IJCTT-Volume 4 Iss 5 No 2 Issue 2013

S.No
Title/Author Name
Paper Id
21
IJCTT-V4I5P21
22

Improving the Energy Efficiency in Multicast Routing For Mobile Adhoc Networks

S.Victoria Mary ,J.Prathish Kumar 

IJCTT-V4I5P22
23

Lfsr-Reseeding Scheme For Achieving Test Coverage 

- M.Kalaiselvi, K.S.Neelukumari

 IJCTT-V4I5P23
24

An Efficient Cloud Storage with Secure Dynamic Data Modification  

K.HariPriya, P.Krishnamoorthy 

 IJCTT-V4I5P24
25

Distance Routing Effective Algorithm for Mobility - Optimized Link State Routing

Gurpreet Singh Saini, Ashish Kots, Manoj Kumar

 IJCTT-V4I5P25
26

Review of First Hop Redundancy Protocol and Their Functionalities

Priyanka Dubey, Shilpi Sharma, Aabha Sachdev

IJCTT-V4I5P26
27

Optimization of RSA Processors Using Multiplier

Chandra.K ,Kumar.P

IJCTT-V4I5P27
28

Cross Platform Mobile Application Development

Mrs. V.C. Kulloli , Ashish Pohare, Sujit Raskar, Tania Bhattacharyya, Shashikant Bhure

IJCTT-V4I5P28
29

An Optimization Technique for Medical Image Segmentation

N. Sridhar , K. N. Prakash

IJCTT-V4I5P29
30

Mobile Robot in Coal Mine Disaster

S.TejaRam , Smt. M. Nalinisri

IJCTT-V4I5P30
31

Breast tumor representation & noise removal using Fuzzy c-mean algorithm and DWT

Brijesh B Patel, Brijesh N Shah, Vandana Shah

IJCTT-V4I5P31
32

Improving Policy Based Intrusion Response Component of a Relational Database by Evaluation of User

M. Dharani, T. Sangeetha 

IJCTT-V4I5P32
33

Resource Provisioning Cost of Cloud Computing by Adaptive Reservation Techniques

M.Manikandaprabhu, R.SivaSenthil 

IJCTT-V4I5P33
34

A Novel Approach for Preventing Selective Jamming Alerts

N.Muruganadham, R.Umesh, D.Kaleeswaran

IJCTT-V4I5P34
35

Advanced Replica-Based Data Access Prediction and Optimization Approach in Distributed Environment

P. Sathiya, K. N. Vimal Shankar

IJCTT-V4I5P35
36

 Communication Model Development using Test Data for a given Protocol

Md Tanzilur Rahman, Kunal Gupta

IJCTT-V4I5P36
37

Analysis and Implementation of Different Digital Image Watermarking Techniques for Secure Data Transmission

Neeraj Kumar,Veenita Gupta, Praveen Kumar 

IJCTT-V4I5P37
38

Cryptoviral Extortion: A virus based approach

S.Manoj Kumar, M.Ravi Kumar

IJCTT-V4I5P38
39

Video Watermarking Using Wavelet Transformation

Rakesh Kumar, Savita Chaudhary

IJCTT-V4I5P39
40

Evaluating Accuracy of Inference and Benefits of Compression over RFID

S.Tashelat Masleena, M.Gayathri

IJCTT-V4I5P40