Tuesday, January 19, 2021

Search

International Journal of Technology and Computing (IJTC)

An ISO Certified Journal 9001:2015
ISSN: 2455-099X

  • Home
  • About IJTC
    • Aim & Scope
    • IJTC team
    • IJTC Indexing
    • IJTC Publication Ethics Policy
    • IJTC Disclaimer
    • IJTC Anti-Plagiarism Policy
  • Call For Paper
  • Archives
    • Volume 1 (2015)
      • October Edition (Volume 1 2015)
      • November Edition (Volume 1 2015)
      • December Edition (Volume 1 2015)
    • Volume 2 (2016)
      • January Edition (Volume 2 2016)
      • March Edition (Volume 2 2016)
      • April Edition (Volume 2 2016)
      • May Edition (Volume 2 2016)
      • June Edition (Volume 2 2016)
      • July Edition (Volume 2 2016)
      • August Edition (Volume 2 2016)
      • September Edition (Volume 2 2016)
      • October Edition (Volume 2 2016)
      • November Edition (Volume 2 2016)
      • December Edition (Volume 2 2016)
    • Volume 3 (2017)
      • Feburary Edition (Volume 3 2017)
      • March Edition (Volume 3 2017)
      • April Edition (Volume 3 2017)
      • May Edition (Volume 3 2017)
      • June Edition (Volume 3 2017)
      • July Edition (Volume 3 2017)
      • August Edition (Volume 3 2017)
      • September Edition (Volume 3 2017)
      • October Edition (Volume 3 2017)
      • November Edition (Volume 3 2017)
      • December Edition (Volume 3 2017)
    • Volume 4 (2018)
      • March Edition (Volume 4 2018)
      • April Edition (Volume 4 2018)
      • May Edition (Volume 4 2018)
      • June Edition (Volume 4 2018)
      • July Edition (Volume 4 2018)
      • August Edition (Volume 4 2018)
      • September Edition (Volume 4 2018)
      • October Edition (Volume 4 2018)
      • November Edition (Volume 4 2018)
      • December Edition (Volume 4 2018)
    • Volume 5 (2019)
      • January Edition (Volume 5 2019)
      • February Edition (Volume 5 2019)
      • March Edition (Volume 5 2019)
      • April Edition (Volume 5 2019)
      • May Edition (Volume 5 2019)
      • June Edition (Volume 5 2019)
      • July Edition (Volume 5 2019)
      • August Edition (Volume 5 2019)
      • September Edition (Volume 5 2019)
      • December Edition (Volume 5 2019)
    • Volume 6 (2020)
      • January Edition (Volume 6 2020)
      • February Edition (Volume 6 2020)
      • July Edition (Volume 6 2020)
      • September Edition (Volume 6 2020)
  • Editorial Board
  • For Author
    • Submit a Manuscript
    • Author Guidelines
    • Download Template
    • Download Copyright Form
    • PROCESSING FEE (Online)
  • IJTC Blog
  • FAQ
  • Contact Us
Logo

