Home
  Call for Papers
  Editorial Board
  Reviewer Board
  Guidelines for Authors
  Paper Submission
  Registration Fee
  Publications
  Indexing
  About Journal
  Contact Us

All Publications
Volume 1, Issue 1 - Feb 2014
Volume 1, Issue 2 - March 2014
Volume 1, Issue 3 - April 2014
Volume 1, Issue 4 - May 2014
Volume 1, Issue 5 - June 2014
Volume 1, Issue 6 - July 2014
Volume 1, Issue 7 - August 2014
Volume 1, Issue 8 - Sept 2014
Volume 1, Issue 9 - Octo 2014
Volume 1, Issue 10 - Nov 2014
Volume 1, Issue 11 - Dec 2014
Volume 2, Issue 1 - Jan 2015
Volume 2, Issue 2 - Feb 2015
Volume 2, Issue 3 - March 2015
Volume 2, Issue 4 - April 2015
Volume 2, Issue 5 - May 2015

 

 

 

 

 

 

 

 


 

IJCAT Paper Publications

     June 2015 Volume 2, Issue 6
   
  Software Based Cellular System for Rural Communication
 
Rajab Philip Muchiri Emmanuel Ogoma Lucyann Muthoni Karani
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 156-162
   
   
  Digital Image Watermarking Using Arnold Transform
 
Navdeep Kaur Dr. Rajinder Singh Virk
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 163-169
   
   
  Combating Broken Authentication and Session Management Attacks
 
Harmanpreet Kaur Sandeep Sharma
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 170-174
   
   
  Virtualization Techniques and Virtualization Challenges in Cloud Computing: A Review
 
Bohar Singh Jagdeep Singh Sahil Kumar
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 175-180
   
   
  Maximizing Energy Efficiency of Wireless Sensor Networks by Using Genetic Algorithm and Graph Theory
 
Harmanjot Kaur Dr. Rajinder Singh Virk
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 181-185
   
   
  A Novel Approach for Network Route Recovery during Link Failure
 
Chintala Ravali Kumari P. Punnam Chander Reddy
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 186-189
   
   
  A Technique of Using Digital Signature and Network Clustering to Prevent from Wormhole Attack
 
Sopan W. Bagalkar S. B Rathod
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 190-195
   
   
  A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases
 
Dhananjay D. Wadkar Santosh N. Shelke
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 196-201
   
   
  Collaborative SQL Query Recommendation for Database Exploration and Prevent SQL Injection Attack
 
Ashish R. Khule Balasaheb B. Gite
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 202-205
   
   
  Real Time Intrusion Detection With Fuzzy, Genetic and Association Algorithm
 
Rupesh B. Jadhav Balasaheb B. Gite
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 206-213
   
   
  Use of Feed-Forword Neural Network for Stock Market Value Prediction
 
Rajesh Musne Sachin Godse
 
Full Text Paper | Year: June 2015 | Volume 2 Issue 6 | Pages 214-218
   

Still Uploading...

  Contact  | Terms of Use | Site Map | Nondiscrimination Policy | Help  
IJCAT
   
  Copyright © 2013 IJCAT - All rights reserved. Use of this website signifies your agreement to the terms and conditions