IJCTT-Volume 6  No 4 December 2013

S.No
Title/Author Name
Paper Id
31
IJCTT-V6N4P131
32

 Data Concealing in Encrypted Images Using Reversible Data Hiding (RDH) Technique

Sujith T , Mr Iwin Thanakumar S

IJCTT-V6N4P132
33

 A Novel Technique in Cryptography for Data Hiding in Digital Images

- Sreepathi V B , Mr.IwinThanakumar S

 IJCTT-V6N4P133
34

 Analysis on the Performance of Wireless Protocols

- A. Malathi , P. Kalai Kannan

 IJCTT-V6N4P134
35

 A Puzzle Based Authentication Scheme for Cloud Computing

Sulochana.V , Parimelazhagan.R

 IJCTT-V6N4P135
36

 A Survey on Clustering Approaches for Gene Expression Patterns

Irene Maria , Mathew Kurian

IJCTT-V6N4P136
37

 Intensity and Texture Gradient Based Boundary Detection Algorithm for Medical Image

V. Sai Kumar , V. Vijaya Kishore

IJCTT-V6N4P137
38

 Plain Woven Fabric Defect Detection Based on Image Processing and Artificial Neural Networks

Dr.G.M.Nasira , P.Banumathi

IJCTT-V6N4P138
39

 Anomaly Detection Based on Access Behavior and Document Rank Algorithm

Prajwal R Thakare , K. Hanumantha Rao

IJCTT-V6N4P139
40

 Proactive Web Server Protocol for Complaint Assessment

G. Vijay Kumar , Ravikumar S. Raykundaliya , Dr. P. Naga Prasad

IJCTT-V6N4P140