S.No | Articles | Ref. No |
1
|
IJCTT-V6N1P101
|
|
2 |
FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor -B.Vasantha Lakshmi, B.Vidheya Raju |
IJCTT-V6N1P102 |
3 |
An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET -M. Dhivyasri , P.E. Prem , A. Nithyasri |
IJCTT-V6N1P103 |
4 |
-Muzammil H Mohammed , Masood A Shaik |
IJCTT-V6N1P108 |
5 |
Secured Packet Hiding Technique for Packet Jamming Attacks -Varagani Paparao , M.N.Satish Kumar |
IJCTT-V6N1P109 |
6 |
A Modified Perceptual Constrained Spectral Weighting Technique For Speech Enhancement -Gowder Praveena Hiriyan , A.Indhumathi |
IJCTT-V6N1P110 |
7
|
IJCTT-V6N2P111
|
|
8 |
Advanced Accident Avoidance System for Automobiles -T.U.Anand Santhosh Kumar , J. Mrudula |
IJCTT-V6N2P112 |
9 |
Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS -Debasis Das , U. A. Lanjewar , S. J. Sharma |
IJCTT-V6N2P113 |
9 |
Statistical Anomaly Detection Technique for Real Time Datasets -Y.A.Siva Prasad , Dr.G.Rama Krishna |
IJCTT-V6N2P114 |
10 |
Vertical Clustering of 3D Elliptical Helical Data -Wasantha Samarathunga , Masatoshi Seki , Hidenobu Saito , Ken Ichiryu , Yasuhiro Ohyama |
IJCTT-V6N2P115 |
11 |
Maximizing Communication Quality with Bandwidth Guarantees in Wireless Mesh Networks -Mohammed Abdul Majeed , J.Sahithi Kavya , A.Prathap Reddy |
IJCTT-V6N2P118 |
12 |
WiFiPos: An In/Out-Door Positioning Tool -Juan Toloza , Nelson Acosta , Carlos Kornuta |
IJCTT-V6N2P119 |
13 |
Efficient Preprocessing and Patterns Identification Approach for Text Mining -Pattan Kalesha , M. Babu Rao ,Ch. Kavitha |
IJCTT-V6N2P120 |