IJCTT-Volume 4 Iss 8 No 2 Issue 2013

 
Title/Author Name
Paper Id
 

Detection of Spams using Extended ICA & Neural Networks

Rajendra kumar K, Siva Ramaiah S , Seshadri U 

IJCTT-V4I8P141
 

Applying Technology Acceptance (TAM) model to determine the acceptance of Nursing Information System (NIS) for Computer Generated Nursing Care Plan among nurses

Nitika Sharma, Manik Gupta

IJCTT-V4I8P142
 

An E-Commerce application for Presuming Missing Items

Rupinderpal Kaur, Rajneet Kaur

 IJCTT-V4I8P144
 

Diagnosis for Dengue Fever Using Spatial Data Mining

S.Clement Virgeniya , Dr.V.Palanisamy

IJCTT-V4I8P146
 

An Efficient Response Time for Shrew Attack Protection in Mitigating Low-Rate Tcp-Targeted Attacks

A.Swathi, Dr.R.Pugazendi

IJCTT-V4I8P148
 

Design and VLSI Implementation of Low Voltage and Low Dropout Voltage Regulator

G. Minni, M. Venkata Dilip Kumar

IJCTT-V4I8P150
 

Classification Rule Discovery Using Genetic Algorithm-Based Approach

Dr. Rahul Malhotra, Prince Jain

IJCTT-V4I8P158
 

Emphasis and emerging trends on virtualization of cloud infrastructure with security challenges

Jose Anand, K. Sivachandar, M. Mohamed Yaseen

IJCTT-V4I8P159

Performance Comparison of Host based and Network based Anomaly Detection using Fuzzy Genetic Approach (FGA)

Harjinder Kaur, Nivit Gill 

 IJCTT-V4I8P164

Data structures and DBMS for CAD Systems- A review  

Mehak Sharma, Manikant Sharma

IJCTT-V4I8P167

Authentication Using Hand geometry And Finger geometry biometric Techniques  

AmandeepKaur Bhatia, SupreetKaurGujral

IJCTT-V4I8P169

Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis

Rajesh Reddy Muley, Sravani Achanta, Prof.S.V.Achutha Rao

IJCTT-V4I8P174

A New Framework for Cloud Computing security using Secret Sharing Algorithm over Single to Multi- Clouds

Venkatarao Matte, L. Ravi Kumar

IJCTT-V4I8P178

Data Security Threat Evaluation Using Bayesian Prioritization Method

- Sai Bharat Gatta,Vishnu Teja Gangineni, Abhilash Maddukuri

 IJCTT-V4I8P183

Improved VEDA and Unwanted Edge Removal approaches for License Plate Detection

A.Sravya,P.Ramesh Babu

 IJCTT-V4I8P185

A Novel Homomorphic Against Intersession Coding attacks Using InterMac

P.Sravani, D.Deewena Raju

IJCTT-V4I8P186

Improved Background Matching Framework for Motion Detection  

K.Amaleswarao, G.Vijayadeep,U.Shivaji

IJCTT-V4I8P188

Improved Password Authentication System against Password attacks for web Applications

Dr.P.Pandarinath, Vaishnavi Yalamanchili

IJCTT-V4I8P189

A Review: Wireless Sensor Networks and Its Application, Platforms, Standards and Tools  

K.Sarammal, R.A.Roseline

IJCTT-V4I8P194

Toward Increased Discoverability of Open Educational Resources and Open Courseware

Monica Vladoiu

IJCTT-V4I8P195

A Hybrid Approach for Data Hiding using Cryptography Schemes

Gurtaptish Kaur, Sheenam Malhotra

IJCTT-V4I8P196

Web Content Mining Techniques Tools & Algorithms – A Comprehensive Study  

R.Malarvizhi, K.Saraswathi

IJCTT-V4I8P200

A Security Mechanism for Video Data hiding

Mr Sudheer Adepu, Mr P. Ashok , Dr.C.V.Guru Rao

IJCTT-V4I8P202

E-mail Classification Using Genetic Algorithm with Heuristic Fitness Function  

Jitendra Nath Shrivastava, Maringanti Hima Bindu

IJCTT-V4I8P203

A Comparative Study of Different TCP Variants in Networks

Balveer Singh

IJCTT-V4I8P204