trust
- Study and Review the Black Hole Attack and Grey Hole Attack
- A Review Paper on Cyber security and Accept it as a Challenge
- A Review Study on Net Trap Description Tool
- A Review Study on Blue Brain Technology
- Searching Of Web Pages by Using the Page Rank Algorithm
- A review study on Boggling
- Issue 9 - September Edition (Volume 3 2017)
- A Refined Alternative to the Traditional Database Record System Services
- Text Exclusion from Document Images and Number Plate using MATLAB
- A Study of Protection Issues Behaviour in Cloud Computing Method
- Self Organizing Maps (SOM) with Moving Average features for Stock Market Prediction
- Improved Security of Iris Template using RLE and State Transition Optimization Algorithm
- Analysis of IPV-4 and IPV-6 in Networking
- Categorization of Copy-Move Fake and Normal Images By ORB Features and SVM Classifier
- Implementation to Improve Quality of Compressed Image Using Updated Huffman Algorithm
- A Review Study on Image Filter Scheming for Advanced Feature Recognition and Segmentation using Digital Image Processing
- Issue 10 - October Edition (Volume 3 2017)
- Implementation Scaling Image Using Bilinear Interpolation
- An Efficient Optimize Approach to Mitigate the Effect of Sybil Attacks in Highly Dense MANET Systems
- Review the impact of Distributed Denial of Service Attack on Real Networks
- Review Study on Generation of Electricity from an Ordinary Fan
- An Optimize Approach to Reduce the Uncertainties in Mobile Adhoc Networks Using Firefly Optimization
- A Survey of Reliable Transfer on Multi-Radio Multi-Channel Techniques in Wireless Mesh Networks
- Comparative Analysis and Prevention of DDOS Attack in Sensor Network
- Dynamic Query Mechanism for Rapid Data Extraction using ETL Process
- Issue 11 - November Edition (Volume 3 2017)
- Issue 12 - December Edition (Volume 3 2017)
- Feburary Edition (Volume 3 2017)
- Volume 4 (2018)
- March Edition (Volume 4 2018)
- April Edition (Volume 4 2018)
- An Evaluation of Deep Thoughts in Cryptography Principles
- An Evaluation of Prevent Hacking all the way through Cyber Security
- Security Techniques of Mobile Ad hoc Networks: A Review
- Analysis of Plant Disease Detection
- A Review Paper on Advance Feature Finding and Segmentation Image Processing
- Review Paper on Prediction of Regional Disease Using Classification Techniques
- Masking using Format Preserving Encryption
- May Edition (Volume 4 2018)
- June Edition (Volume 4 2018)
- July Edition (Volume 4 2018)
- Neural Network Based Optimized Technique for Detection of Blood Vessels in Retina
- Review Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
- Survey Paper: To Evaluate the Performance of KNN Algorithm for Face Spoofing
- A Proposed Technique in IoT Based Parking System Using Bar Code Technology
- Propose and Evaluate Classification Technique for Heart Disease Prediction
- Research Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
- August Edition (Volume 4 2018)
- September Edition (Volume 4 2018)
- October Edition (Volume 4 2018)
- November Edition (Volume 4 2018)
- December Edition (Volume 4 2018)
- A New Mammography Image Classification System by Deep Learning and Feature Selection
- Performance Evaluation of IEEE802.21-Media Independent Handover for Heterogeneous Networks
- A Simulative Analysis of Routing Protocols for LR-WPAN
- Bearing Fault Detection using Ensemble Empirical Mode Decomposition integrated with Teager Kaiser Energy Method
- Issue 1 - January Edition (Volume 4 2018)
- Issue 2 - February Edition (Volume 4 2018)
- Enhanced Data Aggregation Schema for Load Balancing in Wireless Sensor Network Using Gateways
- A Review Study on Combined Battery Energy Extender cum Booster and Technique
- A Review Study on Cloud Computing and Its Issues and Challenges
