S.No |
Articles |
Ref. No |
1 |
Impact of Crime Reporting System to Enhance Effectiveness of Police Service
- KN Jayasinghe, MPL Perera
|
IJCTT-V69I5P101 |
2 |
Designing and Implementing Shortest and Fastest Paths; A Comparison of Bellman-Ford algorithm, A*, and Dijkstra’s algorithms
- Al Bager A. Al Bager. R, Al Samani A. Ahmed
|
IJCTT-V69I5P102 |
3 |
An Analytical Study on Information Technology and Functionality
- Abdusalam Aldrawi, Kemal Akyol
|
IJCTT-V69I5P103 |
4 |
Amazon Web Services Security Best Practices
- Vandana Premkumar, Vinil Bhandari
|
IJCTT-V69I5P104 |
5 |
A Survey on Cloud Data Fetching Techniques and Feature Sets
- Amit Kumar Jha, Dr.Megha Kamble
|
IJCTT-V69I5P106 |
6 |
A Machine Learning Based DSS in Predicting Undergraduate Freshmen Enrolment in a Philippine University
- Dr. Joseph A. Esquivel, Dr. James A. Esquivel
|
IJCTT-V69I5P107 |
7 |
DDoS Malicious Node Detection by Jaccard and Page Rank Algorithm in Cloud Environment
- Adil Hussain Mohammed
|
IJCTT-V69I5P108 |
8 |
Secure Real Estate Transaction Platform using BlockChain And AngularJS
- K.Sunitha
|
IJCTT-V69I5P109 |
9 |
Food Item Calorie Estimation Using YOLOv4 and Image Processing
- Samidha Patil, Shivani Patil, Vaishnavi Kale, Mohan Bonde
|
IJCTT-V69I5P110 |
10 |
Text Summarization of News Events Using Semantic Triples
- Shikha Singh, Garima Srivastava
|
IJCTT-V69I5P111 |