IJCTT - Volume 25 - No 1 July 2015

  Title/Author Name Paper ID
  Stream Control Transmission Protocol Performance Analysis in Disk Local Area Network Services
- Lynet O. Sibiyia, Peter K. Kemei, Leonard K. Rop, Ng’ang’a S. Muiruri, Japheth O. Ondiek
 IJCTT-V25P101
  Performance Evaluation of Quadtree & Hough Transform Segmentation Techniques for Iris recognition using Artificial Neural Network (Ann)
- Falohun A.S, Ismaila W.O, Adeosun O.O
 IJCTT-V25P103
  Phishing Attacks and Counter Measures
- Sophia Kingsley Okore, Benisemeni Zakka
 IJCTT-V25P104
  Our Traditions and Facebook: Are we shifting off the track?
- Firas Omar, Ahmad Nabot
 IJCTT-V25P105
  A review on Face Detection and study of Viola Jones method
- Monali Chaudhari, Shanta sondur, Gauresh Vanjare
 IJCTT-V25P110
  An Efficient Guilt Detection Approach for Identifying Data Leakages
- Anand Kiran
 IJCTT-V25P111
  Avoiding Cross Site Request Forgery (CSRF) Attack Using TwoFish Security Approach
- Wasim Akram Shaik, Rajesh Pasupuleti
 IJCTT-V25P112
  Exploratory Secure Transmission of Data with Semantic CPDA Rule in Wireless Sensor Networks
- K.Bhagya Sri, A.Srinivasan
 IJCTT-V25P116
  An Overview of Identity Deception Approaches and Its Effects
- Ms. M. Preensta Ebenazer, Dr. P. Sumathi
 IJCTT-V25P124
  Fast Response Enhanced Multi-queue packet Scheduler scheme for Wireless Sensor Network
- Shital L. Bansod, Sonal Honale
 IJCTT-V25P125
  Machine Learning Techniques for Automatic Classification of Patients with Fibromyalgia and Arthritis
- Begoña Garcia-Zapirain, Yolanda Garcia-Chimeno, Heather Rogers
 IJCTT-V25P129