IJCTT - Volume 12 - No 3 Jun 2014

S.No Title/Author Name Paper ID
21. Prevention and Detection Techniques for SQL Injection Attacks
- Kamlesh Kumar Raghuvanshi , Deen Bandhu Dixit
 IJCTT-V12P121
22. A Comparative Study of Hidden Web Crawlers
- Sonali Gupta , Komal Kumar Bhatia
 IJCTT-V12P122
23. Design and Development of Mobile Phone Based Healthcare System for Emergency Situation
- Rani R. Shetty , Thyagaraju GS
 IJCTT-V12P123
24. A Study on Recognition of Handwritten Character Images
- Shri Praveenkumar Katigar
 IJCTT-V12P124
25. A Novel Mathematical Model for (t, n)-Threshold Visual Cryptography Scheme
- B.Padhmavathi , Dr.P.Nirmal Kumar
 IJCTT-V12P125
26. Distributed Data Security Enhancement in Cloud Computing
- Rajiv K M , Manoj Challa
 IJCTT-V12P126
27. Comparison of Different Arbitrary Window Functions by Direct Conversion of MDCT to DFT
- Mani Kumar I.P , Rakesh Y
 IJCTT-V12P127
28. Review Paper on Focused Crawler for Categorisation
- Abhilasha Rawat , Megha Bansal
 IJCTT-V12P128
29. How to Track Online Service Level Agreement
- Anuradha Rana , Pratima Sharma
 IJCTT-V12P129
30. Image Enhancement and Its Techniques- A Review
- Gurpreet kaur , Rajdavinder Singh
 IJCTT-V12P130