S.No
Title/Author Name
Paper Id
61
IJCTT-V4I7P161
62

Evapotranpiration Model Using AI Controller for automatic Irrigation system

Mr. Raja sekhar reddy.G, Mr.Manujunatha.S, Mr.Sundeep Kumar k

IJCTT-V4I7P162
63

Zone Based Node Replica Detection in Wireless Sensor Network Using Trust

- Soumya Sara Koshy, Sajitha M

 IJCTT-V4I7P163
64

An Overview of Techniques Used for Extracting Keywords from Documents 

Menaka S, Radha N 

 IJCTT-V4I7P164
65

Sampling Approach Using Btree Indexing for Mining all Association Rules 

Samiksha Bharne, Mangesh Wanjari 

 IJCTT-V4I7P165
66

Implementation of Data warehousing in Online Sales Company 

Snigdha Dash, Subhadra Mishra

IJCTT-V4I7P166
67

Movie Review Classification and Feature based Summarization of Movie Reviews 

Sabeeha Mohammed Basheer, Syed Farook

IJCTT-V4I7P167
68

Thermal Analysis of Shell and Tube Heat Ex-Changer Using C and Ansys 

v.Hari Haran, G.Ravindra Reddy, B.Sreehari

IJCTT-V4I7P168
69

Comparative Study of Speech Encryption Algorithms Using Mobile Applications 

Jaspreet kaur, Er. Kanwal preet Singh

IJCTT-V4I7P169
70

A Novel Firewall Policy Anomaly Management Tool  

Lakshmi Devi, V.Srinadh

IJCTT-V4I7P170
71

An Efficient Subtopic Retrieval System using Hybrid Approach

Manpreet Kaur, Usvir Kaur

IJCTT-V4I7P171
72

DESIGN AND ANALYSIS OF LIGHT WEIGHT MOTOR VEHICLE FLYWHEEL

M.LAVAKUMAR , R.PRASANNA SRINIVAS

IJCTT-V4I7P172
73

Averting Buffer Overflow Attack in Networking OS using – BOAT Controller

Vadivel Murugan.P, M.Alagarsamy

IJCTT-V4I7P173
74

Firewall Policy Anomalies- Detection and Resolution 

Jitha C K , Sreekesh Namboodiri

IJCTT-V4I7P174
75

ISOLATION OF CLONE NODES AND BLACKHOLE NODES USING RISK AWARE MITIGATION   

Mebi Sernaz, Anand Pavithran

IJCTT-V4I7P175
76

Advance Cryptography Scheme for Data Hiding using Advance Hill cipher & DES  

Gurtaptish Kaur, Sheenam Malhotra

IJCTT-V4I7P176
77

A Theoretical Review on SMS Normalization using Hidden Markov Models (HMMs)

Ratika Bali

IJCTT-V4I7P177
78

A Novel Cell Reckoning Intrusion against TOR 

Ujjaneni Siva Lalitha, Prof.S.V.Achutha Rao

IJCTT-V4I7P178
79

A Prospect Mold of Visual Cryptography Design with Dynamic Set

Gavirineni Nalini,Mirza Mohsin Raza

IJCTT-V4I7P179