S.No Articles Ref. No
 1

Providing the Secure Data Transmission in the Network Using Open Source Packet Analyzer

- Hasina A. Razzak A. Karim , S S Handa , M V Ramana Murthy

 IJCTT-V12P103
 2

A study on the Tizen Operating System

- Geetika Vashisht, Rahul Vashisht

 IJCTT-V12P104
 3

Multi-Packet Reception Technology in Random Access Wireless Networks: A Survey

- Mr. Gagan Sachdeva, Ms. Sharvani G. S.

 IJCTT-V12P107
 4

An Approach To Understand Human Behaviour Pattern

- Mereen Thomas Vadakkel

 IJCTT-V12P108
 5

Smart City Analysis using Spatial Data and Predicting the Sustainability

- Thomas Joseph

 IJCTT-V12P109
 6

Integration of Cloud Computing and Web2.0 Collaboration Technologies in E-Learning

- Rasha Fouad AlCattan

 IJCTT-V12P110
 7

Performance Comparison of Two Streaming Data Clustering Algorithms

- Chandrakant Mahobiya, Dr. M. Kumar

 IJCTT-V12P111
 8

A Review of ZeroAccess peer-to-peer Botnet

- Ms. Cheenu

 IJCTT-V12P112
 9

Securing Medical Images by Watermarking Using DWT-DCT-SVD

- Nilesh Rathi , Ganga Holi

 IJCTT-V12P113
 10

E-Learning Quality Criteria and Aspects

- Reema Ajmera , Dinesh Kumar Dharamdasani

 IJCTT-V12P117
 11

A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks

- G.Sumalatha , N.Zareena , Ch.Gopi Raju

 IJCTT-V12P118
12

Prevention and Detection Techniques for SQL Injection Attacks

- Kamlesh Kumar Raghuvanshi , Deen Bandhu Dixit

 IJCTT-V12P121
 13

A Comparative Study of Hidden Web Crawlers

- Sonali Gupta , Komal Kumar Bhatia

 IJCTT-V12P122
 14

Design and Development of Mobile Phone Based Healthcare System for Emergency Situation

- Rani R. Shetty , Thyagaraju GS

 IJCTT-V12P123
 15

A Study on Recognition of Handwritten Character Images

- Shri Praveenkumar Katigar

 IJCTT-V12P124
16

A Novel Mathematical Model for (t, n)-Threshold Visual Cryptography Scheme

- B.Padhmavathi , Dr.P.Nirmal Kumar

 IJCTT-V12P125
17

Virtualization Approaches in Cloud Computing

- K C Gouda , Anurag Patro , Dines Dwivedi , Nagaraj Bhat

 IJCTT-V12P132
18

Intelligent Mobile System for Healthcare Based On WSN and Android

-Farah Nasri , Neila Moussa , Abdellatif Mtibaa

 IJCTT-V12P137
19

Classification of Efficient Imputation Method for Analyzing Missing Values

- S.Kanchana , Dr. Antony Selvadoss Thanamani

 IJCTT-V12P138
20

Classification of Devnagari Numerals using Multiple Classifier

- Shashi Kant Shukla , Akhilesh Pandey

 IJCTT-V12P139
21

A Synonym Based Approach of Data Mining in Search Engine Optimization

- Palvi Arora , Tarun Bhalla

 IJCTT-V12P140
22

Cluster Based Anomaly Detection in Wireless LAN

- P.Kavitha , M.Usha

 IJCTT-V12P146
23

A Puzzle Based Client-Server Authentication Model with Secure Data Transfer

- Laxman Dande, Soppari Kavitha, Lt. K.Ravindra Babu, Akash Singh, Kiran Vanam

 IJCTT-V12P146