S.No |
Articles |
Ref. No |
1 |
Cryptocurrency Investment Learning For Beginners Through E-learning Application Development In Indonesia
- Pualam Dipa Nusantara, Alvaro Louis Tombilayuk, Yesaya Kevinedo Delroyvitto
|
IJCTT-V73I2P101 |
2 |
Cybersecurity for Critical Infrastructure: Protecting National Assets in the Digital Age
- Rajender Pell Reddy
|
IJCTT-V73I2P102 |
3 |
Modernize Manufacturing: Powered by Google Cloud
- Manas Srivastava
|
IJCTT-V73I2P103 |
4 |
D-K8S: Container Orchestration Through Nodes Empowerment and Participation
- Indravadan Patel
|
IJCTT-V73I2P104 |
5 |
A Survey of Compression Methods for Efficient Model Inferencing
- Dhivya Nagasubramanian
|
IJCTT-V73I2P105 |
6 |
Empirical Study on The Role of Explainable AI (XAI) in Improving Customer Trust in AI-Powered Products
- Devendra Singh Parmar, Hemlatha Kaur Saran
|
IJCTT-V73I2P106 |
7 |
Leveraging Machine Learning for Enhanced Automation Testing
- Saumen Biswas
|
IJCTT-V73I2P107 |
8 |
Exploring Multimodal Large Language Models for Next-Generation Recommendation Systems
- Kailash Thiyagarajan
|
IJCTT-V73I2P108 |
9 |
Ensuring Data Confidentiality through an In-Depth Analysis of Advanced Privacy-Preserving Methodologies in Data Science
- Vikas Kumar Jain, Jayesh Patil, Ashish Kumar Jain
|
IJCTT-V73I2P109 |
10 |
Machine Identity Security in Cloud & AI: Ensuring Lifecycle Management, Ownership, and Accountability for Non-Human Identities
- Anant Wairagade
|
IJCTT-V73I2P110 |
11 |
Video Summarization with Neural Networks: A Systematic Comparison of State-of-the-Art Techniques
- M. Hamza Eissa, Hesham Farouk, Kamal Eldahshan, Amr Abozeid
|
IJCTT-V73I2P111 |