S.No | Articles | Ref. No |
1 |
Face Recognition Using Neural Network and Eigenvalues With Distinct Block Processing -Amit Kumar, Prashant Sharma, Shishir Kumar. |
IJCTT-V1I1P02 |
2 |
Algorithm for Intelligent Network Visualization and Threat Analysis -Amit Kumar, Prashant Sharma, Dr. Shishir Kumar. |
IJCTT-V1I1P03 |
3 |
-K.Duraisamy, R.Surendiran. |
IJCTT-V1I1P08 |
4 |
A Conceptual Framework For Extending Distance Measure Algorithm For Data Clustering -A.M. Bagiwa, S.I. Dishing. |
IJCTT-V1I1P10 |
5 |
Handwritten Signature Verification using Instance Based Learning -Priya Metri , Ashwinder Kaur |
IJCTT-V1I1P12 |
6 |
Application software for graphical interface Online theatre booking system -Awodele Oludele, Omole Grace, Fashola Kofoworola, Oni Oladipupo. |
IJCTT-V1I1P14 |
7 |
Multiple Unit GSM Controlled Devices -Oludele Awodele, Beersheba .A Ologure, Aaron .A Izang, Ademola Adams. |
IJCTT-V1I1P15 |
8 |
Adaptive E-learning System: A Review -Subrat Roy, Devshri Roy. |
IJCTT-V1I1P19 |
9 |
-N.Pughazendi, C.Bhanu prakash. |
IJCTT-V1I1P20 |
10 |
Limitations of Practical Quantum Cryptography - Vibha Ojha, Anand Sharma, Vishal Goar, Prakriti Trivedi. |
IJCTT-V1I1P22 |
11 |
An Intelligent Architecture for Multi-Agent Based M-Health Care System - Mayuri Gund, Snehal Andhalkar, Prof. Dipti Patil, Dr. V.M.Wadhaii. |
IJCTT-V1I1P26 |
12 |
An Entropy Decision Model for Selection of Enterprise Resource Planning System -Ming-Chang Lee, Jui-Fang Chang, Jung-Fang Chen. |
IJCTT-V1I1P27 |
13 |
Web Services Security Architectures for Secure Service Oriented Analysis and Design - D.Shravani, Dr.P.Suresh Varma, Dr.B.Padmaja Rani, K.Venkateswar Rao, M.Upendra Kumar. |
IJCTT-V1I1P29 |