S.No |
Articles |
Ref. No |
1 |
Queue Control Model in a Clustered Computer Network using M/M/m Approach
- Ejem A., Njoku C. N., Uzoh O. F., Odii J. N.
|
IJCTT-V35P103 |
2 |
The Code Sanitizer: Regular Expression Based Prevention of Content Injection Attacks
- Sandeep D Sukhdeve, Prof.(Mrs) Hemlata Channe
|
IJCTT-V35P104 |
3 |
Review on Meta Classification Algorithms using WEKA
- Rausheen Bal, Sangeeta Sharma
|
IJCTT-V35P107 |
4 |
GUARDIA- A One Stop Safety Solution
- Shilpa Khedkar, Kiran Chandrasekaran, Tauseef Malik, Manish Poduval
|
IJCTT-V35P109 |
5 |
Implementation of Multiagent Learning Algorithms for Improved Decision Making
- Deepak A. Vidhate, Dr. Parag Kulkarni
|
IJCTT-V35P111 |
6 |
Control Statement in C Language
- Suresh Kumar, R.B.S. Yadav
|
IJCTT-V35P112 |
7 |
Artificial Intelligence Enabled Detection in Bio Medics
- Dr. S.Masood Ahamed
|
IJCTT-V35P114 |
8 |
Reachability in Telemedicine: Concepts, Design and Engineering
- C. P. E. Agbachi, V. Yemi-Peters
|
IJCTT-V35P115 |
9 |
GSM Based Automatic Monitoring System for Efficient Power Management
- R. Rubananth, Saravanan Selvaraj
|
IJCTT-V35P116 |
10 |
Spread of Malware within an E-Commerce Network with Quarantine: A Dynamic Model
- Biswarup Samanta, Samir Kumar Pandey
|
IJCTT-V35P124 |
11 |
License Number Plate Recognition using Template Matching
- Nighat Naaz Ansari, Ajay Kumar Singh
|
IJCTT-V35P133 |
12 |
Performance Analysis of AES and DES Cryptographic Algorithms on Windows & Ubuntu using Java
- Shraddha Dadhich
|
IJCTT-V35P134 |
13 |
Study and reviews of smart city based tourism mobile app
- Kanak Divya
|
IJCTT-V35P144 |
14 |
Mobile Health Technology Program And Its Cost Effectiveness In Improving Health Service Delivery In Nigeria: A Study Of Dutse Local Government Jigawa, Nigeria
- Nasiru Sani, Haruna Isa Hussain, Suleiman Hussaini
|
IJCTT-V35P147 |