IJCTT-Volume 4 Iss 9 No 2 Issue 2013

S.No
Title/Author Name
Paper Id
21

Blocking and Blacklisting Trespassers in Anonymous Networks

K.Sravanti, Manda Ashok Kumar, Betam Suresh 

IJCTT-V4I9P121
22

Data Sharing Website using Personalised Search  

D. Mahesh Babu, Prof.S.V.Achutha Rao

IJCTT-V4I9P122
 23

Monitoring the Service Availability and Minimizing Query Delay in MANETs  

- P. Chinnaiah, B.Srikanth

 IJCTT-V4I9P123
 24

Reliable and Secure Storage Services with Cloud  

Pindikura Ravi Teja Kumar , Narsimha B 

 IJCTT-V4I9P124
 25

A Knowledge Based Model for Pecularised Web Information Gathering using Ontologies  

Satya Bhanu Jonnalagadda, A. Sravani, Prof.S.V.Achutha Rao

 IJCTT-V4I9P125
 26

Data Sharing on Untrusted Domains using a Novel Encryption Standard

A. Sharone Michael, K.Sivanna

IJCTT-V4I9P126
 27

Proposed Etiquette for Ensuring Data Integrity and Verification in Cloud   

Gopi Rayala, K. Anand Kumar, Prof.S.V.Achutha Rao

IJCTT-V4I9P127
 28

Visual Cryptography Implementation within Dynamic Group for Secure Data Access  

Sham Bhise, Soujanya

IJCTT-V4I9P128
 29

Automatic Segmentation of Brain Tumor From MRI Images- A Review  

Raghu Babu Badugu, MandaAshok Kumar, Betam suresh

IJCTT-V4I9P129
 30

Survey on Cloud Computing  

J.Siva Kumar, Boppudi Swanth, Betam Suresh

IJCTT-V4I9P130
 31

A Study on Security Challenges in Wireless Sensor Networks: Key Management Approaches  

Satyavathi Gantala, Boppudi Swanth, Betam Suresh

IJCTT-V4I9P131
 32

A Study on Web Spam Classification and Algorithms  

Lavanya Sudula , K. Chandra Sekhar Reddy, Prof.S.V.Achutha Rao

IJCTT-V4I9P132
 33

Crop Growth Prediction Based On Fruit Recognition Using Machine Vision

V.Malarmathi, Dr.E.Chandra

IJCTT-V4I9P133
 34

An Efficient Technique for Tag Extraction and Content Retrieval from Web Pages  

V.Malarmathi , Dr.E.Chandra

IJCTT-V4I9P134
 35

An Advanced and more Efficient Built-in Self-Repair Strategy for Embedded SRAM with Selectable Redundancy  

K.Amutha,Dr.M.Devapriya

IJCTT-V4I9P135
 36

Finite States Optimization on Look-Ahead Deterministic Finite Automation  

B.Sai Yashodha, J.Ravindranadh

IJCTT-V4I9P136
 37

Physical Supervision Using Wireless Body Sensors in a Secure and Privacy Approach  

K.Venkatesh Nayak, G.V.R.Sagar

IJCTT-V4I9P137
 38

Blocking Selective Jamming Attacks  

Shehla Afzal, M. Faisal Saleem, Fahad Jan, Mudassar Ahmad

IJCTT-V4I9P138