IJCTT - Volume 10 - No 4 April 2014

S.No Title/Author Name Paper ID
31. Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization
- Hani A. Qudaih , Mohammed A. Bawazir , Shuaibu Hassan Usman , Jamaludin Ibrahim
 IJCTT-V10P131
32. An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism
- G.Suganya
 IJCTT-V10P132
33. Minimizing Spurious Patterns Using Association Rule Mining
- Ruchi Goel , Dr. Parul Agarwal
 IJCTT-V10P133
34. The Development of Web Based Expert System for Diagnosing Children Diseases Using PHP and MySQL
- Hustinawaty , Randy Aprianggi
 IJCTT-V10P134
35. Analysis of Email Fraud Detection Using WEKA Tool
- Tarushi Sharma , Mrs.Amanpreet Kaur
 IJCTT-V10P135
36. Automatic Database Clustering: Issues and Algorithms
- Sakshi Kumar , Mahesh Singh , Sunil Sharma
 IJCTT-V10P136
37. Application of Machine Learning Techniques in Aquaculture
- Akhlaqur Rahman , Sumaira Tasnim
 IJCTT-V10P137
38. Performance Analysis of SEP and LEACH for Heterogeneous Wireless Sensor Networks
- Upasana Sharma , Sunil Tiwari
 IJCTT-V10P138
39. Data Acquisition and Reduction Algorithm for Shearing Interferometer Based Long Trace Profilometer
- M. Mohamed Ismail , A.K. Saxena
 IJCTT-V10P139
40. Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET
- P.Indumathi
 IJCTT-V10P140