S.No |
Articles |
Ref. No |
1 |
Providing the Secure Data Transmission in the Network Using Open Source Packet Analyzer
- Hasina A. Razzak A. Karim , S S Handa , M V Ramana Murthy
|
IJCTT-V12P103 |
2 |
A study on the Tizen Operating System
- Geetika Vashisht, Rahul Vashisht
|
IJCTT-V12P104 |
3 |
Multi-Packet Reception Technology in Random Access Wireless Networks: A Survey
- Mr. Gagan Sachdeva, Ms. Sharvani G. S.
|
IJCTT-V12P107 |
4 |
An Approach To Understand Human Behaviour Pattern
- Mereen Thomas Vadakkel
|
IJCTT-V12P108 |
5 |
Smart City Analysis using Spatial Data and Predicting the Sustainability
- Thomas Joseph
|
IJCTT-V12P109 |
6 |
Integration of Cloud Computing and Web2.0 Collaboration Technologies in E-Learning
- Rasha Fouad AlCattan
|
IJCTT-V12P110 |
7 |
Performance Comparison of Two Streaming Data Clustering Algorithms
- Chandrakant Mahobiya, Dr. M. Kumar
|
IJCTT-V12P111 |
8 |
A Review of ZeroAccess peer-to-peer Botnet
- Ms. Cheenu
|
IJCTT-V12P112 |
9 |
Securing Medical Images by Watermarking Using DWT-DCT-SVD
- Nilesh Rathi , Ganga Holi
|
IJCTT-V12P113 |
10 |
E-Learning Quality Criteria and Aspects
- Reema Ajmera , Dinesh Kumar Dharamdasani
|
IJCTT-V12P117 |
11 |
A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks
- G.Sumalatha , N.Zareena , Ch.Gopi Raju
|
IJCTT-V12P118 |
12 |
Prevention and Detection Techniques for SQL Injection Attacks
- Kamlesh Kumar Raghuvanshi , Deen Bandhu Dixit
|
IJCTT-V12P121 |
13 |
A Comparative Study of Hidden Web Crawlers
- Sonali Gupta , Komal Kumar Bhatia
|
IJCTT-V12P122 |
14 |
Design and Development of Mobile Phone Based Healthcare System for Emergency Situation
- Rani R. Shetty , Thyagaraju GS
|
IJCTT-V12P123 |
15 |
A Study on Recognition of Handwritten Character Images
- Shri Praveenkumar Katigar
|
IJCTT-V12P124 |
16 |
A Novel Mathematical Model for (t, n)-Threshold Visual Cryptography Scheme
- B.Padhmavathi , Dr.P.Nirmal Kumar
|
IJCTT-V12P125 |
17 |
Virtualization Approaches in Cloud Computing
- K C Gouda , Anurag Patro , Dines Dwivedi , Nagaraj Bhat
|
IJCTT-V12P132 |
18 |
Intelligent Mobile System for Healthcare Based On WSN and Android
-Farah Nasri , Neila Moussa , Abdellatif Mtibaa
|
IJCTT-V12P137 |
19 |
Classification of Efficient Imputation Method for Analyzing Missing Values
- S.Kanchana , Dr. Antony Selvadoss Thanamani
|
IJCTT-V12P138 |
20 |
Classification of Devnagari Numerals using Multiple Classifier
- Shashi Kant Shukla , Akhilesh Pandey
|
IJCTT-V12P139 |
21 |
A Synonym Based Approach of Data Mining in Search Engine Optimization
- Palvi Arora , Tarun Bhalla
|
IJCTT-V12P140 |
22 |
Cluster Based Anomaly Detection in Wireless LAN
- P.Kavitha , M.Usha
|
IJCTT-V12P146 |
23 |
A Puzzle Based Client-Server Authentication Model with Secure Data Transfer
- Laxman Dande, Soppari Kavitha, Lt. K.Ravindra Babu, Akash Singh, Kiran Vanam
|
IJCTT-V12P146 |