IJCTT - Volume 12 - No 2 Jun 2014

S.No Title/Author Name Paper ID
11. Performance Comparison of Two Streaming Data Clustering Algorithms
- Chandrakant Mahobiya, Dr. M. Kumar
 IJCTT-V12P111
12. A Review of ZeroAccess peer-to-peer Botnet
- Ms. Cheenu
 IJCTT-V12P112
13. Securing Medical Images by Watermarking Using DWT-DCT-SVD
- Nilesh Rathi , Ganga Holi
 IJCTT-V12P113
14. Implementation of Tic-Tac-Toe Game in LabVIEW
- Lalitha Saroja Thota , Manal Elsayeed , Naseema Shaik , Tayf Abdullah Ghawa , Ahlam Rashed , Mona Refdan , Wejdan Mohammed , Rawan Ali , Suresh Babu Changalasetty
 IJCTT-V12P114
15. Real Study of Telecommunications Software System and Multimedia Multimedia System
- Rahul , Mr. Anshul Anand
 IJCTT-V12P115
16. Reliable Transmission of Packet Using Homomorphic Hash Function
- C. Nancy Nightingale , A. Arthi Bala
 IJCTT-V12P116
17. E-Learning Quality Criteria and Aspects
- Reema Ajmera , Dinesh Kumar Dharamdasani
 IJCTT-V12P117
18. A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks
- G.Sumalatha , N.Zareena , Ch.Gopi Raju
 IJCTT-V12P118
19. Web Usage Mining: A Fact Finding Approach in Web Mining
- Rajni Tripathi , Munesh Chandra Trivedi , Shraddha Tripathi
 IJCTT-V12P119
20. Prevention and Detection Techniques for XSS Injection Attacks
- Kamlesh Kumar Raghuvanshi , Neetesh Tiwari
 IJCTT-V12P120