IJCTT-Volume 3 Iss 2 No 1  Issue 2012

S.No
Title/Author Name
Paper Id
1

Evaluation of Teacher’s Performance Using Fuzzylogic Techniques

Sirigiri Pavani, P.V.S.S.Gangadhar, Kajal Kiran Gulhare. 

IJCTT-V3I2P101
 2

BSMR: Byzantine-Resilient Secure Multicast Routing In Multihop Wireless Networks 

Mahamood ul Hasan MD, Syed Shaheen.

IJCTT-V3I2P102
 3

 Face Comparison Using PSO Algorithm

Dr.A.V.Senthilkumar, J.Savitha.

 IJCTT-V3I2P103
 4

 Imputation Framework for Missing Values

K. Raja, G. Tholkappia Arasu ,Chitra. S. Nair. 

 IJCTT-V3I2P104
 5

RDFS:An Extension To RDF

-Gopal Pandey, Prof. B.V.Buddhadev

 IJCTT-V3I2P105
 6

Behaviour based Trust Management using geometric mean approach for Wireless Sensor Networks

Ch.Satya Keerthi.N.V.L, A.Manogna, Ch.Yasaswini, A.Aparna, S.Ravi Teja.

IJCTT-V3I2P106
 7

Ray’s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices

Partha Pratim Ray. 

IJCTT-V3I2P107
 8

A Novel SHA-1 approach in Database Security

Aarthi.G,Dr. E. Ramaraj. 

IJCTT-V3I2P108
 9

Performance Analysis of Asynchronous Optical Burst Switching Networks

Nivedha.G, Reethi.S

IJCTT-V3I2P109
 10

A Security Design combining the advantages of Cryptanalysis and Anonymous routing protocol to achieve data secrecy and anonymity

Varsha Waingankar, Swetha S

IJCTT-V3I2P110
 11

Performance analysis of Linear appearance based algorithms for Face Recognition

Steven Lawrence Fernandes,Dr.G.Josemin Bala.

IJCTT-V3I2P111