Breadcrumbs

    You are here:
  • Home
  • / Sitemap

About Us

  • Aim & Scope
  • IJTC team
  • IJTC Indexing
  • Publication Ethics Policy

Menu

  • Home
  • About IJTC
    • Aim & Scope
    • IJTC team
    • IJTC Indexing
      • Iijif-IJTC
      • Doc Stock-IJTC
      • Scribd-IJTC
      • DOAJ-IJTC
      • Google Scholar-IJTC
    • IJTC Publication Ethics Policy
    • IJTC Disclaimer
  • Call For Paper
  • Archives
    • Volume 1 (2015)
      • October Edition (Volume 1 2015)
        • A New Approach to Enhance Security against Mischievous Nodes Using Cooperative Bait Detection Scheme
        • To Study The Effect Of Holding Time And Holding Temperature On Hardness And Micro Structure Of Alloy Steel AISI4340
        • Detecting forgery in images using alphabetic ordering of extracted blocks
        • Optimum Power Utilization for MIMO Wireless Network using signal-to-interference-and-noise (SINR) ratio and optimal transmission power (OTP)
        • Overview Of Sybil Attack: Analysis And Detection
        • Comparative Study And Analysis Of AODV AND OLSR Protocols In MESH Networks
        • REVIEW OF IDS SYSTEM IN LARGE SCALE ADHOC NETWORKS
        • Web Service Recommendation System In Data Mining
        • Identify The DOS (Denial Of Service) Attack In Wireless ADHOC Network And Tumbling The Influence Of Flooding Caused By DOS Attack In MANETS
        • Surface Detection Using Ultrasonic Waves For The Advancement Of Robotics
        • Email With Classification Detection Power
      • November Edition (Volume 1 2015)
        • Performance Evaluation Survey on Loop Prevention Mechanisms in Redundant Switch Topology
        • A New Era in the area of Digital Marketing
      • December Edition (Volume 1 2015)
        • Identifying And Evaluating Jelly Fish Attack Using Aodv Protocol
        • Comparative Study And Evaluation Of AODV, DSR And OLSR Protocols
      • October Edition (Volume 1 2015)
        • A New Approach to Enhance Security against Mischievous Nodes Using Cooperative Bait Detection Scheme
        • To Study The Effect Of Holding Time And Holding Temperature On Hardness And Micro Structure Of Alloy Steel AISI4340
        • Detecting forgery in images using alphabetic ordering of extracted blocks
        • Optimum Power Utilization for MIMO Wireless Network using signal-to-interference-and-noise (SINR) ratio and optimal transmission power (OTP)
        • Overview Of Sybil Attack: Analysis And Detection
        • Comparative Study And Analysis Of AODV AND OLSR Protocols In MESH Networks
        • REVIEW OF IDS SYSTEM IN LARGE SCALE ADHOC NETWORKS
        • Web Service Recommendation System In Data Mining
        • Identify The DOS (Denial Of Service) Attack In Wireless ADHOC Network And Tumbling The Influence Of Flooding Caused By DOS Attack In MANETS
        • Surface Detection Using Ultrasonic Waves For The Advancement Of Robotics
        • Email With Classification Detection Power
      • November Edition (Volume 1 2015)
        • Performance Evaluation Survey on Loop Prevention Mechanisms in Redundant Switch Topology
        • A New Era in the area of Digital Marketing
      • December Edition (Volume 1 2015)
        • Identifying And Evaluating Jelly Fish Attack Using Aodv Protocol
        • Comparative Study And Evaluation Of AODV, DSR And OLSR Protocols
    • Volume 2 (2016)
      • January Edition (Volume 2 2016)
        • A Novel Approach In Software Cost Estimation Combining Swarm Optimization And Clustering Technique
        • Adaptive Gaussian Filter Based Image Recovery Using Local Segmentation
      • March Edition (Volume 2 2016)
        • Detecting Byzantine Attack using Wireless Sensor Network
        • A Review on Various Classification Techniques in Email Spamming
        • Multiple Parameter Based Resource Allocation Algorithm in Cloud Computing through Auctioneer
        • A Systematic approach for Resource Migrations in Cloud Computing Environment
      • April Edition (Volume 2 2016)
        • Restoration of Image Using KNN Algorithm
        • A Review Paper on Different Classification Techniques Used in News Sentiment Analysis
        • Survey Paper on Frequent Pattern Mining on Web Server Logs
        • A Novel Method For Enhancing LEACH Protocol With Traffic Management System
        • A New Era To Balance The Load On Cloud Using Vector Dot Load Balancing Method
        • Performance Enhancement of RECLAT Algorithm Using Map Reduce Technique
        • Prevention of ICMP Based Attack Using Leader Election Based Algorithm with MAC Authentication
        • Implementation of Model Cloning in Software Models using UML diagrams
      • May Edition (Volume 2 2016)
        • Functional Test Cases Generation Based on Automated Generated Use Case Diagram using DFS algorithm
        • Performance evaluation of Apriori algorithm using association rule mining technique
        • A Co-operative Various Attacks Detect for Location Based Application in Secure Network
        • Energy Optimization of Leach Protocol in WSN Using NS2 Simulator
        • Heat Transfer in Rectangular Micro Channels at Different Plenum Shapes
        • Experimental Investigation of Rectangular Microchannels with Different Manifold Arrangements
        • Optimization of Friction Stirs Welding of Aluminum 6063 by Using Taguchi Approach
        • Introduction to Web Data Mining and Apriori Algorithm
        • Self-Offloading of Andriod Applications Exploiting the Resources of Cloud
        • Image Registration Evaluation and Comparison of Non-Rigid Transformation Algorithms
        • REVIEW ON IMAGE FUSION
        • EFFICIENT RESTORATION TECHNIQUE OF IMAGE USING KNN ALGORITHM
        • A Review Paper on a Novel Cluster Based Approach for Preventing DOS Attack in VANET
        • A REVIEW PAPER TO DETECT AN ISOLATE ATTACK IN WSN AND PROVIDING SECURITY USING RSA AND MD5 ALGORITHMS
        • A REVIEW ON SOFTWARE FAULT PREDICTION TECHNIQUE USING DIFFERENT DATASET
        • A COLORED IMAGE DENOISING APPROACH BASED ON FUZZY LOGIC
        • STUDY OF WEAR BEHAVIOUR OF ALUMINIUM BASED MICRO AND NANO COMPOSITES FABRICATED BY STIR CASTING TECHNIQUE
        • AN ENHANCED PAGE RANKING ALGORITHM USING DYNAMIC APPROACH
        • EVALUATION OF DESIGN FACTOR FOR PARTIALLY OPEN GROUND STOREY REINFORCED CONCRETE BUILDINGS
      • June Edition (Volume 2 2016)
        • A REVIEW ON THE VANET TRAFFIC CONGESTION METHODS
        • DETECTION AND LOCALIZATION OF SOUND USING ADAPTIVE LEARNING TECHNIQUE
        • A REVIEW ON RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
        • A REVIEW ON MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
        • AN EMPIRICAL INVESTIGATION OF BAD SMELLS IN CODE ON MAINTENANCE EFFORT
      • July Edition (Volume 2 2016)
        • A NEW ERA FOR RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
        • LOAD BALANCING IN MPLS PROTOCOL ACROSS WIRED AND WIRELESS NETWORKS: A SURVEY
        • A SURVEY ON FACE RECOGNITION TECHNOLOGIES AND TECHNIQUES
        • A REVIEW ON FACE IDENTIFICATIONS SYSTEM USING FUSION METHOD
        • A REVIEW ON CLOUD BASED LOAD BALANCING SYSTEM USING HYBRID (OLB+LBMM) TECHNIQUE
        • PAGE RANK ALGORITHM BASED ON THE DYNAMIC APPROACH
        • A REVIEW ON BALANCING THE LOAD ON CLOUD USING ACCLB HYBRID LOAD BALANCING TECHNIQUE
        • LITERATURE SURVEY OF MANETS ROUTING PROTOCOLS
      • August Edition (Volume 2 2016)
        • REVIEW OF WIRELESS SENSOR NETWORK AND HIERARCHICAL ROUTING PROTOCOLS
        • A SYSTEMATIC WAY FOR MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
        • IDENTIFICATION OF AODV BASED BLACK HOLE AND GRAY HOLE ATTACKS AND PREVENTION TECHNIQUES IN MANET
        • Machine Printed Gurumukhi Numerals Recognition using Convolutional Neural Networks
        • Pattern Recognition based Scheduling in Cloud Computing
        • K-Nearest Neighbor (kNN) based Product Ranking Model with Minimum Cost Evaluation
        • A Systemmatic way to balance the load on cloud using Hybrid (OLB+LBMM) Technique
        • A New Era to Balance the Load on Cloud using ACCLB Hybrid Load Balancing Technique
        • An Efficient Model for Web Vulnerabilities Detection based on Probabilistic Classification
        • Multiple Attribute Based Security of Data in Cloud Computing
        • Design and development of overhead detection and improvement system for AOP
        • Automated formulation and prioritisation of test path using UML and AOP
      • September Edition (Volume 2 2016)
        • Web Usage Mining Through FP Split and APRIORI Algorithm
        • Base Paper on Estimation of Vehicle Orientation Using Stereo Vision
        • A Detailed Improved Structure of Page Ranking Algorithm Using Dynamic Approach
        • Dual Layered Response for WBANs based upon Authentication and Authorization Layers
        • Evaluate the Performance of COMBO Load Balancing Algorithm in Cloud
        • An Approach for Visualization of Big Data Using Nanocubes
        • Retinal Vessel Segmentation employing Neural Network and Feature Extraction
        • A New Era for Face Identifications System Using Fusion Method
        • Implementation of Turbo Codes in MIMO –OFDM system for 4G applications
        • Adaptive End-to-End Authentication for the Cloud-based Healthcare Networks
      • October Edition (Volume 2 2016)
        • Predicting Students’ Performance Using Classification Techniques in Data Mining
        • Secure and Proficient Unnamed Air Vehicles Using Encryption Technique and Particle Swarm Optimization Based on Wireless Mesh Network
        • A Systematic way to Design New Approach for Technical Steganography based on ACO Algorithm
        • Enhanced TPA Scheme to Improve Access Permissions Development Overcloud Architecture
        • Performance Analysis of Spark using k-means
        • A Review Paper on Translucent Windshield
        • Reasons for Lower Literacy among Girls in Himachal Pradesh
      • November Edition (Volume 2 2016)
        • Review on Enhancement Performance of WDM networks over Diversity Systems
      • December Edition (Volume 2 2016)
        • Black hole Prevention Mechanism using Hybridization of rule set with Evolutionary Method
        • An Approach for Intrusion Detection System using Genetic Algorithm with SVM classification
        • A Systematic Review on the Field of Digital Marketing
        • Review on Novel Approach of Ethical feedback Analysis
        • Technique to Enhance Map Reduce ECLAT Algorithm
        • Research into Pattern Recognition Theory and Practical Algorithms based on scheduling in Cloud
      • Issue 1 - January Edition (Volume 2 2016)
        • A Novel Approach In Software Cost Estimation Combining Swarm Optimization And Clustering Technique
        • Adaptive Gaussian Filter Based Image Recovery Using Local Segmentation
      • Issue 3 - March Edition (Volume 2 2016)
        • Detecting Byzantine Attack using Wireless Sensor Network
        • A Review on Various Classification Techniques in Email Spamming
        • Multiple Parameter Based Resource Allocation Algorithm in Cloud Computing through Auctioneer
        • A Systematic approach for Resource Migrations in Cloud Computing Environment
      • Issue 4 - April Edition (Volume 2 2016)
        • Restoration of Image Using KNN Algorithm
        • A Review Paper on Different Classification Techniques Used in News Sentiment Analysis
        • Survey Paper on Frequent Pattern Mining on Web Server Logs
        • A Novel Method For Enhancing LEACH Protocol With Traffic Management System
        • A New Era To Balance The Load On Cloud Using Vector Dot Load Balancing Method
        • Performance Enhancement of RECLAT Algorithm Using Map Reduce Technique
        • Prevention of ICMP Based Attack Using Leader Election Based Algorithm with MAC Authentication
        • Implementation of Model Cloning in Software Models using UML diagrams
      • Issue 5 - May Edition (Volume 2 2016)
        • Functional Test Cases Generation Based on Automated Generated Use Case Diagram using DFS algorithm
        • Performance evaluation of Apriori algorithm using association rule mining technique
        • A Co-operative Various Attacks Detect for Location Based Application in Secure Network
