S.No Articles Ref. No
19
IJCTT-V4I10P141
20

 A General Framework For Managing Firewall Policy Anomalies

- Deepak Pedapenki , Sheikh Gouse , R.Manasa Annapurna

IJCTT-V4I10P142
21

 An Anti Phishing Framework For Blocking Service Attacks Using Visual Cryptography

- Mary Ruby Star .A.L. , T. Venu

 IJCTT-V4I10P144
22

 Chorography Control In Ad Hoc Networks With Cooperative Communications

- P. Kiran Kumar , M. Raghavendra Rao

 IJCTT-V4I10P145
23

 Procure Sharing Of Health Records In Cloud Using Attribute Based Encryption

- T. Raj Kumar, G. Charles Babu

IJCTT-V4I10P148
24

 Integration of GIS and Cloud Computing for Emergency System

- Eman Mahmoud , Osman Hegazy , Mohamed Nour El-Dien

IJCTT-V4I10P149
25

 Efficient Data Clustering with Link Approach

- Y. Sireesha , CH. Srinivas , K.C. Ravi Kumar

IJCTT-V4I10P150
26

 A Review On Data Hiding Techniques In Encrypted Images

- Ms. Anagha Markandey, Prof. Pragati Patil

IJCTT-V4I10P151
27

 Exploring Load Balancing To Solve Various Problems In Distributed Computing

- Priyesh Kanungo

IJCTT-V4I10P152
28

 Web Service Composition By Using Broker

- Gajanan P. Datir, Prof. P. A. Tijare

IJCTT-V4I10P153
29

 FPGA Implementation Of Efficient And High Speed Template Matching Module

- Radhamani R , Dr. Kurahatti N G

IJCTT-V4I10P154
30

 Preparing Data Sets For Data Mining Using CASE, PIVOT And SPJ

- I.Lakshmi Kantha Reddy , M.Samba sivudu 

IJCTT-V4I10P155
31

 Mitigating Selective Blackhole Attacker By Using Divergence Metric Based Advanced Intrusion Detection System

- H.Shaleena , A.Prakash

IJCTT-V4I10P156
32

 An Optimal Swarm Intelligence Approach For Test Sequence Restructuring To Conserve Power Usage In VLSI Testing

- Y. Sreenivasula Goud , Dr.B.K.Madhavi

 

IJCTT-V4I10P158
33

 Image Enhancement Of Under Water Images Using Structured Preserving Noise Reduction Algorithm

- D.Napoleon , M.Praneesh

IJCTT-V4I10P159
34

 Product Evaluation In Elliptical Helical Pipe Bending

- Wasantha Samarathunga , Masatoshi Seki , Hidenobu Saito , Ken Ichiryu , Yasuhiro Ohyama

IJCTT-V4I10P160
34

 CBC And Interleaved CBC Implementations Of PACMA Cryptographic Algorithm

- J. John Raybin Jose , E. George Dharma Prakash Raj

IJCTT-V4I10P164
35

 Knowledge Based Context Awareness Network Security For Wireless Networks

- Deepa U. Mishra

IJCTT-V4I10P167