S.No Articles Ref. No
14
IJCTT-V6N3P121
15

 A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting

Rajesh R Chauhan , G S Praveen Kumar

 IJCTT-V6N3P123
16

 Reducing Binding update in NEMO Supported PMIPV6

-S Ananthi Jebaseeli , Dr. J. Sundararajan

 IJCTT-V6N3P124
17

 An Improved Naive Bayes Classification to Enhance Image Registration

Mohammed Imran , M. Babu Rao , Ch. Kavitha

 IJCTT-V6N3P125
18

 Multi-Level Association Rule Mining: A Review

-Sonia Setia , Dr. Jyoti

IJCTT-V6N3P127
19

 Reconstruction Models for Attractors in the Technical and Economic Processes

-E.V. Nikulchev

IJCTT-V6N3P128
20

 A Tree of Life Approach for Multidimensional Data

-Dr. Kavita Pabreja

IJCTT-V6N3P130
21
IJCTT-V6N4P131
22

 Analysis on the Performance of Wireless Protocols

-A. Malathi , P. Kalai Kannan

 IJCTT-V6N4P134
23

 A Puzzle Based Authentication Scheme for Cloud Computing

-Sulochana.V , Parimelazhagan.R

 IJCTT-V6N4P135
24

 Plain Woven Fabric Defect Detection Based on Image Processing and Artificial Neural Networks

-Dr.G.M.Nasira , P.Banumathi

IJCTT-V6N4P138
25

 Anomaly Detection Based on Access Behavior and Document Rank Algorithm

-Prajwal R Thakare , K. Hanumantha Rao

IJCTT-V6N4P139
26

 Proactive Web Server Protocol for Complaint Assessment

-G. Vijay Kumar , Ravikumar S. Raykundaliya , Dr. P. Naga Prasad

IJCTT-V6N4P140
27

 Image Search Reranking

-V Rajakumar , Vipeen V Bopche

IJCTT-V6N5P141
28

 To Improve Data Security by Using Secure Data Transmission

-Manisha Yadav

 IJCTT-V6N5P144