S.No |
Articles |
Ref. No |
1 |
Analysis of Big Data Tools and Algorithms
- Kundan Kumar, Dr. Franklin Valcin
|
IJCTT-V68I6P101 |
2 |
Investigating Factors Affecting the Learning Process in Higher Education - A Case Study
- Wafa Ali Mohammed
|
IJCTT-V68I6P102 |
3 |
Identification of a Person Using Iris Features: Challenges and Trends
- Deepak Singh,Mr. Mohan Rao Mamdikar
|
IJCTT-V68I6P103 |
4 |
Review on Credit Card Fraud Detection using Machine Learning Algorithms
- Pooja, Dr. Ashlesha
|
IJCTT-V68I6P104 |
5 |
Modeling a Unified Virtual Market Platform Using Ontologies and User Characteristics
- Daniel Khaoya Muyobo, Peters AnselemoIkoha, Franklin Wabwoba
|
IJCTT-V68I6P105 |
6 |
Internet of Things Security By Elliptic Curve Cryptography
- Narmatha.K, Sujay.S, Arjitvijey.J
|
IJCTT-V68I6P106 |
7 |
Architectural Approach for Implementing Access Control for Enterprise and Application Data Assets
- Imran Quadri Syed
|
IJCTT-V68I6P107 |
8 |
An Unsupervised Clustering Approach for Twitter Sentimental Analysis: A Case Study for George Floyd Incident
- Balaji Karumanchi
|
IJCTT-V68I6P108 |
9 |
The forensic approach uses snort from SQL injection attacks on the server
- Dian kurnia, Hendry, Muhammad Syahputra Novelan
|
IJCTT-V68I6P109 |
10 |
Maintain and Evaluate students’ performance Using Machine Learning
- Mujthaba G.M, Gulam Mubasheer Mujtaba, Mohammed Rahmath
|
IJCTT-V68I6P110 |
11 |
Development of Programmable Camera-Trap
- Mehmet Karakose, Canan Tastimur, Selim Özdemir, Merve Erol, Ahmet Tokgoz, Erhan Akin
|
IJCTT-V68I6P111 |
12 |
Yolo Real Time Object Detection
- Sujata Chaudhari, Nisha Malkan, Ayesha Momin, Mohan Bonde
|
IJCTT-V68I6P112 |
13 |
Review on Credit Card Fraud Detection using Machine Learning Algorithms
- Pooja, Dr. Ashlesha
|
IJCTT-V68I6P113 |
14 |
Traffic Automation Using Computer Vision
- Vikas P, Meera N, Lillit Francis, Vimal Mohan
|
IJCTT-V68I6P114 |
15 |
Text Summarization using K-Means, Tanimoto Distance & Jaccard Similarity
- Annu Sharma, Ms.Nandini Sharma
|
IJCTT-V68I6P115 |