IJCTT-Volume 4 Iss 8 No 2 Issue 2013

 
Title/Author Name
Paper Id
 ?

Detection of Spams using Extended ICA & Neural Networks

Rajendra kumar K, Siva Ramaiah S , Seshadri U 

IJCTT-V4I8P141
 ?

Applying Technology Acceptance (TAM) model to determine the acceptance of Nursing Information System (NIS) for Computer Generated Nursing Care Plan among nurses

Nitika Sharma, Manik Gupta

IJCTT-V4I8P142
 ?

An E-Commerce application for Presuming Missing Items

Rupinderpal Kaur, Rajneet Kaur

 IJCTT-V4I8P144
 ?

Diagnosis for Dengue Fever Using Spatial Data Mining

S.Clement Virgeniya , Dr.V.Palanisamy

IJCTT-V4I8P146
 ?

An Efficient Response Time for Shrew Attack Protection in Mitigating Low-Rate Tcp-Targeted Attacks

A.Swathi, Dr.R.Pugazendi

IJCTT-V4I8P148
 ?

Design and VLSI Implementation of Low Voltage and Low Dropout Voltage Regulator

G. Minni, M. Venkata Dilip Kumar

IJCTT-V4I8P150
 ?

Classification Rule Discovery Using Genetic Algorithm-Based Approach

Dr. Rahul Malhotra, Prince Jain

IJCTT-V4I8P158
 ?

Emphasis and emerging trends on virtualization of cloud infrastructure with security challenges

Jose Anand, K. Sivachandar, M. Mohamed Yaseen

IJCTT-V4I8P159
?

Performance Comparison of Host based and Network based Anomaly Detection using Fuzzy Genetic Approach (FGA)

Harjinder Kaur, Nivit Gill 

 IJCTT-V4I8P164
?

Data structures and DBMS for CAD Systems- A review  

Mehak Sharma, Manikant Sharma

IJCTT-V4I8P167
?

Authentication Using Hand geometry And Finger geometry biometric Techniques  

AmandeepKaur Bhatia, SupreetKaurGujral

IJCTT-V4I8P169
?

Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis

Rajesh Reddy Muley, Sravani Achanta, Prof.S.V.Achutha Rao

IJCTT-V4I8P174
?

A New Framework for Cloud Computing security using Secret Sharing Algorithm over Single to Multi- Clouds

Venkatarao Matte, L. Ravi Kumar

IJCTT-V4I8P178
?

Data Security Threat Evaluation Using Bayesian Prioritization Method

- Sai Bharat Gatta,Vishnu Teja Gangineni, Abhilash Maddukuri

 IJCTT-V4I8P183
?

Improved VEDA and Unwanted Edge Removal approaches for License Plate Detection

A.Sravya,P.Ramesh Babu

 IJCTT-V4I8P185
?

A Novel Homomorphic Against Intersession Coding attacks Using InterMac

P.Sravani, D.Deewena Raju

IJCTT-V4I8P186
?

Improved Background Matching Framework for Motion Detection  

K.Amaleswarao, G.Vijayadeep,U.Shivaji

IJCTT-V4I8P188
?

Improved Password Authentication System against Password attacks for web Applications

Dr.P.Pandarinath, Vaishnavi Yalamanchili

IJCTT-V4I8P189
?

A Review: Wireless Sensor Networks and Its Application, Platforms, Standards and Tools  

K.Sarammal, R.A.Roseline

IJCTT-V4I8P194
?

Toward Increased Discoverability of Open Educational Resources and Open Courseware

Monica Vladoiu

IJCTT-V4I8P195
?

A Hybrid Approach for Data Hiding using Cryptography Schemes

Gurtaptish Kaur, Sheenam Malhotra

IJCTT-V4I8P196
?

Web Content Mining Techniques Tools & Algorithms – A Comprehensive Study  

R.Malarvizhi, K.Saraswathi

IJCTT-V4I8P200
?

A Security Mechanism for Video Data hiding

Mr Sudheer Adepu, Mr P. Ashok , Dr.C.V.Guru Rao

IJCTT-V4I8P202
?

E-mail Classification Using Genetic Algorithm with Heuristic Fitness Function  

Jitendra Nath Shrivastava, Maringanti Hima Bindu

IJCTT-V4I8P203
?

A Comparative Study of Different TCP Variants in Networks

Balveer Singh

IJCTT-V4I8P204