- Comparative Analysis of AODV and DSR Routing Protocols in MANETs
- A Review Paper on Contravention the Curse of Dimensionality for Machine Erudition on Genomic Data
- Issue 3 - March Edition (Volume 4 2018)
- Issue 4 - April Edition (Volume 4 2018)
- An Evaluation of Deep Thoughts in Cryptography Principles
- An Evaluation of Prevent Hacking all the way through Cyber Security
- Security Techniques of Mobile Ad hoc Networks: A Review
- Analysis of Plant Disease Detection
- A Review Paper on Advance Feature Finding and Segmentation Image Processing
- Review Paper on Prediction of Regional Disease Using Classification Techniques
- Masking using Format Preserving Encryption
- Issue 5 - May Edition (Volume 4 2018)
- Issue 6 - June Edition (Volume 4 2018)
- Issue 7 - July Edition (Volume 4 2018)
- Neural Network Based Optimized Technique for Detection of Blood Vessels in Retina
- Review Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
- Survey Paper: To Evaluate the Performance of KNN Algorithm for Face Spoofing
- A Proposed Technique in IoT Based Parking System Using Bar Code Technology
- Propose and Evaluate Classification Technique for Heart Disease Prediction
- Research Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
- Issue 8 - August Edition (Volume 4 2018)
- Issue 9 - September Edition (Volume 4 2018)
- Issue 10 - October Edition (Volume 4 2018)
- Issue 11 - November Edition (Volume 4 2018)
- Issue 12 - December Edition (Volume 4 2018)
- A New Mammography Image Classification System by Deep Learning and Feature Selection
- Performance Evaluation of IEEE802.21-Media Independent Handover for Heterogeneous Networks
- A Simulative Analysis of Routing Protocols for LR-WPAN
- Bearing Fault Detection using Ensemble Empirical Mode Decomposition integrated with Teager Kaiser Energy Method
- Volume 5 (2019)
- January Edition (Volume 5 2019)
- February Edition (Volume 5 2019)
- March Edition (Volume 5 2019)
- A Review Paper on Smart Irrigation Basis of Internet of Things
- A Review Study on Cloud Computing Latency Reduction Approaches
- A Review SWOT UP on 5G Technology Boon or BANE
- Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
- Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
- April Edition (Volume 5 2019)
- May Edition (Volume 5 2019)
- June Edition (Volume 5 2019)
- An Effectual Review on Energy Clustering In Real
- Discussion of Threat Issues in MANET: A Brief Review
- A Robust Multimodal Biometric Traits Using Iris and Fingerprint Fusion
- Review on Advanced Threat Detection Techniques for IoT Networks
- Engagement Predictions in an ELS-E Learning System Using Data Mining: A Review
- July Edition (Volume 5 2019)
- An Effectual Clustering Approach for Low Energy Consumption in Sensor Networks
- An Effectual Optimization for Low Packet Losses in Sensor Networks
- An Effectual Instance to Mitigate Threat in Dense Mobile Ad-Hoc Network
- Data Mining based Student Engagement Predictions in an e-Learning System: A Review
- Review on Threats in Prospective of Secure Mobile Ad-Hoc Networks
- An Improved Datamining Approach for Student Engagement Predictions Systems (SEPS)
- August Edition (Volume 5 2019)
- September Edition (Volume 5 2019)
- December Edition (Volume 5 2019)
- Issue 3 - March Edition (Volume 5 2019)
- A Review Paper on Smart Irrigation Basis of Internet of Things
- A Review Study on Cloud Computing Latency Reduction Approaches
- A Review SWOT UP on 5G Technology Boon or BANE
- Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
- Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
- Issue 5 - May Edition (Volume 5 2019)
- Issue 4 - April Edition (Volume 5 2019)
- Issue 6 - June Edition (Volume 5 2019)
- An Effectual Review on Energy Clustering In Real
- Discussion of Threat Issues in MANET: A Brief Review
