S.No Articles Ref. No
 1

Face Recognition Using Neural Network and Eigenvalues With Distinct Block Processing

-Amit Kumar, Prashant Sharma, Shishir Kumar.

IJCTT-V1I1P02
 2

Algorithm for Intelligent Network Visualization and Threat Analysis

-Amit Kumar, Prashant Sharma, Dr. Shishir Kumar.

 IJCTT-V1I1P03
 3

Impacts of E-Content

-K.Duraisamy, R.Surendiran.

IJCTT-V1I1P08
 4

A Conceptual Framework For Extending Distance Measure Algorithm For Data Clustering

-A.M. Bagiwa, S.I. Dishing.

IJCTT-V1I1P10
 5

Handwritten Signature Verification using Instance Based Learning 

-Priya Metri , Ashwinder Kaur

IJCTT-V1I1P12
 6

Application software for graphical interface Online theatre booking system

-Awodele Oludele, Omole Grace, Fashola Kofoworola, Oni Oladipupo.

IJCTT-V1I1P14
 7

Multiple Unit GSM Controlled Devices

-Oludele Awodele, Beersheba .A Ologure, Aaron .A Izang, Ademola Adams.

IJCTT-V1I1P15
 8

Adaptive E-learning System: A Review

-Subrat Roy, Devshri Roy.

 IJCTT-V1I1P19
 9

A Cost-efficient Approach for Dynamic and Geographically-diverse Replication of Components in Cloud Computing

-N.Pughazendi, C.Bhanu prakash.

 IJCTT-V1I1P20
 10

Limitations of Practical Quantum Cryptography

- Vibha Ojha, Anand Sharma, Vishal Goar, Prakriti Trivedi.

IJCTT-V1I1P22
 11

An Intelligent Architecture for Multi-Agent Based M-Health Care System

- Mayuri Gund, Snehal Andhalkar, Prof. Dipti Patil, Dr. V.M.Wadhaii.

IJCTT-V1I1P26
 12

An Entropy Decision Model for Selection of Enterprise Resource Planning System

-Ming-Chang Lee, Jui-Fang Chang, Jung-Fang Chen.

IJCTT-V1I1P27
 13

Web Services Security Architectures for Secure Service Oriented Analysis and Design

- D.Shravani, Dr.P.Suresh Varma, Dr.B.Padmaja Rani, K.Venkateswar Rao, M.Upendra Kumar.

IJCTT-V1I1P29