S.No | Articles | Ref. No |
1 |
Hinglish Profanity Filter and Hate Speech Detection - Nirali Arora, Aartem Singh, Laik Shaikh, Mawrah Khan, Yash Devadiga |
IJCTT-V71I2P101 |
2 |
Smoking Detection using Deep Learning - Madabhushi Aditya, Pranav Reddy Gudpati, K Sai Sidhartha Reddy, Priyanshu, Radha Karampudi |
IJCTT-V71I2P102 |
3 |
An Implementation of Change Data Capture (CDC) - Hemadri Lekkala |
IJCTT-V71I2P103 |
4 |
Bone Age Prediction with AI Models - Chi-Chang Chen, Yu-Xian Chou |
IJCTT-V71I2P104 |
5 |
Literature Review: An Efficient Clustering Approach to Big Data - Satish S. Banait, Tanuja B. Kaklij, Gauri K. Bankar, Srushti B. Hire, Digvijay B. Wagh |
IJCTT-V71I2P105 |
6 |
Exploring Popular ETL Testing Techniques - Dhamotharan Seenivasan |
IJCTT-V71I2P106 |
7 |
Amazon Redshift: Performance Tuning and Optimization - Amol Kulkarni |
IJCTT-V71I2P107 |
8 |
Region Extraction based Approach for Cigarette usage Classification using Deep Learning - Priyanshu, Madabhushi Aditya, K. Sai Sidhartha Reddy, Pranav Reddy Gudipati, Radha Karampudi |
IJCTT-V71I2P108 |
9 |
Enhancing Enterprise Application Integration through Artificial Intelligence and Machine Learning - Pradeep Kumar Dhoopati |
IJCTT-V71I2P109 |
10 |
Role of ERP Modernization in Digital Transformation: PeopleSoft Insight - Chandra Rawat |
IJCTT-V71I2P110 |
11 |
Research on Improvement of Self-Selective Routing in Wireless Sensor Networks - Chi-Chang Chen, Jung-Hung Ko |
IJCTT-V71I2P111 |
12 |
Data Sharing, Disaster Management, and Security Capabilities of Snowflake a Cloud Datawarehouse - Ravi Kashyap |
IJCTT-V71I2P112 |
13 |
Object Detection for Night Vision using Deep Learning Algorithms - Dipali Bhabad, Surabhi Kadam, Tejal Malode, Girija Shinde, Dipak Bage |
IJCTT-V71I2P113 |