IJCTT - Volume 35 - No 1 May 2016
|
Title/Author Name |
Paper ID |
♦ |
Queue Control Model in a Clustered Computer Network using M/M/m Approach - Ejem A., Njoku C. N., Uzoh O. F., Odii J. N. |
IJCTT-V35P103 |
♦ |
The Code Sanitizer: Regular Expression Based Prevention of Content Injection Attacks - Sandeep D Sukhdeve, Prof.(Mrs) Hemlata Channe |
IJCTT-V35P104 |
♦ |
Review on Meta Classification Algorithms using WEKA - Rausheen Bal, Sangeeta Sharma |
IJCTT-V35P107 |
♦ |
GUARDIA- A One Stop Safety Solution - Shilpa Khedkar, Kiran Chandrasekaran, Tauseef Malik, Manish Poduval |
IJCTT-V35P109 |
♦ |
Implementation of Multiagent Learning Algorithms for Improved Decision Making - Deepak A. Vidhate, Dr. Parag Kulkarni |
IJCTT-V35P111 |
♦ |
Control Statement in C Language - Suresh Kumar, R.B.S. Yadav |
IJCTT-V35P112 |
♦ |
Artificial Intelligence Enabled Detection in Bio Medics - Dr. S.Masood Ahamed |
IJCTT-V35P114 |
♦ |
Reachability in Telemedicine: Concepts, Design and Engineering - C. P. E. Agbachi, V. Yemi-Peters |
IJCTT-V35P115 |
♦ |
GSM Based Automatic Monitoring System for Efficient Power Management - R. Rubananth, Saravanan Selvaraj |
IJCTT-V35P116 |
♦ |
Spread of Malware within an E-Commerce Network with Quarantine: A Dynamic Model - Biswarup Samanta, Samir Kumar Pandey |
IJCTT-V35P124 |
♦ |
License Number Plate Recognition using Template Matching - Nighat Naaz Ansari, Ajay Kumar Singh |
IJCTT-V35P133 |
♦ |
Performance Analysis of AES and DES Cryptographic Algorithms on Windows & Ubuntu using Java - Shraddha Dadhich |
IJCTT-V35P134 |
♦ |
Study and reviews of smart city based tourism mobile app - Kanak Divya |
IJCTT-V35P144 |
♦ |
Mobile Health Technology Program And Its Cost Effectiveness In Improving Health Service Delivery In Nigeria: A Study Of Dutse Local Government Jigawa, Nigeria - Nasiru Sani, Haruna Isa Hussain, Suleiman Hussaini |
IJCTT-V35P147 |