IJCTT - Volume 11 - No 4 May 2014

S.No Title/Author Name Paper ID
31. Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm
- Monika Gunjal , Jasmine Jha
 IJCTT-V11P131
32. Improvement on LEACH: Seeded LEACH-KED
- Preeti Sharma , Pankaj Kumar Verma , Surender Singh
 IJCTT-V11P132
33. Achieving Privacy Assured Outsourcing of Data in Cloud Using Optimalvisual Cryptography
- T.Nataraj , S.K. Mahalingam
 IJCTT-V11P133
34. Multicode Techniques in 4G
- Supriya D.Kubade , Prof.Pravin Lakhe , Dr.Santosh Chede
 IJCTT-V11P134
35. Pre-processing of ECG Signals Using Filters
- Isha V Upganlawar , Harshal Chowhan
 IJCTT-V11P135
36. VirtuMob : Remote Display Virtualization Solution For Smartphones
- M H Soorajprasad , Balapradeep K N , Dr. Antony P J
 IJCTT-V11P136
37. Energy Efficiency in Cloud Data Centers Using Load Balancing
- Ankita Sharma , Upinder Pal Singh
 IJCTT-V11P137
38. Survey of Energy Efficient Routing Protocols and Gossiping
- Rajkunwar Mane , Rupesh Pachghare
 IJCTT-V11P138
39. A Qualitative Study of Various Improvements in Cluster Based Routing Protocols for WSN
- Tanuja Dogra
 IJCTT-V11P139
40. Clinical Decision Support System in HealthCare Industry Success and Risk Factors
- Abdullah AL-Malaise AL-Gamdi , Khulood Salem Albeladi , Rasha Fouad AlCattan
 IJCTT-V11P140