Volume 7 No2 January 2014

S.No Title/Author Name Paper ID
11.  Implementation of E-mail Access for Vision Impaired Person Using Speech Synthesizer
- Rashmi Kurkure , Niketa Gagrani , Sakshi Gupta , Sonali Phadol
 IJCTT-V7P128
12

Novel Implementation of O-Pass Security Model Design of User Authentication for Password Stealing and Reuse Attacks
-Dr.M.Ramabai,J.V.Prashanthi, P.Monika Raju, A.V.L Prasuna, M.Upendra Kumar

 IJCTT-V7P133
13. Driving the Probability with Machine Learning and Efficient Duplicate Detection in Hierarchical Objects
-D.Nithya , K.Karthickeyan
 IJCTT-V7P105
14. LSSVM-ABC Algorithm for Stock Price prediction
- Osman Hegazy , Omar S. Soliman , Mustafa Abdul Salam
 IJCTT-V7P121
15. Energy Saving Technique in Wireless Mobile Ad-hoc Network for Reliable Communication
- Manali Singh, Prof. Jitendra kumar Gupta
 IJCTT-V7P126
16. A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach
-Bhavna Dharamkar , Rajni Ranjan Singh
 IJCTT-V7P106
17. Cluster Chain Based Relay Nodes Assignment
- Gulnaz Ahmed , Asia Samreen
 IJCTT-V7P116
18. A Novel Encryption and Extended Dynamic Histogram Shifting Modulation for Reversible Data Hiding in Encrypted Image
- K.Latha , M.Sundarambal
 IJCTT-V7P130
19. Enhancing Rural Development in Tamilnadu through ICT: An Evaluation of Latest Technologies in the scheme MGNREGS
- S. Meenakshi , Dr. A. Murugan
 IJCTT-V7P134
20. M-Privacy Preserving Synergetic for Data Publishing
- Priya V. Mundafale , Prof. GurudevSawarkar
 IJCTT-V7P141