IJCATR provides e-certificate of publication to authors.      IJCATR invites reserach articles/thesis for publication from reserchers/authors/students.       Submit your reserach articles/thesis to editor@ijcat.com

Volume 4, Issue 5, Pages 336 - 418 ( May - 2015 )

2)
A Novel Constant size Cipher-text Scheme for Security in Real-time Systems
Pages 340 - 343
M.Dhivya Tina Belinda Miranda S.Venkatraman

10.7753/IJCATR0405.1002

Show Preview
  |  
Download PDF
3)
Video Transmission over an Enhancement Approach Of IEEE802.11e
Pages 344 - 350
Abdirisaq M. Jama and Othman O. khalifa Diaa Eldein Mustafa Ahmed

10.7753/IJCATR0405.1003

Show Preview
  |  
Download PDF
4)
Frequent Data Mining in Data Publishing for Privacy Preservation
Pages 351 - 354
Sheikh Nargis Nasir Swati A. Bhawsar

10.7753/IJCATR0405.1004

Show Preview
  |  
Download PDF
5)
Test-Case Optimization Using Genetic and Tabu Search Algorithm in Structural Testing
Pages 355 - 358
Tina Belinda Miranda M. Dhivya K. Sathyamoorthy

10.7753/IJCATR0405.1005

Show Preview
  |  
Download PDF
6)
Object Oriented Software Testability (OOST) Metrics Analysis
Pages 359 - 367
Pushpa R. Suri Harsha Singhani

10.7753/IJCATR0405.1006

Show Preview
  |  
Download PDF
7)
Military Networks by Disruption Tolerant Network Technology
Pages 368 - 373
K.V Srikanth B.Aravindsamy S.Pothumani

10.7753/IJCATR0405.1007

Show Preview
  |  
Download PDF
8)
Data Mining using Improved Association Rule
Pages 374 - 376
Arpit Tripathi Shefali Singh Devika Prasad

10.7753/IJCATR0405.1008

Show Preview
  |  
Download PDF
9)
A Survey on Different Modes of Wormhole Attack and it?s Countermeasures in MANET
Pages 377 - 379
Shahapur Farhat Kauser Iqbal Syeda Sheema Asha Guddadavar

10.7753/IJCATR0405.1009

Show Preview
  |  
Download PDF
10)
A Survey on Selective Jamming Attacks in WMNs
Pages 380 - 385
Syeda Arshiya Sultana Samreen Banu kazi Parveen Maniyar M. Azharuddin

10.7753/IJCATR0405.1010

Show Preview
  |  
Download PDF