Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
International Journal of Computer (IJC)
About
About the Journal
Editorial Team
Submissions
Contact
Current
Archives
Call for Papers 2023: January
Announcements
Search
Register
Login
Home
/
Archives
/
Vol. 21 No. 1 (2016)
Vol. 21 No. 1 (2016)
Published:
2016-03-31
Articles
Hough Transform and Chi-Square-Based Iris Recognition
Olabode Olatubosun, Iwasokun Gabriel Babatunde, Oluwadare Samuel Adebayo, Adeniyi Tunde Taiwo
1-15
PDF
Design and Evaluate an Online Training Management System for Rural Information Communication Technology Trainees in Libya
Khaked Waregh, Abdalmonem Tamtam
16-29
PDF
In the Cloud Storage Market How Users are Using it without Hesitation (Report 2016)
A. Rob Md. Rayhan Hossain, G. M. Israfil Islam, Md. Shahinurzzaman, Md. Alam Hossain
30-34
PDF
Geographical Information Systems: Implementations in Real World and Future Challenges
Konstantinos Karamitsios
35-41
PDF
A Comparison Review of Indoor Positioning Techniques
Nicholaus R. Mrindoko, Dr. Lusajo M. Minga
42-49
PDF
State of the Art Computational Ternary Logic Currnent-Mode Circuits Based on CNTFET Technology
Mona Moradi
50-63
PDF
A Secure Application for Information Sharing in Organizations: A Case Study of Kabale District Local Government
Ivan Niyonzima, Godfrey Omoda-Onyait
64-77
PDF
Fuzzy Logic Systems and Controlling Vehicles in Computer 3D Games
Wojtyna Ziółko, K. N. Medykovskyj
Requires Subscription
PDF
Software Quality Assurance in Network Security Using Advanced Cryptographic Techniques
Tarannam Zaffar
Relative Review of Automated Testing Tools
Ayesha ghazal
Design, Performance Analysis and Efficiency Optimization of Solar Cell
abdelwahed Elmola
A Survey Based Study for Mobile Ad-Hoc Networks
kour Elmola
Design and Analysis of Printed Rectangular Micro strip Antenna
SHARMA Singh, amandeep kour
Modeling and Analysis of RLCG Interconnect using Fourier Series
DHANANJAYA KUMAR
Implementing MapReduce Based Edmonds-Karp Algorithm to Determine Maximum Flow in Small Network Graph
Amandeep kour
Scalable Packet Behaviour Based Firewall Vulnerability Analysis Tools Review
k. Indumathi
Supporting Confidentiality Protection in Advanced Web Search
M. Mozhi
Evaluation of Quality Assurance factors in Safety Complex Software
Osama abdelwahed
Comparison Between MJPEG Standard and Video Compression Technique Based on Advanced Fast Curvelet Transform
Ahmed Marah
SOIL ANALYSIS & REPORTING Fast System
vipin yadav, Nizamud Din, Arif Iqbal Umar
Face Recognition using PCA Methods
MRINAL SHARMA
Stochastic Optimization for Routing Shortest Path in LAN
Sana ghazal
Combined Impact of Cryptography and Steganography Methods
Subray khan
New Security System Based on Linear Equations
Madhura Hegde
Deterministic AODV Routing Protocol for ad-hoc Network
Pushp Lata
ADVANCED DYNAMIC VIRTUAL MACHINE LOAD BALANCING IN CLOUD COMPUTING
Dalbir Singh
Improving Media Encoding Bandwidth using ITU-T H.264 AVC part-10
Ajit Palit
importance of the Role of Management Information System for Effective Human Resource Management
Romita Gakhar
Biometric Identification for Criminals
Amandeep Kaur
AUTOMATIC TUMOR DETECTION FROM KIDNEY AND THEIR PATHOLOGY
Adnan Majeed
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians