S.No | Articles | Ref. No |
1 |
Authorize Client Inspection and Data Dynamics for Secure Storage in Cloud Computing - P Ram Mohan Rao, P Anjusha, N Subba Reddy, S Narasimha Rao |
IJCTT-V41P103 |
2 |
Cloud Computing: Privacy, Mobility and Resources Utilization - Tariq Alwada’n, Omar Al-Zitawi, Jalal Omer Atoum |
IJCTT-V41P106 |
3 |
Achieving High Quality Tweet Segmentation using the HybridSeg Framework - Dr Ilaiah Kavati, Dayakar P, E. Amarnath Reddy, Vinay Kumar Thumu |
IJCTT-V41P107 |
4 |
A Survey on Image Segmentation Using Threshoding Methods -Shubham Arjariya, Dr. Mahesh Motwani, Dr. Shikha Agrawal |
IJCTT-V41P111 |
5 |
Digital Watermarked Anaglyph 3D Images Using FrFT - Rakesh Y, Dr.K.Sri Rama Krishna |
IJCTT-V41P113 |
6 |
Study and Analysis of Factors Responsible For Failures of Software Project - Prof. Ashvini Shende, Dr.Janardan Pawar |
IJCTT-V41P114 |
7 |
Digital Image Watermarking Using Fuzzy Logic and Genetic Algorithm - Arun Kumar R, T.Venkat Narayana Rao |
IJCTT-V41P118 |
8 |
Security Metrics and the Risks: An Overview - Rana Khudhair Abbas Ahmed |
IJCTT-V41P119 |