Skip to main content Skip to main navigation menu Skip to site footer
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
  • Issue
    • Current
    • Archives
  • Authors
    • Submissions
    • Author Guidelines
    • WORD TEMPLATE
    • LATEX TEMPLATE
    • How to submit your article(Video help)
  • Reviewers
    • Join as Reviewer
    • How to review (video help)
  • Editors
    • Editorial Team
    • Editorial Workflow (help video's)
  • Journal Policies
    • Peer Review Policy
    • Open Access Policy
    • Plagiarism Policy
    • Digital Archiving Policy
    • Rights and License
    • Privacy Statement
    • Publication Ethics
  • About
    • About the Journal
    • Announcements
    • Contact
Search
  • Register
  • Login
  1. Home /
  2. Archives /
  3. Vol. 5 No. 2 (2013)

Vol. 5 No. 2 (2013)

					View Vol. 5 No. 2 (2013)
Published: 2013-05-15

Research Articles

  • Simulation Tool for Queuing Models: QSIM

    Dr. Pratiksha Saxena, Lokesh Sharma
    74-79
    • PDF
  • PERFORMANCE ANALYSIS OF EFFECT RATE OF CROSS LAYER BASED INTRUSION DETECTION FOR WIRELESS LAN

    Dr. Vinod Kumar, Mr Avtar Singh, Mrs. Ritika Narang
    80-84
    • PDF
  • Multi-Agent System Overview: Architectural Designing using Practical Approach

    Mohamed Osama Khozium
    85-93
    • PDF
  • Intrusion Detection Techniques based on Cross Layer For Wireless Local Area Networks

    Dr. Vinod Kumar, Mr Sandeep Agarwal, Mr Avtar Singh
    94-97
    • PDF
  • THE CHALLENGE OF IMPLEMENTING SCRUM AGILE METHODOLOGY IN A TRADITIONAL DEVELOPMENT ENVIRONMENT

    Renato Takeki Nishijima, Prof. Dr. José Gonçalo Dos Santos
    98-108
    • PDF
  • DEFINING QUALITY CRITERIA IN SITUATIONAL METHOD ENGINEERING

    Samir Azzouz, Naoufel Kraiem, Henda Ben Ghezala
    109-119
    • PDF
  • EXTENDING THE VISUAL CRYPTOGRAPHY ALGORITHM USING IMAGE WATERMARKING TECHNIQUE

    Dilip Kumar Kotthapalli, Dr. V.R. Anitha
    120-123
    • PDF
  • AN EFFICIENT MEMORY MANAGEMENT TECHNIQUE FOR SMART CARD OPERATING SYSTEM

    Shardha Porwal, Himanshu Mittal
    124-129
    • PDF
  • ANALYSIS OF SUCCESS DRIVERS OF E-HEALTH INFRASTRUCTURE AND USE: A NATIONAL LEVEL STUDY

    KALLOL K. BAGCHI, Godwin J. Udo
    130-135
    • PDF
  • Maintainability Evaluation of Object-Oriented Software System Using Clustering Techniques

    Astha Mehra, Sanjay Kumar Dubey
    136-143
    • PDF

Make a Submission

Make a Submission

journalmetrics

 ABOUT THE IJCT
 EDITORIAL TEAM
 AUTHOR GUIDELINES
 AUTHOR FEE
  RIGHT AND LICENSE
  FOCUS AND SCOPE
  PEER REVIEW POLICY
  INDEXING
  PLAGIARISM POLICY
  OPEN ACCESS STATEMENT
 WORD TEMPLATE
  LATEX TEMPLATE

Information

  • For Readers
  • For Authors
  • For Librarians

flagcounter

Flag Counter

Current Issue

  • Atom logo
  • RSS2 logo
  • RSS1 logo

suggestedtools

Suggested tools


Mendeley
Zotero
JabRef
Grammarly

 

ISSN: 2277-3061

DOI Prefix: 10.24297/ijct 

Creative Commons License All articles published in International Journal of Computers & Technology are licensed under a Creative Commons Attribution 4.0 International License.

 

More information about the publishing system, Platform and Workflow by OJS/PKP.