IJCTT-Volume 4 Iss 5 No 1 Issue 2013

 
Title/Author Name
Paper Id
 ?
IJCTT-V4I5P1
 ?

Entrenched Visual Cryptography using Secret Sharing Scheme with public Key 

Kode Phani Kumar, B.Veera Mallu

 IJCTT-V4I5P5
 ?

ROI Estimation of Data Warehouse with Bottom Up Architecture and Top Down Implementation

Bikramjit Pal, Awanish Pati Mishra, Mallika De

IJCTT-V4I5P8
 ?

Contrast Enhancement Using Bi-Histogram Equalization With Brightness Preservation

Gowthami Rajagopal, K.Santhi

IJCTT-V4I5P11
 ?

Zone Divisional Network with Double Cluster Head for effective communication in WSN

Sandeep Verma, Kanika Sharma

IJCTT-V4I5P13
 ?

Secure web mining framework for e-commerce websites

M.Karthik , S.Swathi

IJCTT-V4I5P18
 ?

An Efficient Cloud Storage with Secure Dynamic Data Modification  

K.HariPriya, P.Krishnamoorthy 

 IJCTT-V4I5P24
 ?

Review of First Hop Redundancy Protocol and Their Functionalities

Priyanka Dubey, Shilpi Sharma, Aabha Sachdev

IJCTT-V4I5P26
 ?

Resource Provisioning Cost of Cloud Computing by Adaptive Reservation Techniques

M.Manikandaprabhu, R.SivaSenthil 

IJCTT-V4I5P33
 ?

Advanced Replica-Based Data Access Prediction and Optimization Approach in Distributed Environment

P. Sathiya, K. N. Vimal Shankar

IJCTT-V4I5P35
 ?

Cryptoviral Extortion: A virus based approach

S.Manoj Kumar, M.Ravi Kumar

IJCTT-V4I5P38
 ?

Video Watermarking Using Wavelet Transformation

Rakesh Kumar, Savita Chaudhary

IJCTT-V4I5P39
 ?

Methodological approach for Face Recognition Using Artificial Neural Networks

K. Shirisha, S. Vijaya Lakshmi, N. Musrat Sultana 

IJCTT-V4I5P41
 ?

A Novel Approach for Detection and Prevention of Wormhole Attack In Ad-hoc Networks

Monika, Jyoti Thalor 

IJCTT-V4I5P42
 ?

Emerging Network Technologies that are Likely to Become Widely Available in the Future

- Peter K. Kemei and William P.K. Korir

 IJCTT-V4I5P43
 ?

Cat Swarm based Optimization of Gene Expression Data Classification

Amit Kumar, Debahuti Mishra 

 IJCTT-V4I5P44
 ?

Modification of Instruction Set Architecture in a UTeMRISCII Processor 

Ahmad Jamal Salim, Nur Raihana Samsudin, Sani Irwan Md Salim , Soo Yew Guan 

IJCTT-V4I5P46
 ?

A New Approach for Providing the Data Security and Secure Data Transfer in Cloud Computing

Manoj Prabhakar Darsi , K.Suresh Joseph, Dr. S.K.V.Jayakumar 

IJCTT-V4I5P47
 ?

Reduction of Greedy Forwarding using Overlay Multicasting in Mobile Ad Hoc Networks

G. Kiran Kumar, B.Vijaya Babu

IJCTT-V4I5P51
 ?

Hybridization of Symmetric Key Encryption and Visual Cryptography

Monika, Rakhi Soni

IJCTT-V4I5P52