S.No |
Articles |
Ref. No |
1 |
Towards Comprehensive Approach to Information Security Management: Empowering the Human Factor for Enhanced Security
- Abbas H. Imam
|
IJCTT-V71I8P101 |
2 |
A Framework for Enhancing Computer Network Dependability in Universities
- James Ekadakada Omasaja, Betty Mayeku, Daniel Otanga
|
IJCTT-V71I8P102 |
3 |
An Analysis of Data Quality Requirements for Machine Learning Development Pipelines Frameworks
- Sandeep Rangineni
|
IJCTT-V71I8P103 |
4 |
API Integration using GraphQL
- Anshumali Ambasht
|
IJCTT-V71I8P104 |
5 |
Internet of Things (IoT) and its Application to Insurance Systems & Technology
- Neeraj Kaushik
|
IJCTT-V71I8P105 |
6 |
Data Democratization: Empowering Non-Technical Users with Self-Service BI Tools and Techniques to Access and Analyze Data Without Heavy Reliance on IT Teams
- Alekhya Achanta
|
IJCTT-V71I8P106 |
7 |
A Study on Fake News Detection Techniques using Machine Learning
- Rohan Prasad, Ambar Dutta
|
IJCTT-V71I8P107 |
8 |
Indexing Robotic Process Automation Products
- Shreekant Mandvikar
|
IJCTT-V71I8P108 |
9 |
Kubernetes and Docker: An Introduction to Container Orchestration and Management
- Sumit Sachdeva
|
IJCTT-V71I8P109 |
10 |
Enhancing Glaucoma Detection: An Integrated Approach Using Virtual Reality and Artificial Intelligence for Visual Field Testing
- Manas Joshi
|
IJCTT-V71I8P110 |
11 |
Automation of Vendor Invoice Process with OpenText Vendor Invoice Management
- Venkata Sathya Kumar Koppisetti
|
IJCTT-V71I8P111 |