Subscribe Now Subscribe Today
Science Alert Home Journals at Science Alert For Authors For Subscribers Contact Us
 
FOLLOW US:     Facebook    Twitter
   
 
    Publisher: Academic Journals Inc., USA
   
  Research Journal of Information Technology is positioned to publish high quality research papers that reflect global information technology advances. Scope of the journal includes: Strategy, change, infrastructure, human resources, sourcing, system development and implementation, communications, Software engineering, formal methods and business process management, technology developments, technology futures, national policies and standards.

Research Journal of Information Technology now accepting new submissions. Submit your best paper via online submission system.
  Editor-in-Chief:  David Chek Ling Ngo
 
 
Appathurai, K. and S. Karthikeyan, 2011. Survey on spatio-temporal access methods. Int. J. Comput. Applic., 18: 40-44.
Appathurai, K. and S. Karthikeyan, 2012. A new proposed algorithm for BBx-index structure. Int. J. Comput. Sci. Issues, 9: 287-293.
Appathurai, K. and S. Karthikeyan, 2012. A new proposed algorithm for OBBx-index structure. Int. J. Comput. Applic., 50: 32-36.
Direct Link  |  
Appathurai, K. and S. Karthikeyan, 2012. A novel indexing method for BBx-index structure. Int. J. Comput. Technol. Applic., 3: 779-784.
Appathurai, K. and S. Karthikeyan, 2012. Comparative analysis of proposed POBBx-index structure. Int. J. Comput. Technol. Applic., 3: 1349-1356.
Appathurai, K. and S. Karthikeyan, 2013. Moving object indexing using crossbreed update. Int. J. Comput. Applic., 69: 25-30.
Direct Link  |  
Brindha, N., S. Karthikeyan and N. Lalitha, 2007. A comparative study between Business Process Outsourcing (BPO) and Knowledge Process Outsourcing (KPO). J. Manage., 2: 584-592.
Chandramohan, G. and S.K. Subramanian, 2014. An efficient hybrid segmentation algorithm for computer tomography image segmentation. Int. Rev. Comput. Software, 9: 1576-1582.
Direct Link  |  
Chandramohan, V.V.G. and D.S. Karthikeyan, 2014. An efficient clustering based segmentation algorithm for computer tomography image segmentation. J. Biomed. Eng. Med. Imag., 1: 1-11.
Direct Link  |  
Gomathi, V.V. and S. Karthikeyan, 2013. A Proposed Hybrid Medoid Shift with K-Means (HMSK) Segmentation Algorithm to Detect Tumor and Organs for Effective Radiotherapy. In: Mining Intelligence and Knowledge Exploration, Prasath, R. and T. Kathirvalavakumar (Eds.). Springer International Publishing, Switzerland, ISBN: 978-3-319-03843- pp: 139-147.
Gomathi, V.V. and S. Karthikeyan, 2014. Performance analysis of distance measures for computer tomography image segmentation. Int. J. Comput. Technol. Applic., 5: 400-405.
Gomathi, V.V. and S. Karthikeyan, 2014. Performance analysis of wavelet and curvelet filtering techniques for reduction of streak artifacts in computer tomography images. Int. J. Control Theory Applic., 7: 53-62.
Gomathi, V.V. and S. Karthikeyan, 2014. Performance evaluation of HMSK and SQFD algorithms for computer tomography (CT) image segmentation of effective radiotherapy. J. Theor. Applied Inform. Technol., 66: 409-415.
Direct Link  |  
Gomathi, V.V. and S. Karthikeyan, 2015. A novel ECFT algorithm to improve the excellence of computer tomography images for effective segmentation. Int. J. Tomography Simul., 28: 45-62.
Direct Link  |  
Gunasundari, R. and S. Karthikeyan, 2010. A new approach to improve the performance of page content ranking in web content mining. Data Min. Knowl. Eng., 2: 63-65.
Direct Link  |  
Gunasundari, R. and S. Karthikeyan, 2012. A new approach for web information extraction. Int. J. Comput. Technol. Applic., 3: 211-215.
Gunasundari, R. and S. Karthikeyan, 2012. A study of content extraction from web pages based on links. Int. J. Data Min. Knowl. Manage. Process, 2: 23-30.
Gunasundari, R. and S. Karthikeyan, 2013. An effective design for extracting web content from webpages. Eur. J. Scient. Res., 99: 473-484.