        • Energy Optimization of Leach Protocol in WSN Using NS2 Simulator
        • Heat Transfer in Rectangular Micro Channels at Different Plenum Shapes
        • Experimental Investigation of Rectangular Microchannels with Different Manifold Arrangements
        • Optimization of Friction Stirs Welding of Aluminum 6063 by Using Taguchi Approach
        • Introduction to Web Data Mining and Apriori Algorithm
        • Self-Offloading of Andriod Applications Exploiting the Resources of Cloud
        • Image Registration Evaluation and Comparison of Non-Rigid Transformation Algorithms
        • REVIEW ON IMAGE FUSION
        • EFFICIENT RESTORATION TECHNIQUE OF IMAGE USING KNN ALGORITHM
        • A Review Paper on a Novel Cluster Based Approach for Preventing DOS Attack in VANET
        • A REVIEW PAPER TO DETECT AN ISOLATE ATTACK IN WSN AND PROVIDING SECURITY USING RSA AND MD5 ALGORITHMS
        • A REVIEW ON SOFTWARE FAULT PREDICTION TECHNIQUE USING DIFFERENT DATASET
        • A COLORED IMAGE DENOISING APPROACH BASED ON FUZZY LOGIC
        • STUDY OF WEAR BEHAVIOUR OF ALUMINIUM BASED MICRO AND NANO COMPOSITES FABRICATED BY STIR CASTING TECHNIQUE
        • AN ENHANCED PAGE RANKING ALGORITHM USING DYNAMIC APPROACH
        • EVALUATION OF DESIGN FACTOR FOR PARTIALLY OPEN GROUND STOREY REINFORCED CONCRETE BUILDINGS
      • Issue 6 - June Edition (Volume 2 2016)
        • A REVIEW ON THE VANET TRAFFIC CONGESTION METHODS
        • DETECTION AND LOCALIZATION OF SOUND USING ADAPTIVE LEARNING TECHNIQUE
        • A REVIEW ON RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
        • A REVIEW ON MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
        • AN EMPIRICAL INVESTIGATION OF BAD SMELLS IN CODE ON MAINTENANCE EFFORT
      • Issue 7 - July Edition (Volume 2 2016)
        • A NEW ERA FOR RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
        • LOAD BALANCING IN MPLS PROTOCOL ACROSS WIRED AND WIRELESS NETWORKS: A SURVEY
        • A SURVEY ON FACE RECOGNITION TECHNOLOGIES AND TECHNIQUES
        • A REVIEW ON FACE IDENTIFICATIONS SYSTEM USING FUSION METHOD
        • A REVIEW ON CLOUD BASED LOAD BALANCING SYSTEM USING HYBRID (OLB+LBMM) TECHNIQUE
        • PAGE RANK ALGORITHM BASED ON THE DYNAMIC APPROACH
        • A REVIEW ON BALANCING THE LOAD ON CLOUD USING ACCLB HYBRID LOAD BALANCING TECHNIQUE
        • LITERATURE SURVEY OF MANETS ROUTING PROTOCOLS
      • Issue 8 - August Edition (Volume 2 2016)
        • REVIEW OF WIRELESS SENSOR NETWORK AND HIERARCHICAL ROUTING PROTOCOLS
        • A SYSTEMATIC WAY FOR MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
        • IDENTIFICATION OF AODV BASED BLACK HOLE AND GRAY HOLE ATTACKS AND PREVENTION TECHNIQUES IN MANET
        • Machine Printed Gurumukhi Numerals Recognition using Convolutional Neural Networks
        • Pattern Recognition based Scheduling in Cloud Computing
        • K-Nearest Neighbor (kNN) based Product Ranking Model with Minimum Cost Evaluation
        • A Systemmatic way to balance the load on cloud using Hybrid (OLB+LBMM) Technique
        • A New Era to Balance the Load on Cloud using ACCLB Hybrid Load Balancing Technique
        • An Efficient Model for Web Vulnerabilities Detection based on Probabilistic Classification
        • Multiple Attribute Based Security of Data in Cloud Computing
        • Design and development of overhead detection and improvement system for AOP
        • Automated formulation and prioritisation of test path using UML and AOP
      • Issue 9 - September Edition (Volume 2 2016)
        • Web Usage Mining Through FP Split and APRIORI Algorithm
        • Base Paper on Estimation of Vehicle Orientation Using Stereo Vision
        • A Detailed Improved Structure of Page Ranking Algorithm Using Dynamic Approach
        • Dual Layered Response for WBANs based upon Authentication and Authorization Layers
        • Evaluate the Performance of COMBO Load Balancing Algorithm in Cloud
        • An Approach for Visualization of Big Data Using Nanocubes
        • Retinal Vessel Segmentation employing Neural Network and Feature Extraction
        • A New Era for Face Identifications System Using Fusion Method
        • Implementation of Turbo Codes in MIMO –OFDM system for 4G applications
        • Adaptive End-to-End Authentication for the Cloud-based Healthcare Networks
      • Issue 10 - October Edition (Volume 2 2016)
        • Predicting Students’ Performance Using Classification Techniques in Data Mining
        • Secure and Proficient Unnamed Air Vehicles Using Encryption Technique and Particle Swarm Optimization Based on Wireless Mesh Network
        • A Systematic way to Design New Approach for Technical Steganography based on ACO Algorithm
        • Enhanced TPA Scheme to Improve Access Permissions Development Overcloud Architecture
        • Performance Analysis of Spark using k-means
        • A Review Paper on Translucent Windshield
        • Reasons for Lower Literacy among Girls in Himachal Pradesh
      • Issue 11 - November Edition (Volume 2 2016)
        • Review on Enhancement Performance of WDM networks over Diversity Systems
      • Issue 12 - December Edition (Volume 2 2016)
        • Black hole Prevention Mechanism using Hybridization of rule set with Evolutionary Method
        • An Approach for Intrusion Detection System using Genetic Algorithm with SVM classification
        • A Systematic Review on the Field of Digital Marketing
        • Review on Novel Approach of Ethical feedback Analysis
        • Technique to Enhance Map Reduce ECLAT Algorithm
        • Research into Pattern Recognition Theory and Practical Algorithms based on scheduling in Cloud
    • Volume 3 (2017)
      • Feburary Edition (Volume 3 2017)
        • A Systematic Review on An Artificial Bee Colony optimized approach for segmentation of blood vessels using Neural Networks
        • Review Paper on Transliteration Method of Nouns
        • To Maintain the Privacy in Moveable Sink to Prevent Active and Passive Attacks
        • Black Hole and Gray Hole attacks and Prevention Techniques in WSN
        • An Evaluation Study on Compression Techniques in Hadoop
        • Improvement in Dynamic Clustering using Genetic Analysis Based Mechanism
      • March Edition (Volume 3 2017)
        • Review Paper on Batch Processing and Stream Processing
        • Spatio Spectral Features Based Skin Lesions Segmentation Using Euclidean Distance
        • Optimum Power Utilization for MIMO Wireless Network
        • Quick Response Content based Image Retrieval (QR-CBIR) using Hybrid Feature Descriptor
        • A Reliable Punjabi to English Machine Transliteration System for Proper Noun
      • April Edition (Volume 3 2017)
        • Heart Disease Prediction System Using Data Mining Techniques - A Review
        • A Review on Various Approaches of Brain Tumor Detection in Medical Images
        • To Investigate the Effect of Vibration on Electrical Discharge Machining of AISI H13 Die Steel
        • Review paper on Safety issues of Memory Management in Cloud Computing
      • May Edition (Volume 3 2017)
        • Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
        • Classification of Brain tumor using texture features with segmentation & FFNN approach: A Synopsis
        • Review Paper on Workload Characteristics and Resource Aware Hadoop Scheduler
        • A Review on Energy Efficient Routing in Wireless Sensor Networks
        • Trending Routing Protocols in Wireless Communication – A Review
        • Extraction Based Lung Cancer Recognition: A Survey
        • Review paper on Traffic Route Scheduling in Road Networks
        • Copy Move Forgery Image Classification with Orientation Based Features by EM Algorithm
        • A Survey on Energy Optimization Approaches in Ad-Hoc Networks
      • June Edition (Volume 3 2017)
        • Mitigation of Network Security Threat in Cyber World
        • A Review on Data Mining Model to Predict Coronary Artery Disease
        • Comparative Analysis of Various File Formats in HIVE
        • A New Era For Image Enhancement Using Spatial Domain Filtering
        • A Systematic Way To Image Enhancement Using Transform Domain Method For X-Ray Images
        • Elemental Approach for High Performance Real Time Streaming Analytics Platform
        • An evaluation on Shortest Path in Road Transportation Networks
        • A Review Study of an Evaluation on Safety Issue in Clod Computing Using Memory Management
        • A Review Paper on Routing Protocol and Network Security
        • Enhanced Video Classification by Time Domain Features Using SVM & RB Kernel Function
        • A Data Mining Model to Predict Coronary Artery Disease using Cleveland CAD dataset
        • Data Storage and Integrity Preserving Framework for Cloud Using a Cryptosystem
        • Review-Content Based Image Retrieval with Methods and Types
        • A Review on Facial Emotion Authentication
      • July Edition (Volume 3 2017)
        • Segmentation of Retinal Blood Vessels using Sub-blocking and Weighted Sum Method
        • The Survey Of The Heart Disease Detection Technques In Data Mining
        • An Optimize Feature Extraction Approach for Facial Emotion Detection System
        • An Optimized Energy Conservation to Increase Network Lifetime Approach in Mobile Ad-Hoc Networks
        • Updated Energy Effective Routing Algorithm for Event-driven Wireless Sensor Networks
        • Hybrid Feature based CBIR Model using Color and Texture Oriented Features
        • Research Paper on Updated Energy Effective Routing Algorithm for Event-Driven Wireless Sensor Networks with Results
        • An Enhanced Approach for Highly Reputed Authenticated Routing in MANET
        • A Review on Effectual Techniques in Mobile Ad-Hoc Networks
        • A Precise Hybrid Approach for Energy Conservation in Mobile Ad-Hoc Networks
        • Evaluation of Optimal Mobility-Speed of Mobile Nodes in GRP Enabled MANET
        • A Survey on Safety Intimidations in Mobile Ad-Hoc Networks
        • A Review on Uncertainties in Mobile Ad-Hoc Networks
        • An Efficient Learning Based Lung Cancer Diagnostics System
        • A New Era To Handle The Critical Sections Problem Using Token Based Scheme
        • Techniques Of Encryption And Decryption in Cloud Computing- A Review
        • Routing Protocols of MANETS: A Review
        • A New Data Mining Technique in Cloud Big Data Environment
      • August Edition (Volume 3 2017)
        • Research Paper on Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
        • Review Study on New Era of Android Kotlin
        • Classification of Brain Tumor Using Texture Features with Segmentation & FFNN Approach
        • A Rotation-Invariant Fingerprint Identifications System Using Neural Network
        • A Survey on Different Types of Load Balancing Techniques and Its Characteristics Used In Cloud Computing
        • Data Store using Encryption Technique with in Cloud Computing: A Research
        • A Fuzzy Neural Network Based Approach for CBIR
        • Image Encryption Using Two Dimensional Modified Sine Logistic Map
        • Services, Technologies and Issues in M-Banking
        • An Assessment of Security Aspects in E-Business through Transaction Monitoring
        • E-Banking Adoption: A Study of Privacy and Trust
        • Study and Review the Black Hole Attack and Grey Hole Attack
        • A Review Paper on Cyber security and Accept it as a Challenge
        • A Review Study on Net Trap Description Tool
        • A Review Study on Blue Brain Technology
        • Searching Of Web Pages by Using the Page Rank Algorithm
        • A review study on Boggling
      • September Edition (Volume 3 2017)
        • A Refined Alternative to the Traditional Database Record System Services
        • Text Exclusion from Document Images and Number Plate using MATLAB
        • A Study of Protection Issues Behaviour in Cloud Computing Method
        • Self Organizing Maps (SOM) with Moving Average features for Stock Market Prediction
        • Improved Security of Iris Template using RLE and State Transition Optimization Algorithm
        • Analysis of IPV-4 and IPV-6 in Networking
