International Journal of Computer
Trends and Technology
Volume 4 Issue 5
Research Article IJCTT-V4I5P1
Extraction of Persistence and Volatile Forensics Evidences from Computer System
Esan P. Panchal
Research Article IJCTT-V4I5P100
A Parametric Chain based Routing Approach for Underwater Sensor Network
Aarti, Sanjiv Kumar Tomar
Research Article IJCTT-V4I5P102
Towards Achieving Secured and Decentralized Accountability in Cloud Computing
Drishya S G , Kavitha Murugeshan
Research Article IJCTT-V4I5P11
Contrast Enhancement Using Bi-Histogram Equalization With Brightness Preservation
Gowthami Rajagopal, K.Santhi
Research Article IJCTT-V4I5P13
Zone Divisional Network with Double Cluster Head for effective communication in WSN
Sandeep Verma, Kanika Sharma
Research Article IJCTT-V4I5P18
Secure web mining framework for e-commerce websites
M.Karthik , S.Swathi
Research Article IJCTT-V4I5P24
An Efficient Cloud Storage with Secure Dynamic Data Modification
K.HariPriya, P.Krishnamoorthy
Research Article IJCTT-V4I5P26
Review of First Hop Redundancy Protocol and Their Functionalities
Priyanka Dubey, Shilpi Sharma, Aabha Sachdev
Research Article IJCTT-V4I5P33
Resource Provisioning Cost of Cloud Computing by Adaptive Reservation Techniques
M.Manikandaprabhu, R.SivaSenthil
Research Article IJCTT-V4I5P35
Advanced Replica-Based Data Access Prediction and Optimization Approach in Distributed Environment
P. Sathiya, K. N. Vimal Shankar
Research Article IJCTT-V4I5P38
Cryptoviral Extortion: A virus based approach
S.Manoj Kumar, M.Ravi Kumar
Research Article IJCTT-V4I5P39
Video Watermarking Using Wavelet Transformation
Rakesh Kumar, Savita Chaudhary
Research Article IJCTT-V4I5P41
Methodological approach for Face Recognition Using Artificial Neural Networks
K. Shirisha, S. Vijaya Lakshmi, N. Musrat Sultana
Research Article IJCTT-V4I5P42
A Novel Approach for Detection and Prevention of Wormhole Attack In Ad-hoc Networks
Monika, Jyoti Thalor
Research Article IJCTT-V4I5P43
Emerging Network Technologies that are Likely to Become Widely Available in the Future
Peter K. Kemei and William P.K. Korir
Research Article IJCTT-V4I5P44
Cat Swarm based Optimization of Gene Expression Data Classification
Amit Kumar, Debahuti Mishra
Research Article IJCTT-V4I5P46
Modification of Instruction Set Architecture in a UTeMRISCII Processor
Ahmad Jamal Salim, Nur Raihana Samsudin, Sani Irwan Md Salim , Soo Yew Guan
Research Article IJCTT-V4I5P47
A New Approach for Providing the Data Security and Secure Data Transfer in Cloud Computing
Manoj Prabhakar Darsi , K.Suresh Joseph, Dr. S.K.V.Jayakumar
Research Article IJCTT-V4I5P5
Entrenched Visual Cryptography using Secret Sharing Scheme with public Key
Kode Phani Kumar, B.VeeraMallu A
Research Article IJCTT-V4I5P51
Reduction of Greedy Forwarding using Overlay Multicasting in Mobile Ad Hoc Networks
G. Kiran Kumar, B.Vijaya Babu
Research Article IJCTT-V4I5P52
Hybridization of Symmetric Key Encryption and Visual Cryptography
Monika, Rakhi Soni
Research Article IJCTT-V4I5P55
Image segmentation using K-mean clustering for finding tumor in medical application
Piyush M. Patel, Brijesh N Shah, Vandana Shah
Research Article IJCTT-V4I5P57
Challenges and issues in 4G – Networks Mobility Management
Payaswini P, Manjaiah D.H
Research Article IJCTT-V4I5P58
