IJCTT-Volume 4 Iss 8 No 5 Issue 2013

S.No
Title/Author Name
Paper Id
81

Improving Recommendations Assortment using Ranking Functions

Karuna Latha Thanukula, Manda Ashok Kumar, Betam Suresh 

IJCTT-V4I8P181
82

Impact of Inter Vehicle Communication (IVC) on network and road traffic simulation using bidirectional coupled network through one hop broadcasting technique  

Prof.Rekhapatil, Jyothi.N

IJCTT-V4I8P182
83

Data Security Threat Evaluation Using Bayesian Prioritization Method

- Sai Bharat Gatta,Vishnu Teja Gangineni, Abhilash Maddukuri

 IJCTT-V4I8P183
84

Secured N-Tier Attack Detection and Prevention Mechanism4

R.Anusha, Ch.Sivaramamohana Rao 

 IJCTT-V4I8P184
85

Improved VEDA and Unwanted Edge Removal approaches for License Plate Detection

A.Sravya,P.Ramesh Babu

 IJCTT-V4I8P185
86

A Novel Homomorphic Against Intersession Coding attacks Using InterMac

P.Sravani, D.Deewena Raju

IJCTT-V4I8P186
87

Graphical based Secure Authentication System for Online Applications  

S.Vineela Krishna, G.Mani Mayuri

IJCTT-V4I8P187
88

Improved Background Matching Framework for Motion Detection  

K.Amaleswarao, G.Vijayadeep,U.Shivaji

IJCTT-V4I8P188
89

Improved Password Authentication System against Password attacks for web Applications

Dr.P.Pandarinath, Vaishnavi Yalamanchili

IJCTT-V4I8P189
90

A Survey on Interactive Video Retrieval Using Active Learning Approach 

K.P.Kiruthika, T.P.Senthilkumar

IJCTT-V4I8P190
91

Virtual Ring Network Protection Against Flooding DDOS Attack  

Rashida farsath.k

IJCTT-V4I8P191
92

Localization of Fault Based on Program Spectrum

Dr. R.M.Chandrasekaran, N.suguna

IJCTT-V4I8P192
93

Traffic Rank Based QoS Routing in Wireless Mesh Network

Deepa P Kamble, Sujatha P Terdal

IJCTT-V4I8P193
94

A Review: Wireless Sensor Networks and Its Application, Platforms, Standards and Tools  

K.Sarammal, R.A.Roseline

IJCTT-V4I8P194
95

Toward Increased Discoverability of Open Educational Resources and Open Courseware

Monica Vladoiu

IJCTT-V4I8P195
96

A Hybrid Approach for Data Hiding using Cryptography Schemes

Gurtaptish Kaur, Sheenam Malhotra

IJCTT-V4I8P196
97

A Range Queries Trigger Identification Service in Wireless Sensor Networks  

L.Jothi, Dr.R.Pugazendi

IJCTT-V4I8P197
98

Genetic Algorithm for Joint Relaying Topology Routing and Scheduling Optimization in Multihop Cellular Network

Prof.Rekhapatil, Shivaprasad Biradar

IJCTT-V4I8P198
99

Predetection of diseases by retinal diagnosis using Digital image processing  

Vamsi Krishna Reddy Munnangi, Hemanth yadav Aradhyula, Riyan Mohammed 

IJCTT-V4I8P199
100

Web Content Mining Techniques Tools & Algorithms – A Comprehensive Study  

R.Malarvizhi, K.Saraswathi

IJCTT-V4I8P200
101

Defensive Seclusion in Location-based Services with K-anonymity without Cloaked Region

D.V.V.Phani Kumar, J.V.Ram Kumar

IJCTT-V4I8P201
102

A Security Mechanism for Video Data hiding

Mr Sudheer Adepu, Mr P. Ashok , Dr.C.V.Guru Rao

IJCTT-V4I8P202
103

E-mail Classification Using Genetic Algorithm with Heuristic Fitness Function  

Jitendra Nath Shrivastava, Maringanti Hima Bindu

IJCTT-V4I8P203
104

A Comparative Study of Different TCP Variants in Networks

Balveer Singh

IJCTT-V4I8P204