        • Categorization of Copy-Move Fake and Normal Images By ORB Features and SVM Classifier
        • Implementation to Improve Quality of Compressed Image Using Updated Huffman Algorithm
        • A Review Study on Image Filter Scheming for Advanced Feature Recognition and Segmentation using Digital Image Processing
      • October Edition (Volume 3 2017)
        • Implementation Scaling Image Using Bilinear Interpolation
        • An Efficient Optimize Approach to Mitigate the Effect of Sybil Attacks in Highly Dense MANET Systems
        • Review the impact of Distributed Denial of Service Attack on Real Networks
        • Review Study on Generation of Electricity from an Ordinary Fan
        • An Optimize Approach to Reduce the Uncertainties in Mobile Adhoc Networks Using Firefly Optimization
        • A Survey of Reliable Transfer on Multi-Radio Multi-Channel Techniques in Wireless Mesh Networks
        • Comparative Analysis and Prevention of DDOS Attack in Sensor Network
        • Dynamic Query Mechanism for Rapid Data Extraction using ETL Process
      • November Edition (Volume 3 2017)
        • An efficient approach to reduce the Uncertainties in MANETS using Firefly Optimizations
        • An Adaptive Zone Routing Protocol Based on Node Mobility and Traffic Load in Mobile Adhoc Networks
      • December Edition (Volume 3 2017)
        • Performance optimization MPLS-MANET Networks over Black Hole Attack
        • Network Attack Aware Routing using AODV and TORA in MANETs
      • Issue 1 - January Edition (Volume 3 2017)
        • Narrative Approach of Ethical Response Scrutiny
        • Performance Evaluation of Apriori Algorithm on Reservation Policy
        • A Review paper on DHCP RELAY AGENT
        • Methodological Analysis of Client Recognition Mechanisms
        • A Narrative Study on Supervised Learning
      • Issue 2 - February Edition (Volume 3 2017)
        • A Systematic Review on An Artificial Bee Colony optimized approach for segmentation of blood vessels using Neural Networks
        • Review Paper on Transliteration Method of Nouns
        • To Maintain the Privacy in Moveable Sink to Prevent Active and Passive Attacks
        • Black Hole and Gray Hole attacks and Prevention Techniques in WSN
        • An Evaluation Study on Compression Techniques in Hadoop
        • Improvement in Dynamic Clustering using Genetic Analysis Based Mechanism
      • Issue 3 - March Edition (Volume 3 2017)
        • Review Paper on Batch Processing and Stream Processing
        • Spatio Spectral Features Based Skin Lesions Segmentation Using Euclidean Distance
        • Optimum Power Utilization for MIMO Wireless Network
        • Quick Response Content based Image Retrieval (QR-CBIR) using Hybrid Feature Descriptor
        • A Reliable Punjabi to English Machine Transliteration System for Proper Noun
      • Issue 4 - April Edition (Volume 3 2017)
        • Heart Disease Prediction System Using Data Mining Techniques - A Review
        • A Review on Various Approaches of Brain Tumor Detection in Medical Images
        • To Investigate the Effect of Vibration on Electrical Discharge Machining of AISI H13 Die Steel
        • Review paper on Safety issues of Memory Management in Cloud Computing
      • Issue 5 - May Edition (Volume 3 2017)
        • Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
        • Classification of Brain tumor using texture features with segmentation & FFNN approach: A Synopsis
        • Review Paper on Workload Characteristics and Resource Aware Hadoop Scheduler
        • A Review on Energy Efficient Routing in Wireless Sensor Networks
        • Trending Routing Protocols in Wireless Communication – A Review
        • Extraction Based Lung Cancer Recognition: A Survey
        • Review paper on Traffic Route Scheduling in Road Networks
        • Copy Move Forgery Image Classification with Orientation Based Features by EM Algorithm
        • A Survey on Energy Optimization Approaches in Ad-Hoc Networks
      • Issue 6 - June Edition (Volume 3 2017)
        • Mitigation of Network Security Threat in Cyber World
        • A Review on Data Mining Model to Predict Coronary Artery Disease
        • Comparative Analysis of Various File Formats in HIVE
        • A New Era For Image Enhancement Using Spatial Domain Filtering
        • A Systematic Way To Image Enhancement Using Transform Domain Method For X-Ray Images
        • Elemental Approach for High Performance Real Time Streaming Analytics Platform
        • An evaluation on Shortest Path in Road Transportation Networks
        • A Review Study of an Evaluation on Safety Issue in Clod Computing Using Memory Management
        • A Review Paper on Routing Protocol and Network Security
        • Enhanced Video Classification by Time Domain Features Using SVM & RB Kernel Function
        • A Data Mining Model to Predict Coronary Artery Disease using Cleveland CAD dataset
        • Data Storage and Integrity Preserving Framework for Cloud Using a Cryptosystem
        • Review-Content Based Image Retrieval with Methods and Types
        • A Review on Facial Emotion Authentication
      • Issue 7 - July Edition (Volume 3 2017)
        • Segmentation of Retinal Blood Vessels using Sub-blocking and Weighted Sum Method
        • The Survey Of The Heart Disease Detection Technques In Data Mining
        • An Optimize Feature Extraction Approach for Facial Emotion Detection System
        • An Optimized Energy Conservation to Increase Network Lifetime Approach in Mobile Ad-Hoc Networks
        • Updated Energy Effective Routing Algorithm for Event-driven Wireless Sensor Networks
        • Hybrid Feature based CBIR Model using Color and Texture Oriented Features
        • Research Paper on Updated Energy Effective Routing Algorithm for Event-Driven Wireless Sensor Networks with Results
        • An Enhanced Approach for Highly Reputed Authenticated Routing in MANET
        • A Review on Effectual Techniques in Mobile Ad-Hoc Networks
        • A Precise Hybrid Approach for Energy Conservation in Mobile Ad-Hoc Networks
        • Evaluation of Optimal Mobility-Speed of Mobile Nodes in GRP Enabled MANET
        • A Survey on Safety Intimidations in Mobile Ad-Hoc Networks
        • A Review on Uncertainties in Mobile Ad-Hoc Networks
        • An Efficient Learning Based Lung Cancer Diagnostics System
        • A New Era To Handle The Critical Sections Problem Using Token Based Scheme
        • Techniques Of Encryption And Decryption in Cloud Computing- A Review
        • Routing Protocols of MANETS: A Review
        • A New Data Mining Technique in Cloud Big Data Environment
      • Issue 8 - August Edition (Volume 3 2017)
        • Research Paper on Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
        • Review Study on New Era of Android Kotlin
        • Classification of Brain Tumor Using Texture Features with Segmentation & FFNN Approach
        • A Rotation-Invariant Fingerprint Identifications System Using Neural Network
        • A Survey on Different Types of Load Balancing Techniques and Its Characteristics Used In Cloud Computing
        • Data Store using Encryption Technique with in Cloud Computing: A Research
        • A Fuzzy Neural Network Based Approach for CBIR
        • Image Encryption Using Two Dimensional Modified Sine Logistic Map
        • Services, Technologies and Issues in M-Banking
        • An Assessment of Security Aspects in E-Business through Transaction Monitoring
        • E-Banking Adoption: A Study of Privacy and Trust
        • Study and Review the Black Hole Attack and Grey Hole Attack
        • A Review Paper on Cyber security and Accept it as a Challenge
        • A Review Study on Net Trap Description Tool
        • A Review Study on Blue Brain Technology
        • Searching Of Web Pages by Using the Page Rank Algorithm
        • A review study on Boggling
      • Issue 9 - September Edition (Volume 3 2017)
        • A Refined Alternative to the Traditional Database Record System Services
        • Text Exclusion from Document Images and Number Plate using MATLAB
        • A Study of Protection Issues Behaviour in Cloud Computing Method
        • Self Organizing Maps (SOM) with Moving Average features for Stock Market Prediction
        • Improved Security of Iris Template using RLE and State Transition Optimization Algorithm
        • Analysis of IPV-4 and IPV-6 in Networking
        • Categorization of Copy-Move Fake and Normal Images By ORB Features and SVM Classifier
        • Implementation to Improve Quality of Compressed Image Using Updated Huffman Algorithm
        • A Review Study on Image Filter Scheming for Advanced Feature Recognition and Segmentation using Digital Image Processing
      • Issue 10 - October Edition (Volume 3 2017)
        • Implementation Scaling Image Using Bilinear Interpolation
        • An Efficient Optimize Approach to Mitigate the Effect of Sybil Attacks in Highly Dense MANET Systems
        • Review the impact of Distributed Denial of Service Attack on Real Networks
        • Review Study on Generation of Electricity from an Ordinary Fan
        • An Optimize Approach to Reduce the Uncertainties in Mobile Adhoc Networks Using Firefly Optimization
        • A Survey of Reliable Transfer on Multi-Radio Multi-Channel Techniques in Wireless Mesh Networks
        • Comparative Analysis and Prevention of DDOS Attack in Sensor Network
        • Dynamic Query Mechanism for Rapid Data Extraction using ETL Process
      • Issue 11 - November Edition (Volume 3 2017)
        • An efficient approach to reduce the Uncertainties in MANETS using Firefly Optimizations
        • An Adaptive Zone Routing Protocol Based on Node Mobility and Traffic Load in Mobile Adhoc Networks
      • Issue 12 - December Edition (Volume 3 2017)
        • Performance optimization MPLS-MANET Networks over Black Hole Attack
        • Network Attack Aware Routing using AODV and TORA in MANETs
    • Volume 4 (2018)
      • March Edition (Volume 4 2018)
        • A Review Study on Humanoid Robot SOPHIA based on Artificial Intelligence
        • Review on FPM and FPE
      • April Edition (Volume 4 2018)
        • An Evaluation of Deep Thoughts in Cryptography Principles
        • An Evaluation of Prevent Hacking all the way through Cyber Security
        • Security Techniques of Mobile Ad hoc Networks: A Review
        • Analysis of Plant Disease Detection
        • A Review Paper on Advance Feature Finding and Segmentation Image Processing
        • Review Paper on Prediction of Regional Disease Using Classification Techniques
        • Masking using Format Preserving Encryption
      • May Edition (Volume 4 2018)
        • A Survey on Big Data Storage
        • A Computational to Study the Effect of Flow Type on the Performance of Different Heat Sinks
        • An Effect of Varying Nodes and Mobility during Breakdown and Recovery of Nodes on MANET
        • A Survey on Wireless Sensor Networks Attacks
      • June Edition (Volume 4 2018)
        • Prediction of Regional Disease Using Data Mining Techniques
        • Hybrid Approach to Digital Watermarking For Secure Communication
        • Review Paper on Face Recognition Using Techniques and Neural Networks
      • July Edition (Volume 4 2018)
        • Neural Network Based Optimized Technique for Detection of Blood Vessels in Retina
        • Review Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
        • Survey Paper: To Evaluate the Performance of KNN Algorithm for Face Spoofing
        • A Proposed Technique in IoT Based Parking System Using Bar Code Technology
        • Propose and Evaluate Classification Technique for Heart Disease Prediction
        • Research Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
      • August Edition (Volume 4 2018)
        • Research Paper -Novel Approach for Face Spoof Detection Using Classification Technique
        • Implementing Proposed Model of IDs System to Defend Against DDOS Attack
        • Speed Up Apache Server Performance by Using Heterogeneous Architecture of Content Delivery Network
      • September Edition (Volume 4 2018)
        • Implementing Authentication Based System to Detect and Mitigate Anonymous users in VANETS
