IJCTT-Volume 6 No 1 December 2013
|
Title/Author Name
|
Paper Id
|
♦
|
IJCTT-V6N1P101
|
|
♦ |
FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor - B.Vasantha Lakshmi, B.Vidheya Raju |
IJCTT-V6N1P102 |
♦ |
An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET - M. Dhivyasri , P.E. Prem , A. Nithyasri |
IJCTT-V6N1P103 |
♦ |
- Muzammil H Mohammed , Masood A Shaik |
IJCTT-V6N1P108 |
♦ |
Secured Packet Hiding Technique for Packet Jamming Attacks - Varagani Paparao , M.N.Satish Kumar |
IJCTT-V6N1P109 |
♦ |
A Modified Perceptual Constrained Spectral Weighting Technique For Speech Enhancement - Gowder Praveena Hiriyan , A.Indhumathi |
IJCTT-V6N1P110 |
♦
|
IJCTT-V6N2P111
|
|
♦ |
Advanced Accident Avoidance System for Automobiles - T.U.Anand Santhosh Kumar , J. Mrudula |
IJCTT-V6N2P112 |
♦ |
Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS - Debasis Das , U. A. Lanjewar , S. J. Sharma |
IJCTT-V6N2P113 |
♦ |
Statistical Anomaly Detection Technique for Real Time Datasets - Y.A.Siva Prasad , Dr.G.Rama Krishna |
IJCTT-V6N2P114 |
♦ |
Vertical Clustering of 3D Elliptical Helical Data - Wasantha Samarathunga , Masatoshi Seki , Hidenobu Saito , Ken Ichiryu , Yasuhiro Ohyama |
IJCTT-V6N2P115 |
♦ |
Maximizing Communication Quality with Bandwidth Guarantees in Wireless Mesh Networks - Mohammed Abdul Majeed , J.Sahithi Kavya , A.Prathap Reddy |
IJCTT-V6N2P118 |
♦ |
WiFiPos: An In/Out-Door Positioning Tool - Juan Toloza , Nelson Acosta , Carlos Kornuta |
IJCTT-V6N2P119 |
♦ |
Efficient Preprocessing and Patterns Identification Approach for Text Mining - Pattan Kalesha , M. Babu Rao ,Ch. Kavitha |
IJCTT-V6N2P120 |