Hemalatha, M., V.V. Gomathi and S. Karthikeyan, 2006. An efficient algorithm for predicting survival of medical data. Int. J. Technol. Knowledge Soc., 2: 37-48.
Direct Link  |  
Karthikeyan, S. and E. Ramaraj, 2006. A design of enhanced security protocol for wireless communication using hybrid encryption technique (AES-rijndael and RSA). Indian J. Comput. Technol., 1: 22-29.
Karthikeyan, S. and E. Ramaraj, 2006. A new type of network security protocol using hybrid encryption in virtual private networking. J. Comput. Sci., 2: 672-675.
CrossRef  |  Direct Link  |  
Karthikeyan, S., 2008. An extended MD5 (ExMD5) algorithm for better data integrity. J. Comput. Sci., 2: 584-592.
Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2005. An improvement of security of 802.22 using hybrid encryption (AES-rijndael and RSA). J. Inform. Sci. Technol., 1: 18-26.
Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. A new approach of hybrid encryption technique in database security. Int. J. Technol. Knowledge Soc., 2: 55-60.
Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An improvement of Eun-jun-kyung-kee`s remote user authentication scheme in smart card using hybrid encryption. J. Comput. Sci., 1: 293-300.
Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2009. A design of security protocol using hybrid encryption technique (AES-rijndael and RSA). Int. J. Comput. Internet Manage., 17: 78-86.
Direct Link  |  
Karthikeyan, S., E. Ramaraj and N. Lalitha, 2006. An analysis of key management in transport layer security standard. PCTE J. Comput. Sci., 2: 78-84.
Karthikeyan, S., E. Ramaraj and N. Lalitha, 2006. The new approach of secure protocol in smart card using hybrid encryption technique. ICFAI J. Syst. Manage., 2: 71-75.
Karthikeyan, S., E. Ramaraj and N. Lalitha, 2007. An analysis and improvement of security in wired equivalent privacy (WEP) algorithm using hybrid encryption technique. Int. J. Comput. Sci. Syst. Anal., 1: 75-81.
Karthikeyan, S., M. Hemalatha and E. Ramaraj, 2005. Database search and retrieval system for bacteria. Bioinformatics India J., 3: 37-42.
Karthikeyan, S., M. Hemalatha and V.V. Gomathi, 2005. A data-mining tool to increase human life days from affecting cardiac arrest. Bioinformatics India J., 3: 96-111.
Karthikeyan, S., M. Hemalatha and V.V. Gomathi, 2008. Data mining-knowledge discovery database. Tamil Comput. Magazine, 12: 4-8.
Kavitha, B., S. Karthikeyan and P.S. Maybell, 2011. Emerging intuitionistic fuzzy classifiers for intrusion detection system. J. Adv. Inform. Technol., 2: 99-108.
CrossRef  |  Direct Link  |  
Kavitha, N. and S. Karthikeyan, 2011. An efficient algorithm for mining frequent K-item sets for association rule mining in large databases. Data Min. Knowl. Eng., 3: 555-558.
Direct Link  |  
Kavitha, N. and S. Karthikeyan, 2012. An efficient mining algorithm for closed frequent itemsets and its associated data. Int. J. Comput. Applic., 49: 22-25.
Direct Link  |  
Kavitha, N. and S. Karthikeyan, 2013. Customer buying behavior analysis: A clustered closed frequent itemsets for transactional databases. Int. J. Comput. Sci. Issues, 10: 113-117.
Kumar, A. and S. Karthikeyan, 2011. Security model for TCP/IP protocol suite. J. Adv. Inform. Technol., 2: 87-91.
CrossRef  |  Direct Link  |  
Kumar, M.A. and S. Karthikeyan, 2010. A new security architecture for TCP/IP protocol suite. Int. J. Adv. Res. Comput. Sci., 1: 177-181.
Direct Link  |  
Kumar, M.A. and S. Karthikeyan, 2012. Investigating the efficiency of Blowfish and Rejindael (AES) algorithms. Int. J. Comput. Network Inform. Security, 4: 22-28.
Direct Link  |  
Kumar, M.A., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. Comparative analysis of IPv4 and IPv6 to evaluate performance. Int. J. Comput. Network Security, 2: 67-71.
Kumar, M.A., S. Karthikeyan, K. Appathurai and P. Nagarajan, 2011. A novel security protocol based on hybrid cryptography. Int. J. Comput. Sci. Syst. Eng. Inform. Technol., 4: 35-39.
Mahalingam, P., N. Jeyaprakash and S. Karthikeyan, 2011. Components based key management algorithm for storage area networks. J. Adv. Inform. Technol., 2: 72-79.
