Volume-68 Issue-6 Number-1 June 2020

  Title/Author Name Paper ID

Analysis of Big Data Tools and Algorithms

- Kundan Kumar, Dr. Franklin Valcin

 IJCTT-V68I6P101

Investigating Factors Affecting the Learning Process in Higher Education - A Case Study

- Wafa Ali Mohammed

 IJCTT-V68I6P102

Identification of a Person Using Iris Features: Challenges and Trends

- Deepak Singh,Mr. Mohan Rao Mamdikar

 IJCTT-V68I6P103

Review on Credit Card Fraud Detection using Machine Learning Algorithms

- Pooja, Dr. Ashlesha

 IJCTT-V68I6P104

Modeling a Unified Virtual Market Platform Using Ontologies and User Characteristics

- Daniel Khaoya Muyobo, Peters AnselemoIkoha, Franklin Wabwoba

 IJCTT-V68I6P105

Internet of Things Security By Elliptic Curve Cryptography

- Narmatha.K, Sujay.S, Arjitvijey.J

 IJCTT-V68I6P106

Architectural Approach for Implementing Access Control for Enterprise and Application Data Assets

- Imran Quadri Syed

 IJCTT-V68I6P107

An Unsupervised Clustering Approach for Twitter Sentimental Analysis: A Case Study for George Floyd Incident

- Balaji Karumanchi

 IJCTT-V68I6P108

The forensic approach uses snort from SQL injection attacks on the server

- Dian kurnia, Hendry, Muhammad Syahputra Novelan

 IJCTT-V68I6P109

Maintain and Evaluate students’ performance Using Machine Learning

- Mujthaba G.M, Gulam Mubasheer Mujtaba, Mohammed Rahmath

 IJCTT-V68I6P110

Development of Programmable Camera-Trap

- Mehmet Karakose, Canan Tastimur, Selim Özdemir, Merve Erol, Ahmet Tokgoz, Erhan Akin

 IJCTT-V68I6P111

Yolo Real Time Object Detection

- Sujata Chaudhari, Nisha Malkan, Ayesha Momin, Mohan Bonde

 IJCTT-V68I6P112

Review on Credit Card Fraud Detection using Machine Learning Algorithms

- Pooja, Dr. Ashlesha

 IJCTT-V68I6P113

Traffic Automation Using Computer Vision

- Vikas P, Meera N, Lillit Francis, Vimal Mohan

 IJCTT-V68I6P114

Text Summarization using K-Means, Tanimoto Distance & Jaccard Similarity

- Annu Sharma, Ms.Nandini Sharma

 IJCTT-V68I6P115