Volume-24 Number-1 June 2015

S.No
Title/Author Name
Ref. No
1

Tampering Detection Based On Blur Inconsistencies

- Vidyalaxmi Garur, Dr.Lalitha Y S


IJETT-V24P201
2

Code Generation for Different Navigation Systems

- Sisira C S, R.Sindhu Rajendran


IJETT-V24P202
3

Implementation of an Improved Path Selection Algorithm Using Particle Swarm Optimization (PSO) Technique

- ER. Jatin Kaur, ER. Jujhar Singh


IJETT-V24P203
4

Reduction of Carbon Emission by Using Green Bricks: Bangladesh Perspective

- Debojit Sarker, Md. Khairul Hasan Khan, Md. Moynur Rahman, Sumit Saha, Dr. Rowshan Mamtaz


IJETT-V24P204
5 Implementation of Fuzzy Logic Controller Using VHDL – A Review

- Virendra K. Verma, sarika sapre


IJETT-V24P205
6 Flaws & Frauds Hindering Credit Cards Security

- Abhishek Maheshwari, S.K. Saritha


IJETT-V24P206
7 Optimizing Image Steganography using Genetic Algorithm

- Gangeshawar, James Attri


IJETT-V24P207
8 A Comparison of Routing Protocols for MANET using NS-2 Simulator

- Renu Singla, Priyanka


IJETT-V24P208
9 An Approach of K-Means and ART Network for Character Recognition

- Ankush Goyal, Shallu


IJETT-V24P209
10 Improved NAND Flash Memories Storage Reliablity Using Nonlinear Multi Error Correction Codes

- R.Naresh Naik, P.Siva Nagendra Reddy , E. Ramakrishna Naik


IJETT-V24P210