S.No |
Articles |
Ref. No |
14
|
|
IJCTT-V6N3P121
|
15 |
A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting
Rajesh R Chauhan , G S Praveen Kumar
|
IJCTT-V6N3P123 |
16 |
Reducing Binding update in NEMO Supported PMIPV6
-S Ananthi Jebaseeli , Dr. J. Sundararajan
|
IJCTT-V6N3P124 |
17 |
An Improved Naive Bayes Classification to Enhance Image Registration
Mohammed Imran , M. Babu Rao , Ch. Kavitha
|
IJCTT-V6N3P125 |
18 |
Multi-Level Association Rule Mining: A Review
-Sonia Setia , Dr. Jyoti
|
IJCTT-V6N3P127 |
19 |
Reconstruction Models for Attractors in the Technical and Economic Processes
-E.V. Nikulchev
|
IJCTT-V6N3P128 |
20 |
A Tree of Life Approach for Multidimensional Data
-Dr. Kavita Pabreja
|
IJCTT-V6N3P130 |
21
|
|
IJCTT-V6N4P131
|
22 |
Analysis on the Performance of Wireless Protocols
-A. Malathi , P. Kalai Kannan
|
IJCTT-V6N4P134 |
23 |
A Puzzle Based Authentication Scheme for Cloud Computing
-Sulochana.V , Parimelazhagan.R
|
IJCTT-V6N4P135 |
24 |
Plain Woven Fabric Defect Detection Based on Image Processing and Artificial Neural Networks
-Dr.G.M.Nasira , P.Banumathi
|
IJCTT-V6N4P138 |
25 |
Anomaly Detection Based on Access Behavior and Document Rank Algorithm
-Prajwal R Thakare , K. Hanumantha Rao
|
IJCTT-V6N4P139 |
26 |
Proactive Web Server Protocol for Complaint Assessment
-G. Vijay Kumar , Ravikumar S. Raykundaliya , Dr. P. Naga Prasad
|
IJCTT-V6N4P140 |
27 |
|
IJCTT-V6N5P141
|
28 |
To Improve Data Security by Using Secure Data Transmission
-Manisha Yadav
|
IJCTT-V6N5P144 |