      • October Edition (Volume 4 2018)
        • A Review Paper on Insight of an Android Operating System
        • A Review on Li-Fi Technology
      • November Edition (Volume 4 2018)
        • A Review on Lung Cancer Detection Analysis
        • A Review Swot Up On Survey of Data Safety Measures in Cloud Computing
      • December Edition (Volume 4 2018)
        • A New Mammography Image Classification System by Deep Learning and Feature Selection
        • Performance Evaluation of IEEE802.21-Media Independent Handover for Heterogeneous Networks
        • A Simulative Analysis of Routing Protocols for LR-WPAN
        • Bearing Fault Detection using Ensemble Empirical Mode Decomposition integrated with Teager Kaiser Energy Method
      • Issue 1 - January Edition (Volume 4 2018)
        • An Evaluation of Big Data Challenges Techniques with Hadoop Components
        • Energy Efficient Clustering Protocol Using PEGASIS Routing Protocol and Feed Forward Neural Network For Wireless Sensor Network
      • Issue 2 - February Edition (Volume 4 2018)
        • Enhanced Data Aggregation Schema for Load Balancing in Wireless Sensor Network Using Gateways
        • A Review Study on Combined Battery Energy Extender cum Booster and Technique
        • A Review Study on Cloud Computing and Its Issues and Challenges
        • Comparative Analysis of AODV and DSR Routing Protocols in MANETs
        • A Review Paper on Contravention the Curse of Dimensionality for Machine Erudition on Genomic Data
      • Issue 3 - March Edition (Volume 4 2018)
        • A Review Study on Humanoid Robot SOPHIA based on Artificial Intelligence
        • Review on FPM and FPE
      • Issue 4 - April Edition (Volume 4 2018)
        • An Evaluation of Deep Thoughts in Cryptography Principles
        • An Evaluation of Prevent Hacking all the way through Cyber Security
        • Security Techniques of Mobile Ad hoc Networks: A Review
        • Analysis of Plant Disease Detection
        • A Review Paper on Advance Feature Finding and Segmentation Image Processing
        • Review Paper on Prediction of Regional Disease Using Classification Techniques
        • Masking using Format Preserving Encryption
      • Issue 5 - May Edition (Volume 4 2018)
        • A Survey on Big Data Storage
        • A Computational to Study the Effect of Flow Type on the Performance of Different Heat Sinks
        • An Effect of Varying Nodes and Mobility during Breakdown and Recovery of Nodes on MANET
        • A Survey on Wireless Sensor Networks Attacks
      • Issue 6 - June Edition (Volume 4 2018)
        • Prediction of Regional Disease Using Data Mining Techniques
        • Hybrid Approach to Digital Watermarking For Secure Communication
        • Review Paper on Face Recognition Using Techniques and Neural Networks
      • Issue 7 - July Edition (Volume 4 2018)
        • Neural Network Based Optimized Technique for Detection of Blood Vessels in Retina
        • Review Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
        • Survey Paper: To Evaluate the Performance of KNN Algorithm for Face Spoofing
        • A Proposed Technique in IoT Based Parking System Using Bar Code Technology
        • Propose and Evaluate Classification Technique for Heart Disease Prediction
        • Research Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
      • Issue 8 - August Edition (Volume 4 2018)
        • Research Paper -Novel Approach for Face Spoof Detection Using Classification Technique
        • Implementing Proposed Model of IDs System to Defend Against DDOS Attack
        • Speed Up Apache Server Performance by Using Heterogeneous Architecture of Content Delivery Network
      • Issue 9 - September Edition (Volume 4 2018)
        • Implementing Authentication Based System to Detect and Mitigate Anonymous users in VANETS
      • Issue 10 - October Edition (Volume 4 2018)
        • A Review Paper on Insight of an Android Operating System
        • A Review on Li-Fi Technology
      • Issue 11 - November Edition (Volume 4 2018)
        • A Review on Lung Cancer Detection Analysis
        • A Review Swot Up On Survey of Data Safety Measures in Cloud Computing
      • Issue 12 - December Edition (Volume 4 2018)
        • A New Mammography Image Classification System by Deep Learning and Feature Selection
        • Performance Evaluation of IEEE802.21-Media Independent Handover for Heterogeneous Networks
        • A Simulative Analysis of Routing Protocols for LR-WPAN
        • Bearing Fault Detection using Ensemble Empirical Mode Decomposition integrated with Teager Kaiser Energy Method
    • Volume 5 (2019)
      • January Edition (Volume 5 2019)
        • A Smart Placement Optimized Sink Mechanism for Wireless Sensor Networks
        • A Review Study on Virtual Reality
      • February Edition (Volume 5 2019)
        • An Effective Load Balancing Algorithm for Cloud Data Centers
        • An Analysis of Cloud Computing Security Issues and Challenges
      • March Edition (Volume 5 2019)
        • A Review Paper on Smart Irrigation Basis of Internet of Things
        • A Review Study on Cloud Computing Latency Reduction Approaches
        • A Review SWOT UP on 5G Technology Boon or BANE
        • Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
        • Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
      • April Edition (Volume 5 2019)
        • Optimization of Domino Logic in Terms of Power Dissipation and Delay for High Speed Applications using CMOS
        • The Security Analysis on Biometric Authentication System: A Brief Review
        • An Effectual Clustering Approaches for Wireless Sensor Networks: A Review
      • May Edition (Volume 5 2019)
        • Outlier Detection of Energy House Holding Data Streams using K-Means and A-SVM Algorithm
        • Detection and Mitigation of Selfish Node in Wireless Mesh Networks (WMN’s)-A Review
      • June Edition (Volume 5 2019)
        • An Effectual Review on Energy Clustering In Real
        • Discussion of Threat Issues in MANET: A Brief Review
        • A Robust Multimodal Biometric Traits Using Iris and Fingerprint Fusion
        • Review on Advanced Threat Detection Techniques for IoT Networks
        • Engagement Predictions in an ELS-E Learning System Using Data Mining: A Review
      • July Edition (Volume 5 2019)
        • An Effectual Clustering Approach for Low Energy Consumption in Sensor Networks
        • An Effectual Optimization for Low Packet Losses in Sensor Networks
        • An Effectual Instance to Mitigate Threat in Dense Mobile Ad-Hoc Network
        • Data Mining based Student Engagement Predictions in an e-Learning System: A Review
        • Review on Threats in Prospective of Secure Mobile Ad-Hoc Networks
        • An Improved Datamining Approach for Student Engagement Predictions Systems (SEPS)
      • August Edition (Volume 5 2019)
        • Review Paper on Object Tracking For Single and Multi-Objects by Using Various Algorithm
        • An Optimize Reduction of Uncertainties in Mobile Ad-Hoc Networks
        • An Efficient Datamining Approach for Student Engagement Predictions Systems
      • September Edition (Volume 5 2019)
        • A Review Study on Virtual Reality vs. Augmented Reality
        • Bio-Inspired Approach for Edge Detection in Image Processing
        • Analysis of Edge Detection Techniques
        • Software Effort Estimation Techniques: A Review
        • Hybrid Technique for Effort Estimation of Software’s
      • December Edition (Volume 5 2019)
        • The Path Recovery in Mobile Ad hoc Network with Improved DFCP Protocol
      • Issue 3 - March Edition (Volume 5 2019)
        • A Review Paper on Smart Irrigation Basis of Internet of Things
        • A Review Study on Cloud Computing Latency Reduction Approaches
        • A Review SWOT UP on 5G Technology Boon or BANE
        • Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
        • Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
      • Issue 5 - May Edition (Volume 5 2019)
        • Outlier Detection of Energy House Holding Data Streams using K-Means and A-SVM Algorithm
        • Detection and Mitigation of Selfish Node in Wireless Mesh Networks (WMN’s)-A Review
      • Issue 4 - April Edition (Volume 5 2019)
        • Optimization of Domino Logic in Terms of Power Dissipation and Delay for High Speed Applications using CMOS
        • The Security Analysis on Biometric Authentication System: A Brief Review
        • An Effectual Clustering Approaches for Wireless Sensor Networks: A Review
      • Issue 6 - June Edition (Volume 5 2019)
        • An Effectual Review on Energy Clustering In Real
        • Discussion of Threat Issues in MANET: A Brief Review
        • A Robust Multimodal Biometric Traits Using Iris and Fingerprint Fusion
        • Review on Advanced Threat Detection Techniques for IoT Networks
        • Engagement Predictions in an ELS-E Learning System Using Data Mining: A Review
      • Issue 7 - July Edition (Volume 5 2019)
        • An Effectual Clustering Approach for Low Energy Consumption in Sensor Networks
        • An Effectual Optimization for Low Packet Losses in Sensor Networks
        • An Effectual Instance to Mitigate Threat in Dense Mobile Ad-Hoc Network
        • Data Mining based Student Engagement Predictions in an e-Learning System: A Review
        • Review on Threats in Prospective of Secure Mobile Ad-Hoc Networks
        • An Improved Datamining Approach for Student Engagement Predictions Systems (SEPS)
      • Issue 8 - August Edition (Volume 5 2019)
        • Review Paper on Object Tracking For Single and Multi-Objects by Using Various Algorithm
        • An Optimize Reduction of Uncertainties in Mobile Ad-Hoc Networks
        • An Efficient Datamining Approach for Student Engagement Predictions Systems
      • Issue 9 - September Edition (Volume 5 2019)
        • A Review Study on Virtual Reality vs. Augmented Reality
        • Bio-Inspired Approach for Edge Detection in Image Processing
        • Analysis of Edge Detection Techniques
        • Software Effort Estimation Techniques: A Review
        • Hybrid Technique for Effort Estimation of Software’s
      • Issue 12 - December Edition (Volume 5 2019)
        • The Path Recovery in Mobile Ad hoc Network with Improved DFCP Protocol
    • Volume 6 (2020)
      • January Edition (Volume 6 2020)
        • Analysis of DFCP Protocol for Link Recovery in MANET
      • February Edition (Volume 6 2020)
        • A review paper on Garbage Monitoring System using IOT
      • July Edition (Volume 6 2020)
        • A Review Paper on Face Recognition with Visible and Thermal Infrared Imagery
        • A Review Paper on Concept of Security and comparison in Data Management System
      • September Edition (Volume 6 2020)
        • A Paper on Face Recognition with Visible and Thermal Infrared Imagery
        • A Paper on Concept of Security and Comparison in Data Management System
      • Issue 1 - January Edition (Volume 6 2020)
        • Analysis of DFCP Protocol for Link Recovery in MANET
      • Issue 2 - February Edition (Volume 6 2020)
        • A review paper on Garbage Monitoring System using IOT
      • Issue 3- July Edition (Volume 6 2020)
        • A Review Paper on Face Recognition with Visible and Thermal Infrared Imagery
        • A Review Paper on Concept of Security and comparison in Data Management System
      • Issue 4- September Edition (Volume 6 2020)
        • A Paper on Face Recognition with Visible and Thermal Infrared Imagery
        • A Paper on Concept of Security and Comparison in Data Management System
    • Volume 1 (2015)
      • October Edition (Volume 1 2015)
        • A New Approach to Enhance Security against Mischievous Nodes Using Cooperative Bait Detection Scheme
        • To Study The Effect Of Holding Time And Holding Temperature On Hardness And Micro Structure Of Alloy Steel AISI4340
        • Detecting forgery in images using alphabetic ordering of extracted blocks
        • Optimum Power Utilization for MIMO Wireless Network using signal-to-interference-and-noise (SINR) ratio and optimal transmission power (OTP)
        • Overview Of Sybil Attack: Analysis And Detection