Comparative analysis of Speech Compression on 8-bit and 16-bit data using different wavelets
Vini Malik, Pranjal Singh Atul kumar Singh, Monika Singh
Research Article IJCTT-V4I5P61
An Efficient Interaction Pattern Discovery For Human Meetings
A.Nandha Kumar, N.Baskar
Research Article IJCTT-V4I5P62
Artificial Bee based Optimized Fuzzy c-Means Clustering of Gene Expression Data
Punam Priti Pradhan, Debahuti Mishra, Sashikala Mishra and Kailash Shaw
Research Article IJCTT-V4I5P63
Chain Clustered Communication Protocol for WSN
Swati Sharma, Dr. Pradeep Mittal
Research Article IJCTT-V4I5P64
Mobile Location-Based Tour guide System
Swati Sharma, Dr. Pradeep Mittal
Research Article IJCTT-V4I5P65
An Efficient Approach For Integrating Data Mining Into Cloud Computing
N. Janardhan, T. Sree Pravallika, Sowjanya Gorantla
Research Article IJCTT-V4I5P66
TJ-ACA: An Advanced Cryptographic Algorithm for Color Images using Ikeda Mapping
Taranjit Kaur, Reecha Sharma
Research Article IJCTT-V4I5P67
Analysis of Different Techniques for Finger-Vein Feature Extraction
Iram Malik, Rohini Sharma
Research Article IJCTT-V4I5P68
Reviewing Effectiveness of CAPTCHA
Ms. Priyanka, Ms.Harleen Kaur, Mr.Dileep Kumar Kushwaha
Research Article IJCTT-V4I5P69
Assuring Data Sharing and Culpability as a Service in Cloud
A Sreekanth, Sri K Ishthaq Ahamed
Research Article IJCTT-V4I5P70
Development of an Iris-Based Access Control System Using a Two-Level Segmentation Approach
Falohun A. S, Omidiora E.O, Fakolujo A.O, dOjo.J.A
Research Article IJCTT-V4I5P72
Implementation Opass Authentication Protocol System for net Security
P.Shanmukha kumar, Sri. k.Ishthaq Ahamed
Research Article IJCTT-V4I5P73
Fusion of CT and MRI images using Discrete Multiwavelet Transform
Kusum Rani,Reecha Sharma
Research Article IJCTT-V4I5P74
Wireless LAN Security: Addressing Challenges, Attacks and Solutions
Gurpreet Kaur, Kirandeep Kaur
Research Article IJCTT-V4I5P75
An Integrated Research Analysis of Cloud Forensics for Secured Computing Environment
N.Jaswanth,J.Durga
Research Article IJCTT-V4I5P76
Slicing Technique For Privacy Preserving Data Publishing
D. Mohanapriya , Dr. T.Meyyappan
Research Article IJCTT-V4I5P77
Estimation of Arterial Stiffness by using PPG Signal: A Review
Sanjeev kumar, Dr. S.C. Prasanna kumar, Dr.B.G. Sudharshan
Research Article IJCTT-V4I5P78
Seasonal Time Series and Transfer Function Modelling for Natural Rubber Forecasting in India
P. Arumugam, V. Anithakumari
Research Article IJCTT-V4I5P80
Semi Supervised Color Image Segmentation Using Region Based Method
M.MargretRubini, Dr.P.Eswaran
Research Article IJCTT-V4I5P83
Biomedical Image Registration Using Fuzzy Logic
Himadri Nath Moulick, Anindita Chatterjee
Research Article IJCTT-V4I5P84
Automatic fingerprint Identification Using Minutiae Matching
S.Mousmi, Dr.T.Meyappan
Research Article IJCTT-V4I5P87
Mental Stress and its Implications on Reaction time
Apoorvagiri, Nagananda M S
Research Article IJCTT-V4I5P93
Differential thresh holding algorithm for edge detection in noisy environment
Amir A Khaliq, I M Qureshi
Research Article IJCTT-V4I5P98
Client Puzzle Approach for Improving Confidentiality
Ms. Sapna, S. Khapre, Prof. Shrikant Ardhapurkar
Research Article IJCTT-V4I5P99
General Framework for Biomedical Knowledge With Data Mining Techniques
B.Madasamy, Dr.J.Jebamalar Tamilselvi