S.No Articles Ref. No
 1

Evaluation of Common Encryption Algorithm and Scope of Advanced Algorithm for Simulated Wireless Network

- Dr. Atul M. Gonsai , Lakshadeep M. Raval

 IJCTT-V11P102
 2

Secure and Reliable Watermarking in Relational Databases

- G.Shyamala , I.Jasmine Selvakumari Jeya , M.Revathi

 IJCTT-V11P103
 3

Efficient Anonymous Routing Protocols in Manets: A Survey

- Jojy Saramma John , R.Rajesh

 IJCTT-V11P105
 4

An Efficient Query Mining Framework Using Spatial Hidden Markov Models for Automatic Annotation of Images

- R.Ramya

 IJCTT-V11P107
 5

Detection of Calcification Using Filter in Mammograms – A Survey

- C.Kaviya Prabha , S.Usha

 IJCTT-V11P109
 6

A Survey of Coverage-Based Broadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks

- V.V.V. Pradeep Sastry , Dr S.Arvind

 IJCTT-V11P111
 7

A Meta-heuristic Approach for Image Segmentation using Firefly Algorithm

- Bhavana Vishwakarma , Amit Yerpude

 IJCTT-V11P115
 8

Classification of Basmati Rice Grain Variety using Image Processing and Principal Component Analysis

- Rubi Kambo , Amit Yerpude

 IJCTT-V11P117
 9

Prognosis of Diabetes Using Data mining Approach-Fuzzy C Means Clustering and Support Vector Machine

- Ravi Sanakal , Smt. T Jayakumari

 IJCTT-V11P120
 10

Handwritten Nastaleeq Script Recognition with BLSTM-CTC and ANFIS method

- Rinku Patel , Mitesh Thakkar

 IJCTT-V11P128
 11

A Review of Multi-Protocol Label Switching: Protocol for Traffic Engineering on Internet

- Isha Mangal , Deepali Bajaj

 IJCTT-V11P129
 12

Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm

- Monika Gunjal , Jasmine Jha

 IJCTT-V11P131
 13

Improvement on LEACH: Seeded LEACH-KED

- Preeti Sharma , Pankaj Kumar Verma , Surender Singh

 IJCTT-V11P132
 14

Pre-processing of ECG Signals Using Filters

- Isha V Upganlawar , Harshal Chowhan

 IJCTT-V11P135
 15

VirtuMob : Remote Display Virtualization Solution For Smartphones

- M H Soorajprasad , Balapradeep K N , Dr. Antony P J

 IJCTT-V11P136
 16

Energy Efficiency in Cloud Data Centers Using Load Balancing

- Ankita Sharma , Upinder Pal Singh

 IJCTT-V11P137
 17

Clinical Decision Support System in HealthCare Industry Success and Risk Factors

- Abdullah AL-Malaise AL-Gamdi , Khulood Salem Albeladi , Rasha Fouad AlCattan

 IJCTT-V11P140
 18

Attribute Based User Control Access for Cloud Storage Data

- Satheesh Kavuri , GangadharaRao Kancharla , Basaveswara Rao Bobba

 IJCTT-V11P141
 19

Zigbee-Based Smart Ordering System (S.O.S)

- Asan N. Badariah , Nordin N. Azreena , Shariff Zulkifli

 IJCTT-V11P144
 20

Techniques Used for Detection of Mobile Spyware

- Neelam Kaur

 IJCTT-V11P146
 21

IDS in Cloud Environment

- Shikha Pandit , Pooja

 IJCTT-V11P148
 22

Unsupervised Opinion Mining From Text Reviews Using SentiWordNet

- Vibha Soni , Meenakshi R Patel

 IJCTT-V11P150
 23

Comparative Analysis of Textural Features Derived from GLCM for Ultrasound Liver Image Classification

- Aborisade.D.O , Ojo.J. A , Amole.A.O , Durodola A.O

 IJCTT-V11P151
 24

Electric Load Forecasting using a Neural Network Approach

- Vinutha H D , K C Gouda , Chandan K N

 IJCTT-V11P152