IJCTT-Volume 2 Iss 1 No 1 Issue 2011

S.No
Title/Author Name
Paper Id
1

Security Solution for WSN Using Mobile Agent Technology 6

-Ashish Kumar Srivastava , Aditya Goel. 

IJCTT-V2I1P101
 2

Study of Trends in Higher Education

R. Lakshman Naik, S.S.V.N. Sarma, B. Manjula, D. Ramesh.

IJCTT-V2I1P102
 3

A Routing-Driven Public-Key Cryptosystem Based Key Management Scheme for a Sensor Network

- Satya Venkatesh Kadali, O.Srinivasa Rao, Dr MHM Krishna Prasad. 

 IJCTT-V2I1P103
 4

Computer Assisted Instruction For Teaching/Learning Process And Its Effects On Students’Performance In Tertiary Institutions  

Ismail O. Muraina,Imran A.Adeleke, Mukaila A.Rahman 

 IJCTT-V2I1P104
 5

Reliability and Maintainability of Passive optical component  

-Jitendra saxena, Aditya Goel.

 IJCOT-V12I1P105
 6

Credit Card Fraud Detection Analysis

J. Keziya Rani,S.Prem Kumar,U.Ram Mohan, C.Uma Shankar.

IJCTT-V2I1P106
 7

 Automated Black-Box Web Application Vulnerability Testing 

M.R.Srinivas.

IJCTT-V2I1P107
 8

Form Processing Through Handwritting Input Device  

Radhika.R,Ramya Dorai.D 

IJCTT-V2I1P108
 9

Integrated methods for Web Server Access Control  

Anitha Chepuru, Amardeep Matta , Dr.K.Venugopal Rao.

IJCTT-V2I1P109
 10

Mitigating Congestion Aware Routing Protocol in Wireless Sensor Networks  

B. Pruthviraj.

IJCTT-V2I1P110
 11

 Dataset Generation for OCR

Aparna Vara Lakshmi Vemuri,T.V.Sai Krishna,Atul Negi.

IJCTT-V2I1P111
 12

A Study on Conduct of Teams in an It and a BPO Company  

S.Nirmala, S.Deborah Sharon.

IJCTT-V2I1P112
 13

An IP Trace back System to Find the Real Source of Attacks  

A.Parvathi and G.L.N.JayaPradha.

IJCTT-V2I1P113
 14

Dependency grammar feature based noun phrase extraction for text summarization.  

Mrs. Dipti Sakhare,Dr. Rajkumar.

IJCTT-V2I1P114
 15

Low Power testing by don’t care bit filling technique  

Chetan Sharma.

IJCTT-V2I1P115
 16

Message passing with no-key exchange and an additive element at second pass   

K.N.V.V.S.S.S.Chakravarthy ,A.Ramamohan Reddy.

IJCTT-V2I1P116
 17

Construction of an Efficient Mobility Model for Ad Hoc Wireless Networks  

Arvind Shukla, Shashiraj Teotia, Sohan Garg.

IJCTT-V2I1P117
 18

Design and Development of a Secured Routing Scheme for Mobile Ad hoc Networks (MANETs)  

Payal Kansal, Viksit Kumar Sharma, Shashiraj Teotia, Dr. Sohan Garg.

IJCTT-V2I1P118
 19

A Modeling of Shape Descripting Approaches using Local Patterns of High Gradient Points.  

J. Bhattacharya , S.Majumder ,G.Sanyal.

IJCTT-V2I1P119
 20

Modified LRU Algorithm to Implement Proxy Server With Caching Policies  

Jitendra Singh Kushwah,Jitendra Kumar Gupta, Brijesh Patel..

IJCTT-V2I1P120
 21

A QOS-Aware Software Selection Method Based On Service Credibility Evaluation  

U.Sadhana Reddy, M.Y.Babu.

IJCTT-V2I1P121
 22

Removal of High Density Salt & Pepper Noise in Noisy Images Using Decision Based UnSymmetric Trimmed Median Filter (DBUTM)  

Dodda Shekar, Rangu Srikanth.

IJCTT-V2I1P122