IJCTT - Volume 49 - No 2 July 2017

  Title/Author Name Paper ID
  Survey Paper on Secure Digital Cash Payment through Coin Management

- Dr.P.Chandra Sekhar

  Dictionary Based Text Filter for Lossless Text Compression

- Rexline S. J, Robert L, Trujilla Lobo.F

  Big Data Security and Privacy- A Survey

- Mrs. Shanmugapriya. E, Dr. R.Kavitha

  Internet Filtration and Internet Neutrality

- Nand Kumar Singh

  Review Paper on Big Data Analytics in Cloud Computing

- Saneh Lata Yadav, Asha Sohal

  A Face Recognition System using Convolutional Neural Network and Generalized with Facial Expression

- C.R Vimalchand, Dr. G.P Ramesh Kumar

  A Novel Method to Monitor Threats in Cloud Computing Environment

- K.Arthi, M.Rajeev Kumar, B.Bhagyashree

  Implementation of Word Count- Hadoop Framework with Map Reduce Algorithm

- Keerthi.Bangari, Sujitha.Meduri, Ch.CY.Rao

  Agricultural Data Visualization for Prescriptive Crop Planning

- Harshitha B P, Amith R, Abhishek S, Rohit Vibhu C

  Mixed Round Robin Scheduling for Real Time Systems

- Pallab Banerjee, Biresh Kumar, Probal Banerjee

  Review of online shopping security protocol of EC: SSL and SET

- Vishakha Prabhakar Rode

  Challenges and Prosperity Research in Cloud Computing

- Niharika Singh, Ajay Jangra

  Designing Nanotechnology Based QCA Full Adders

- Wani Shah Jahan

  Genetic Algorithm Approach For Test Case Generation Randomly: A Review

- Deepak kumar, Manu Phogat

  The Technologies of Voice over Internet Protocol (VoIP) Based Telephony System: A Review

- Odii J. N., Nwokoma F.O., Onwuama T.U., Ejem A

  Vehicle Assisted Data Delivery using Ant Colony Optimization

- Ishwarpreet Kaur Grewal, Dr. Sandeep Harit

  Kinematics Analysis and Simulation of Six - DOF Industrial Robot

- Linna Xu, Zhenhua Wang, Yameng Zhai

  Bounds for the Zeros of a Lacunary Polynomial

- M.H. Gulzar, Ajaz Wani

  An Approach for Detecting and Preventing SQL Injection and Cross Site Scripting Attacks using Query sanitization with regular expression

- Monali Sachin Kawalkar, Dr. P. K. Butey

  Cloud Computing – Key Hashing Cryptographic Implication based Algorithm for Service Provider based Encryption and Decryption

- D. Ramesh, Dr. B, Rama

  Image Enhancement of Medical Images Based on an Efficient Approach of Morphological and Arithmetic Operations

- Usha Ramasamy, Perumal K

  Study of Windows based .NET ANEKA in Cloud Computing

- Bimal. VO, Sreya. PP

  A Survey on Automatic Question-answering process in Speech using Spoken term detection

- M.Mamatha, T.Bhaskar Reddy