IJCTT - Volume 29 - No 1 November 2015

  Title/Author Name Paper ID
  A Defensive Measure of Cloud Server Security with Brief Solution
- Sultan Anwar, Abdullah Al Mamun, Hassan Ali
  Semi-Automatic techniquesfor Estimating Climatic Conditions Recorded in the Tree rings
- P.MeenakshiSundari, S. Britto Ramesh Kumar
  A Location Aware Safety Companion
- Shilpa Khedkar, Kiran Chandrasekaran, Tauseef Malik, Manish Poduval
  Design and Implementation of File Sharing Server
- Firas Abdullah Thweny Al-Saedi, Zaianb Dheya’a Al-Taweel
  A Survey of Multi Object Tracking and Detecting Algorithm in Real Scene use in video surveillance systems
- Abouzar Ghasemi, C.N Ravi Kumar
  The Impact of Harmattan Particles on Microwave Propagation in the Savannah Region
- D. D. Dajab, Naldongar Parfait, E.A. Adedokun
  A Simplistic Approach for Registration of Orthogonal Planar Images as a Pre-Preparation for Externally Acquired Cranial Images in Department of Radiation Oncology, Nayati Healthcare and Research Centre
- Sujit Nath Sinha, Santanu Chaudhuri, Somnath Dey
  Prevention of Multiple Rushing Attack Nodes in Multicast MANET
- R.Thilagarasi, D.Geetha
  Study of Scheduling Techniques in Cloud Computing Environment
- Anagha Yadav, S.B.Rathod
  Implementation of Sight and Shooting Systems with Rule- Based Artificial Intelligence in a Military 3-Dimensional Environment
- Firas Abdullah Thweny Al-Saedi, Fadi Khalid Ibrahim
  Implementation of LAN-Based IP Telephony Simulator
- Firas Abdullah Thweny Al-Saedi, Jihan Salah
  A New Method for Detection and Estimation of Outliers in Multiple Linear Regression Model
- Dr. Nabeel George Nacy, Dr.Ghazi. I .Raho, Zrean Salam Ahmed
  A Predictive Model for Evaluating Mobile Number Portability in Nigeria
- Odii Juliet N, Ejiofor V.E, Osuagwu O.E
  An Investigation into the Effectiveness of Java Code Coverage Tools
- Shaik Khasim Saheb, Devavarapu Sreenivasarao, Prof.T.V.Narayana Rao, M Kiran Kumar