S.No |
Articles |
Ref. No |
1 |
Password Security using Mutation Technique in Cloud Computing
- Priyank Singh, Shobhit Kukreti, Tanvi Hungund
|
IJCTT-V72I8P101 |
2 |
DevOps Deciphered: A Comparative Analysis of Tools Powering the DevOps Revolution
- Junaid Jagalur
|
IJCTT-V72I8P102 |
3 |
AI-Driven Load Balancing for Energy-Efficient Data Centers
- Harish Janardhanan
|
IJCTT-V72I8P103 |
4 |
Predictive Analytics in Data Engineering
- Manohar Sai Jasti
|
IJCTT-V72I8P104 |
5 |
AI and Cybersecurity in 2024: Navigating New Threats and Unseen Opportunities
- Praveen Tripathi
|
IJCTT-V72I8P105 |
6 |
House of Cards: Framework for Memory Experiments in VR
- Priyank Singh
|
IJCTT-V72I8P106 |
7 |
E-Stylist: A Machine Learning Aided Fashion Stylist
- Priyank Singh, Nishtha Ahuja
|
IJCTT-V72I8P107 |
8 |
Big Data Integration with ERP Systems for Innovation and Efficiency
- Pratiksha Agarwal
|
IJCTT-V72I8P108 |
9 |
Big Data Engineering Using Hadoop and Cloud (GCP/AZURE) Technologies
- Shrikaa Jadiga
|
IJCTT-V72I8P109 |
10 |
Chain Reaction: Analyzing Trends and Crafting Defenses Against Software Supply Chain Attacks
- Varadharaj Varadhan Krishnan
|
IJCTT-V72I8P110 |
11 |
Advanced Sales Prediction for ERP Systems Using Generative Adversarial Networks
- Pratiksha Agarwal
|
IJCTT-V72I8P111 |
12 |
Enhancing Endpoint Security through Collaborative Zero-Trust Integration: A Multi-Agent Approach
- Rajender Reddy Pell Reddy
|
IJCTT-V72I8P112 |
13 |
Integrating CRM and ERP Insights for Optimized Product Development Using CNN-LSTM Hybrid Models
- Arun Gupta, Pratiksha Agarwal
|
IJCTT-V72I8P113 |
14 |
A Practical Overview of Real-Time System Implementation in Linux Kernel
- Shobhit Kukreti, Priyank Singh, Tanvi Hungund
|
IJCTT-V72I8P114 |
15 |
Visualizing Higher-Dimensional Data
- Atmajitsinh Gohil
|
IJCTT-V72I8P115 |
16 |
Leveraging Technology for Financial Compliance Excellence
- Mukta Sharma, Krunal Patel
|
IJCTT-V72I8P116 |
17 |
Exploring Cloud Computing Adoption in Supply Chain Management: Key Drivers and Challenges
- Sanjay Vijay Mhaskey
|
IJCTT-V72I8P117 |
18 |
Large Language Models: Revolutionizing Pervasive Computing
- Meenakshi Sundaram Ambasamudram Sailappan
|
IJCTT-V72I8P118 |
19 |
Enhancing Query Performance Through Relational Database Indexing
- Ankit Anchlia
|
IJCTT-V72I8P119 |
20 |
Preparing for the Unexpected Outages for Your Mission-Critical Cloud Infrastructure with Confidence
- Prasad Gandham, Ramakanth Damodaram, Sunit Randhawa
|
IJCTT-V72I8P120 |
21 |
Optimizing Business Processes in IT Security through Automated Reporting and Risk Assessment
- Sangeeta Harish Rijhwani, Raghavaiah Avula
|
IJCTT-V72I8P121 |
22 |
Towards a Decision Support Tool for Service Identification in Service-Oriented Architecture
- Iheb Abdellatif, Amar Ramudhin
|
IJCTT-V72I8P122 |
23 |
Automated Validation Framework in Machine Learning Operations for Consistent Data Processing
- Sevinthi Kali Sankar Nagarajan, Rajesh Remala, Krishnamurty Raju Mudunuru, Sandip J. Gami
|
IJCTT-V72I8P123 |
24 |
Optimizing Rail Track Maintenance by Integrating Geometry Data with Cloud Data Lake and IoT
- Ram Sekhar Bodala, Lakshmana Rao Koppada, Harshavardhan Yedla
|
IJCTT-V72I8P124 |
25 |
Implementing Serverless Computing Architectures for Expandable and Cost-Effective Cloud Applications
- Joel Lopes, Ceres Dbritto
|
IJCTT-V72I8P125 |
26 |
AI-Powered Networked Management: The Future of MVNOs and MVNAs
- Karthick Cherladine
|
IJCTT-V72I8P126 |
27 |
Innovative Telecom: MVNOs and MVNAs Leveraging Cloud-Based Technologies
- Karthick Cherladine
|
IJCTT-V72I8P127 |
28 |
Applications of Generative AI in Modern Operating Rooms
- Suvin Seal
|
IJCTT-V72I8P128 |
29 |
SFTP Integration Method – An Option to Consider in SAP ERP Integration Projects
- Shyam Patel,Vishal Palaskar
|
IJCTT-V72I8P129 |
30 |
Leveraging Artificial Intelligence and Machine Learning for Data-Driven Marketing Strategy: A Framework for Marketing Managers
- Vishvesh Soni
|
IJCTT-V72I8P130 |
31 |
SAP Business Transformation: Steps for Effective Cutover and Data Migration
- Saurav Mago
|
IJCTT-V72I8P131 |
32 |
Open Source and Open Targets: A Comprehensive Analysis of Software Supply Chain Attacks in Open-Source Software
- Varadharaj Varadhan Krishnan
|
IJCTT-V72I8P132 |
33 |
Bibliometric Analysis of Artificial Intelligence and Focus in Morocco: A Comprehensive Study (2014-2023)
- Samiya TAMTAM, Ahmed LAGUIDI, Abderafiaa ELKALAY
|
IJCTT-V72I8P133 |