You are on page 1of 3

International Journal of Computer (IJC)

ISSN 2307-4531
http://gssrr.org/index.php?journal=InternationalJournalOfComputer&page=index

Volume 7 , No 1, 2012 Table of Contents Articles


Ensuring Data Security in Cloud Computing Using encryption
Karmen Biswas
PDF

ERP systems in Portugal production firms


Vinita Hansen

PDF

Artificial Neural Expert Computing Models For Determining Shelf Life Of Processed Meat
Siddesh Anil

PDF

E-Government Assessment And Future Directions


John Chibambo, Paul Maroin

PDF

Danish E-Government Where Is It Coming From And Where Is It Going


Viveca Wiklund

PDF

Usability Evaluation Of Government Web Portals Of Pakistan


Erik Larsson

PDF

Improving Intrusion Detection Effectiveness Using Agents


San Kumar

PDF

Color Barcodes For Personal Digital Assistant Devices


Rocha Carneiro, Asawa Agarwal

PDF

Image Compression Using Huffman Coding


Vozalis Margaritis

PDF

Bandwidth Recycling In Wide Area Networks


Koladiya Vaghela, Charde Bhargavi

PDF

Two-layered Framework for Network Troubleshooting


Verma Vikas, Hans uenther, Vasos Pavlika

PDF

Wavelength Selection for Gabor Wavelet using Genetic algorithms


Ron Ye, Jing Ma, Yu-Jen Chen

PDF

Performance evaluation of Routing Protocols in Ad-hoc Network


Xiao Zhang, Ge Xiuquan, Li Guoqing

PDF

An Expert System for Heart Disease Diagnosis


Patrick Berg, Robert Drescher, Ehrlich mann

PDF

Neural Network implementation in Image Processing


Agarwal Beaven

PDF

Feature Detection Using Neural Network


Samuel Schmitt

PDF

Object Tracking in Surveillance Application

PDF

International Journal of Computer (IJC) (2013) Volume 00, No 00, pp 00-00


Romain Blanchard

Face Authentication System


Philippe Lefebvre, Thophile Leroy

PDF

Animated simulations in Computational Physics


Luke Rafig

PDF

High Alloy Precipitation Hardening Martensitic Steels And Their Uses


Pan Piderit

PDF

New Intrusion Detection System Using Genetic Algorithm


Martin Brunner

PDF

New Artificial Immune System for Spam Detection


Genya Coffey

PDF

The Impact of Virtual Simulations


Richard Khoury

PDF

A New Hybrid Malware Detection Technique


Maria Osborn

PDF

Applications of Speech Recognition for Romanian Language


Hirsch Yalcinoz

PDF

Pattern-Based Techniques in Reengineering Processes


Thophile Nagpal

PDF

A Risk-Assessment Model for Cyber Attacks


Tanja Garcia

PDF

Bug Tracking System


Genya Leela

PDF

Challenges in Managing Information Security


Harry Larsson

PDF

Noise Reduction for Automatic Gridding of Microarray Images


Tanja Goldschmidt

PDF

An Algorithm for Task Scheduling in Grids


Popescu Petit

PDF

Ensuring Data Security in Cloud Computing Using Huffman Encryption


Karmen Biswas

PDF

What Are The Available Open Source ERP Systems?


Roxanne Piderit

PDF

Meta Tags In Information Retrieval: New Look!


Avinash Kotapat

PDF

Information Protection Methods In Computer Systems


Koladiya Vaghela, Charde Bhargavi

PDF

Improving Retrieval Performance Using New Ideas


Lim Chen

PDF

Very Small Objects Tracking in Surveillance Application


Romain Blanchard

PDF

Three-layered Framework for Network Troubleshooting


Verma Vikas, Hans uenther, Vasos Pavlika

PDF

Comparing Color And Colorless Barcodes For Personal Digital Assistant Devices
Rocha Carneiro, Asawa Agarwal

PDF

Speech Recognition System for Romanian Language


Hirsch Yalcinoz

PDF

Determinants Of Online Tax Payment System In Malaysia


Erik Larsson

PDF

Evaluating Malaysian Ministries' Websites


Paul Maroin, John Chibambo

PDF

Determinants Of Online Tax Payment System In Germany

PDF

International Journal of Computer (IJC) (2013) Volume 00, No 00, pp 00-00


Erik Larsson

Current E-Government: Pros and Cons


Vectoria Willard

PDF

You might also like