|
Title/Author Name
|
Paper Id
|
? |
|
IJCTT-V4I5P1
|
? |
Entrenched Visual Cryptography using Secret Sharing Scheme with public Key
- Kode Phani Kumar, B.Veera Mallu
|
IJCTT-V4I5P5 |
? |
ROI Estimation of Data Warehouse with Bottom Up Architecture and Top Down Implementation
- Bikramjit Pal, Awanish Pati Mishra, Mallika De
|
IJCTT-V4I5P8 |
? |
Contrast Enhancement Using Bi-Histogram Equalization With Brightness Preservation
- Gowthami Rajagopal, K.Santhi
|
IJCTT-V4I5P11 |
? |
Zone Divisional Network with Double Cluster Head for effective communication in WSN
- Sandeep Verma, Kanika Sharma
|
IJCTT-V4I5P13 |
? |
Secure web mining framework for e-commerce websites
- M.Karthik , S.Swathi
|
IJCTT-V4I5P18 |
? |
An Efficient Cloud Storage with Secure Dynamic Data Modification
- K.HariPriya, P.Krishnamoorthy
|
IJCTT-V4I5P24 |
? |
Review of First Hop Redundancy Protocol and Their Functionalities
- Priyanka Dubey, Shilpi Sharma, Aabha Sachdev
|
IJCTT-V4I5P26 |
? |
Resource Provisioning Cost of Cloud Computing by Adaptive Reservation Techniques
- M.Manikandaprabhu, R.SivaSenthil
|
IJCTT-V4I5P33 |
? |
Advanced Replica-Based Data Access Prediction and Optimization Approach in Distributed Environment
- P. Sathiya, K. N. Vimal Shankar
|
IJCTT-V4I5P35 |
? |
Cryptoviral Extortion: A virus based approach
- S.Manoj Kumar, M.Ravi Kumar
|
IJCTT-V4I5P38 |
? |
Video Watermarking Using Wavelet Transformation
- Rakesh Kumar, Savita Chaudhary
|
IJCTT-V4I5P39 |
? |
|
IJCTT-V4I5P41
|
? |
A Novel Approach for Detection and Prevention of Wormhole Attack In Ad-hoc Networks
- Monika, Jyoti Thalor
|
IJCTT-V4I5P42 |
? |
Emerging Network Technologies that are Likely to Become Widely Available in the Future
- Peter K. Kemei and William P.K. Korir
|
IJCTT-V4I5P43 |
? |
Cat Swarm based Optimization of Gene Expression Data Classification
- Amit Kumar, Debahuti Mishra
|
IJCTT-V4I5P44 |
? |
Modification of Instruction Set Architecture in a UTeMRISCII Processor
- Ahmad Jamal Salim, Nur Raihana Samsudin, Sani Irwan Md Salim , Soo Yew Guan
|
IJCTT-V4I5P46 |
? |
A New Approach for Providing the Data Security and Secure Data Transfer in Cloud Computing
- Manoj Prabhakar Darsi , K.Suresh Joseph, Dr. S.K.V.Jayakumar
|
IJCTT-V4I5P47 |
? |
Reduction of Greedy Forwarding using Overlay Multicasting in Mobile Ad Hoc Networks
- G. Kiran Kumar, B.Vijaya Babu
|
IJCTT-V4I5P51 |
? |
Hybridization of Symmetric Key Encryption and Visual Cryptography
- Monika, Rakhi Soni
|
IJCTT-V4I5P52 |