        • Comparative Study And Analysis Of AODV AND OLSR Protocols In MESH Networks
        • REVIEW OF IDS SYSTEM IN LARGE SCALE ADHOC NETWORKS
        • Web Service Recommendation System In Data Mining
        • Identify The DOS (Denial Of Service) Attack In Wireless ADHOC Network And Tumbling The Influence Of Flooding Caused By DOS Attack In MANETS
        • Surface Detection Using Ultrasonic Waves For The Advancement Of Robotics
        • Email With Classification Detection Power
      • November Edition (Volume 1 2015)
        • Performance Evaluation Survey on Loop Prevention Mechanisms in Redundant Switch Topology
        • A New Era in the area of Digital Marketing
      • December Edition (Volume 1 2015)
        • Identifying And Evaluating Jelly Fish Attack Using Aodv Protocol
        • Comparative Study And Evaluation Of AODV, DSR And OLSR Protocols
    • IJTC Forms
      • IJTC Paper Template
      • IJTC Copyright Form
    • Volume 2 (2016)
      • Issue 1 - January Edition (Volume 2 2016)
        • A Novel Approach In Software Cost Estimation Combining Swarm Optimization And Clustering Technique
        • Adaptive Gaussian Filter Based Image Recovery Using Local Segmentation
      • Issue 3 - March Edition (Volume 2 2016)
        • Detecting Byzantine Attack using Wireless Sensor Network
        • A Review on Various Classification Techniques in Email Spamming
        • Multiple Parameter Based Resource Allocation Algorithm in Cloud Computing through Auctioneer
        • A Systematic approach for Resource Migrations in Cloud Computing Environment
      • Issue 4 - April Edition (Volume 2 2016)
        • Restoration of Image Using KNN Algorithm
        • A Review Paper on Different Classification Techniques Used in News Sentiment Analysis
        • Survey Paper on Frequent Pattern Mining on Web Server Logs
        • A Novel Method For Enhancing LEACH Protocol With Traffic Management System
        • A New Era To Balance The Load On Cloud Using Vector Dot Load Balancing Method
        • Performance Enhancement of RECLAT Algorithm Using Map Reduce Technique
        • Prevention of ICMP Based Attack Using Leader Election Based Algorithm with MAC Authentication
        • Implementation of Model Cloning in Software Models using UML diagrams
      • Issue 5 - May Edition (Volume 2 2016)
        • Functional Test Cases Generation Based on Automated Generated Use Case Diagram using DFS algorithm
        • Performance evaluation of Apriori algorithm using association rule mining technique
        • A Co-operative Various Attacks Detect for Location Based Application in Secure Network
        • Energy Optimization of Leach Protocol in WSN Using NS2 Simulator
        • Heat Transfer in Rectangular Micro Channels at Different Plenum Shapes
        • Experimental Investigation of Rectangular Microchannels with Different Manifold Arrangements
        • Optimization of Friction Stirs Welding of Aluminum 6063 by Using Taguchi Approach
        • Introduction to Web Data Mining and Apriori Algorithm
        • Self-Offloading of Andriod Applications Exploiting the Resources of Cloud
        • Image Registration Evaluation and Comparison of Non-Rigid Transformation Algorithms
        • REVIEW ON IMAGE FUSION
        • EFFICIENT RESTORATION TECHNIQUE OF IMAGE USING KNN ALGORITHM
        • A Review Paper on a Novel Cluster Based Approach for Preventing DOS Attack in VANET
        • A REVIEW PAPER TO DETECT AN ISOLATE ATTACK IN WSN AND PROVIDING SECURITY USING RSA AND MD5 ALGORITHMS
        • A REVIEW ON SOFTWARE FAULT PREDICTION TECHNIQUE USING DIFFERENT DATASET
        • A COLORED IMAGE DENOISING APPROACH BASED ON FUZZY LOGIC
        • STUDY OF WEAR BEHAVIOUR OF ALUMINIUM BASED MICRO AND NANO COMPOSITES FABRICATED BY STIR CASTING TECHNIQUE
        • AN ENHANCED PAGE RANKING ALGORITHM USING DYNAMIC APPROACH
        • EVALUATION OF DESIGN FACTOR FOR PARTIALLY OPEN GROUND STOREY REINFORCED CONCRETE BUILDINGS
      • Issue 6 - June Edition (Volume 2 2016)
        • A REVIEW ON THE VANET TRAFFIC CONGESTION METHODS
        • DETECTION AND LOCALIZATION OF SOUND USING ADAPTIVE LEARNING TECHNIQUE
        • A REVIEW ON RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
        • A REVIEW ON MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
        • AN EMPIRICAL INVESTIGATION OF BAD SMELLS IN CODE ON MAINTENANCE EFFORT
      • Issue 7 - July Edition (Volume 2 2016)
        • A NEW ERA FOR RETINAL BLOOD VESSEL SEGMENTATION USING SUPERVISED & UNSUPERVISED LEARNING METHOD
        • LOAD BALANCING IN MPLS PROTOCOL ACROSS WIRED AND WIRELESS NETWORKS: A SURVEY
        • A SURVEY ON FACE RECOGNITION TECHNOLOGIES AND TECHNIQUES
        • A REVIEW ON FACE IDENTIFICATIONS SYSTEM USING FUSION METHOD
        • A REVIEW ON CLOUD BASED LOAD BALANCING SYSTEM USING HYBRID (OLB+LBMM) TECHNIQUE
        • PAGE RANK ALGORITHM BASED ON THE DYNAMIC APPROACH
        • A REVIEW ON BALANCING THE LOAD ON CLOUD USING ACCLB HYBRID LOAD BALANCING TECHNIQUE
        • LITERATURE SURVEY OF MANETS ROUTING PROTOCOLS
      • Issue 8 - August Edition (Volume 2 2016)
        • REVIEW OF WIRELESS SENSOR NETWORK AND HIERARCHICAL ROUTING PROTOCOLS
        • A SYSTEMATIC WAY FOR MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET
        • IDENTIFICATION OF AODV BASED BLACK HOLE AND GRAY HOLE ATTACKS AND PREVENTION TECHNIQUES IN MANET
        • Machine Printed Gurumukhi Numerals Recognition using Convolutional Neural Networks
        • Pattern Recognition based Scheduling in Cloud Computing
        • K-Nearest Neighbor (kNN) based Product Ranking Model with Minimum Cost Evaluation
        • A Systemmatic way to balance the load on cloud using Hybrid (OLB+LBMM) Technique
        • A New Era to Balance the Load on Cloud using ACCLB Hybrid Load Balancing Technique
        • An Efficient Model for Web Vulnerabilities Detection based on Probabilistic Classification
        • Multiple Attribute Based Security of Data in Cloud Computing
        • Design and development of overhead detection and improvement system for AOP
        • Automated formulation and prioritisation of test path using UML and AOP
      • Issue 9 - September Edition (Volume 2 2016)
        • Web Usage Mining Through FP Split and APRIORI Algorithm
        • Base Paper on Estimation of Vehicle Orientation Using Stereo Vision
        • A Detailed Improved Structure of Page Ranking Algorithm Using Dynamic Approach
        • Dual Layered Response for WBANs based upon Authentication and Authorization Layers
        • Evaluate the Performance of COMBO Load Balancing Algorithm in Cloud
        • An Approach for Visualization of Big Data Using Nanocubes
        • Retinal Vessel Segmentation employing Neural Network and Feature Extraction
        • A New Era for Face Identifications System Using Fusion Method
        • Implementation of Turbo Codes in MIMO –OFDM system for 4G applications
        • Adaptive End-to-End Authentication for the Cloud-based Healthcare Networks
      • Issue 10 - October Edition (Volume 2 2016)
        • Predicting Students’ Performance Using Classification Techniques in Data Mining
        • Secure and Proficient Unnamed Air Vehicles Using Encryption Technique and Particle Swarm Optimization Based on Wireless Mesh Network
        • A Systematic way to Design New Approach for Technical Steganography based on ACO Algorithm
        • Enhanced TPA Scheme to Improve Access Permissions Development Overcloud Architecture
        • Performance Analysis of Spark using k-means
        • A Review Paper on Translucent Windshield
        • Reasons for Lower Literacy among Girls in Himachal Pradesh
      • Issue 11 - November Edition (Volume 2 2016)
        • Review on Enhancement Performance of WDM networks over Diversity Systems
      • Issue 12 - December Edition (Volume 2 2016)
        • Black hole Prevention Mechanism using Hybridization of rule set with Evolutionary Method
        • An Approach for Intrusion Detection System using Genetic Algorithm with SVM classification
        • A Systematic Review on the Field of Digital Marketing
        • Review on Novel Approach of Ethical feedback Analysis
        • Technique to Enhance Map Reduce ECLAT Algorithm
        • Research into Pattern Recognition Theory and Practical Algorithms based on scheduling in Cloud
    • Volume 3 (2017)
      • Issue 1 - January Edition (Volume 3 2017)
        • Narrative Approach of Ethical Response Scrutiny
        • Performance Evaluation of Apriori Algorithm on Reservation Policy
        • A Review paper on DHCP RELAY AGENT
        • Methodological Analysis of Client Recognition Mechanisms
        • A Narrative Study on Supervised Learning
      • Issue 2 - February Edition (Volume 3 2017)
        • A Systematic Review on An Artificial Bee Colony optimized approach for segmentation of blood vessels using Neural Networks
        • Review Paper on Transliteration Method of Nouns
        • To Maintain the Privacy in Moveable Sink to Prevent Active and Passive Attacks
        • Black Hole and Gray Hole attacks and Prevention Techniques in WSN
        • An Evaluation Study on Compression Techniques in Hadoop
        • Improvement in Dynamic Clustering using Genetic Analysis Based Mechanism
      • Issue 3 - March Edition (Volume 3 2017)
        • Review Paper on Batch Processing and Stream Processing
        • Spatio Spectral Features Based Skin Lesions Segmentation Using Euclidean Distance
        • Optimum Power Utilization for MIMO Wireless Network
        • Quick Response Content based Image Retrieval (QR-CBIR) using Hybrid Feature Descriptor
        • A Reliable Punjabi to English Machine Transliteration System for Proper Noun
      • Issue 4 - April Edition (Volume 3 2017)
        • Heart Disease Prediction System Using Data Mining Techniques - A Review
        • A Review on Various Approaches of Brain Tumor Detection in Medical Images
        • To Investigate the Effect of Vibration on Electrical Discharge Machining of AISI H13 Die Steel
        • Review paper on Safety issues of Memory Management in Cloud Computing
      • Issue 5 - May Edition (Volume 3 2017)
        • Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
        • Classification of Brain tumor using texture features with segmentation & FFNN approach: A Synopsis
        • Review Paper on Workload Characteristics and Resource Aware Hadoop Scheduler
        • A Review on Energy Efficient Routing in Wireless Sensor Networks
        • Trending Routing Protocols in Wireless Communication – A Review
        • Extraction Based Lung Cancer Recognition: A Survey
        • Review paper on Traffic Route Scheduling in Road Networks
        • Copy Move Forgery Image Classification with Orientation Based Features by EM Algorithm
        • A Survey on Energy Optimization Approaches in Ad-Hoc Networks
      • Issue 6 - June Edition (Volume 3 2017)
        • Mitigation of Network Security Threat in Cyber World
        • A Review on Data Mining Model to Predict Coronary Artery Disease
        • Comparative Analysis of Various File Formats in HIVE
        • A New Era For Image Enhancement Using Spatial Domain Filtering
        • A Systematic Way To Image Enhancement Using Transform Domain Method For X-Ray Images
        • Elemental Approach for High Performance Real Time Streaming Analytics Platform
        • An evaluation on Shortest Path in Road Transportation Networks
        • A Review Study of an Evaluation on Safety Issue in Clod Computing Using Memory Management
        • A Review Paper on Routing Protocol and Network Security
        • Enhanced Video Classification by Time Domain Features Using SVM & RB Kernel Function
        • A Data Mining Model to Predict Coronary Artery Disease using Cleveland CAD dataset
        • Data Storage and Integrity Preserving Framework for Cloud Using a Cryptosystem
        • Review-Content Based Image Retrieval with Methods and Types
        • A Review on Facial Emotion Authentication
      • Issue 7 - July Edition (Volume 3 2017)
        • Segmentation of Retinal Blood Vessels using Sub-blocking and Weighted Sum Method
        • The Survey Of The Heart Disease Detection Technques In Data Mining
