S.No | Articles | Ref. No |
1 |
Intrusion Detection a Challenge: SNORT the savior - Gurven Vaseer, Dr. Pushpinder Singh Patheja |
IJCTT-V45P101 |
2 |
- Dr. Mridul Kumar Mathur, Gyan Prakash Bissa |
IJCTT-V45P102 |
3 |
- Amit Prakash, Karamjit Bhatia, Raj Kumar |
IJCTT-V45P103 |
4 |
Survey on CRM Analytics in Telecommunication Industry - Lewlisa Saha, Laxman Sahoo, Sanjib Kumar Routray |
IJCTT-V45P104 |
5 |
Trusted Execution Environment and Linux- A Survey - Prabhav S, Madhav V Deshpande, Rakshak R Kamath, Rohan N, Latha NR |
IJCTT-V45P105 |
6 |
Hadoop: Move Compute to the Data - Anand C. Bohara |
IJCTT-V45P106 |
7 |
Proficient Segmentation Methods for Tumor Detection & Prediction Age in MRI Images - M.S.Vinmathi, P.Priyanka, S.Rathnasundari, Sannareddy.Sowchika |
IJCTT-V45P107 |
8 |
Design and Development to Catalyze a Transformation in Teaching and Learning at Universities - Abdul Kadhar Sheriff, A.Shameem Fathima |
IJCTT-V45P108 |
9 |
Solution Integration Approach using IoT in Education System - Suja P Mathews, Dr.Raju R Gondkar |
IJCTT-V45P109 |
10 |
- Sameesha Vs |
IJCTT-V45P110 |
11 |
Fuzzy Based Approach for Privacy Preserving in Data Mining - Shrikant Zade, Dr. Pradeep Chouksey,Dr.R.S.Thakur |
IJCTT-V45P111 |
12 |
Energy Aware Resource Allocation for Throughput Maximized IOT Network - E.kowsalya, Mr.D.Saravanan, Mr.R Parthiban |
IJCTT-V45P112 |
13 |
Implementation of Interactive and Simple Messaging In Educational Institution - Ms.P.Nancy Anurag ,M.Pavani,D.Lakshmi Prasanna,S.Swetha Susmitha |
IJCTT-V45P113 |
14 |
Data Replication in Conventional Computing Environment - P J Kumar, P Ilango |
IJCTT-V45P114 |
15 |
A Comparative Analysis of Beenish and Ebeenish in WSN - Nidhi Bhatia, Manju Bala, Varsha |
IJCTT-V45P115 |