IJCTT - Volume 11 - No 1 May 2014

 

  Title/Author Name Paper ID
  Evaluation of Common Encryption Algorithm and Scope of Advanced Algorithm for Simulated Wireless Network
- Dr. Atul M. Gonsai , Lakshadeep M. Raval
 IJCTT-V11P102
  Secure and Reliable Watermarking in Relational Databases
- G.Shyamala , I.Jasmine Selvakumari Jeya , M.Revathi
 IJCTT-V11P103
  Efficient Anonymous Routing Protocols in Manets: A Survey
- Jojy Saramma John , R.Rajesh
 IJCTT-V11P105
  An Efficient Query Mining Framework Using Spatial Hidden Markov Models for Automatic Annotation of Images
- R.Ramya
 IJCTT-V11P107
  Detection of Calcification Using Filter in Mammograms – A Survey
- C.Kaviya Prabha , S.Usha
 IJCTT-V11P109
  A Survey of Coverage-Based Broadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
- V.V.V. Pradeep Sastry , Dr S.Arvind
 IJCTT-V11P111
  A Meta-heuristic Approach for Image Segmentation using Firefly Algorithm
- Bhavana Vishwakarma , Amit Yerpude
 IJCTT-V11P115
  Classification of Basmati Rice Grain Variety using Image Processing and Principal Component Analysis
- Rubi Kambo , Amit Yerpude
 IJCTT-V11P117
  Prognosis of Diabetes Using Data mining Approach-Fuzzy C Means Clustering and Support Vector Machine
- Ravi Sanakal , Smt. T Jayakumari
 IJCTT-V11P120
  Handwritten Nastaleeq Script Recognition with BLSTM-CTC and ANFIS method
- Rinku Patel , Mitesh Thakkar
 IJCTT-V11P128
  A Review of Multi-Protocol Label Switching: Protocol for Traffic Engineering on Internet
- Isha Mangal , Deepali Bajaj
 IJCTT-V11P129
  Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm
- Monika Gunjal , Jasmine Jha
 IJCTT-V11P131
  Improvement on LEACH: Seeded LEACH-KED
- Preeti Sharma , Pankaj Kumar Verma , Surender Singh
 IJCTT-V11P132
  Pre-processing of ECG Signals Using Filters
- Isha V Upganlawar , Harshal Chowhan
 IJCTT-V11P135
  VirtuMob : Remote Display Virtualization Solution For Smartphones
- M H Soorajprasad , Balapradeep K N , Dr. Antony P J
 IJCTT-V11P136
  Energy Efficiency in Cloud Data Centers Using Load Balancing
- Ankita Sharma , Upinder Pal Singh
 IJCTT-V11P137
  Clinical Decision Support System in HealthCare Industry Success and Risk Factors
- Abdullah AL-Malaise AL-Gamdi , Khulood Salem Albeladi , Rasha Fouad AlCattan
 IJCTT-V11P140
  Attribute Based User Control Access for Cloud Storage Data
- Satheesh Kavuri , GangadharaRao Kancharla , Basaveswara Rao Bobba
 IJCTT-V11P141
  Zigbee-Based Smart Ordering System (S.O.S)
- Asan N. Badariah , Nordin N. Azreena , Shariff Zulkifli
 IJCTT-V11P144
  Techniques Used for Detection of Mobile Spyware
- Neelam Kaur
 IJCTT-V11P146
  IDS in Cloud Environment
- Shikha Pandit , Pooja
 IJCTT-V11P148
  Unsupervised Opinion Mining From Text Reviews Using SentiWordNet
- Vibha Soni , Meenakshi R Patel
 IJCTT-V11P150
  Comparative Analysis of Textural Features Derived from GLCM for Ultrasound Liver Image Classification
- Aborisade.D.O , Ojo.J. A , Amole.A.O , Durodola A.O
 IJCTT-V11P151
  Electric Load Forecasting using a Neural Network Approach
- Vinutha H D , K C Gouda , Chandan K N
 IJCTT-V11P152