IJCTT - Volume 9 - No 5 March 2014

S.No Title/Author Name Paper ID
41. New Julia and Mandelbrot Sets for Jungck Ishikawa Iterates
- Suman Joshi , Dr. Yashwant Singh Chauhan , Dr. Ashish Negi
 IJCTT-V9P141
42. An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack
- Rohit Srivastava , Avinash Verma , Shadab Hussain
 IJCTT-V9P142
43. Detecting and Localizing the Attackers in Multiple Networks
- Mr.S.A. Ramesh kumar , Mr.R.Thanigaivel
 IJCTT-V9P143
44. Comprehensive Study of Impact of Requirement Engineering Processes on Rework
- Dr Rajinder Singh
 IJCTT-V9P144
45. Improved 3-Dimensional Security in Cloud Computing
- Sagar Tirodkar , Yazad Baldawala , Sagar Ulane , Ashok Jori
 IJCTT-V9P145
46. Embedding a Non-Standard Encryption/Decryption Method with Mathematical Draw Function to Meet Challenges in Mobility
- S. Lakshmi Priya , R.Lawrance
 IJCTT-V9P146
47. Mas Based Framework for Recruitment of Fresher’s By CMM Level Company
- Alankar Srivastava , Ramesh Vaishya
 IJCTT-V9P147
48. Efficient User Authentication and Providing Host Security against Malware
- P.Angel , V.Sindhu Shri
 IJCTT-V9P148
49. Importance and Techniques of Information Hiding : A Review
- Richa Gupta , Sunny Gupta , Anuradha Singhal
 IJCTT-V9P149
50. Big Data : Overview
- Richa Gupta , Sunny Gupta , Anuradha Singhal
 IJCTT-V9P150