IJCTT - Volume 12 - No 1 Jun 2014

  Title/Author Name Paper ID
  Providing the Secure Data Transmission in the Network Using Open Source Packet Analyzer
- Hasina A. Razzak A. Karim , S S Handa , M V Ramana Murthy
 IJCTT-V12P103
  A study on the Tizen Operating System
- Geetika Vashisht, Rahul Vashisht
 IJCTT-V12P104
  Multi-Packet Reception Technology in Random Access Wireless Networks: A Survey
- Mr. Gagan Sachdeva, Ms. Sharvani G. S.
 IJCTT-V12P107
  An Approach To Understand Human Behaviour Pattern
- Mereen Thomas Vadakkel
 IJCTT-V12P108
  Smart City Analysis using Spatial Data and Predicting the Sustainability
- Thomas Joseph
 IJCTT-V12P109
  Integration of Cloud Computing and Web2.0 Collaboration Technologies in E-Learning
- Rasha Fouad AlCattan
 IJCTT-V12P110
  Performance Comparison of Two Streaming Data Clustering Algorithms
- Chandrakant Mahobiya, Dr. M. Kumar
 IJCTT-V12P111
  A Review of ZeroAccess peer-to-peer Botnet
- Ms. Cheenu
 IJCTT-V12P112
  Securing Medical Images by Watermarking Using DWT-DCT-SVD
- Nilesh Rathi , Ganga Holi
 IJCTT-V12P113
  E-Learning Quality Criteria and Aspects
- Reema Ajmera , Dinesh Kumar Dharamdasani
 IJCTT-V12P117
  A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks
- G.Sumalatha , N.Zareena , Ch.Gopi Raju
 IJCTT-V12P118
Prevention and Detection Techniques for SQL Injection Attacks
- Kamlesh Kumar Raghuvanshi , Deen Bandhu Dixit
 IJCTT-V12P121
  A Comparative Study of Hidden Web Crawlers
- Sonali Gupta , Komal Kumar Bhatia
 IJCTT-V12P122
  Design and Development of Mobile Phone Based Healthcare System for Emergency Situation
- Rani R. Shetty , Thyagaraju GS
 IJCTT-V12P123
  A Study on Recognition of Handwritten Character Images
- Shri Praveenkumar Katigar
 IJCTT-V12P124
A Novel Mathematical Model for (t, n)-Threshold Visual Cryptography Scheme
- B.Padhmavathi , Dr.P.Nirmal Kumar
 IJCTT-V12P125
Virtualization Approaches in Cloud Computing
- K C Gouda , Anurag Patro , Dines Dwivedi , Nagaraj Bhat
 IJCTT-V12P132
Intelligent Mobile System for Healthcare Based On WSN and Android
-Farah Nasri , Neila Moussa , Abdellatif Mtibaa
 IJCTT-V12P137
Classification of Efficient Imputation Method for Analyzing Missing Values
- S.Kanchana , Dr. Antony Selvadoss Thanamani
 IJCTT-V12P138
Classification of Devnagari Numerals using Multiple Classifier
- Shashi Kant Shukla , Akhilesh Pandey
 IJCTT-V12P139
A Synonym Based Approach of Data Mining in Search Engine Optimization
- Palvi Arora , Tarun Bhalla
 IJCTT-V12P140
Cluster Based Anomaly Detection in Wireless LAN
- P.Kavitha , M.Usha
 IJCTT-V12P146
A Puzzle Based Client-Server Authentication Model with Secure Data Transfer
- Laxman Dande, Soppari Kavitha, Lt. K.Ravindra Babu, Akash Singh, Kiran Vanam
 IJCTT-V12P146