IJCTT-Volume 4 Iss 8 No 3 Issue 2013

S.No
Title/Author Name
Paper Id
41

Detection of Spams using Extended ICA & Neural Networks

Rajendra kumar K, Siva Ramaiah S , Seshadri U 

IJCTT-V4I8P141
42

Applying Technology Acceptance (TAM) model to determine the acceptance of Nursing Information System (NIS) for Computer Generated Nursing Care Plan among nurses

Nitika Sharma, Manik Gupta

IJCTT-V4I8P142
43

A New Framework for Thwarting Phishing attacks based on Visual Cryptography

- Sandeep Kaur,Gaganpreet Kaur,Dheerendra Singh

 IJCTT-V4I8P143
44

An E-Commerce application for Presuming Missing Items

Rupinderpal Kaur, Rajneet Kaur

 IJCTT-V4I8P144
45

Resilient Data Stream Mining using Spike detection

Yiqing Ling, Dandan Li, Dun Han, Mei Sun

 IJCTT-V4I8P145
46

Diagnosis for Dengue Fever Using Spatial Data Mining

S.Clement Virgeniya , Dr.V.Palanisamy

IJCTT-V4I8P146
47

A Survey of Ad-Hoc Network: A Survey  

 Rajwant Kaur , Sukhpreet Kaur

IJCTT-V4I8P147
48

An Efficient Response Time for Shrew Attack Protection in Mitigating Low-Rate Tcp-Targeted Attacks

A.Swathi, Dr.R.Pugazendi

IJCTT-V4I8P148
49

Network Attacks Control Process

Trilok Gaba, Parveen Kumar

IJCTT-V4I8P149
50

Design and VLSI Implementation of Low Voltage and Low Dropout Voltage Regulator

G. Minni, M. Venkata Dilip Kumar

IJCTT-V4I8P150
51

A Survey of ICI Reduction Techniques in OFDM System

V.Priyadharshini, Dr. A. Malathi

IJCTT-V4I8P151
52

Survey of the network security in cloud computing

D.Shravani , Dr. S. Zahoor Ul Huq

IJCTT-V4I8P152
53

Defensive Seclusion in Location-based Services with K-anonymity without Cloaked Region

M.Thangarasu, Dr.R.Manavalan

IJCTT-V4I8P153
54

Software Quality and Web Compression Analysis

Abhilasha yadav, Prashant Ahlawat

IJCTT-V4I8P154
55

Internet Censorship: Freedom vs Security

Deepinder Kaur, Kamaljit Kaur

IJCTT-V4I8P155
56

Classification of Unwanted Messages in Online Social Network Using Machine Learning Algorithms

Gurpreet Singh, Amandeep Kaur

IJCTT-V4I8P156
57

Design of Mobility Implementation into an ATM Networks

Jasmeet Kaur, Sarpreet Singh 

IJCTT-V4I8P157
58

Classification Rule Discovery Using Genetic Algorithm-Based Approach

Dr. Rahul Malhotra, Prince Jain

IJCTT-V4I8P158
59

Emphasis and emerging trends on virtualization of cloud infrastructure with security challenges

Jose Anand, K. Sivachandar, M. Mohamed Yaseen

IJCTT-V4I8P159
60

Mitigating Risk in Manet Using Srt Scheme and Hadof 

Jose Anand, K. Sivachandar, M. Mohamed Yaseen

IJCTT-V4I8P160