IJCTT - Volume 59 - No 1 May 2018

  Title/Author Name Paper ID

A Framework for Electronic Services Integrationand Seamless E-Services Delivery in Nigeria Public Sector

-Oyefolahan, I.O., Ganiyu, S.O., Babakano, F. J., Zubairu, H. A., Etuk, S. O.

 IJCTT-V59P101

Effective Segmentation in Plain woven Fabric Defect Detection by using Digital Image Processing

-S.Sahaya Tamil Selvi, Dr.G.M.Nasira

 IJCTT-V59P102

Sentiment Analysis in the IT Domain an Enhanced Approach to VADER Sentiment

-Kiran Hegde, Aarush Gupta, Aparna George and Anudeep Dhonde

 IJCTT-V59P103

An Improved Asynchronous Tuberculosis Diagnosis System using Fuzzy Logic Mining Techniques

-Morgan O. Obi, Eke B.O, Asagba P.O

 IJCTT-V59P104

A Preface to Green Computing and its Issues

-Ekta Malhotra, Karishma Gulati

 IJCTT-V59P105

Associative Rule Mining in Large Datasets using Neural Network Algorithm and enhanced Apriori - Based algorithm

-Febin Issac, Yeshwant More

 IJCTT-V59P106

Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512

-Dr.B.Basaveswara Rao, Qutaiba Mumtaz Dawood, Dr.K.Gangadhara Rao

 IJCTT-V59P107

Secure Visible Light Communication by Caser Cipher and Spiral Wheel Algorithm

-Komal Kumari Agrawal , Vishal Shrivastava

 IJCTT-V59P108

A Survey of Existing Leaf Disease Techniques using Artificial Neural Network

-RakshitKhajuria, Dr.Sunanda, Mr.Siddharth Singh

 IJCTT-V59P109

Partition Based with Outlier Detection

-Saswati Bhattacharyya,RakeshK. Das,Nilutpol Sonowal,Aloron Bezbaruah, Rabinder K. Prasad

 IJCTT-V59P110

Opinion Mining on PM‟s “Man Ki Baat” using R Programming

- Himani Tyagi, Puneet Bhardwaj

 IJCTT-V59P111

 Performance and Classification Evaluation of J48 Algorithm and Kendall’s Based J48 Algorithm (KNJ48)

- N.SaravanaN, Dr.V.Gayathri

 IJCTT-V59P112

 A Survey on Access Control in Cloud Computing

- Yogita Borse, Anushka Chawathe

 IJCTT-V59P113

 An Efficient Verification of Data Integrity and Keyword Search for Multi Data Owners by Preserving Privacy in Cloud

- Jincy Easow, Prof. Jisha P Abraham

 IJCTT-V59P114

 An Efficient Integrity Model by Implementing Public Auditing in Cloud

- I. Asoon, Dr.Charles, J.P.Jayan

 IJCTT-V59P115

 A Novel user Authentication Method Based on Freehand Sketches

- P.Sukin, Dr. A.Anitha, J.P.Jayan

 IJCTT-V59P116

 Recognition of Misbehaviour Actions in Delay Tolerant Networks using Trusted Authority

- J. Dhinesh, Dr.K.Siva Sankar, J.P.Jayan

 IJCTT-V59P117

 Iot Based Evidence Collection System for Vehicle Accidents

- Jyothi, Smt.Shailaja

 IJCTT-V59P118

 Computational Performance for UWSN Protocol in Mobile Sink Data Transmission

- Shyni M.V, Dr.A.C.Subhajini, J.P.Jayan

 IJCTT-V59P119

 A Netwoking Smart Phones for Energy Efficient Routing in Disaster Recovery Networks using Teemfon

- Revathi J R, Dr. C. P. Maheswaran, Mr. J. P. Jayan

 IJCTT-V59P120
21

Network Intrusion Detection using Neural Network Based Classifiers

- Ashalata Panigrahi and Manas Ranjan Patra

 IJCTT-V59P121