S.No |
Articles |
Ref. No |
1 |
A Cyber-Threat Intelligence Framework for Improved Internet Facilitated Organized Crime Threat Management
- Oluwafemi Oriola
|
IJCTT-V60P101 |
2 |
A Survey : Adoption of Cloud Computing in Education Sector
- Nishant Katiyar,Dr. Rakesh Bhujade
|
IJCTT-V60P102 |
3 |
Redefining Web Revisitation Process using Content and Context Keywords
- Bhagyashree, Assoc.Prof.Jyoti Patil
|
IJCTT-V60P103 |
4 |
Evaluation of Parsing Techniques in Natural Language Processing
- Ankita Nohria, Harkiran Kaur
|
IJCTT-V60P104 |
5 |
A Novel SCMAC Protocol for Vehicular Network to Access Control Channel
- S.J.Sujitha, Dr.U.Kumaran, Mr. J. P. Jayan
|
IJCTT-V60P105 |
6 |
A Medical ChatBot
- Mrs. Rashmi Dharwadkar, Dr.Mrs. Neeta A. Deshpande
|
IJCTT-V60P106 |
7 |
Bespoke Travel Recommendation System on Social Media
- M.Saranya ,A.Prema
|
IJCTT-V60P107 |
8 |
Analyzing the Popularity of A City (Hyd) Through Twitter Data
- Vaddadi Vasudha Rani , Dr.K.Sandhya Rani
|
IJCTT-V60P108 |
9 |
Multi-Criteria Multi Path Routing Protocol using Fuzzy Cardinality Priority Ranking
- Supreet Kaur, Mandeep Singh Bandral
|
IJCTT-V60P109 |
10 |
3D Modeling of the Ball Bearing for the Front Axle Knuckle
- Rami Matarneh, Svitlana Sotnik, Vyacheslav Lyashenko
|
IJCTT-V60P110 |
11 |
Leveraging Crowd Sourcing for Proficient Malevolent Users Revealing In Social Networks
- R.Madhubala,A.Prema
|
IJCTT-V60P111 |
12 |
Cloud Computing: Effective Concepts
- M E Purushoththaman
|
IJCTT-V60P112 |
13 |
Design and Implementation of Remote Data Possession Checking Protocol using Homomorphic Hash Fuction for Cloud Data
- Ajay S Kulkarni, Guntumadugu Girish Raj
|
IJCTT-V60P113 |
14 |
Text Classification using Bi-Gram Alphabet Document Vector Representation
- Fatma Elghannam
|
IJCTT-V60P114 |
15 |
A Smart App for Mobile Phones to Top-Up User Accounts for Any Network Service Provider in SriLanka
- C. L. Ishani S. Fonseka
|
IJCTT-V60P115 |