|
Title/Author Name
|
Paper Id
|
? |
|
IJCTT-V4I8P141
|
? |
Applying Technology Acceptance (TAM) model to determine the acceptance of Nursing Information System (NIS) for Computer Generated Nursing Care Plan among nurses
- Nitika Sharma, Manik Gupta
|
IJCTT-V4I8P142 |
? |
An E-Commerce application for Presuming Missing Items
- Rupinderpal Kaur, Rajneet Kaur
|
IJCTT-V4I8P144 |
? |
Diagnosis for Dengue Fever Using Spatial Data Mining
- S.Clement Virgeniya , Dr.V.Palanisamy
|
IJCTT-V4I8P146 |
? |
An Efficient Response Time for Shrew Attack Protection in Mitigating Low-Rate Tcp-Targeted Attacks
- A.Swathi, Dr.R.Pugazendi
|
IJCTT-V4I8P148 |
? |
Design and VLSI Implementation of Low Voltage and Low Dropout Voltage Regulator
- G. Minni, M. Venkata Dilip Kumar
|
IJCTT-V4I8P150 |
? |
Classification Rule Discovery Using Genetic Algorithm-Based Approach
- Dr. Rahul Malhotra, Prince Jain
|
IJCTT-V4I8P158 |
? |
Emphasis and emerging trends on virtualization of cloud infrastructure with security challenges
- Jose Anand, K. Sivachandar, M. Mohamed Yaseen
|
IJCTT-V4I8P159 |
? |
Performance Comparison of Host based and Network based Anomaly Detection using Fuzzy Genetic Approach (FGA)
- Harjinder Kaur, Nivit Gill
|
IJCTT-V4I8P164 |
? |
Data structures and DBMS for CAD Systems- A review
- Mehak Sharma, Manikant Sharma
|
IJCTT-V4I8P167 |
? |
Authentication Using Hand geometry And Finger geometry biometric Techniques
- AmandeepKaur Bhatia, SupreetKaurGujral
|
IJCTT-V4I8P169 |
? |
Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis
- Rajesh Reddy Muley, Sravani Achanta, Prof.S.V.Achutha Rao
|
IJCTT-V4I8P174 |
? |
A New Framework for Cloud Computing security using Secret Sharing Algorithm over Single to Multi- Clouds
- Venkatarao Matte, L. Ravi Kumar
|
IJCTT-V4I8P178 |
? |
Data Security Threat Evaluation Using Bayesian Prioritization Method
- Sai Bharat Gatta,Vishnu Teja Gangineni, Abhilash Maddukuri
|
IJCTT-V4I8P183 |
? |
Improved VEDA and Unwanted Edge Removal approaches for License Plate Detection
- A.Sravya,P.Ramesh Babu
|
IJCTT-V4I8P185 |
? |
A Novel Homomorphic Against Intersession Coding attacks Using InterMac
- P.Sravani, D.Deewena Raju
|
IJCTT-V4I8P186 |
? |
Improved Background Matching Framework for Motion Detection
- K.Amaleswarao, G.Vijayadeep,U.Shivaji
|
IJCTT-V4I8P188 |
? |
Improved Password Authentication System against Password attacks for web Applications
- Dr.P.Pandarinath, Vaishnavi Yalamanchili
|
IJCTT-V4I8P189 |
? |
A Review: Wireless Sensor Networks and Its Application, Platforms, Standards and Tools
- K.Sarammal, R.A.Roseline
|
IJCTT-V4I8P194 |
? |
Toward Increased Discoverability of Open Educational Resources and Open Courseware
- Monica Vladoiu
|
IJCTT-V4I8P195 |
? |
A Hybrid Approach for Data Hiding using Cryptography Schemes
- Gurtaptish Kaur, Sheenam Malhotra
|
IJCTT-V4I8P196 |
? |
Web Content Mining Techniques Tools & Algorithms – A Comprehensive Study
- R.Malarvizhi, K.Saraswathi
|
IJCTT-V4I8P200 |
? |
A Security Mechanism for Video Data hiding
- Mr Sudheer Adepu, Mr P. Ashok , Dr.C.V.Guru Rao
|
IJCTT-V4I8P202 |
? |
E-mail Classification Using Genetic Algorithm with Heuristic Fitness Function
- Jitendra Nath Shrivastava, Maringanti Hima Bindu
|
IJCTT-V4I8P203 |
? |
A Comparative Study of Different TCP Variants in Networks
- Balveer Singh
|
IJCTT-V4I8P204 |