IJCTT-Volume 8-No1 February 2014

S.No Title/Author Name Paper ID
1.

Secure Health Information Exchanging in Cluster Computing
- Satish Garigipati , Manoj Kumar Gottimukala

 

 IJCTT-V8P101

2. MCA Learning Algorithm for Incident Signals Estimation:A Review
- Rashid Ahmed , John A. Avaritsiotis
 IJCTT-V8P102
3. Improved WaterMarking algorithm For Securing Image authentication and Integrity
- Jeeth Sundeep,Y.Sujatha
 IJCTT-V8P103
4. Multiple Criteria Decision Making Methodology for Network security
- Dr.S.Munisankaraiah , Mr.A.Arun Kumar , Mr.G.Ravikumar ,Dr.D.K.Pandey
 IJCTT-V8P104
5.

A Survey On Semi-Supervised Learning Techniques
- V. Jothi Prakash , Dr. L.M. Nithya

 

 IJCTT-V8P105

6. Survey on Sparse Coded Features for Content Based Face Image Retrieval
- D. JohnVictor , G. Selvavinayagam
 IJCTT-V8P106
7. A Review on Impersonation Attack in Mobile Ad-Hoc Network
- Nidhi Gour ,Monika Agarwal ,Heena Singh ,Ajay Kumar
 IJCTT-V8P107
8. Classification of Diabetes Mellitus using Modified Particle Swarm Optimization and Least Squares Support Vector Machine
- Omar S.Soliman , Eman AboElhamd
 IJCTT-V8P108
9. Analysis on Credit Card Fraud Detection Methods
- Renu , Suman
 IJCTT-V8P109
10. VHDL Modeling of Intrusion Detection & Prevention System (IDPS) – A Neural Network Approach
- Tanusree Chatterjee , Abhishek Bhattacharya
 IJCTT-V8P110