IJCTT-Volume 4 Iss 4 No 3 Issue 2013

 
Title/Author Name
Paper Id
 

Prevention Proposals for Threats in Internet Services

L.V.N.Durgamani, M.Nalinisri, V.Samson Devakumar 

IJCTT-V4I4P141
 

Protection Method Against Unauthorised Issues In Network-Honeypots

K.Meenakshi, M.Nalini Sri

IJCTT-V4I4P142
 

Study on Computer Numerical Simulations Calculation of Structural Wind Load

- Chunyan Ma, Xuhong Fan,Bo Su

 IJCTT-V4I4P143
 

Reducing Chain Complexity using Honey Bee Optimization in Wireless sensor network

Richa Mehta, O.S. Khanna

IJCTT-V4I4P148
 

An Automatic Detection and Assessment of Diabetic Macular Edema Along With Fovea Detection from Color Retinal Images

S.Fowjiya, Dr.M.karnan , Mr.R.Sivakumar 

IJCTT-V4I4P149
 

Neuro-Fuzzy Classification

Shwetali Hiwarkar, Jyoti Yadav, Reena Nair, Reshma Nair

IJCTT-V4I4P150
 

Data invulnerability and data integrity verification of multi cloud storage

N.Janardhan, Y.Rajasree, R .Himaja

IJCTT-V4I4P153
 

Association Technique in Data Mining and Its Applications

Harveen Buttar, Rajneet Kaur

IJCTT-V4I4P155
 

Grid Based Multipath Energy Aware Routing Protocol for WSNs

Divya Sharma , Kanika Sharma

IJCTT-V4I4P158
 
IJCTT-V4I4P160
 

A Dual Objective Scheduling Scheme for Computational Grids

V.Daya Sagar Ketaraju,Dr.M.V.L.N.Raja Rao, Dr. G.V.S.N.R.V.Prasad 

IJCTT-V4I4P161
 

Spartan 3E Synthesizable FPGA Based Floating-Point Arithmetic Unit

- Yedukondala Rao Veeranki, R. Nakkeeran

 IJCTT-V4I4P162
 

Enhancing the lifetime of LEACH Protocol using NNA for Wireless Sensor Network

Anjali Bharti, Kanika Sharma 

 IJCTT-V4I4P163
 

Mining Frequent Itemsets Using Apriori Algorithm

Jogi.Suresh, T.Ramanjaneyulu

 IJCTT-V4I4P164
 

State of the art: Compression of 3D meshes

Zeineb ABDERRAHIM, BOUHLEL Mohamed Salim

IJCTT-V4I4P165
 

A Comparative study on clustering of data using Improved K-means Algorithms

Abhilash C B, Sharana basavanagowda

IJCTT-V4I4P166
 

A Review of DFA Minimizing State Machines Using Hash-Tables

Vishal Garg, Anu

IJCTT-V4I4P167
 

Improvement in Qos using sink mobility in WSN

Chandni,Kanika Sharma

IJCTT-V4I4P168
 

Forestalling of Flooding Attacks in Wireless Ad Hoc Networks

A . Dhana Lakshmi, Dr.V Srikanth,Mr.T Pavan Kumar

IJCTT-V4I4P169
 

Network Security Using Quantum Cryptography

N.Kusuma, N.Sai Tejaswi, T.Anitha, K.V.D Kiran

IJCTT-V4I4P170