•  
  •  
 

International Journal of Computer and Communication Technology

Volume 6, Issue 3 (2015)

Articles

PDF

ONTOLOGY FOR AUTOMATIC ACQUISITION WEB USER INFORMATION
A. PRAVEEN MUKHARJI, Y. SOWJANYA KUMARI, and P. HARINI
DOI: 10.47893/IJCCT.2015.1294

PDF

PREVENTING BUFFER OVERFLOW ATTACKS WITH RELIABLE AND LOW COST SYSTEM
B V S NAGARAJU, Y. SRINIVASA RAO, and P. HARINI
DOI: 10.47893/IJCCT.2015.1295

PDF

PERSONAL NAME ALIASES ON AUTOMATIC DISCOVERY FROM THE WEB
Y. SARATH KUMAR, ESWAR KODALI, and P. HARINI
DOI: 10.47893/IJCCT.2015.1296

PDF

RECOGNIZING FACES USING INDIVIDUAL EIGEN SUBSPACES TECHNIQUE WITH FUZZY RULES METHODOLOGY
AISHWARYA P and KARNAN MARCUS
DOI: 10.47893/IJCCT.2015.1297

PDF

BIG DATA MANAGEMENT – DNA DATA WAREHOUSE
VAIBHAV SUNEJA
DOI: 10.47893/IJCCT.2015.1298

PDF

KNOWLEDGE DISCOVERY IN DATA GRID WITH ADVANCE RESERVATION FOR METEOROLOGY
M. THANGAMANI, J.MALAR VIZHI, and G. NANDHINI
DOI: 10.47893/IJCCT.2015.1299

PDF

AN EFFICIENT AND SYSTEMATIC VIRUS DETECTION PROCESSOR FOR EMBEDDED NETWORK SECURITY
P.MUTHU KUMARAN, R.V.ASHOK PRATHAP, and D. MATHAVAN
DOI: 10.47893/IJCCT.2015.1301

PDF

AN OPTIMIZED ARM SCHEME FOR DISTINCT NETWORK DATA SET
K.GANESH KUMAR, H.VIGNESH RAMAMOORTHY, M.PREM KUMAR, and S. SUDHA
DOI: 10.47893/IJCCT.2015.1302

PDF

POST-MINING OF ASSOCIATION RULES USING ONTOLOGIES AND RULE SCHEMAS
R. SUBASH CHADRA BOSE and R. SIVAKUMAR
DOI: 10.47893/IJCCT.2015.1303

PDF

DETECTING DISEASED IMAGES BY USING SEMI – SUPERVISED LEARNING
DINESH KUMAR A, SHAHUL HAMMED, HANAH AYISHA V HYDER ALI, and NIDHYA R
DOI: 10.47893/IJCCT.2015.1305

IJCCT Cover Art