S.No |
Articles |
Ref. No |
1 |
Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
- Dr. R. Lakshmi Tulasi, M.Ravikanth |
IJCTT-V1I3P103 |
5 |
Comparative Analysis of AES and RC4 Algorithms for Better Utilization
- Nidhi Singhal, J.P.S.Raina. |
IJCTT-V1I3P104 |
3 |
Design and Analysis of On-Chip Router for Network On Chip
- Ms. A.S. Kale,Prof. M.A.Gaikwad. |
IJCTT-V1I3P105 |
4 |
Evaluating Efficacy of Forward Error Correction Coding
- K.Supraja, ,A. Srinivasa Reddy, R. Lakshmi Tulasi. |
IJCTT-V1I3P106 |
5 |
Discriminative Features Selection in Text Mining Using TF-IDF Scheme
- Ms. Vaishali Bhujade, Prof. N. J. Janwe, Ms. Chhaya Meshram. |
IJCTT-V1I3P107 |
6 |
Robots with biological brain
- Ochin, Jugnu Gaur. |
IJCTT-V1I3P108 |
7 |
Comparative Analysis of Data warehouse Design Approaches from Security Perspectives
- Shashank Saroop, Manoj Kumar. |
IJCTT-V1I3P109 |
8 |
Readiness of Requirement Engineering towards Global Collaboration and Communication
- Nor Azliana Akmal Jamaludin, Shamsul Sahibuddin. |
IJCTT-V1I3P110 |
9 |
<Object Recognition using SVM-KNN based on Geometric Moment Invariant
- R.Muralidharan, Dr.C.Chandrasekar. |
IJCTT-V1I3P111 |
10 |
|
IJCTT-V1I3P113 |
11 |
By Performance Metrics Analysis of CLR & JVM– A Survey
- Mrs. Pratibha Singh, Mr.Dipesh Sharma, Mr.Sonu Agrawal. |
IJCTT-V1I3P114 |
12 |
GLIP: A Concurrency Control Protocol for Clipping Indexing
- J.RAMESH,N.SWATHI,R.LAKSHMI TULASI. |
IJCTT-V1I3P115 |
13 |
Robust and secure digital signature for image authentication over wireless Channels
- J Sravanthi, Dr. MHM Krishna Prasad. |
IJCTT-V1I3P117 |
14 |
Design of a Scheme for Secure Rouitng in Mobile Adhoc Networks
- Sesha Bhargavi Velagaleti, Dr.M.Seetha, Dr.S.Viswanadha Raju. |
IJCTT-V1I3P118 |
15 |
A Novel Implementation of Fuzzy Keyword Search over Encrypted Data in Cloud Computing
- RANJEETH KUMAR.M , D.VASUMATHI. |
IJCTT-V1I3P122 |