IJETT-Volume 3 Issue 5/ Sep - Oct 2012

S.No
Title/Author Name
Ref. No
1

Improved Apriori and KNN approach for Virtual machine based intrusion detection

  -Suneetha Valluru, Mrs N. Rajeswari

IJETT-V3I5p201
2

Web Application Vulnerability Analysis Using Robust SQL Injection Attacks

  -Anil Kumar Mandapati , Adi lakshmi.Yannam

IJETT-V3I5p202
3

Finite Element Analysis of Pressure Vessel and Piping Design

Bandarupalli Praneeth, T.B.S.Rao

IJETT-V3I5p203
4

A Novel Paradigm: Detection & Prevention of Wormhole Attack in Mobile Ad Hoc Networks

  - Shilpa Jaiswal, Sumeet Agrawal

IJETT-V3I5p204
5

Architectural Level Power Optimization Techniques for Multipliers

  - V.Alekhya, B.Srinivas

IJETT-V3I5p205
6

Supervisory & Data Acquisition System Based On Labview for Gas Filling Plant

  -  Abhishek Chattri ,Sumit Rathore,Shivani Kumra,Amit Dhaman

IJETT-V3I5p206
7

Analysing an Industrial Automation Pyramid and Providing Service Oriented Architecture  

-  Shivani Kumra , Laxman sharma, Yashvi Khanna, Abhishek Chattri

IJETT-V3I5p207
8

Data Acquisition and Supervisory Control System for Environmental Parameters in Greenhouse

 Kratika Sharma , Hemendra Shrimali , Jaideep Sing Hada,Abhishek Chattri

IJETT-V3I5p208
9

Analysis of Blocking Probability in a GSM Based Cellular Network System

  - Anuj Kumar, Shilpi Srivastav, Alok Agarwal, Narendra Kumar

IJETT-V3I5p209
10

Paper has been removed by editor

 

 
11

Adaptive Classifier and Associative Algorithms for phishing detection

  - Ch.sonika , Mrs.D.Raaga Vamsi

IJETT-V3I5p211