S.No |
Articles |
Ref. No |
1 |
A Systematic Review of Bluetooth Security Threats, Attacks & Analysis
- Tahira Ali, Rashid Baloch, Mohsan Azeem, Dr.Muhammad Farhan, Sana Naseem, Bushra Mohsin
|
IJCTT-V69I7P101 |
2 |
Plants Disease Detection using Image Processing Techniques
- Dr. Suresh M B, Poorvika N, Sri Priya K, Varsha S, Sushma P Nagesh
|
IJCTT-V69I7P102 |
3 |
Locomotion Control Framework for Snake-like Robot using Deep Reinforcement Learning
- Obe Olumide O, Ayogu Thomas O
|
IJCTT-V69I7P103 |
4 |
Air Quality Monitor using Arduino
- Anannya Patra, Arvind S, Gautham M K, Sreelatha R
|
IJCTT-V69I7P104 |
5 |
Stock Market Prediction Using Novel Deep Learning Approaches: A Review
- Munjal Shah
|
IJCTT-V69I7P105 |
6 |
At The Cost of Consumer’s Privacy, Data Becomes The Most Expensive Digital Currency
- Munjal Shah
|
IJCTT-V69I7P106 |
7 |
Quality Assurance Factors: Key Aspects for Software Quality Control and Testing
- Kishan N Milan
|
IJCTT-V69I7P107 |
8 |
Detection of Mesoscale Eddies using Structural Statistical Feature
- Baomin Shao, Hongyun Jia
|
IJCTT-V69I7P108 |
9 |
Self-Organizing Information for Approaching AI by Relative Entropy
- I-HO Lee
|
IJCTT-V69I7P109 |
10 |
Machine Learning In Healthcare for Chronic Kidney Disease Prediction
- Pranjali Kasture
|
IJCTT-V69I7P110 |
11 |
Analysis of IT Capability Impact On Organizational Performance
- Phumzile Dorcus Mogoale, Prof Ray M Kekwaletswe, Aubrey Mongale
|
IJCTT-V69I7P111 |