- A Robust Multimodal Biometric Traits Using Iris and Fingerprint Fusion
- Review on Advanced Threat Detection Techniques for IoT Networks
- Engagement Predictions in an ELS-E Learning System Using Data Mining: A Review
- Issue 7 - July Edition (Volume 5 2019)
- An Effectual Clustering Approach for Low Energy Consumption in Sensor Networks
- An Effectual Optimization for Low Packet Losses in Sensor Networks
- An Effectual Instance to Mitigate Threat in Dense Mobile Ad-Hoc Network
- Data Mining based Student Engagement Predictions in an e-Learning System: A Review
- Review on Threats in Prospective of Secure Mobile Ad-Hoc Networks
- An Improved Datamining Approach for Student Engagement Predictions Systems (SEPS)
- Issue 8 - August Edition (Volume 5 2019)
- Issue 9 - September Edition (Volume 5 2019)
- Issue 12 - December Edition (Volume 5 2019)
- Volume 6 (2020)
- January Edition (Volume 6 2020)
- February Edition (Volume 6 2020)
- July Edition (Volume 6 2020)
- September Edition (Volume 6 2020)
- Volume 1 (2015)
- October Edition (Volume 1 2015)
- A New Approach to Enhance Security against Mischievous Nodes Using Cooperative Bait Detection Scheme
- To Study The Effect Of Holding Time And Holding Temperature On Hardness And Micro Structure Of Alloy Steel AISI4340
- Detecting forgery in images using alphabetic ordering of extracted blocks
- Optimum Power Utilization for MIMO Wireless Network using signal-to-interference-and-noise (SINR) ratio and optimal transmission power (OTP)
- Overview Of Sybil Attack: Analysis And Detection
- Comparative Study And Analysis Of AODV AND OLSR Protocols In MESH Networks
- REVIEW OF IDS SYSTEM IN LARGE SCALE ADHOC NETWORKS
- Web Service Recommendation System In Data Mining
- Identify The DOS (Denial Of Service) Attack In Wireless ADHOC Network And Tumbling The Influence Of Flooding Caused By DOS Attack In MANETS
- Surface Detection Using Ultrasonic Waves For The Advancement Of Robotics
- Email With Classification Detection Power
- November Edition (Volume 1 2015)
- December Edition (Volume 1 2015)
- October Edition (Volume 1 2015)
- IJTC Forms
- Volume 2 (2016)
- Issue 1 - January Edition (Volume 2 2016)
- Issue 3 - March Edition (Volume 2 2016)
- Issue 4 - April Edition (Volume 2 2016)
- Restoration of Image Using KNN Algorithm
- A Review Paper on Different Classification Techniques Used in News Sentiment Analysis
- Survey Paper on Frequent Pattern Mining on Web Server Logs
- A Novel Method For Enhancing LEACH Protocol With Traffic Management System
- A New Era To Balance The Load On Cloud Using Vector Dot Load Balancing Method
- Performance Enhancement of RECLAT Algorithm Using Map Reduce Technique
- Prevention of ICMP Based Attack Using Leader Election Based Algorithm with MAC Authentication
- Implementation of Model Cloning in Software Models using UML diagrams
- Issue 5 - May Edition (Volume 2 2016)
- Functional Test Cases Generation Based on Automated Generated Use Case Diagram using DFS algorithm
- Performance evaluation of Apriori algorithm using association rule mining technique
- A Co-operative Various Attacks Detect for Location Based Application in Secure Network
- Energy Optimization of Leach Protocol in WSN Using NS2 Simulator
- Heat Transfer in Rectangular Micro Channels at Different Plenum Shapes
- Experimental Investigation of Rectangular Microchannels with Different Manifold Arrangements
- Optimization of Friction Stirs Welding of Aluminum 6063 by Using Taguchi Approach
- Introduction to Web Data Mining and Apriori Algorithm
- Self-Offloading of Andriod Applications Exploiting the Resources of Cloud
- Image Registration Evaluation and Comparison of Non-Rigid Transformation Algorithms
- REVIEW ON IMAGE FUSION
- EFFICIENT RESTORATION TECHNIQUE OF IMAGE USING KNN ALGORITHM
