IJCTT - Volume 17 - No 5 Nov 2014

S.No Title/Author Name Paper ID
41. Using T.H.E.S Methodology- An Original Defense Prehistoric Based Going on Unbreakable AI Troubles
- Kranthi Kumar.G, E.Purushotham, M.Giri
 IJCTT-V17P141
42. Quick Spread to Remote Joint Groups Scheme for Wireless Sensor Networks
- L.Dhananjaya reddy, B.Madhubabu, M.Giri
 IJCTT-V17P142
43. E-Health Services in HL7 Standard
- V.Sathya Preiya , G.Senthilkumar, C.Thyagarajan, A.Kanchana
 IJCTT-V17P143
44. Low Power32-Bit DADDA Multipleir
- K.N.V.S.Vijaya Lakshmi , D.R.Sandeep
 IJCTT-V17P144
45. Semantic Information Usage Mining for Next Page Prediction Using Markov Model
- Ankit Mahajan, Md.Mudassir Reyaz, Megha Singh
 IJCTT-V17P145
46. Extract Meaningful Text Sequences and Common Topic Discovery Using Fine-Gained Techniques
- L.Eswaramma, T.V.N Sudheer
 IJCTT-V17P146
47. Improving the Security Performance of Public Clouds Using Attribute Based Access Control in Document Sharing
- Y.Sandhya, DR.M A D R Swamy
 IJCTT-V17P147
48. Multi-Document Summarization using Phrase Context based Indexing and Geometric Model
- Kantu. Vijaya Kumar, Abburi. Venkatesh
 IJCTT-V17P148
49. Efficiency and Effectiveness in Privacy and Security of Data Sharing on Multi cloud Architectures
- G.Katyayani, P.Srinivasulu
 IJCTT-V17P149
50. Threshold and binarization for document image analysis using otsu’s Algorithm
- Dr. Neeraj Bhargava, Anchal kumawat, Dr. Ritu Bhargava
 IJCTT-V17P150