IJCTT-Volume 4 Iss 5 No 1 Issue 2013

 
Title/Author Name
Paper Id
 
IJCTT-V4I5P1
 

Entrenched Visual Cryptography using Secret Sharing Scheme with public Key 

Kode Phani Kumar, B.Veera Mallu

 IJCTT-V4I5P5
 

ROI Estimation of Data Warehouse with Bottom Up Architecture and Top Down Implementation

Bikramjit Pal, Awanish Pati Mishra, Mallika De

IJCTT-V4I5P8
 

Contrast Enhancement Using Bi-Histogram Equalization With Brightness Preservation

Gowthami Rajagopal, K.Santhi

IJCTT-V4I5P11
 

Zone Divisional Network with Double Cluster Head for effective communication in WSN

Sandeep Verma, Kanika Sharma

IJCTT-V4I5P13
 

Secure web mining framework for e-commerce websites

M.Karthik , S.Swathi

IJCTT-V4I5P18
 

An Efficient Cloud Storage with Secure Dynamic Data Modification  

K.HariPriya, P.Krishnamoorthy 

 IJCTT-V4I5P24
 

Review of First Hop Redundancy Protocol and Their Functionalities

Priyanka Dubey, Shilpi Sharma, Aabha Sachdev

IJCTT-V4I5P26
 

Resource Provisioning Cost of Cloud Computing by Adaptive Reservation Techniques

M.Manikandaprabhu, R.SivaSenthil 

IJCTT-V4I5P33
 

Advanced Replica-Based Data Access Prediction and Optimization Approach in Distributed Environment

P. Sathiya, K. N. Vimal Shankar

IJCTT-V4I5P35
 

Cryptoviral Extortion: A virus based approach

S.Manoj Kumar, M.Ravi Kumar

IJCTT-V4I5P38
 

Video Watermarking Using Wavelet Transformation

Rakesh Kumar, Savita Chaudhary

IJCTT-V4I5P39
 

Methodological approach for Face Recognition Using Artificial Neural Networks

K. Shirisha, S. Vijaya Lakshmi, N. Musrat Sultana 

IJCTT-V4I5P41
 

A Novel Approach for Detection and Prevention of Wormhole Attack In Ad-hoc Networks

Monika, Jyoti Thalor 

IJCTT-V4I5P42
 

Emerging Network Technologies that are Likely to Become Widely Available in the Future

- Peter K. Kemei and William P.K. Korir

 IJCTT-V4I5P43
 

Cat Swarm based Optimization of Gene Expression Data Classification

Amit Kumar, Debahuti Mishra 

 IJCTT-V4I5P44
 

Modification of Instruction Set Architecture in a UTeMRISCII Processor 

Ahmad Jamal Salim, Nur Raihana Samsudin, Sani Irwan Md Salim , Soo Yew Guan 

IJCTT-V4I5P46
 

A New Approach for Providing the Data Security and Secure Data Transfer in Cloud Computing

Manoj Prabhakar Darsi , K.Suresh Joseph, Dr. S.K.V.Jayakumar 

IJCTT-V4I5P47
 

Reduction of Greedy Forwarding using Overlay Multicasting in Mobile Ad Hoc Networks

G. Kiran Kumar, B.Vijaya Babu

IJCTT-V4I5P51
 

Hybridization of Symmetric Key Encryption and Visual Cryptography

Monika, Rakhi Soni

IJCTT-V4I5P52