S.No Articles Ref. No
1

Analysis of Big Data Tools and Algorithms

- Kundan Kumar, Dr. Franklin Valcin

 IJCTT-V68I6P101
2

Investigating Factors Affecting the Learning Process in Higher Education - A Case Study

- Wafa Ali Mohammed

 IJCTT-V68I6P102
3

Identification of a Person Using Iris Features: Challenges and Trends

- Deepak Singh,Mr. Mohan Rao Mamdikar

 IJCTT-V68I6P103
4

Review on Credit Card Fraud Detection using Machine Learning Algorithms

- Pooja, Dr. Ashlesha

 IJCTT-V68I6P104
5

Modeling a Unified Virtual Market Platform Using Ontologies and User Characteristics

- Daniel Khaoya Muyobo, Peters AnselemoIkoha, Franklin Wabwoba

 IJCTT-V68I6P105
6

Internet of Things Security By Elliptic Curve Cryptography

- Narmatha.K, Sujay.S, Arjitvijey.J

 IJCTT-V68I6P106
7

Architectural Approach for Implementing Access Control for Enterprise and Application Data Assets

- Imran Quadri Syed

 IJCTT-V68I6P107
8

An Unsupervised Clustering Approach for Twitter Sentimental Analysis: A Case Study for George Floyd Incident

- Balaji Karumanchi

 IJCTT-V68I6P108
9

The forensic approach uses snort from SQL injection attacks on the server

- Dian kurnia, Hendry, Muhammad Syahputra Novelan

 IJCTT-V68I6P109
10

Maintain and Evaluate students’ performance Using Machine Learning

- Mujthaba G.M, Gulam Mubasheer Mujtaba, Mohammed Rahmath

 IJCTT-V68I6P110
11

Development of Programmable Camera-Trap

- Mehmet Karakose, Canan Tastimur, Selim Özdemir, Merve Erol, Ahmet Tokgoz, Erhan Akin

 IJCTT-V68I6P111
12

Yolo Real Time Object Detection

- Sujata Chaudhari, Nisha Malkan, Ayesha Momin, Mohan Bonde

 IJCTT-V68I6P112
13

Review on Credit Card Fraud Detection using Machine Learning Algorithms

- Pooja, Dr. Ashlesha

 IJCTT-V68I6P113
14

Traffic Automation Using Computer Vision

- Vikas P, Meera N, Lillit Francis, Vimal Mohan

 IJCTT-V68I6P114
15

Text Summarization using K-Means, Tanimoto Distance & Jaccard Similarity

- Annu Sharma, Ms.Nandini Sharma

 IJCTT-V68I6P115