- A Review Paper on a Novel Cluster Based Approach for Preventing DOS Attack in VANET
- A REVIEW PAPER TO DETECT AN ISOLATE ATTACK IN WSN AND PROVIDING SECURITY USING RSA AND MD5 ALGORITHMS
- A REVIEW ON SOFTWARE FAULT PREDICTION TECHNIQUE USING DIFFERENT DATASET
- A COLORED IMAGE DENOISING APPROACH BASED ON FUZZY LOGIC
- STUDY OF WEAR BEHAVIOUR OF ALUMINIUM BASED MICRO AND NANO COMPOSITES FABRICATED BY STIR CASTING TECHNIQUE
- AN ENHANCED PAGE RANKING ALGORITHM USING DYNAMIC APPROACH
- EVALUATION OF DESIGN FACTOR FOR PARTIALLY OPEN GROUND STOREY REINFORCED CONCRETE BUILDINGS
- Issue 6 - June Edition (Volume 2 2016)
- A REVIEW ON THE VANET TRAFFIC CONGESTION METHODS
- DETECTION AND LOCALIZATION OF SOUND USING ADAPTIVE LEARNING TECHNIQUE
- A REVIEW ON RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
- A REVIEW ON MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
- AN EMPIRICAL INVESTIGATION OF BAD SMELLS IN CODE ON MAINTENANCE EFFORT
- Issue 7 - July Edition (Volume 2 2016)
- A NEW ERA FOR RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
- LOAD BALANCING IN MPLS PROTOCOL ACROSS WIRED AND WIRELESS NETWORKS: A SURVEY
- A SURVEY ON FACE RECOGNITION TECHNOLOGIES AND TECHNIQUES
- A REVIEW ON FACE IDENTIFICATIONS SYSTEM USING FUSION METHOD
- A REVIEW ON CLOUD BASED LOAD BALANCING SYSTEM USING HYBRID (OLB+LBMM) TECHNIQUE
- PAGE RANK ALGORITHM BASED ON THE DYNAMIC APPROACH
- A REVIEW ON BALANCING THE LOAD ON CLOUD USING ACCLB HYBRID LOAD BALANCING TECHNIQUE
- LITERATURE SURVEY OF MANETS ROUTING PROTOCOLS
- Issue 8 - August Edition (Volume 2 2016)
- REVIEW OF WIRELESS SENSOR NETWORK AND HIERARCHICAL ROUTING PROTOCOLS
- A SYSTEMATIC WAY FOR MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
- IDENTIFICATION OF AODV BASED BLACK HOLE AND GRAY HOLE ATTACKS AND PREVENTION TECHNIQUES IN MANET
- Machine Printed Gurumukhi Numerals Recognition using Convolutional Neural Networks
- Pattern Recognition based Scheduling in Cloud Computing
- K-Nearest Neighbor (kNN) based Product Ranking Model with Minimum Cost Evaluation
- A Systemmatic way to balance the load on cloud using Hybrid (OLB+LBMM) Technique
- A New Era to Balance the Load on Cloud using ACCLB Hybrid Load Balancing Technique
- An Efficient Model for Web Vulnerabilities Detection based on Probabilistic Classification
- Multiple Attribute Based Security of Data in Cloud Computing
- Design and development of overhead detection and improvement system for AOP
- Automated formulation and prioritisation of test path using UML and AOP
- Issue 9 - September Edition (Volume 2 2016)
- Web Usage Mining Through FP Split and APRIORI Algorithm
- Base Paper on Estimation of Vehicle Orientation Using Stereo Vision
- A Detailed Improved Structure of Page Ranking Algorithm Using Dynamic Approach
- Dual Layered Response for WBANs based upon Authentication and Authorization Layers
- Evaluate the Performance of COMBO Load Balancing Algorithm in Cloud
- An Approach for Visualization of Big Data Using Nanocubes
- Retinal Vessel Segmentation employing Neural Network and Feature Extraction
- A New Era for Face Identifications System Using Fusion Method
- Implementation of Turbo Codes in MIMO –OFDM system for 4G applications
- Adaptive End-to-End Authentication for the Cloud-based Healthcare Networks
- Issue 10 - October Edition (Volume 2 2016)
- Predicting Students’ Performance Using Classification Techniques in Data Mining
- Secure and Proficient Unnamed Air Vehicles Using Encryption Technique and Particle Swarm Optimization Based on Wireless Mesh Network
- A Systematic way to Design New Approach for Technical Steganography based on ACO Algorithm
- Enhanced TPA Scheme to Improve Access Permissions Development Overcloud Architecture
- Performance Analysis of Spark using k-means
- A Review Paper on Translucent Windshield
