IJCTT - Volume 59 - No 1 May 2018

  Title/Author Name Paper ID

A Framework for Electronic Services Integrationand Seamless E-Services Delivery in Nigeria Public Sector

-Oyefolahan, I.O., Ganiyu, S.O., Babakano, F. J., Zubairu, H. A., Etuk, S. O.


Effective Segmentation in Plain woven Fabric Defect Detection by using Digital Image Processing

-S.Sahaya Tamil Selvi, Dr.G.M.Nasira


Sentiment Analysis in the IT Domain an Enhanced Approach to VADER Sentiment

-Kiran Hegde, Aarush Gupta, Aparna George and Anudeep Dhonde


An Improved Asynchronous Tuberculosis Diagnosis System using Fuzzy Logic Mining Techniques

-Morgan O. Obi, Eke B.O, Asagba P.O


A Preface to Green Computing and its Issues

-Ekta Malhotra, Karishma Gulati


Associative Rule Mining in Large Datasets using Neural Network Algorithm and enhanced Apriori - Based algorithm

-Febin Issac, Yeshwant More


Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512

-Dr.B.Basaveswara Rao, Qutaiba Mumtaz Dawood, Dr.K.Gangadhara Rao


Secure Visible Light Communication by Caser Cipher and Spiral Wheel Algorithm

-Komal Kumari Agrawal , Vishal Shrivastava


A Survey of Existing Leaf Disease Techniques using Artificial Neural Network

-RakshitKhajuria, Dr.Sunanda, Mr.Siddharth Singh


Partition Based with Outlier Detection

-Saswati Bhattacharyya,RakeshK. Das,Nilutpol Sonowal,Aloron Bezbaruah, Rabinder K. Prasad


Opinion Mining on PM‟s “Man Ki Baat” using R Programming

- Himani Tyagi, Puneet Bhardwaj


 Performance and Classification Evaluation of J48 Algorithm and Kendall’s Based J48 Algorithm (KNJ48)

- N.SaravanaN, Dr.V.Gayathri


 A Survey on Access Control in Cloud Computing

- Yogita Borse, Anushka Chawathe


 An Efficient Verification of Data Integrity and Keyword Search for Multi Data Owners by Preserving Privacy in Cloud

- Jincy Easow, Prof. Jisha P Abraham


 An Efficient Integrity Model by Implementing Public Auditing in Cloud

- I. Asoon, Dr.Charles, J.P.Jayan


 A Novel user Authentication Method Based on Freehand Sketches

- P.Sukin, Dr. A.Anitha, J.P.Jayan


 Recognition of Misbehaviour Actions in Delay Tolerant Networks using Trusted Authority

- J. Dhinesh, Dr.K.Siva Sankar, J.P.Jayan


 Iot Based Evidence Collection System for Vehicle Accidents

- Jyothi, Smt.Shailaja


 Computational Performance for UWSN Protocol in Mobile Sink Data Transmission

- Shyni M.V, Dr.A.C.Subhajini, J.P.Jayan


 A Netwoking Smart Phones for Energy Efficient Routing in Disaster Recovery Networks using Teemfon

- Revathi J R, Dr. C. P. Maheswaran, Mr. J. P. Jayan


Network Intrusion Detection using Neural Network Based Classifiers

- Ashalata Panigrahi and Manas Ranjan Patra