S.No | Articles | Ref. No |
1 |
MCA Learning Algorithm for Incident Signals Estimation:A Review - Rashid Ahmed , John A. Avaritsiotis |
IJCTT-V8P102 |
2 |
A Survey On Semi-Supervised Learning Techniques - V. Jothi Prakash , Dr. L.M. Nithya |
IJCTT-V8P105 |
3 |
Survey on Sparse Coded Features for Content Based Face Image Retrieval - D. JohnVictor , G. Selvavinayagam |
IJCTT-V8P106 |
4 |
A Review on Impersonation Attack in Mobile Ad-Hoc Network - Nidhi Gour ,Monika Agarwal ,Heena Singh ,Ajay Kumar |
IJCTT-V8P107 |
5 |
- Omar S.Soliman , Eman AboElhamd |
IJCTT-V8P108 |
6 |
- Omar S. Soliman , Elshimaa A. R. Elgendi |
IJCTT-V8P111 |
7 |
- M.Dharani , T.Menaka , G.Vinodhini |
IJCTT-V8P112 |
8 |
Affective Embedded Systems: a Requirement Engineering Approach - Millys F. A. Carvalhaes, Adson F. da Rocha, Marcus Fraga Vieira and Talles Marcelo G. de A. Barbosa |
IJCTT-V8P113 |
9 |
Block Motion Based Dynamic Texture Analysis: A Review - Akhlaqur Rahman , Sumaira Tasnim |
IJCTT-V8P114 |
10 |
A Study on Educational Data Mining - Smitha Harikumar |
IJCTT-V8P117 |
11 |
Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security - Tejashree Paigude , Prof. T. A. Chavan |
IJCTT-V8P118 |
12 |
Hadoop Mapreduce Framework in Big Data Analytics - Vidyullatha Pellakuri , Dr.D. Rajeswara Rao |
IJCTT-V8P121 |
13 |
Survey on Security Issues and Solutions in Cloud Computing - D.Gnanavelu , Dr. G.Gunasekaran |
IJCTT-V8P123 |
14 |
Securing ATM Using Graphical Password Authentication Scheme - Sonia Rathi , Raunak Chitnis , Ramakant Yadav , Mrs. M.V.Bhosle |
IJCTT-V8P125 |
15 |
Implementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept - Atul S. Chaudhari , Dr. Girish K. Patnaik , Sandip S. Patil |
IJCTT-V8P133 |