IJCTT - Volume 49 - No 2 July 2017

  Title/Author Name Paper ID
  Survey Paper on Secure Digital Cash Payment through Coin Management

- Dr.P.Chandra Sekhar

 IJCTT-V49P121
  Dictionary Based Text Filter for Lossless Text Compression

- Rexline S. J, Robert L, Trujilla Lobo.F

 IJCTT-V49P122
  Big Data Security and Privacy- A Survey

- Mrs. Shanmugapriya. E, Dr. R.Kavitha

 IJCTT-V49P123
  Internet Filtration and Internet Neutrality

- Nand Kumar Singh

 IJCTT-V49P124
  Review Paper on Big Data Analytics in Cloud Computing

- Saneh Lata Yadav, Asha Sohal

 IJCTT-V49P125
  A Face Recognition System using Convolutional Neural Network and Generalized with Facial Expression

- C.R Vimalchand, Dr. G.P Ramesh Kumar

 IJCTT-V49P126
  A Novel Method to Monitor Threats in Cloud Computing Environment

- K.Arthi, M.Rajeev Kumar, B.Bhagyashree

 IJCTT-V49P127
  Implementation of Word Count- Hadoop Framework with Map Reduce Algorithm

- Keerthi.Bangari, Sujitha.Meduri, Ch.CY.Rao

 IJCTT-V49P128
  Agricultural Data Visualization for Prescriptive Crop Planning

- Harshitha B P, Amith R, Abhishek S, Rohit Vibhu C

 IJCTT-V49P129
  Mixed Round Robin Scheduling for Real Time Systems

- Pallab Banerjee, Biresh Kumar, Probal Banerjee

 IJCTT-V49P130
  Review of online shopping security protocol of EC: SSL and SET

- Vishakha Prabhakar Rode

 IJCTT-V49P131
  Challenges and Prosperity Research in Cloud Computing

- Niharika Singh, Ajay Jangra

 IJCTT-V49P132
  Designing Nanotechnology Based QCA Full Adders

- Wani Shah Jahan

 IJCTT-V49P133
  Genetic Algorithm Approach For Test Case Generation Randomly: A Review

- Deepak kumar, Manu Phogat

 IJCTT-V49P134
  The Technologies of Voice over Internet Protocol (VoIP) Based Telephony System: A Review

- Odii J. N., Nwokoma F.O., Onwuama T.U., Ejem A

 IJCTT-V49P135
  Vehicle Assisted Data Delivery using Ant Colony Optimization

- Ishwarpreet Kaur Grewal, Dr. Sandeep Harit

 IJCTT-V49P136
  Kinematics Analysis and Simulation of Six - DOF Industrial Robot

- Linna Xu, Zhenhua Wang, Yameng Zhai

 IJCTT-V49P137
  Bounds for the Zeros of a Lacunary Polynomial

- M.H. Gulzar, Ajaz Wani

 IJCTT-V49P138
  An Approach for Detecting and Preventing SQL Injection and Cross Site Scripting Attacks using Query sanitization with regular expression

- Monali Sachin Kawalkar, Dr. P. K. Butey

 IJCTT-V49P139
  Cloud Computing – Key Hashing Cryptographic Implication based Algorithm for Service Provider based Encryption and Decryption

- D. Ramesh, Dr. B, Rama

 IJCTT-V49P140
  Image Enhancement of Medical Images Based on an Efficient Approach of Morphological and Arithmetic Operations

- Usha Ramasamy, Perumal K

 IJCTT-V49P141
  Study of Windows based .NET ANEKA in Cloud Computing

- Bimal. VO, Sreya. PP

 IJCTT-V49P142
  A Survey on Automatic Question-answering process in Speech using Spoken term detection

- M.Mamatha, T.Bhaskar Reddy

 IJCTT-V49P143