Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
Volume 4, Issue 2, Pages 86 - 174 ( February - 2015 )
1) |
Improved Learning Management System (i-LMS): A Flat Form for Content Creation and Sharing for Kenyan Secondary SchoolsPages 86 - 91Anthony Mutua Nzioki Wilson Cheruiyot Nicholas Mutua Muthama10.7753/IJCATR0402.1001
|
2) |
FUZZY GOAL PROGRAMMING TECHNIQUES FOR PRODUCTION PLANNING IN INDUSTRYPages 92 - 96A.K. Bhargava S.R. Singh Divya Bansal10.7753/IJCATR0402.1002
|
3) |
The Critical Technological Factors OF E-Government in KenyaPages 97 - 102Godfrey Kyalo Makau Elijah, I. Omwenga Njihia James Muranga10.7753/IJCATR0402.1003
|
4) |
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Botnet AttacksPages 103 - 107R. Kannan A.V.Ramani10.7753/IJCATR0402.1004
|
5) |
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Templates in Verification and Identification SystemsPages 108 - 119Joseph Mwema Stephen Kimani Michael Kimwele10.7753/IJCATR0402.1005
|
6) |
Haralick Texture Features based Syriac(Assyrian) and English or Arabic documents ClassificationPages 120 - 123Basima Z.Yacob10.7753/IJCATR0402.1006
|
7) |
SOA for Dynamically Integrated Virtual Learning Environment Systems with Cloud Based ServicesPages 124 - 127Mohammed Eltahir Abdelhag Saife Eldin fattoh Osman10.7753/IJCATR0402.1007
|
8) |
Superconductivity and Spin Density Wave (SDW) in NaFe1-xCoxAsPages 128 - 134Haftu Brhane Amarendra Rajput10.7753/IJCATR0402.1008
|
9) |
A Survey on the Clustering Algorithms in Sales Data MiningPages 135 - 137Mathew Ngwae Maingi10.7753/IJCATR0402.1009
|
10) |
Real Time Simulation of Security Systems using Face Recongnition, a reviewPages 138 - 141Manisha Sajwan10.7753/IJCATR0402.1010
|
11) |
Performance Evaluation using Blackboard Technique in Software ArchitecturePages 142 - 148Fatemeh majidi Ali Harounabadi10.7753/IJCATR0402.1011
|
12) |
Design and Analysis of Robotic Rover with Gripper Arm using Embedded CPages 149 - 152Harmeet Singh, Sangeeta Harpreet Kaur10.7753/IJCATR0402.1012
|
13) |
Android Based Remote Surveillance System and Content Sharing Between PC And MobilePages 153 - 156S. A. Ahirrao Sayali S. Ballal Divya K. Sawant Harsha H. Chahira10.7753/IJCATR0402.1013
|
14) |
Assistive Examination System for Visually ImpairedPages 157 - 164Manvi Breja10.7753/IJCATR0402.1014
|
15) |
New Technique for Image Encryption Based on Choas and Change of MSBPages 165 - 169Fariba Ghorbany beram Mojtaba khayt Sajjad Ghorbany Beram10.7753/IJCATR0402.1015
|
16) |
Adaptive Steganography Based on Logistic MapPages 170 - 174Fariba Ghorbany beram Sajjad Ghorbany Beram10.7753/IJCATR0402.1016
|