IJCTT-Volume 6 No 2 December 2013
|
Title/Author Name
|
Paper Id
|
♦
|
|
IJCTT-V6N3P121
|
♦ |
A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting
- Rajesh R Chauhan , G S Praveen Kumar
|
IJCTT-V6N3P123 |
♦ |
Reducing Binding update in NEMO Supported PMIPV6
- S Ananthi Jebaseeli , Dr. J. Sundararajan
|
IJCTT-V6N3P124 |
♦ |
An Improved Naive Bayes Classification to Enhance Image Registration
- Mohammed Imran , M. Babu Rao , Ch. Kavitha
|
IJCTT-V6N3P125 |
♦ |
Multi-Level Association Rule Mining: A Review
- Sonia Setia , Dr. Jyoti
|
IJCTT-V6N3P127 |
♦ |
Reconstruction Models for Attractors in the Technical and Economic Processes
- E.V. Nikulchev
|
IJCTT-V6N3P128 |
♦ |
A Tree of Life Approach for Multidimensional Data
- Dr. Kavita Pabreja
|
IJCTT-V6N3P130 |
♦
|
|
IJCTT-V6N4P131
|
♦ |
Analysis on the Performance of Wireless Protocols
- A. Malathi , P. Kalai Kannan
|
IJCTT-V6N4P134 |
♦ |
A Puzzle Based Authentication Scheme for Cloud Computing
- Sulochana.V , Parimelazhagan.R
|
IJCTT-V6N4P135 |
♦ |
Plain Woven Fabric Defect Detection Based on Image Processing and Artificial Neural Networks
- Dr.G.M.Nasira , P.Banumathi
|
IJCTT-V6N4P138 |
♦ |
Anomaly Detection Based on Access Behavior and Document Rank Algorithm
- Prajwal R Thakare , K. Hanumantha Rao
|
IJCTT-V6N4P139 |
♦ |
Proactive Web Server Protocol for Complaint Assessment
- G. Vijay Kumar , Ravikumar S. Raykundaliya , Dr. P. Naga Prasad
|
IJCTT-V6N4P140 |
♦
|
|
IJCTT-V6N5P141
|
♦ |
To Improve Data Security by Using Secure Data Transmission
- Manisha Yadav
|
IJCTT-V6N5P144 |