S.No |
Articles |
Ref. No |
1 |
Clustering Subspace for High Dimensional Categorical Data Using Neuro-Fuzzy Classification
-Ms. K.Karunambiga , Mrs. M.Suganya.
|
IJCTT-V5N1P103 |
2 |
User- And Query-Conditional Ranking for Web Databases
-Mrs.D.Kalyani , Mrs. M.Suganya.
|
IJCTT-V5N1P104 |
3 |
Ranking Based Approach to Maximize Utility of Recommender Systems
-S.Ganesh Kumar , P.Hari Krishna.
|
IJCTT-V5N1P106 |
4 |
Shamir Secret Sharing Based Authentication Method with Data Repair Capability for Gray Scale Document Images via the Use of PNG Image
-Nagababu Manne , K.J.Silva Lorraine.
|
IJCTT-V5N1P108 |
5 |
A Selfishness Aware Neighbor Coverage Based Probabilistic Rebroadcast Protocol for Manets
-Deepthi Sivaraj.
|
IJCTT-V5N1P109 |
6
|
|
IJCTT-V5N2P111
|
7 |
Robust & Efficient Power Management Technique for MIMO Network Interfaces
-Sasi Manchala , K.J.Silva Lorraine
|
IJCTT-V5N2P113 |
8 |
Deployment and Evaluation of a Multi-Hop Wireless Network
-Fakrulradzi Idris , Norlezah Hashim
|
IJCTT-V5N2P115 |
9 |
Improved Clustering and Naïve Bayesian based Binary Decision tree with Bagging Approach
-Medeswara Rao, Sudhir Tirumalasetty
|
IJCTT-V5N2P116 |
10 |
Network Packet Jamming Detection and Prevention Using Hiding Method
-M.VamsiKrishna , R.Sudhakishore
|
IJCTT-V5N2P117 |
11
|
|
IJCTT-V5N3P121
|
12 |
End-To-End Trust Based Transmission Optimization in Smartgrid Network Architecture
-M.Ramasaravanan , M.Kirithikadevi
|
IJCTT-V5N3P124 |
13 |
An Optimization Technique for Image Watermarking Scheme
-S.Veeramani , Y.Rakesh
|
IJCTT-V5N3P126 |
14 |
A Review on Reconstruction Based Techniques for Privacy Preservation of Critical Data
-Keyur Dodiya , Shruti Yagnik
|
IJCTT-V5N3P127 |
15 |
Enhancing File Security by Rijndael Algorithm Using Combination of Other New Generation Security Algorithms
-Anshu Dixit , Ashish Kumar Jain
|
IJCTT-V5N3P128 |
16 |
Analysis of Energy Aware Data Center using Green Cloud Simulator in Cloud Computing
-Beant Singh Gill , Satinderjit kaur Gill , Prince Jain
|
IJCTT-V3P129 |