| 
 S.No 
 | 
 Articles 
 | 
 Ref. No 
 | 
| 1 | 
 Role of Feature Reduction in Intrusion Detection Systems for Wireless Attacks -Jashuva.Chundi , V.V.Gopala Rao  | 
IJETT-V6N1p241 | 
| 2 | 
 Integrating AHP and Genetic Algorithm Model Adopted for Personal Selection -Mohammed Fahmy Aly , Hagag M.Abd El-hameed  | 
IJETT-V6N1p242 | 
| 3 | 
 A Proposed Online Approach of English and Punjabi Question Answering - Vishal Gupta  | 
IJETT-V6N1p250 | 
| 4 | 
 Optimizing the Cost for Resource Subscription Policy in IaaS Cloud -Ms.M.Uthaya Banu , Mr.K.Saravanan  | 
IJETT-V6N1p251 | 
| 5 | 
 An Approach to Build Software Based on Fault Tolerance Computing Using Uncertainty Factor -Mrityunjay Brahma  | 
IJETT-V6N1p252 | 
| 6 | 
 Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services - Ms. M. Subha , Mr. K. Saravanan  | 
IJETT-V6N1p253 | 
| 7 | 
 - A.Rama Krishna Raju Penmetsa , Sitarama Reddy Muppidi , Raghuram Popuri , Suri Babu Golla , Rambabu Tenneti  | 
IJETT-V6N1p254 | 
| 8 | 
 In-Memory Database Systems - A Paradigm Shift - Mohit Kumar Gupta , Vishal Verma , Megha Singh Verma  | 
IJETT-V6N1p258 | 
| 9 | 
 Automatic Key Generation of Caesar Cipher - B. Bazith Mohammed  | 
IJETT-V6N1p259 | 
| 10 | 
 Enhancement of Public Transportation Services Using Wireless Technologies -Mr. Mohammad Osman , Ms. Reshma Sultana , Asst.Prof., Ms. Salma Sulthana  | 
IJETT-V6N1p261 | 
| 11 | 
 Survey on VM Placement Algorithms -B. Benita Jacinth Suseela  | 
IJETT-V6N1p262 | 
| 12 | 
 Automatic Normalization of Punjabi Words - Vishal Gupta  | 
IJETT-V6N1p263 | 
| 13 | 
 Performance Characteristics of Oxy Hydrogen Gas on Two Stroke Petrol Engine - G.Ajay Kumar , G.Venkateswara Rao  | 
IJETT-V6N1p264 | 
| 14 | 
 Cryptography in Ultra-Low Power Microcontroller MSP430 -Radek Fujdiak , Ji?í Mišurec , Petr Mlýnek , Ond?ej Rášo  | 
IJETT-V6N1p272 | 
| 15 | 
 - WC Solomon , SU Muhammad , MY Egoh  | 
IJETT-V6N1p273 |