S.No |
Articles |
Ref. No |
21 |
Survey Paper on Secure Digital Cash Payment through Coin Management
- Dr.P.Chandra Sekhar
|
IJCTT-V49P121 |
22 |
Dictionary Based Text Filter for Lossless Text Compression
- Rexline S. J, Robert L, Trujilla Lobo.F
|
IJCTT-V49P122 |
23 |
Big Data Security and Privacy- A Survey
- Mrs. Shanmugapriya. E, Dr. R.Kavitha
|
IJCTT-V49P123 |
24 |
Internet Filtration and Internet Neutrality
- Nand Kumar Singh
|
IJCTT-V49P124 |
25 |
Review Paper on Big Data Analytics in Cloud Computing
- Saneh Lata Yadav, Asha Sohal
|
IJCTT-V49P125 |
26 |
A Face Recognition System using Convolutional Neural Network and Generalized with Facial Expression
- C.R Vimalchand, Dr. G.P Ramesh Kumar
|
IJCTT-V49P126 |
27 |
A Novel Method to Monitor Threats in Cloud Computing Environment
- K.Arthi, M.Rajeev Kumar, B.Bhagyashree
|
IJCTT-V49P127 |
28 |
Implementation of Word Count- Hadoop Framework with Map Reduce Algorithm
- Keerthi.Bangari, Sujitha.Meduri, Ch.CY.Rao
|
IJCTT-V49P128 |
29 |
Agricultural Data Visualization for Prescriptive Crop Planning
- Harshitha B P, Amith R, Abhishek S, Rohit Vibhu C
|
IJCTT-V49P129 |
30 |
Mixed Round Robin Scheduling for Real Time Systems
- Pallab Banerjee, Biresh Kumar, Probal Banerjee
|
IJCTT-V49P130 |
31 |
Review of online shopping security protocol of EC: SSL and SET
- Vishakha Prabhakar Rode
|
IJCTT-V49P131 |
32 |
Challenges and Prosperity Research in Cloud Computing
- Niharika Singh, Ajay Jangra
|
IJCTT-V49P132 |
33 |
Designing Nanotechnology Based QCA Full Adders
- Wani Shah Jahan
|
IJCTT-V49P133 |
34 |
Genetic Algorithm Approach For Test Case Generation Randomly: A Review
- Deepak kumar, Manu Phogat
|
IJCTT-V49P134 |
35 |
The Technologies of Voice over Internet Protocol (VoIP) Based Telephony System: A Review
- Odii J. N., Nwokoma F.O., Onwuama T.U., Ejem A
|
IJCTT-V49P135 |
36 |
Vehicle Assisted Data Delivery using Ant Colony Optimization
- Ishwarpreet Kaur Grewal, Dr. Sandeep Harit
|
IJCTT-V49P136 |
37 |
Kinematics Analysis and Simulation of Six - DOF Industrial Robot
- Linna Xu, Zhenhua Wang, Yameng Zhai
|
IJCTT-V49P137 |
38 |
Bounds for the Zeros of a Lacunary Polynomial
- M.H. Gulzar, Ajaz Wani
|
IJCTT-V49P138 |
39 |
An Approach for Detecting and Preventing SQL Injection and Cross Site Scripting Attacks using Query sanitization with regular expression
- Monali Sachin Kawalkar, Dr. P. K. Butey
|
IJCTT-V49P139 |
40 |
Cloud Computing – Key Hashing Cryptographic Implication based Algorithm for Service Provider based Encryption and Decryption
- D. Ramesh, Dr. B, Rama
|
IJCTT-V49P140 |
41 |
Image Enhancement of Medical Images Based on an Efficient Approach of Morphological and Arithmetic Operations
- Usha Ramasamy, Perumal K
|
IJCTT-V49P141 |
42 |
Study of Windows based .NET ANEKA in Cloud Computing
- Bimal. VO, Sreya. PP
|
IJCTT-V49P142 |
43 |
A Survey on Automatic Question-answering process in Speech using Spoken term detection
- M.Mamatha, T.Bhaskar Reddy
|
IJCTT-V49P143 |