S.No | Articles | Ref. No |
1 |
An Advanced Image Encryption Method Based on Fuzzy Transform in Two Variables and Edge Detection - Pankaj Sambyal, Vivek Sambyal |
IJCTT-V31P101 |
2 |
A Simple Taxonomy of Multilayer Networks - Andrey A. Shchurov, Radek Ma?ík |
IJCTT-V31P105 |
3 |
ID-Based Directed Multi Proxy Chameleon Signature Scheme with Bilinear Pairing - Tejeshwari Thakurh |
IJCTT-V31P107 |
5 |
The State of the Art on Educational Data Mining in Higher Education - Mohamed Osman Hegazi, Mazahir Abdelrhman Abugroon |
IJCTT-V31P109 |
6 |
A survey of Commit Protocols in Distributed Real Time database systems - Fadia A. Elbagir, Ahmed Khalid, Khalid Khanfar |
IJCTT-V31P111 |
7 |
Smartphone-based 3D Orientation Estimation for Virtually any Published PC Game -Anas Fattouh |
IJCTT-V31P113 |
8 |
Mining Software Quality from Software Reviews: Research Trends and Open Issues - Issa Atoum, Ahmed Otoom |
IJCTT-V31P114 |