IJCT -Volume 2, Issue 3 / May - June - 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
A Review on 3-D Digital Video Water Marking
- Ravi Kumar, Shweta Sharma
|
1-5 |
2
|
Multifractal-Based Features for Medical Images Classification
- Saad Al-Momen , Loay E. George, Raid K. Naji
|
6-13 |
3
|
Social Properties Based Routing in Delay Tolerant Network
- Aliasger k. Dhilawala, Vishal shah
|
14-18 |
4
|
Improving AASR protocol for Adversarial Environments in MANETS
- NiravKotadia, KeyurUpadhyay
|
19-24 |
5
|
Synthesis of Planar Mechanisms, Part II: Specified Stroke, Time Ratio and Transmission Angle
- Galal Ali Hassaan
|
25-32 |
6
|
Sensor Based Traffic Prediction and Accident Detection using GPS and GSM Technology
- Geetanjali Shintre, Gowrima E., Prabhudev R., Shilpa M.S,Mrs.Bhat Geetalaxmi Jayram(Associate Professor)
|
33-35 |
7
|
Reducing Energy Consumption and extending WSN lifetime using CBEEPSS
- Priyanka M.Tambat, Arati M.Dixit
|
36-46 |
8
|
Fast Premium Immediate Money Transfer Using Mobile Number
- Mahendra Deore,Priyanka Dharurkar,Lajawanti Lanjekar,Minal Chavan,Raksha Gound
|
47-50 |
9
|
E-learning in Distance Education using Cloud Computing
- Arshad Ali, Amit Bajpeye , Amit Kumar Srivastava
|
51-54 |
10
|
Duplicate Record Detection in XML using AI Techniques
- Anagha Pradeep, Teena George
|
55-60 |
11
|
Click jacking Vulnerability Analysis and Providing Security against WEB Attacks Using White listing URL analyzer
- D.Kavitha, S.Ravikumar
|
61-67 |
12
|
A Review OnGUI Implementation of Efficient Robust Digital Watermarking using 3-Discrete wavelet Technique
- Ravi Kumar,Garima Garg
|
68-71 |
13
|
BER Evaluation of FSO Link for different Duty Cycles of RZ pulse in different conditions of Rainfall
- Er. Rajeev Thakur
|
72-77 |
14
|
Optimization of Association Rules using Hybrid BPSO
- Jyotsana Dixit, Abha Choubey
|
78-85 |
15
|
A Survey on Frequent Pattern Mining Methods Apriori, Eclat, FP growth
- Siddhrajsinh Solanki, Neha Soni
|
86-89 |
16
|
Comparative Analysis and Implementation of DSDV and AODV Routing Protocol for MANET
- Snehal Goverdhan , Aakanksha Choubey
|
90-98 |
17
|
Frequent itemset mining using eclat with relative profit and price
- Siddhrajsinh Solanki, Neha Soni
|
99-105 |
18
|
Generation of Graph for APB via SPI Verification Using Trek
- Gowtham R, Govindaraj V
|
106-109 |
19
|
Controller Tuning for Disturbance Rejection Associated with a Delayed Double Integrating Process, Part I: PD-PI Controller
- Galal Ali Hassaan
|
110-115 |
20
|
An Efficient Algorithm for Identification of Most Valuable Itemsets from WebTransaction Log Data
- Litty Tressa George, Asha Rose Thomas
|
116-122 |