•  
  •  
 

International Journal of Computer and Communication Technology

Volume 5, Issue 4 (2014)

Articles

PDF

Checkpointing Orchestrated Web Services
A. Vani Vathsala and Hrushikesha Mohanty
DOI: 10.47893/IJCCT.2014.1248

PDF

A Correctness Criterion for Eager Approach Validation for Transactional Memory System
Ravi Kumar and Sathya Peri
DOI: 10.47893/IJCCT.2014.1249

PDF

A Grid Computing Based Power System Monitoring Tool Using Gridgain
Subrat K. Patro, Subhendu S. Paik, Dr D. S. Roy, and Avinash Kumar
DOI: 10.47893/IJCCT.2014.1251

PDF

Issues of Emotion-Based Multi-Agent System
ARUSHI THAKUR and DIVYA RISHI SAHU
DOI: 10.47893/IJCCT.2014.1253

PDF

Atherosclerosis Detection Using Music
NIHARIKA JHA
DOI: 10.47893/IJCCT.2014.1254

PDF

Load Balancing in Computational Grids Using Ant Colony Optimization Algorithm
SOWMYA SURYADEVERA, JAISHRI CHOURASIA, SONAM RATHORE, and ABDUL JHUMMARWALA
DOI: 10.47893/IJCCT.2014.1255

PDF

Privacy Preserved Centralized Model for Counter Terrorism
ABHISHEK SACHAN and DEVSHRI ROY
DOI: 10.47893/IJCCT.2014.1256

PDF

OBSTACLE DETECTION AND NAVIGATION OF AUTONOMOUS ROBOT
HIMANSU SEKHAR SASMAL, TAPAN NAYAK, and Srikanta Patnaik
DOI: 10.47893/IJCCT.2014.1258

PDF

Clustering Based Classification and Analysis of Data
NEERAJ SAHU, D. S. RAJPUT, R. S. THAKUR, and G. S. THAKUR
DOI: 10.47893/IJCCT.2014.1259

PDF

Exploiting Data Mining Techniques For Improving the Efficiency of Time Series Data
TARUN DHAR DIWAN, PRADEEP CHOUKSEY, R. S. THAKUR, and BHARAT LODHI
DOI: 10.47893/IJCCT.2014.1260

PDF

Application of Data Mining Technique in Stock Market : An Analysis
SACHIN KAMBEY, R. S. THAKUR, and SHAILESH JALORI
DOI: 10.47893/IJCCT.2014.1261

PDF

A Novel Approach For Information Security With Automatic Variable Key Using Fibonacci Q-Matrix
SHALIGRAM PRAJAPAT, AMBER JAIN, and R. S. THAKUR
DOI: 10.47893/IJCCT.2014.1262

IJCCT Cover Art