S.No
Articles
Ref. No
 1

Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems

-  Dr. R. Lakshmi Tulasi, M.Ravikanth 

 IJCTT-V1I3P103
 5

Comparative Analysis of AES and RC4 Algorithms for Better Utilization

- Nidhi Singhal, J.P.S.Raina. 

 IJCTT-V1I3P104
 3

Design and Analysis of On-Chip Router for Network On Chip

- Ms. A.S. Kale,Prof. M.A.Gaikwad.

 IJCTT-V1I3P105
 4

Evaluating Efficacy of Forward Error Correction Coding

- K.Supraja, ,A. Srinivasa Reddy, R. Lakshmi Tulasi.

IJCTT-V1I3P106
 5

Discriminative Features Selection in Text Mining Using TF-IDF Scheme

- Ms. Vaishali Bhujade, Prof. N. J. Janwe, Ms. Chhaya Meshram.

IJCTT-V1I3P107
 6

Robots with biological brain

- Ochin, Jugnu Gaur. 

IJCTT-V1I3P108
 7

Comparative Analysis of Data warehouse Design Approaches from Security Perspectives

- Shashank Saroop, Manoj Kumar.

IJCTT-V1I3P109
 8

Readiness of Requirement Engineering towards Global Collaboration and Communication

- Nor Azliana Akmal Jamaludin, Shamsul Sahibuddin.

IJCTT-V1I3P110
 9

<Object Recognition using SVM-KNN based on Geometric Moment Invariant

- R.Muralidharan, Dr.C.Chandrasekar.

IJCTT-V1I3P111
 10

Leaf Classification Using Shape, Color, and Texture Features

- Abdul Kadir, Lukito Edi Nugroho, Adhi Susanto, Paulus Insap Santosa.. 

IJCTT-V1I3P113
 11

By Performance Metrics Analysis of CLR & JVM– A Survey

- Mrs. Pratibha Singh, Mr.Dipesh Sharma, Mr.Sonu Agrawal.

IJCTT-V1I3P114

 12

GLIP: A Concurrency Control Protocol for Clipping Indexing

- J.RAMESH,N.SWATHI,R.LAKSHMI TULASI.

 IJCTT-V1I3P115
 13

Robust and secure digital signature for image authentication over wireless Channels

- J Sravanthi, Dr. MHM Krishna Prasad.

 IJCTT-V1I3P117
 14

Design of a Scheme for Secure Rouitng in Mobile Adhoc Networks

- Sesha Bhargavi Velagaleti, Dr.M.Seetha, Dr.S.Viswanadha Raju.

IJCTT-V1I3P118
 15

A Novel Implementation of Fuzzy Keyword Search over Encrypted Data in Cloud Computing

- RANJEETH KUMAR.M , D.VASUMATHI.

IJCTT-V1I3P122