IJCTT - Volume 30 - No 1 December 2015

  Title/Author Name Paper ID
  A QoS Load Balancing Scheduling Algorithm in Cloud Environment
- Sana J. Shaikh, Prof. S.B.Rathod
  Analysis of the HalfTone Visual Cryptography and proposing a model for illustrating the related schemes
- Dr. Amit Chaturvedi, Imtiyaz Rehman
  Analysis of Schemes proposed for improving the Segment Based Visual Cryptography
- Dr. Amit Chaturvedi, Irfan Jalal Bhat
  Flying Virtual Cloud Computing Integrated System (FVCIS)
- MuzhirShaban Al-Ani, Ghazi IbrahemRaho
  Ant-based Feature Decomposition Method in Constructing NMC and NBC ensembles
- Abdullah
  Development of a Barcode Reader System
- Firas Abdullah Thweny Al-Saedi, Ali Al-Bayaty
10. Implementation of Viewing and Networking Systems in a Military 3-Dimensional Environment
- Firas Abdullah Thweny Al-Saedi, Fadi Khalid Ibrahim
  Mobile Number Portability in India: Business & Technical Aspects
- Keshav Kishore, Shamneesh Sharma, Pankaj Kajla
  Object Tracking Using Features Extracted From Compressed Domain
- Miss. Pratiksha R.Bhalekar, Ms. Vaishali Suryawanshi
  A review of security models in cloud computing and an Innovative approach
- Dr. Amit Chaturvedi, Sajad Ahmad Zarger
  Adaptive resource scaling methods for Multi-tenant cloud system
- Dr. Amit Chaturvedi, Zahoor Ahmad Bhat
  Characterizing Healthcare Interaction System as a Service System
- Ahlam Mohammed Alamri, Dina Khaled Alharthi, AzrilahAbdulaziz, Salha Abdullah
  An Analytical Evaluation of Matricizing Least-Square-Errors Curve Fitting to Support High Performance Computation on Large Datasets
- Poorna Banerjee Dasgupta
  Extract the Semantic Meaning of Prepositions at Arabic Texts: An Exploratory Study
- Mohammad Khaled A. Al-Maghasbeh, Mohd Pouzi Bin Hamzah
  Expert System for Diagnosis and Management of Kidney Diseases
- Amosa B.M.G., Olalere O. B., Kawonise K.A., Fabiyi A.O, Fabiyi A.A
  Security Model for Communication and Exchanging Data in Mobile Cloud Computing
- Moh'd Fawzi Al-Hunaity, Jawdat Alshaer, Osama Dorgham, Hussam Farraj
  Frequency analysis of Kinyarwanda natural language
- BIZIMUNGU Theogene
  Multimedia Protection, Authentication and Advanced Digital Watermarking Techniques: A Survey
- RanaKhudhair Abbas Ahmed
  Internet of Things for Intelligent Traffic Monitoring System: A Case Study in Denpasar
- I Made Oka Widyantara, Nyoman Putra Sastra
  Session Aware Music Recommendation System with Matrix Factorization technique-SVD
- M. Sunitha, Dr. T. Adilakshmi
  Security in Near Field Communication for m-payment service
- Tasnuva Ali, M. Abdul Awal
  Mining Sequential Patterns from Super Market Datasets
- Fokrul Alom Mazarbhuiya
  Review on Textual Description of Image Contents
- Vasundhara Kadam, Ramesh M. Kagalkar