S.No
Articles
Ref. No
 1

A Survey on Network Security and Attack Defense Mechanisam for Wireless sensor Network 

- Shio Kumar Singh , M P Singh and D K Singh.

IJCTT-V1I2P02
 2

Regionalisation as Spatial Data Mining Problem: A Comparative Study.

- P V V S Srinivas, Susanta K Satpathy, Lokesh K Sharma, Ajaya K Akasapu.

 IJCTT-V1I2P05
 3

A Step towards Precision Farming of Rice Crop by Estimating Loss Caused by Leaf Blast Disease Using Digital Image Processing and Fuzzy Clustering

- Toran Verma, Susanta Kumar Satpathy, Lokesh Kumar Sharma.

IJCTT-V1I2P06
 4

A Fraud Detection Approach in Telecommunication using Cluster GA.

- V.Umayaparvathi, Dr.K.Iyakutti.

IJCTT-V1I2P07
 5

Gray Eye Traffic Surveillance.

- Ayesha Butalia, Durgesh Maru, Kuldeep Baheti, Avais Mohammad, Ankit Bagdiya.

IJCTT-V1I2P09
 6

Stroke economy approach for constructing complex expert system using multi agent architecture.

- U.Chandrasekhar , S.Sahithya.

IJCTT-V1I2P11
 7

Implementation and Analysis of Image Restoration Techniques

- Charu Khare, Kapil Kumar Nagwanshi.

IJCTT-V1I2P12
 8

Computer Aided Diagnosis System For The Identification And Classification Of Lessions In Lungs

-B. Magesh, Mrs. P. Vijayalakshmi, Ms. M. Abirami.

 IJCTT-V1I2P19
 9

Connected Component Analysis and Change Detection for Images

-Prasad S.Halgaonkar.

IJCTT-V1I2P22
 10

Location-based Services Routing in Networks

M.Krishnamoorthy, P.Ramyashri, M.S. Srinidhi.

IJCTT-V1I2P23