- Reasons for Lower Literacy among Girls in Himachal Pradesh
- Issue 11 - November Edition (Volume 2 2016)
- Issue 12 - December Edition (Volume 2 2016)
- Black hole Prevention Mechanism using Hybridization of rule set with Evolutionary Method
- An Approach for Intrusion Detection System using Genetic Algorithm with SVM classification
- A Systematic Review on the Field of Digital Marketing
- Review on Novel Approach of Ethical feedback Analysis
- Technique to Enhance Map Reduce ECLAT Algorithm
- Research into Pattern Recognition Theory and Practical Algorithms based on scheduling in Cloud
- Volume 3 (2017)
- Issue 1 - January Edition (Volume 3 2017)
- Issue 2 - February Edition (Volume 3 2017)
- A Systematic Review on An Artificial Bee Colony optimized approach for segmentation of blood vessels using Neural Networks
- Review Paper on Transliteration Method of Nouns
- To Maintain the Privacy in Moveable Sink to Prevent Active and Passive Attacks
- Black Hole and Gray Hole attacks and Prevention Techniques in WSN
- An Evaluation Study on Compression Techniques in Hadoop
- Improvement in Dynamic Clustering using Genetic Analysis Based Mechanism
- Issue 3 - March Edition (Volume 3 2017)
- Review Paper on Batch Processing and Stream Processing
- Spatio Spectral Features Based Skin Lesions Segmentation Using Euclidean Distance
- Optimum Power Utilization for MIMO Wireless Network
- Quick Response Content based Image Retrieval (QR-CBIR) using Hybrid Feature Descriptor
- A Reliable Punjabi to English Machine Transliteration System for Proper Noun
- Issue 4 - April Edition (Volume 3 2017)
- Heart Disease Prediction System Using Data Mining Techniques - A Review
- A Review on Various Approaches of Brain Tumor Detection in Medical Images
- To Investigate the Effect of Vibration on Electrical Discharge Machining of AISI H13 Die Steel
- Review paper on Safety issues of Memory Management in Cloud Computing
- Issue 5 - May Edition (Volume 3 2017)
- Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
- Classification of Brain tumor using texture features with segmentation & FFNN approach: A Synopsis
- Review Paper on Workload Characteristics and Resource Aware Hadoop Scheduler
- A Review on Energy Efficient Routing in Wireless Sensor Networks
- Trending Routing Protocols in Wireless Communication – A Review
- Extraction Based Lung Cancer Recognition: A Survey
- Review paper on Traffic Route Scheduling in Road Networks
- Copy Move Forgery Image Classification with Orientation Based Features by EM Algorithm
- A Survey on Energy Optimization Approaches in Ad-Hoc Networks
- Issue 6 - June Edition (Volume 3 2017)
- Mitigation of Network Security Threat in Cyber World
- A Review on Data Mining Model to Predict Coronary Artery Disease
- Comparative Analysis of Various File Formats in HIVE
- A New Era For Image Enhancement Using Spatial Domain Filtering
- A Systematic Way To Image Enhancement Using Transform Domain Method For X-Ray Images
- Elemental Approach for High Performance Real Time Streaming Analytics Platform
- An evaluation on Shortest Path in Road Transportation Networks
- A Review Study of an Evaluation on Safety Issue in Clod Computing Using Memory Management
- A Review Paper on Routing Protocol and Network Security
- Enhanced Video Classification by Time Domain Features Using SVM & RB Kernel Function
- A Data Mining Model to Predict Coronary Artery Disease using Cleveland CAD dataset
- Data Storage and Integrity Preserving Framework for Cloud Using a Cryptosystem
- Review-Content Based Image Retrieval with Methods and Types
- A Review on Facial Emotion Authentication
- Issue 7 - July Edition (Volume 3 2017)
- Segmentation of Retinal Blood Vessels using Sub-blocking and Weighted Sum Method
- The Survey Of The Heart Disease Detection Technques In Data Mining
