International Journal of Computer
Trends and Technology
Volume 5 Number 1
Research Article IJCTT-V3P129
Analysis of Energy Aware Data Center using Green Cloud Simulator in Cloud Computing
Beant Singh Gill , Satinderjit kaur Gill , Prince Jain
Research Article IJCTT-V5N1P103
Clustering Subspace for High Dimensional Categorical Data Using Neuro-Fuzzy Classification
Ms. K.Karunambiga , Mrs. M.Suganya
Research Article IJCTT-V5N1P104
User- And Query-Conditional Ranking for Web Databases
Mrs.D.Kalyani , Mrs. M.Suganya
Research Article IJCTT-V5N1P106
Ranking Based Approach to Maximize Utility of Recommender Systems
S.Ganesh Kumar , P.Hari Krishna
Research Article IJCTT-V5N1P108
Shamir Secret Sharing Based Authentication Method with Data Repair Capability for Gray Scale Document Images via the Use of PNG Image
Nagababu Manne , K.J.Silva Lorraine
Research Article IJCTT-V5N1P109
A Selfishness Aware Neighbor Coverage Based Probabilistic Rebroadcast Protocol for Manets
Deepthi Sivaraj
Research Article IJCTT-V5N2P111
Advanced EGMP Based Multicast for Ad-Hoc MIMO
Srikalyani Paashikanti , Rajashekar Thallapalli
Research Article IJCTT-V5N2P113
Robust & Efficient Power Management Technique for MIMO Network Interfaces
Sasi Manchala , K.J.Silva Lorraine
Research Article IJCTT-V5N2P115
Deployment and Evaluation of a Multi-Hop Wireless Network
Fakrulradzi Idris , Norlezah Hashim
Research Article IJCTT-V5N2P116
Improved Clustering and Naïve Bayesian based Binary Decision tree with Bagging Approach
Medeswara Rao, Sudhir Tirumalasetty
Research Article IJCTT-V5N2P117
Network Packet Jamming Detection and Prevention Using Hiding Method
M.VamsiKrishna , R.Sudhakishore
Research Article IJCTT-V5N3P121
Performance Analysis of AODV and OLSR using OPNET
Jagdeep Singh , Dr. Rajiv Mahajan
Research Article IJCTT-V5N3P124
End-To-End Trust Based Transmission Optimization in Smartgrid Network Architecture
M.Ramasaravanan , M.Kirithikadevi
Research Article IJCTT-V5N3P126
An Optimization Technique for Image Watermarking Scheme
S.Veeramani , Y.Rakesh
Research Article IJCTT-V5N3P127
A Review on Reconstruction Based Techniques for Privacy Preservation of Critical Data
Keyur Dodiya , Shruti Yagnik
Research Article IJCTT-V5N3P128
Enhancing File Security by Rijndael Algorithm Using Combination of Other New Generation Security Algorithms
Anshu Dixit , Ashish Kumar Jain