S.No
Articles
Paper Id
1

Security Solution for WSN Using Mobile Agent Technology 6

- Ashish Kumar Srivastava , Aditya Goel.

IJCTT-V2I1P101
2

A Routing-Driven Public-Key Cryptosystem Based Key Management Scheme for a Sensor Network

- Satya Venkatesh Kadali, O.Srinivasa Rao, Dr MHM Krishna Prasad. 

 IJCTT-V2I1P103
3

Computer Assisted Instruction For Teaching/Learning Process And Its Effects On Students’Performance In Tertiary Institutions  

-  Ismail O. Muraina,Imran A.Adeleke, Mukaila A.Rahman 

 IJCTT-V2I1P104
4

Credit Card Fraud Detection Analysis

-  J. Keziya Rani,S.Prem Kumar,U.Ram Mohan, C.Uma Shankar.

IJCTT-V2I1P106
5

A Study on Conduct of Teams in an It and a BPO Company  

-  S.Nirmala, S.Deborah Sharon .

IJCTT-V2I1P112
6

An IP Trace back System to Find the Real Source of Attacks  

-  A.Parvathi and G.L.N.JayaPradha.

IJCTT-V2I1P113
7

Dependency grammar feature based noun phrase extraction for text summarization.  

-  Mrs. Dipti Sakhare,Dr. Rajkumar.

IJCTT-V2I1P114
8

Low Power testing by don’t care bit filling technique  

-  Chetan Sharma .

IJCTT-V2I1P115
9

Design and Development of a Secured Routing Scheme for Mobile Ad hoc Networks (MANETs)  

-  Payal Kansal, Viksit Kumar Sharma, Shashiraj Teotia, Dr. Sohan Garg.

IJCTT-V2I1P118
10

A QOS-Aware Software Selection Method Based On Service Credibility Evaluation  

-  U.Sadhana Reddy, M.Y.Babu.

IJCTT-V2I1P121
11

Removal of High Density Salt & Pepper Noise in Noisy Images Using Decision Based UnSymmetric Trimmed Median Filter (DBUTM)  

-  Dodda Shekar, Rangu Srikanth.

IJCTT-V2I1P122