IJCTT - Volume 60 - No 2 June 2018

S.No Title/Author Name Paper ID
11

Leveraging Crowd Sourcing for Proficient Malevolent Users Revealing In Social Networks

- R.Madhubala,A.Prema

 IJCTT-V60P111
12

 Cloud Computing: Effective Concepts

- M E Purushoththaman

 IJCTT-V60P112
13

 Design and Implementation of Remote Data Possession Checking Protocol using Homomorphic Hash Fuction for Cloud Data

- Ajay S Kulkarni, Guntumadugu Girish Raj

 IJCTT-V60P113
14

Text Classification using Bi-Gram Alphabet Document Vector Representation

- Fatma Elghannam

 IJCTT-V60P114
15 A Smart App for Mobile Phones to Top-Up User Accounts for Any Network Service Provider in SriLanka

- C. L. Ishani S. Fonseka

 IJCTT-V60P115
16

Tasks Scheduling with Heterogeneity System in the Cloud Computing using ACO Algorithm

- Mrs. Nahla Ahmed farag, Prof. Ramesh Babu Inampudi

 IJCTT-V60P116
17

Joint Power Allocation and Beam Forming for Energy-Efficient Multi-Way Multi-Antenna Relay Networks

- L.K.Wiseling lazarus, Dr.P.Venkadesh, J.P.Jayan

 IJCTT-V60P117
18

Comparative Study on Classification Algorithms for Plant Leaves Disease Detection

- S.Dhivya, Dr.R.Shanmugavadivu

 IJCTT-V60P118
19

Security System using Arduino

- Geethanjali T M ,RaushaniKumari,Srividya M S,Shreeraksha M R

 IJCTT-V60P119
20

Req2Test - Graph Driven Test Case Generation for Domain Specific Requirement

- Veera Prathap Reddy M, Prasad P.V.R.D, Manjunath Chikkamath, Karthikeyan Ponnalagu, Sarathchandra Mandadi, and Praveen C.V.R

 IJCTT-V60P120