S.No |
Articles |
Ref. No |
1 |
A Novel Framework for Construing User Search Intension with Feedback sessions
- Shaheen, M. Satyanarayana Reddy, Prof.S.V.Achutha Rao
|
IJCTT-V18P103 |
2 |
A Secure Online Application Safeguarding Data with Stegnography based Watermarking
- Swathi Voddi, Santhi Chavala, Prof.S.V.Achutha Rao
|
IJCTT-V18P106 |
3 |
Tracking of Local Area Adversaries in Wireless Sensor Networks
- P. Seetha Ramakrishna , P. Samba Siva Rao , Abdul Vahed
|
IJCTT-V18P131 |
4 |
Wireless Sensor Expedition of Extensive Choice to Preserve the Quality
- Alivelu Manga Tayi Ch S , B.V.S. Varma , Abdul Vahed
|
IJCTT-V18P132 |
6 |
Securely Data Sharing with Indeterminate ID Allocation
- V. Lasya , M. Prasanthi , Abdul Vahed
|
IJCTT-V18P133 |
7 |
A Statistical Survey on Imperial Data Handling in Big Data
- T. Princess Raichel, S.Kokila, N.Sowmya
|
IJCTT-V18P134 |
8 |
Secure User Authentication & Graphical Password using Cued Click-Points
- Miss.Saraswati B.Sahu, Associate Prof. Angad Singh
|
IJCTT-V18P137 |
9 |
Secure and Privacy-Preserving Distributed File Systems on Load Rebalancing in Cloud Computing
- A Sumanth, Bhaludra Raveendranadh Singh, Moligi Sangeetha
|
IJCTT-V18P139 |
10 |
Object classification Techniques using Machine Learning Model
- Er. Navjot Kaur, Er. Yadwinder Kaur
|
IJCTT-V18P140 |
11 |
Telecommunications Infrastructure Consequence to Economic Growth in Malaysia: Time Series Analysis
- Shairil Izwan Taasim, Remali Yusoff
|
IJCTT-V18P141 |
12 |
A Novel Integrated Approach for Big Data Mining
- Ritu Katarha, Hareram Shah
|
IJCTT-V18P144 |
13 |
Image Restoration Technique for Fog Degraded Image
- Sheelu Mishra, Mrs. Tripti Sharma
|
IJCTT-V18P146 |
14 |
Enhanced Classification to Counter the Problem of Cluster Disjuncts
- Syed Ziaur Rahman, Dr.G. Samuel Vara Prasad Raju
|
IJCTT-V18P148 |
15 |
Automation of Ash Handling System with Event Logger
- Prof. A.S.Wadhawe , Rahul P. Kurtadikar
|
IJCTT-V18P150 |
16 |
Conditional Activity-Based Model for Describing User Experience Using Category Theory
- Ahmed A. A. Gad-Elrab , Kamal A. ElDahshan , Mahmoud E. Embabi
|
IJCTT-V18P151 |
17 |
Towards Innovative System for Hadith Isnad Processing
- Moath M. Najeeb
|
IJCTT-V18P154 |
18 |
Learning Analytics: A Survey
- Usha Keshavamurthy , Dr. H S Guruprasad
|
IJCTT-V18P155 |
19 |
An Approach for Detecting and Preventing DoS Attacks in LAN
- Majed Tabash , Tawfiq Barhoom
|
IJCTT-V18P156 |
20 |
Extended SQL Aggregation for Database Transformation
- Archana A. Chaudhari , Harmeet Kaur Khanuja
|
IJCTT-V18P157 |
21 |
Assessing Moodle as Learning Management System Platform for English Course Based TOEFL
- Irfan Syamsuddin , Alimin
|
IJCTT-V18P158 |