Skip to main content
Skip to main navigation menu
Skip to site footer
International Journal of Computer (IJC)
About
About the Journal
Editorial Team
Submissions
Contact
Current
Archives
Call for Papers 2021: April
Announcements
Search
Search
Register
Login
Home
/
Archives
/
Vol 19 No 1 (2015)
Published:
2015-10-12
Articles
Weight-based Word Sense Disambiguation Method for Myanmar-to-English Language Translation
Aye Mya Nyein, May Zin Oo
1-12
PDF
Design of MIMO Antenna Array Architecture for Higher Channel Capacity
phyu phyu thin, Aung Myint Aye
13-25
PDF
Security Enhancement System Based on the Integration of Cryptography and Steganography
Zin May Zaw, Su Wai Phyo
26-39
PDF
Development of Radio Wave Propagation Model in Indoor Non-Line-of-Sight (NLOS) Scenario
Thet War Soe, Aung Myint Aye
40-52
PDF
Automatic Car Number Plate Extraction Using Connected Components and Geometrical Features Approach
Phyo Thet Khin, Lai Lai Win Kyi, Nang Aye Aye Htwe
53-66
PDF
Digital Envelope System Based on Optimized NTRU (Number Theory Research Unit) and RC6 Algorithm
Thwe Thwe Ngwe, Su Wai Phyo
67-78
PDF
A Modified Quantization Based Image Compression Technique using Walsh-Hadamard Transform
Khin Thida Win, Nang Aye Aye Htwe
79-90
PDF
Context-Aware Model for Dynamic Adaptability of Software for Embedded Systems
Camille Jaggernauth, Bozena Kaminska, Douglas Gubbe
91-113
PDF
Neural Networks in Business Forecasting
Osman Mohamed Abbas
114-128
PDF
Evaluation Metrics for Computer Science Domain Specific Ontology in Semantic Web Based IRSCSD System
Ritika Bansal, Sonal Chawla
129-139
PDF
Fast Text Mining Methodology
Pooja Kolte
Smart Secret Detection of Sensitive Data Leakage
Prajakta R.
CHALLENGES OF PROJECT MANAGEMENT IN GLOBAL SOFTWARE DEVELOPMENT
D. joshi
A Efficient Literature Examination Method on Global Software Development
S. Kowthar
Implementation of Active Watermark-Based Correlation Framework
H. Din
Multicast Signcryption Method Based on Elliptic Curve for Firewalls
D. Sharmila, Naser Iqbal, Ahmad Wakeel, Noor Akdar
GREEDY ALGORITHMS: ANALYSIS, DESIGN & APPLICATIONS
Priya Ashok
Comparative study of different sorting techniques using new algorithm
SUBHADRA AKELLA
ANONYMIZATION TECHNIQUE FOR PRIVACY PROTECTION SHARING OF SENSITIVE DATA STREAM
Vector Surve
Preventing Attacks by Malicious Nodes in Mobile Ad-hoc network
Kavita Nivedha
Computing Devices & Its Recent Trends
Akingbola Akinsola
Data Mining as a Tool for Decision Making
SUBHADRA AKELLA
Management of Packet Queues in Buffer using Fast Proactive Protocol
Vikas shivapuje
Forgery Detection Using Lexicographic Sorting Algorithm
Priyanka Saini
New approach to alleviate energy draining attacks in adhoc Wireless Sensor Networks
Shaukin Ahamad
SEGMENTATION AND IDENTIFICATION OF SPECIAL OBJECT IN AN IMAGE
Rashmi Konda
New Tree Implementation In Bank Transactional Databases
Amandeep SONI
Error Verification and Prediction in Smart Medical Devices
Amira Gaber
SMART Framework for Integrating the Software Project Tasks and Software Change Requests
Maitanmi Olusola Stephen
Comparative analysis of the popular websites used for electronic filing
H. joshi
Make a Submission
Information
For Readers
For Authors
For Librarians
Current Issue