S.No
|
Articles
|
Ref. No
|
1 |
A Survey on Network Security and Attack Defense Mechanisam for Wireless sensor Network - Shio Kumar Singh , M P Singh and D K Singh. |
IJCTT-V1I2P02 |
2 |
Regionalisation as Spatial Data Mining Problem: A Comparative Study. - P V V S Srinivas, Susanta K Satpathy, Lokesh K Sharma, Ajaya K Akasapu. |
IJCTT-V1I2P05 |
3 |
- Toran Verma, Susanta Kumar Satpathy, Lokesh Kumar Sharma. |
IJCTT-V1I2P06 |
4 |
A Fraud Detection Approach in Telecommunication using Cluster GA. - V.Umayaparvathi, Dr.K.Iyakutti. |
IJCTT-V1I2P07 |
5 |
Gray Eye Traffic Surveillance. - Ayesha Butalia, Durgesh Maru, Kuldeep Baheti, Avais Mohammad, Ankit Bagdiya. |
IJCTT-V1I2P09 |
6 |
Stroke economy approach for constructing complex expert system using multi agent architecture. - U.Chandrasekhar , S.Sahithya. |
IJCTT-V1I2P11 |
7 |
Implementation and Analysis of Image Restoration Techniques - Charu Khare, Kapil Kumar Nagwanshi. |
IJCTT-V1I2P12 |
8 |
Computer Aided Diagnosis System For The Identification And Classification Of Lessions In Lungs -B. Magesh, Mrs. P. Vijayalakshmi, Ms. M. Abirami. |
IJCTT-V1I2P19 |
9 |
Connected Component Analysis and Change Detection for Images -Prasad S.Halgaonkar. |
IJCTT-V1I2P22 |
10 |
Location-based Services Routing in Networks M.Krishnamoorthy, P.Ramyashri, M.S. Srinidhi. |
IJCTT-V1I2P23 |