![ijct](http://www.ijctjournal.org/images/title_good1.jpg)
![ijct](http://www.ijctjournal.org/images/newbut.gif)
![ijct](http://www.ijctjournal.org/images/newbut.gif)
IJCT -Volume 2, Issue 3 / May - June - 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
A Review on 3-D Digital Video Water Marking
- ![]()
![]() ![]() ![]() |
1-5 |
2
|
Multifractal-Based Features for Medical Images Classification
- ![]()
![]() ![]() ![]() |
6-13 |
3
|
Social Properties Based Routing in Delay Tolerant Network
- ![]()
![]() ![]() ![]() |
14-18 |
4
|
Improving AASR protocol for Adversarial Environments in MANETS
- ![]()
![]() ![]() ![]() |
19-24 |
5
|
Synthesis of Planar Mechanisms, Part II: Specified Stroke, Time Ratio and Transmission Angle
- ![]()
![]() ![]() ![]() |
25-32 |
6
|
Sensor Based Traffic Prediction and Accident Detection using GPS and GSM Technology
- ![]()
![]() ![]() ![]() |
33-35 |
7
|
Reducing Energy Consumption and extending WSN lifetime using CBEEPSS
- ![]()
![]() ![]() ![]() |
36-46 |
8
|
Fast Premium Immediate Money Transfer Using Mobile Number
- ![]()
![]() ![]() ![]() |
47-50 |
9
|
E-learning in Distance Education using Cloud Computing
- ![]()
![]() ![]() ![]() |
51-54 |
10
|
Duplicate Record Detection in XML using AI Techniques
- ![]()
![]() ![]() ![]() |
55-60 |
11
|
Click jacking Vulnerability Analysis and Providing Security against WEB Attacks Using White listing URL analyzer
- ![]()
![]() ![]() ![]() |
61-67 |
12
|
A Review OnGUI Implementation of Efficient Robust Digital Watermarking using 3-Discrete wavelet Technique
- ![]()
![]() ![]() ![]() |
68-71 |
13
|
BER Evaluation of FSO Link for different Duty Cycles of RZ pulse in different conditions of Rainfall
- ![]()
![]() ![]() ![]() |
72-77 |
14
|
Optimization of Association Rules using Hybrid BPSO
- ![]()
![]() ![]() ![]() |
78-85 |
15
|
A Survey on Frequent Pattern Mining Methods Apriori, Eclat, FP growth
- ![]()
![]() ![]() ![]() |
86-89 |
16
|
Comparative Analysis and Implementation of DSDV and AODV Routing Protocol for MANET
- ![]()
![]() ![]() ![]() |
90-98 |
17
|
Frequent itemset mining using eclat with relative profit and price
- ![]()
![]() ![]() ![]() |
99-105 |
18
|
Generation of Graph for APB via SPI Verification Using Trek
- ![]()
![]() ![]() ![]() |
106-109 |
19
|
Controller Tuning for Disturbance Rejection Associated with a Delayed Double Integrating Process, Part I: PD-PI Controller
- ![]()
![]() ![]() ![]() |
110-115 |
20
|
An Efficient Algorithm for Identification of Most Valuable Itemsets from WebTransaction Log Data
- ![]()
![]() ![]() ![]() |
116-122 |