International Journal of Computer
Trends and Technology
Volume 13 Number 1
Research Article IJCTT-V13P103
A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)
Olabenjo Babatunde , Omar Al-Debagy
Research Article IJCTT-V13P105
Intrusion Detection Based On Fuzzy Logic Approach Using Simplified Swarm Optimization
S. Revathi , Dr. A. Malathi
Research Article IJCTT-V13P110
The Study of Various Code Coverage Tools
Sneha Shelke , Sangeeta Nagpure
Research Article IJCTT-V13P112
An Land Cover Fuzzy Logic Classification By Maximumlikelihood
T.Sarath , G.Nagalakshmi
Research Article IJCTT-V13P113
Fungus/Disease Analysis in Tomato Crop using Image Processing Techniques
Shruti , Nidhi Seth
Research Article IJCTT-V13P116
A Fuzzy Differential Evolution Algorithm for Job Scheduling on Computational Grids
Ch.Srinivasa Rao , Dr.B.Raveendra Babu
Research Article IJCTT-V13P117
Performance Comparison of Data Mining Algorithms: A Case Study on Car Evaluation Dataset
Jamilu Awwalu , Anahita Ghazvini , Azuraliza Abu Bakar
Research Article IJCTT-V13P118
Audio Steganography by Direct Sequence Spread Spectrum
Rupanshi , Preeti , Vandana
Research Article IJCTT-V13P121
Energy-Aware Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks
Priya Gopi
Research Article IJCTT-V13P124
Assessment of Response Time for New Multi Level Feedback Queue Scheduler
M.V. Panduranga Rao , K.C. Shet
Research Article IJCTT-V13P128
Web Crawler: Extracting the Web Data
Mini Singh Ahuja , Dr Jatinder Singh Bal , Varnica
Research Article IJCTT-V13P129
Secured Health Monitoring System in Mobile Cloud Computing
Mohammed Azhar , Maddikunta Laxman
Research Article IJCTT-V13P130
Vendor Lock-In Winds Relocation to Meta Cloud
Ganapathi Bhargavi , S. Anitha
Research Article IJCTT-V13P135
Vulnerabilities and Defensive Mechanism of CSRF
Purnima Khurana , Purnima Bindal
Research Article IJCTT-V13P136
A Proposed Framework for Development of a Visualizer Based on Memory Transfer Language (MTL)
Ally S. Nyamawe
Research Article IJCTT-V13P137
Computing the Solution of the Hartree Equation with Repulsive Harmonic Potential
Liming Fu