- An Optimize Feature Extraction Approach for Facial Emotion Detection System
- An Optimized Energy Conservation to Increase Network Lifetime Approach in Mobile Ad-Hoc Networks
- Updated Energy Effective Routing Algorithm for Event-driven Wireless Sensor Networks
- Hybrid Feature based CBIR Model using Color and Texture Oriented Features
- Research Paper on Updated Energy Effective Routing Algorithm for Event-Driven Wireless Sensor Networks with Results
- An Enhanced Approach for Highly Reputed Authenticated Routing in MANET
- A Review on Effectual Techniques in Mobile Ad-Hoc Networks
- A Precise Hybrid Approach for Energy Conservation in Mobile Ad-Hoc Networks
- Evaluation of Optimal Mobility-Speed of Mobile Nodes in GRP Enabled MANET
- A Survey on Safety Intimidations in Mobile Ad-Hoc Networks
- A Review on Uncertainties in Mobile Ad-Hoc Networks
- An Efficient Learning Based Lung Cancer Diagnostics System
- A New Era To Handle The Critical Sections Problem Using Token Based Scheme
- Techniques Of Encryption And Decryption in Cloud Computing- A Review
- Routing Protocols of MANETS: A Review
- A New Data Mining Technique in Cloud Big Data Environment
- Issue 8 - August Edition (Volume 3 2017)
- Research Paper on Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
- Review Study on New Era of Android Kotlin
- Classification of Brain Tumor Using Texture Features with Segmentation & FFNN Approach
- A Rotation-Invariant Fingerprint Identifications System Using Neural Network
- A Survey on Different Types of Load Balancing Techniques and Its Characteristics Used In Cloud Computing
- Data Store using Encryption Technique with in Cloud Computing: A Research
- A Fuzzy Neural Network Based Approach for CBIR
- Image Encryption Using Two Dimensional Modified Sine Logistic Map
- Services, Technologies and Issues in M-Banking
- An Assessment of Security Aspects in E-Business through Transaction Monitoring
- E-Banking Adoption: A Study of Privacy and Trust
- Study and Review the Black Hole Attack and Grey Hole Attack
- A Review Paper on Cyber security and Accept it as a Challenge
- A Review Study on Net Trap Description Tool
- A Review Study on Blue Brain Technology
- Searching Of Web Pages by Using the Page Rank Algorithm
- A review study on Boggling
- Issue 9 - September Edition (Volume 3 2017)
- A Refined Alternative to the Traditional Database Record System Services
- Text Exclusion from Document Images and Number Plate using MATLAB
- A Study of Protection Issues Behaviour in Cloud Computing Method
- Self Organizing Maps (SOM) with Moving Average features for Stock Market Prediction
- Improved Security of Iris Template using RLE and State Transition Optimization Algorithm
- Analysis of IPV-4 and IPV-6 in Networking
- Categorization of Copy-Move Fake and Normal Images By ORB Features and SVM Classifier
- Implementation to Improve Quality of Compressed Image Using Updated Huffman Algorithm
- A Review Study on Image Filter Scheming for Advanced Feature Recognition and Segmentation using Digital Image Processing
- Issue 10 - October Edition (Volume 3 2017)
- Implementation Scaling Image Using Bilinear Interpolation
- An Efficient Optimize Approach to Mitigate the Effect of Sybil Attacks in Highly Dense MANET Systems
- Review the impact of Distributed Denial of Service Attack on Real Networks
- Review Study on Generation of Electricity from an Ordinary Fan
- An Optimize Approach to Reduce the Uncertainties in Mobile Adhoc Networks Using Firefly Optimization
- A Survey of Reliable Transfer on Multi-Radio Multi-Channel Techniques in Wireless Mesh Networks
- Comparative Analysis and Prevention of DDOS Attack in Sensor Network
- Dynamic Query Mechanism for Rapid Data Extraction using ETL Process
- Issue 11 - November Edition (Volume 3 2017)