        • An Optimize Feature Extraction Approach for Facial Emotion Detection System
        • An Optimized Energy Conservation to Increase Network Lifetime Approach in Mobile Ad-Hoc Networks
        • Updated Energy Effective Routing Algorithm for Event-driven Wireless Sensor Networks
        • Hybrid Feature based CBIR Model using Color and Texture Oriented Features
        • Research Paper on Updated Energy Effective Routing Algorithm for Event-Driven Wireless Sensor Networks with Results
        • An Enhanced Approach for Highly Reputed Authenticated Routing in MANET
        • A Review on Effectual Techniques in Mobile Ad-Hoc Networks
        • A Precise Hybrid Approach for Energy Conservation in Mobile Ad-Hoc Networks
        • Evaluation of Optimal Mobility-Speed of Mobile Nodes in GRP Enabled MANET
        • A Survey on Safety Intimidations in Mobile Ad-Hoc Networks
        • A Review on Uncertainties in Mobile Ad-Hoc Networks
        • An Efficient Learning Based Lung Cancer Diagnostics System
        • A New Era To Handle The Critical Sections Problem Using Token Based Scheme
        • Techniques Of Encryption And Decryption in Cloud Computing- A Review
        • Routing Protocols of MANETS: A Review
        • A New Data Mining Technique in Cloud Big Data Environment
      • Issue 8 - August Edition (Volume 3 2017)
        • Research Paper on Heart Disease Prediction using Genetic Algorithm with Rule Based Classifier in Data Mining
        • Review Study on New Era of Android Kotlin
        • Classification of Brain Tumor Using Texture Features with Segmentation & FFNN Approach
        • A Rotation-Invariant Fingerprint Identifications System Using Neural Network
        • A Survey on Different Types of Load Balancing Techniques and Its Characteristics Used In Cloud Computing
        • Data Store using Encryption Technique with in Cloud Computing: A Research
        • A Fuzzy Neural Network Based Approach for CBIR
        • Image Encryption Using Two Dimensional Modified Sine Logistic Map
        • Services, Technologies and Issues in M-Banking
        • An Assessment of Security Aspects in E-Business through Transaction Monitoring
        • E-Banking Adoption: A Study of Privacy and Trust
        • Study and Review the Black Hole Attack and Grey Hole Attack
        • A Review Paper on Cyber security and Accept it as a Challenge
        • A Review Study on Net Trap Description Tool
        • A Review Study on Blue Brain Technology
        • Searching Of Web Pages by Using the Page Rank Algorithm
        • A review study on Boggling
      • Issue 9 - September Edition (Volume 3 2017)
        • A Refined Alternative to the Traditional Database Record System Services
        • Text Exclusion from Document Images and Number Plate using MATLAB
        • A Study of Protection Issues Behaviour in Cloud Computing Method
        • Self Organizing Maps (SOM) with Moving Average features for Stock Market Prediction
        • Improved Security of Iris Template using RLE and State Transition Optimization Algorithm
        • Analysis of IPV-4 and IPV-6 in Networking
        • Categorization of Copy-Move Fake and Normal Images By ORB Features and SVM Classifier
        • Implementation to Improve Quality of Compressed Image Using Updated Huffman Algorithm
        • A Review Study on Image Filter Scheming for Advanced Feature Recognition and Segmentation using Digital Image Processing
      • Issue 10 - October Edition (Volume 3 2017)
        • Implementation Scaling Image Using Bilinear Interpolation
        • An Efficient Optimize Approach to Mitigate the Effect of Sybil Attacks in Highly Dense MANET Systems
        • Review the impact of Distributed Denial of Service Attack on Real Networks
        • Review Study on Generation of Electricity from an Ordinary Fan
        • An Optimize Approach to Reduce the Uncertainties in Mobile Adhoc Networks Using Firefly Optimization
        • A Survey of Reliable Transfer on Multi-Radio Multi-Channel Techniques in Wireless Mesh Networks
        • Comparative Analysis and Prevention of DDOS Attack in Sensor Network
        • Dynamic Query Mechanism for Rapid Data Extraction using ETL Process
      • Issue 11 - November Edition (Volume 3 2017)
        • An efficient approach to reduce the Uncertainties in MANETS using Firefly Optimizations
        • An Adaptive Zone Routing Protocol Based on Node Mobility and Traffic Load in Mobile Adhoc Networks
      • Issue 12 - December Edition (Volume 3 2017)
        • Performance optimization MPLS-MANET Networks over Black Hole Attack
        • Network Attack Aware Routing using AODV and TORA in MANETs
    • Volume 4 (2018)
      • Issue 1 - January Edition (Volume 4 2018)
        • An Evaluation of Big Data Challenges Techniques with Hadoop Components
        • Energy Efficient Clustering Protocol Using PEGASIS Routing Protocol and Feed Forward Neural Network For Wireless Sensor Network
      • Issue 2 - February Edition (Volume 4 2018)
        • Enhanced Data Aggregation Schema for Load Balancing in Wireless Sensor Network Using Gateways
        • A Review Study on Combined Battery Energy Extender cum Booster and Technique
        • A Review Study on Cloud Computing and Its Issues and Challenges
        • Comparative Analysis of AODV and DSR Routing Protocols in MANETs
        • A Review Paper on Contravention the Curse of Dimensionality for Machine Erudition on Genomic Data
      • Issue 3 - March Edition (Volume 4 2018)
        • A Review Study on Humanoid Robot SOPHIA based on Artificial Intelligence
        • Review on FPM and FPE
      • Issue 4 - April Edition (Volume 4 2018)
        • An Evaluation of Deep Thoughts in Cryptography Principles
        • An Evaluation of Prevent Hacking all the way through Cyber Security
        • Security Techniques of Mobile Ad hoc Networks: A Review
        • Analysis of Plant Disease Detection
        • A Review Paper on Advance Feature Finding and Segmentation Image Processing
        • Review Paper on Prediction of Regional Disease Using Classification Techniques
        • Masking using Format Preserving Encryption
      • Issue 5 - May Edition (Volume 4 2018)
        • A Survey on Big Data Storage
        • A Computational to Study the Effect of Flow Type on the Performance of Different Heat Sinks
        • An Effect of Varying Nodes and Mobility during Breakdown and Recovery of Nodes on MANET
        • A Survey on Wireless Sensor Networks Attacks
      • Issue 6 - June Edition (Volume 4 2018)
        • Prediction of Regional Disease Using Data Mining Techniques
        • Hybrid Approach to Digital Watermarking For Secure Communication
        • Review Paper on Face Recognition Using Techniques and Neural Networks
      • Issue 7 - July Edition (Volume 4 2018)
        • Neural Network Based Optimized Technique for Detection of Blood Vessels in Retina
        • Review Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
        • Survey Paper: To Evaluate the Performance of KNN Algorithm for Face Spoofing
        • A Proposed Technique in IoT Based Parking System Using Bar Code Technology
        • Propose and Evaluate Classification Technique for Heart Disease Prediction
        • Research Paper on Dynamic Approach for Performance Analysis of Real Time Data Using Traditional System and HADOOP
      • Issue 8 - August Edition (Volume 4 2018)
        • Research Paper -Novel Approach for Face Spoof Detection Using Classification Technique
        • Implementing Proposed Model of IDs System to Defend Against DDOS Attack
        • Speed Up Apache Server Performance by Using Heterogeneous Architecture of Content Delivery Network
      • Issue 9 - September Edition (Volume 4 2018)
        • Implementing Authentication Based System to Detect and Mitigate Anonymous users in VANETS
      • Issue 10 - October Edition (Volume 4 2018)
        • A Review Paper on Insight of an Android Operating System
        • A Review on Li-Fi Technology
      • Issue 11 - November Edition (Volume 4 2018)
        • A Review on Lung Cancer Detection Analysis
        • A Review Swot Up On Survey of Data Safety Measures in Cloud Computing
      • Issue 12 - December Edition (Volume 4 2018)
        • A New Mammography Image Classification System by Deep Learning and Feature Selection
        • Performance Evaluation of IEEE802.21-Media Independent Handover for Heterogeneous Networks
        • A Simulative Analysis of Routing Protocols for LR-WPAN
        • Bearing Fault Detection using Ensemble Empirical Mode Decomposition integrated with Teager Kaiser Energy Method
    • Volume 5 (2019)
      • Issue 3 - March Edition (Volume 5 2019)
        • A Review Paper on Smart Irrigation Basis of Internet of Things
        • A Review Study on Cloud Computing Latency Reduction Approaches
        • A Review SWOT UP on 5G Technology Boon or BANE
        • Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
        • Evolution and Application of IEEE 802.11n OFDM PHY Link With Different Fading Techniques
      • Issue 5 - May Edition (Volume 5 2019)
        • Outlier Detection of Energy House Holding Data Streams using K-Means and A-SVM Algorithm
        • Detection and Mitigation of Selfish Node in Wireless Mesh Networks (WMN’s)-A Review
      • Issue 4 - April Edition (Volume 5 2019)
        • Optimization of Domino Logic in Terms of Power Dissipation and Delay for High Speed Applications using CMOS
        • The Security Analysis on Biometric Authentication System: A Brief Review
        • An Effectual Clustering Approaches for Wireless Sensor Networks: A Review
      • Issue 6 - June Edition (Volume 5 2019)
        • An Effectual Review on Energy Clustering In Real
        • Discussion of Threat Issues in MANET: A Brief Review
        • A Robust Multimodal Biometric Traits Using Iris and Fingerprint Fusion
        • Review on Advanced Threat Detection Techniques for IoT Networks
        • Engagement Predictions in an ELS-E Learning System Using Data Mining: A Review
      • Issue 7 - July Edition (Volume 5 2019)
        • An Effectual Clustering Approach for Low Energy Consumption in Sensor Networks
        • An Effectual Optimization for Low Packet Losses in Sensor Networks
        • An Effectual Instance to Mitigate Threat in Dense Mobile Ad-Hoc Network
        • Data Mining based Student Engagement Predictions in an e-Learning System: A Review
        • Review on Threats in Prospective of Secure Mobile Ad-Hoc Networks
        • An Improved Datamining Approach for Student Engagement Predictions Systems (SEPS)
      • Issue 8 - August Edition (Volume 5 2019)
        • Review Paper on Object Tracking For Single and Multi-Objects by Using Various Algorithm
        • An Optimize Reduction of Uncertainties in Mobile Ad-Hoc Networks
        • An Efficient Datamining Approach for Student Engagement Predictions Systems
      • Issue 9 - September Edition (Volume 5 2019)
        • A Review Study on Virtual Reality vs. Augmented Reality
        • Bio-Inspired Approach for Edge Detection in Image Processing
        • Analysis of Edge Detection Techniques
        • Software Effort Estimation Techniques: A Review
        • Hybrid Technique for Effort Estimation of Software’s
      • Issue 12 - December Edition (Volume 5 2019)
        • The Path Recovery in Mobile Ad hoc Network with Improved DFCP Protocol
    • Volume 6 (2020)
      • Issue 1 - January Edition (Volume 6 2020)
        • Analysis of DFCP Protocol for Link Recovery in MANET
      • Issue 2 - February Edition (Volume 6 2020)
        • A review paper on Garbage Monitoring System using IOT
      • Issue 3- July Edition (Volume 6 2020)
        • A Review Paper on Face Recognition with Visible and Thermal Infrared Imagery
        • A Review Paper on Concept of Security and comparison in Data Management System
      • Issue 4- September Edition (Volume 6 2020)
        • A Paper on Face Recognition with Visible and Thermal Infrared Imagery
        • A Paper on Concept of Security and Comparison in Data Management System
  • Editorial Board
  • For Author
    • Submit a Manuscript
    • Author Guidelines
    • Download Template
    • Download Copyright Form
    • PROCESSING FEE (Online)
  • IJTC Blog
  • FAQ
  • Contact Us

