S.No |
Articles |
Ref. No |
1 |
An Android Based System for Reporting Coronavirus Outbreak in Educational Institutions using Social Media Services
- W.K.ElSaid
|
IJCTT-V68I11P101 |
2 |
Mobile ERP: Implementation and Sustainment Strategies
- Jigar K Patel
|
IJCTT-V68I11P102 |
3 |
Pluvial Flood Detection And Prediction Methods
- Idowu, S.A, Adekunle, Y.A, Ayankoya, F.Y, Oladapo K.A
|
IJCTT-V68I11P103 |
4 |
Scalable multiple representation and dynamic classification by multiple specialization of objects in OO-Prolog
- Macaire Ngomo
|
IJCTT-V68I11P104 |
5 |
Machine Learning (ML) In a 5G Standalone (SA) Self Organizing Network (SON)
- Srinivasan Sridharan
|
IJCTT-V68I11P105 |
6 |
Mobile Banking - Security Risks And Security Preventions
- Cordel?a Jem?ma G.Y, Dr.V.Kav?tha
|
IJCTT-V68I11P106 |
7 |
A Hybrid Approach For Fault Tolerance In Datagrid
- Senhadji sarra, MEGAIZ Samia, SADOK Riad Mustapha
|
IJCTT-V68I11P107 |
8 |
Compressed Representation of Color Information for Converting 2D Images Into 3D Models
- Poorna Banerjee Dasgupta
|
IJCTT-V68I11P108 |
9 |
Hybrid Combination of Error Back Propagation and Genetic Algorithm for Text Document Clustering
- Ashwani Mathur
|
IJCTT-V68I11P109 |
10 |
An Effective Approach to Contact Tracing Applications for Covid-19
- Aprajita Jain, Piyush Pokharkar, Pranav Ghadge, Aman Agarwal, Trupti Baraskar
|
IJCTT-V68I11P110 |
11 |
Core System Modernization
- Akshay Heroor
|
IJCTT-V68I11P111 |
12 |
A Study on QoS and Security techniques of 4G Wireless Network
- Amrutha K S, Gripsy Paul
|
IJCTT-V68I11P112 |
13 |
A Survey on DDoS Attack Detection Methods Employing Intelligent Techniques
- Vinayak P R, Gripsy Paul
|
IJCTT-V68I11P113 |