IJCTT-Volume 3 Iss 4  Issue 2012

S.No
Title/Author Name
Paper Id
1
IJCTT-V3I4P101
 2

Remote Based Intelligent Video Surveillance System  

Sahithi, Venkat Mutyalu

IJCTT-V3I4P102
 3

A Survey on Dynamic Job Scheduling in Grid Environment Based on Heuristic Algorithms

- D. Thilagavathi ,Dr. Antony Selvadoss Thanamani 

 IJCTT-V3I4P103
 4

Monitor For Detection And Prevention Of Fake Agents  

Sudheer Kumar Kotha , Ch.S.V.V.S.N.Murthy 

 IJCTT-V3I4P104
 5

Retrieval Of Digital Images Using Texture Feature With Advanced Genetic Algorithm  

-Shafimirza, Dr.J.Apparao

 IJCTT-V3I4P105
 6

Development of Data leakage Detection Using Data Allocation Strategies   

Polisetty Sevani Kumari, Kavidi Venkata Mutyalu

IJCTT-V3I4P106
 7

Analysis of Reliability in Web Services for Fuzzy Keyword Search in Encrypted Data  

Sharath G P, Rashmi R 

IJCTT-V3I4P107
 8

Improved association rule for classification of type -2 diabetic patients   

T.Rajesh, S.Narayana 

IJCTT-V3I4P108
 9

Wireless Web Content Management Using J2ME  

Anjana Gangadhar, K Shirin Bhanu

IJCTT-V3I4P109
 10

A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Sites  

Amsaveni.K, Vydehi.S

IJCTT-V3I4P110
 11

Infallible and upgradable Geo-environment based Multicasting protocol in MANETs  

Sheba kunche, B. Hanmanthu

IJCTT-V3I4P111
 12

The Design Of Speech-Control Power Point Presentation Tool Using Arm

P.Vishnu Kumar, Dr.T.JayaChandra Prasad

IJCTT-V3I4P112
 13

A Comprehensive Image Segmentation Approach For Image Registration  

R.V.Prasad CH, S.Suresh 

IJCTT-V3I4P113
 14

Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm  

G.Devi, M.Pramod Kumar

IJCTT-V3I4P114
 15

Novel Approach for Color Extended Visual Cryptography Using Error Diffusion  

Dr.D.Vasumathi, M.Surya Prakash Rao, M.Upendra Kumar,Dr.Y.Ramadevi, Dr.R.Rajeswara Rao

IJCTT-V3I4P115
 16

Advance approach of solving real coded optimization problem using modified ABC algorithm with crossover operators of GA  

Mrs. Shahana Gajala Qureshi, Mrs. Uzma Ansari

IJCTT-V3I4P116
 17

Game Based Analysis of Distributed DoS Attacks Prevention Using Puzzle-Based Defense Strategy  

Varsha Vishwanath, V.Shankar

IJCTT-V3I4P117
 18

A New Reduced Clock Power Flip-flop for Future SOC Applications

T.Kavitha , Dr.V.Sumalatha

IJCTT-V3I4P118
19

A Campus Technology Choice Model with Incorporated Network Effects: Choosing Between General Use and Campus Systems

Eric Malm, David Loomis, Joanna DeFranco

IJCTT-V3I4P119
20

Introduction to KEA-Means Algorithm for Web Document Clustering

Swapnali Ware, N.A.Dhawas

IJCTT-V3I4P120
21

Web Usage Mining: User Navigational Patterns Extraction from Web Logs 

Thilaga Rani, Mrs. S.Vydehi

IJCTT-V3I4P121
22

A Study on the Architecture for Text Categorization and Summarization

Suvidha, Ravikishan 

IJCTT-V3I4P122
23

Fingerprint Recognition Using Minutia Matching

Dr. Neeraj Bhargava,Dr. Ritu Bhargava,Prafull Narooka,Minaxi Cotia 

IJCTT-V3I4P123
24

Automated Enhanced Parallelization of Sequential C to Parallel Open MP

Dheeraj D., Shruti Ramesh, Nitish B

IJCTT-V3I4P124

25

A new Digital Signature Algorithm based on Factorization and Discrete Logarithm problem

Sushila Vishnoi, Vishal Shrivastava

IJCTT-V3I4P125
26

Bilingual Subject-based Information Retrieval in NECLIB2 Digital Library 

Zoran Constantinescu , Monica Vladoiu

IJCTT-V3I4P126