S.No Articles Ref. No
1
IJCTT-V6N1P101
2

 FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor

-B.Vasantha Lakshmi, B.Vidheya Raju

IJCTT-V6N1P102
3

 An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET

-M. Dhivyasri , P.E. Prem , A. Nithyasri

 IJCTT-V6N1P103
4

 Proficient And Protected Content Dispensation In Distributed Environment To Client Proxy-Based Transcoding Approach

-Muzammil H Mohammed , Masood A Shaik

IJCTT-V6N1P108
5

 Secured Packet Hiding Technique for Packet Jamming Attacks

-Varagani Paparao , M.N.Satish Kumar

IJCTT-V6N1P109
6

 A Modified Perceptual Constrained Spectral Weighting Technique For Speech Enhancement

-Gowder Praveena Hiriyan , A.Indhumathi

IJCTT-V6N1P110
7
IJCTT-V6N2P111
8

 Advanced Accident Avoidance System for Automobiles

-T.U.Anand Santhosh Kumar , J. Mrudula

IJCTT-V6N2P112
9

 Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS

-Debasis Das , U. A. Lanjewar , S. J. Sharma

 IJCTT-V6N2P113
9

 Statistical Anomaly Detection Technique for Real Time Datasets

-Y.A.Siva Prasad , Dr.G.Rama Krishna

 IJCTT-V6N2P114
10

 Vertical Clustering of 3D Elliptical Helical Data

-Wasantha Samarathunga , Masatoshi Seki , Hidenobu Saito , Ken Ichiryu , Yasuhiro Ohyama

 IJCTT-V6N2P115
11

 Maximizing Communication Quality with Bandwidth Guarantees in Wireless Mesh Networks

-Mohammed Abdul Majeed , J.Sahithi Kavya , A.Prathap Reddy

IJCTT-V6N2P118
12

 WiFiPos: An In/Out-Door Positioning Tool

-Juan Toloza , Nelson Acosta , Carlos Kornuta

IJCTT-V6N2P119
13

 Efficient Preprocessing and Patterns Identification Approach for Text Mining

-Pattan Kalesha , M. Babu Rao ,Ch. Kavitha

IJCTT-V6N2P120