IJCTT-Volume 6  No 2 December 2013

          
Title/Author Name
Paper Id
IJCTT-V6N3P121

 A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting

- Rajesh R Chauhan , G S Praveen Kumar 

 IJCTT-V6N3P123

 Reducing Binding update in NEMO Supported PMIPV6

- S Ananthi Jebaseeli , Dr. J. Sundararajan 

 IJCTT-V6N3P124

 An Improved Naive Bayes Classification to Enhance Image Registration

Mohammed Imran , M. Babu Rao , Ch. Kavitha

 IJCTT-V6N3P125

 Multi-Level Association Rule Mining: A Review

Sonia Setia , Dr. Jyoti

IJCTT-V6N3P127

 Reconstruction Models for Attractors in the Technical and Economic Processes

E.V. Nikulchev

IJCTT-V6N3P128

 A Tree of Life Approach for Multidimensional Data

Dr. Kavita Pabreja

IJCTT-V6N3P130
IJCTT-V6N4P131

 Analysis on the Performance of Wireless Protocols

- A. Malathi , P. Kalai Kannan

 IJCTT-V6N4P134

 A Puzzle Based Authentication Scheme for Cloud Computing

Sulochana.V , Parimelazhagan.R

 IJCTT-V6N4P135

 Plain Woven Fabric Defect Detection Based on Image Processing and Artificial Neural Networks

Dr.G.M.Nasira , P.Banumathi

IJCTT-V6N4P138

 Anomaly Detection Based on Access Behavior and Document Rank Algorithm

Prajwal R Thakare , K. Hanumantha Rao

IJCTT-V6N4P139

 Proactive Web Server Protocol for Complaint Assessment

G. Vijay Kumar , Ravikumar S. Raykundaliya , Dr. P. Naga Prasad

IJCTT-V6N4P140

 Image Search Reranking

- V Rajakumar , Vipeen V Bopche

IJCTT-V6N5P141

 To Improve Data Security by Using Secure Data Transmission

- Manisha Yadav

 IJCTT-V6N5P144