- DocumentoIJTC201604009-Implementation of Model Cloning in Software Models Using UML Diagrams-s129enviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201604008-Prevention of ICMP Based Attack Using Leader Election Based Algorithm With MAC Authenticationenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201604007-Performance Enhancement of RECLAT Algorithm Using Map Reduce Technique-s126enviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201604006-A New Era to Balance the Load on Cloud Using Vector Dot Load Balancing Methodenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201604005-A Novel Method for Enhancing LEACH Protocol With Traffic Management Systemenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201604004-Survey Paper on Frequent Pattern Mining on Web Server Logsenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201604003-Evaluate the Performance of Load Balancing Algorithms in Cloud Computingenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201604002-A Review Paper on Different Classification Techniques Used in News Sentiment Analysisenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201604001-Restoration of Image Using KNN Algorithmenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201603003-Multiple Parameter Based Resource Allocation Algorithm in Cloud Computing Through Auctioneerenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201603002-A Review on Various Classification Techniques in Email Spammingenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201603001-Detecting Byzantine Attack Using Wireless Sensor Networkenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201601002-Adaptive Gaussian Filter Based Image Recovery Using Local Segmentationenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201601001-A Novel Approach in Software Cost Estimation Combining Swarm Optimization and Clustering Techniqueenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201512002-Comparative Study and Evaluation of AODV, DSR and OLSR Protocolsenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201512001-Identifying and Evaluating Jelly Fish Attack Using Aodv Protocolenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201511001-Performance Evaluation Survey on Loop Prevention Mechanisms in Redundant Switch Topologyenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510012-Email With Classification Detection Powerenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510011-Surface Detection Using Ultrasonic Waves for the Advancement of Roboticsenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510010-Identify the Dos (Denial of Service) Attack in Wireless Ad Hoc Network and Tumbling the Influence of Flooding Caused by Dos Attack in Manetsenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510009-Prevention of Attacks on Mobile Agents Based E-Service Applicationsenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510008-Review of IDS System in Large Scale ADHOC Networksenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510007-Web Service Recommendation System in Data Miningenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510006-Overview of Sybil Attack Analysis and Detectionenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510005-Optimum Power Utilization for MIMO Wireless Network Using Signal-To-Interference-And-noise (SINR) Ratio and Optimal Transmission Power (OTP)enviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510004-Detecting Forgery in Images Using Alphabetic Ordering of Extracted Blocksenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510003-Comparative Study And Analysis Of AODV AND OLSR Protocols In MESH Networks.pdfenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510002-To Study the Effect of Holding Time and Holding Temperature on Hardness and Micro Structure of Alloy Steel AISI4340.pdfenviado porInternational Journal of Technology and Computing (IJTC)
- DocumentoIJTC201510001-A New Approach to Enhance Security Against Mischievous Nodes Using Cooperative Bait Detection Schemeenviado porInternational Journal of Technology and Computing (IJTC)