S.No | Articles | Ref. No |
1 |
- Dr. Atul M. Gonsai , Lakshadeep M. Raval |
IJCTT-V11P102 |
2 |
Secure and Reliable Watermarking in Relational Databases - G.Shyamala , I.Jasmine Selvakumari Jeya , M.Revathi |
IJCTT-V11P103 |
3 |
Efficient Anonymous Routing Protocols in Manets: A Survey - Jojy Saramma John , R.Rajesh |
IJCTT-V11P105 |
4 |
- R.Ramya |
IJCTT-V11P107 |
5 |
Detection of Calcification Using Filter in Mammograms – A Survey - C.Kaviya Prabha , S.Usha |
IJCTT-V11P109 |
6 |
A Survey of Coverage-Based Broadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks - V.V.V. Pradeep Sastry , Dr S.Arvind |
IJCTT-V11P111 |
7 |
A Meta-heuristic Approach for Image Segmentation using Firefly Algorithm - Bhavana Vishwakarma , Amit Yerpude |
IJCTT-V11P115 |
8 |
Classification of Basmati Rice Grain Variety using Image Processing and Principal Component Analysis - Rubi Kambo , Amit Yerpude |
IJCTT-V11P117 |
9 |
Prognosis of Diabetes Using Data mining Approach-Fuzzy C Means Clustering and Support Vector Machine - Ravi Sanakal , Smt. T Jayakumari |
IJCTT-V11P120 |
10 |
Handwritten Nastaleeq Script Recognition with BLSTM-CTC and ANFIS method - Rinku Patel , Mitesh Thakkar |
IJCTT-V11P128 |
11 |
A Review of Multi-Protocol Label Switching: Protocol for Traffic Engineering on Internet - Isha Mangal , Deepali Bajaj |
IJCTT-V11P129 |
12 |
Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm - Monika Gunjal , Jasmine Jha |
IJCTT-V11P131 |
13 |
Improvement on LEACH: Seeded LEACH-KED - Preeti Sharma , Pankaj Kumar Verma , Surender Singh |
IJCTT-V11P132 |
14 |
Pre-processing of ECG Signals Using Filters - Isha V Upganlawar , Harshal Chowhan |
IJCTT-V11P135 |
15 |
VirtuMob : Remote Display Virtualization Solution For Smartphones - M H Soorajprasad , Balapradeep K N , Dr. Antony P J |
IJCTT-V11P136 |
16 |
Energy Efficiency in Cloud Data Centers Using Load Balancing - Ankita Sharma , Upinder Pal Singh |
IJCTT-V11P137 |
17 |
Clinical Decision Support System in HealthCare Industry Success and Risk Factors - Abdullah AL-Malaise AL-Gamdi , Khulood Salem Albeladi , Rasha Fouad AlCattan |
IJCTT-V11P140 |
18 |
Attribute Based User Control Access for Cloud Storage Data - Satheesh Kavuri , GangadharaRao Kancharla , Basaveswara Rao Bobba |
IJCTT-V11P141 |
19 |
Zigbee-Based Smart Ordering System (S.O.S) - Asan N. Badariah , Nordin N. Azreena , Shariff Zulkifli |
IJCTT-V11P144 |
20 |
Techniques Used for Detection of Mobile Spyware - Neelam Kaur |
IJCTT-V11P146 |
21 |
- Shikha Pandit , Pooja |
IJCTT-V11P148 |
22 |
Unsupervised Opinion Mining From Text Reviews Using SentiWordNet - Vibha Soni , Meenakshi R Patel |
IJCTT-V11P150 |
23 |
- Aborisade.D.O , Ojo.J. A , Amole.A.O , Durodola A.O |
IJCTT-V11P151 |
24 |
Electric Load Forecasting using a Neural Network Approach - Vinutha H D , K C Gouda , Chandan K N |
IJCTT-V11P152 |