IJCTT - Volume 23 - No 1 May 2015

  Title/Author Name Paper ID
  A Hybrid Approach for content based image retrieval from large Dataset
- Devendra Kurwe, Prof. Anjna Jayant Deen, Dr. Rajeev Pandey
 IJCTT-V23P104
  Combining and Analysing Apriori and K-Means Algorithms for Efficient Data Mining on the Web
- Nisha Rani, Yamini Chouhan
 IJCTT-V23P107
  Algorithmic Analysis of Edge Ranking and Profiling for MTF Determination of an Imaging System
- Poorna Banerjee Dasgupta
 IJCTT-V23P110
  Matrix-Chain Multiplication Using Greedy and Divide-Conquer approach
- Raghav Lakhotia, Sanjeev Kumar, Rishabh Sood, Harmeet Singh, Javaid Nabi
 IJCTT-V23P115
  Security mechanism for Collision Avoidance and Attack Prevention Formants
- Harpreet Kaur, Mrs.SupreetKaur
 IJCTT-V23P116
  Literature Survey on Multicast Routing Protocols in MANETS
- T.Rama Thulasi, N.Jyotsna, K.Sowjanya
 IJCTT-V23P117
  Extraction, Visualisation and Analysis of Co- Authorship Based Academic Social Networks
- Tasleem Arif
 IJCTT-V23P118
  QR Images: an Automatic Method to Embed QR codes in to Color Images
- Shraddha Bachkar, Prajakta Savkar, Sarika Sarode
 IJCTT-V23P119
  Integrating Grid Computing Technology into Multimedia Application
- Rafid Al-Khannak, Abdulkareem A. Kadhim, Nada S. Ibrahim
 IJCTT-V23P122
  A Novel Approach for Classification of Indoor Scenes
- Gagandeep Kaur, Dr. Amandeep Verma
 IJCTT-V23P123
  Efficient Layout Design of 4-Bit Full Adder using Transmission Gate
- Anurag Yadav, Rajesh Mehra
 IJCTT-V23P125
  Brief Overview of Automated Industrial Plant: A Review
- Akogbe Michael Abogunde
 IJCTT-V23P127
  Voice recognition Using back propagation algorithm in neural networks
- Abdelmajid Hassan Mansour, Gafar Zen Alabdeen Salh, Hozayfa Hayder Zeen Alabdeen
 IJCTT-V23P128
  Study of HSV Color Space Deviations and Histograms in Image Steganography
- Pankaj Sambyal
 IJCTT-V23P131
  A Novel Approach to Face Detection using Image Parsing and Morphological Analysis
- Abhishek Maity, Sayan Dasgupta, Debjit Paul
 IJCTT-V23P132
  The Adverse Effect of Watering Hole Attack in Distributed Systems and the Preventive Measures
- Glory V. Umoh, Nnamnso P. Paul
 IJCTT-V23P133