- Issue 12 - December Edition (Volume 3 2017)
- Volume 4 (2018)
- Issue 1 - January Edition (Volume 4 2018)
- Issue 2 - February Edition (Volume 4 2018)
- Enhanced Data Aggregation Schema for Load Balancing in Wireless Sensor Network Using Gateways
- A Review Study on Combined Battery Energy Extender cum Booster and Technique
- A Review Study on Cloud Computing and Its Issues and Challenges
- Comparative Analysis of AODV and DSR Routing Protocols in MANETs
- A Review Paper on Contravention the Curse of Dimensionality for Machine Erudition on Genomic Data
- Issue 3 - March Edition (Volume 4 2018)
- Issue 4 - April Edition (Volume 4 2018)
- An Evaluation of Deep Thoughts in Cryptography Principles
- An Evaluation of Prevent Hacking all the way through Cyber Security
- Security Techniques of Mobile Ad hoc Networks: A Review
- Analysis of Plant Disease Detection
- A Review Paper on Advance Feature Finding and Segmentation Image Processing
- Review Paper on Prediction of Regional Disease Using Classification Techniques
- Masking using Format Preserving Encryption
- Issue 5 - May Edition (Volume 4 2018)
- Issue 6 - June Edition (Volume 4 2018)
- Issue 7 - July Edition (Volume 4 2018)
- Neural Network Based Optimized Technique for Detection of Blood Vessels in Retina
- Review Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
- Survey Paper: To Evaluate the Performance of KNN Algorithm for Face Spoofing
- A Proposed Technique in IoT Based Parking System Using Bar Code Technology
- Propose and Evaluate Classification Technique for Heart Disease Prediction
- Research Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
- Issue 8 - August Edition (Volume 4 2018)
- Issue 9 - September Edition (Volume 4 2018)
- Issue 10 - October Edition (Volume 4 2018)
- Issue 11 - November Edition (Volume 4 2018)
- Issue 12 - December Edition (Volume 4 2018)
- A New Mammography Image Classification System by Deep Learning and Feature Selection
- Performance Evaluation of IEEE802.21-Media Independent Handover for Heterogeneous Networks
- A Simulative Analysis of Routing Protocols for LR-WPAN
- Bearing Fault Detection using Ensemble Empirical Mode Decomposition integrated with Teager Kaiser Energy Method
- Volume 5 (2019)
- Issue 3 - March Edition (Volume 5 2019)
- A Review Paper on Smart Irrigation Basis of Internet of Things
- A Review Study on Cloud Computing Latency Reduction Approaches
- A Review SWOT UP on 5G Technology Boon or BANE
- Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
- Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
- Issue 5 - May Edition (Volume 5 2019)
- Issue 4 - April Edition (Volume 5 2019)
- Issue 6 - June Edition (Volume 5 2019)
- An Effectual Review on Energy Clustering In Real
- Discussion of Threat Issues in MANET: A Brief Review
- A Robust Multimodal Biometric Traits Using Iris and Fingerprint Fusion
- Review on Advanced Threat Detection Techniques for IoT Networks
- Engagement Predictions in an ELS-E Learning System Using Data Mining: A Review
- Issue 7 - July Edition (Volume 5 2019)
- An Effectual Clustering Approach for Low Energy Consumption in Sensor Networks
- An Effectual Optimization for Low Packet Losses in Sensor Networks
- An Effectual Instance to Mitigate Threat in Dense Mobile Ad-Hoc Network
- Data Mining based Student Engagement Predictions in an e-Learning System: A Review
- Review on Threats in Prospective of Secure Mobile Ad-Hoc Networks
- An Improved Datamining Approach for Student Engagement Predictions Systems (SEPS)
- Issue 8 - August Edition (Volume 5 2019)
- Issue 9 - September Edition (Volume 5 2019)
- Issue 12 - December Edition (Volume 5 2019)
- Issue 3 - March Edition (Volume 5 2019)
- Volume 6 (2020)
- Volume 1 (2015)
- Editorial Board
- For Author
- IJTC Blog
- FAQ
- Contact Us