IJCTT-Volume 1 Iss 2 No 2 May to Jun Issue 2011


S.No
Title/Author Name
Paper Id
16

An Approach For Secured Data Storage Using Cloud Computing

- K. Kajendran, J.James Jeyaseelan, J. Jakkulin Joshi. 

IJCTT-V1I2P16
 17

Pioneer DTV System Under Cloud Computing Environment

Vimala.S , Yayathi.J, J. Pugalendiran.

IJCTT-V1I2P17
 18

Detecting Nepotistic Links Based On Qualified Link Analysis and Language Models

- K.KARTHICK, V.SATHIYA, J.PUGALENDIRAN.

 IJCTT-V1I2P18
 19

Computer Aided Diagnosis System For The Identification And Classification Of Lessions In Lungs

- B.MAGESH,Mrs.P.VIJAYALAKSHMI,Ms. M. ABIRAMI. 

 IJCTT-V1I2P19
 20

Trust Management For Mobile Ad Hoc Networks Using Recommendation Exchange Protocol

P.DEEPA , A.SHALINI , J.JAKKULIN JOSHI.

 IJCTT-V1I2P20
 21

Logs in once and access different Web Applications

Mrs.V.Sathya preiya, M.Suresh ,Ms.S. Kalaiarasi.

IJCTT-V1I2P21
 22

Connected Component Analysis and Change Detection for Images

Prasad S.Halgaonkar.

IJCTT-V1I2P22
 23

Location-based Services Routing in Networks

M.Krishnamoorthy, P.Ramyashri, M.S. Srinidhi. 

IJCTT-V1I2P23
 24

Inter Domain Packet Filters for IP Spoofing Attacks

P.Venkata SubbaReddy,T.V.Sai Krishna,P.Venkata Ravi Kanth.

IJCTT-V1I2P24
 25

Secure Role based Data Access Control in Cloud Computing

V.Sathya Preiya, R.Pavithra , Dr. Joshi.

IJCTT-V1I2P25
 26

A Novel Approach of Embedded System for Indian Paper Currency Recognition 

- Ms. Trupti Pathrabe, Mrs.Swapnili Karmore.

IJCTT-V1I2P26
 27

Protection to ARP from Attackers Based on Timer Tables and Voting

Venkata Subba Redddy.P,Prof.K.Ankababu,Vijaya Bharathi.G.

IJCTT-V1I2P27