  • IJTC
  • Search
  • Successful
  • cancelled
  • failed
  • Reviewer Registration Form

IMPORTANT LINKS

  • Disclaimer
  • Anti-Plagiarism Policy
  • Code of Conduct
  • Terms and Conditions

Quick Links

  • Sitemap
  • Feedback
  • Join as Reviewer

Call for Papers

Call for Papers - February Edition - 2020, Volume 6

Authors are invited to submit papers for the February edition Volume 6, Issue 2, February- 2020.

The research papers/manuscripts can be submitted online or by sending mail to ijtc.editor@gmail.com

Submit your Paper

Search your papers

Google Add 1

IJTC Archives

Blog Tags

Who's Online

We have no guests and no members online

Indexing

Iijif-IJTC
Doc Stock-IJTC
Scribd-IJTC
DOAJ-IJTC
Google Scholar-IJTC

Processing Fee

India : Rs.3000/-
Other Countries: USD 50

Google Scholar

 IJTC Google Scholar


www  ijtc.org


Iso Certified

Like Us On Facebook

International Journal of Technology and Computing-IJTC

CC by creative commons

Creative Commons License
IJTC by http://ijtc.org is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

About Us

  • Aim & Scope
  • IJTC team
  • IJTC Indexing
  • Publication Ethics Policy

FOR AUTHORS

  • Submit a Manuscript
  • Author Guidelines
  • Processing Fee
  • Download Template
  • Download Copyright Form

PUBLICATIONS

  • CALL FOR PAPER
  • ARCHIVES
  • THESIS PUBLICATION
  • SPECIAL ISSUE

IMPORTANT LINKS

  • Disclaimer
  • Anti-Plagiarism Policy
  • Code of Conduct
  • Terms and Conditions

Quick Links

  • Sitemap
  • Feedback
  • Join as Reviewer

Visitor Count

               Ijtc hits

Copyright © 2015 IJTC.ORG , All rights reserved.Published and Powered By Techlive Solutions
Back to top
  • Home
  • About IJTC
    • Aim & Scope
    • IJTC team
    • IJTC Indexing
    • IJTC Publication Ethics Policy
    • IJTC Disclaimer
    • IJTC Anti-Plagiarism Policy
  • Call For Paper
  • Archives
    • Volume 1 (2015)
      • October Edition (Volume 1 2015)
      • November Edition (Volume 1 2015)
      • December Edition (Volume 1 2015)
    • Volume 2 (2016)
      • January Edition (Volume 2 2016)
      • March Edition (Volume 2 2016)
      • April Edition (Volume 2 2016)
      • May Edition (Volume 2 2016)
      • June Edition (Volume 2 2016)
      • July Edition (Volume 2 2016)
      • August Edition (Volume 2 2016)
      • September Edition (Volume 2 2016)
      • October Edition (Volume 2 2016)
      • November Edition (Volume 2 2016)
      • December Edition (Volume 2 2016)
    • Volume 3 (2017)
      • Feburary Edition (Volume 3 2017)
      • March Edition (Volume 3 2017)
      • April Edition (Volume 3 2017)
      • May Edition (Volume 3 2017)
      • June Edition (Volume 3 2017)
      • July Edition (Volume 3 2017)
      • August Edition (Volume 3 2017)
      • September Edition (Volume 3 2017)
      • October Edition (Volume 3 2017)
      • November Edition (Volume 3 2017)
      • December Edition (Volume 3 2017)
    • Volume 4 (2018)
      • March Edition (Volume 4 2018)
      • April Edition (Volume 4 2018)
      • May Edition (Volume 4 2018)
      • June Edition (Volume 4 2018)
      • July Edition (Volume 4 2018)
      • August Edition (Volume 4 2018)
      • September Edition (Volume 4 2018)
      • October Edition (Volume 4 2018)
      • November Edition (Volume 4 2018)
      • December Edition (Volume 4 2018)
    • Volume 5 (2019)
      • January Edition (Volume 5 2019)
      • February Edition (Volume 5 2019)
      • March Edition (Volume 5 2019)
      • April Edition (Volume 5 2019)
      • May Edition (Volume 5 2019)
      • June Edition (Volume 5 2019)
      • July Edition (Volume 5 2019)
      • August Edition (Volume 5 2019)
      • September Edition (Volume 5 2019)
      • December Edition (Volume 5 2019)
    • Volume 6 (2020)
      • January Edition (Volume 6 2020)
      • February Edition (Volume 6 2020)
      • July Edition (Volume 6 2020)
      • September Edition (Volume 6 2020)
  • Editorial Board
  • For Author
    • Submit a Manuscript
    • Author Guidelines
    • Download Template
    • Download Copyright Form
    • PROCESSING FEE (Online)
  • IJTC Blog
  • FAQ
  • Contact Us