CrossRef  |  Direct Link  |  
Nagarajan, M. and S. Karthikeyan, 2009. Health condition observation in high level efficiency using an advanced sensor network. CIIT Int. J. Wireless Commun., 1: 183-189.
Direct Link  |  
Narayanan, R. and K. Subramanian, 2011. An efficient secure biometric system with non-invertible gabor transform. Int. J. Comput. Sci. Issues, 8: 170-175.
Direct Link  |  
Priya, S.M. and S. Karthikeyan, 2011. Increasing lifetime of sensor networks by using dynamic clustering. Int. J. Wireless Commun. Network., 3: 1-5.
Priya, S.M. and S. Karthikeyan, 2012. An efficient clustered multipath routing to improve lifespan in WSN. Int. J. Comput. Sci. Issues, 9: 182-187.
Direct Link  |  
Priya, S.M. and S. Karthikeyan, 2012. CMR-FD: Clustered multipath routing with false destination to increase the lifetime of sensor network. Int. J. Comput. Applic., 48: 11-16.
Direct Link  |  
Priyaa, D.S., T. Nachimuthu and S. Karthikeyan, 2011. An evolving approach on video frame retrieval based on color, shape and region. Int. J. Comput. Sci. Eng. Technol., 2: 84-89.
Direct Link  |  
Radha, N. and S. Karthikeyan, 2010. A study on biometric template security. ICTACT J. Soft Comput., 1: 37-41.
Radha, N. and S. Karthikeyan, 2011. An evaluation of fingerprint security using noninvertible biohash. Int. J. Network Security Applic., 3: 118-128.
CrossRef  |  Direct Link  |  
Radha, N., S. Karthikeyan and P. Anupriya, 2010. Securing retina fuzzy vault system using soft biometrics. Global J. Comput. Sci. Technol., 10: 13-18.
Direct Link  |  
Radha, N., T. Rubya and S. Karthikeyan, 2011. Securing retinal template using quasigroups. J. Adv. Inform. Technol., 2: 80-86.
CrossRef  |  Direct Link  |  
Ramaraj, A., N. Laitha and S. Karthikeyan, 2006. An analysis of key management in cryptographic algorithms. Asia J. Inform. Technol., 5: 963-967.
CrossRef  |  Direct Link  |  
Sakthivel, C. and D. Karthikeyan, 2014. Multi-hop unified routing algorithm for energy-constrained networks. J. Theor. Applied Inform. Technol., 69: 25-31.
Direct Link  |  
Sakthivel, C.R. and S. Karthikeyan, 2013. A survey on wireless routing schemes in single and multi-hop energy constrained networks. CiiT Int. J. Networking Commun. Eng., 5: 461-465.
Direct Link  |  
Sakthivel, C.R. and S. Karthikeyan, 2014. Reliable multi-hop MISO based cooperative communications for energy-constrained wireless sensor networks. Int. J. Emerg. Trends Eng. Dev., 4: 180-189.
Direct Link  |  
Shanmugavel, D.P., 2006. Trends in Bioinformatics. In: Microarray in Bioinformatics , Hemalatha, M. and S. Karthikeyan (Eds.). Pointer publishers, Jaipur, India, pp: 212-250.
Sundararajan, S. and S. Karthikeyan, 2012. A study on spatial data clustering algorithms in data mining. Int. J. Eng. Comput. Sci., 1: 37-41.
Direct Link  |  
Sundararajan, S. and S. Karthikeyan, 2014. An efficient data ranking technique based on bicluster score. Int. J. Emerg. Trends Eng. Dev., 4: 377-386.
Direct Link  |  
Sundararajan, S. and S. Karthikeyan, 2014. An efficient hybrid approach for data clustering using dynamic K-means algorithm and firefly algorithm. ARPN J. Eng. Applied Sci., 9: 1-6.
Thilagam, K. and S. Karthikeyan, 2011. An analysis of hybrid techniques of seam carving. Int. J. Comput. Sci. Eng., 3: 1406-1412.
Direct Link  |  
Thilagam, K. and S. Karthikeyan, 2011. An efficient method for content aware image resizing using PSC. Int. J. Comput. Technol. Applic., 2: 807-812.
Thilagam, K. and S. Karthikeyan, 2012. Content aware retargeting of stego images. Int. J. Comput. Applic., 52: 4-8.
Direct Link  |  
Thilagam, K. and S. Karthikeyan, 2012. Optimized image resizing using piecewise seam carving. Int. J. Comput. Applic., 42: 24-30.
CrossRef  |  Direct Link  |  

 
 
 
 
 
 
 
 
 
     
 

 
 
 
 
 
 

                 home       |       journals        |       for authors       |       for subscribers       |       asci
          © Science Alert. All Rights Reserved