S.No
Articles
Ref. No
1

Various Database Attacks and its Prevention Techniques

- K.A.Varunkumar , M.Prabakaran , Ajay Kaurav , S.Sibi Chakkaravarthy , S.Thiyagarajan , Pokala Venkatesh

IJETT-V9P302
2

Comparison of Algorithms for Fetal ECG Extraction

- Winnie Rachel Cherian , D.J.Jagannath , A.Immanuel Selvakumar

IJETT-V9P304
3

Performance of MANET: A Review

- Swati Puri , Vishal Arora

IJETT-V9P305
4

Impact Analysis on the Performance of Zigbee Protocol Under Various Mobility Models 

- Parneet Dhillon , Dr. Harsh Sadawarti

IJETT-V9P306
5

A Survey on Leakage Power Reduction Techniques by Using Power Gating Methodology 

- Pramod Kumar. M.P , A.S. Augustine Fletcher

IJETT-V9P308
6

Implementation of Speech Recognition in Web Application for Sub Continental Language 

- Dilip Kumar , Abhishek Sachan , Malay Kumar

IJETT-V9P309
7

Extracting Large Data using Big Data Mining 

- Ms. Neha A. Kandalkar , Prof. Avinash Wadhe

IJETT-V9P310