S.No Articles Ref. No
 21

Survey Paper on Secure Digital Cash Payment through Coin Management

- Dr.P.Chandra Sekhar

 IJCTT-V49P121
 22

Dictionary Based Text Filter for Lossless Text Compression

- Rexline S. J, Robert L, Trujilla Lobo.F

 IJCTT-V49P122
 23

Big Data Security and Privacy- A Survey

- Mrs. Shanmugapriya. E, Dr. R.Kavitha

 IJCTT-V49P123
 24

Internet Filtration and Internet Neutrality

- Nand Kumar Singh

 IJCTT-V49P124
 25

Review Paper on Big Data Analytics in Cloud Computing

- Saneh Lata Yadav, Asha Sohal

 IJCTT-V49P125
 26

A Face Recognition System using Convolutional Neural Network and Generalized with Facial Expression

- C.R Vimalchand, Dr. G.P Ramesh Kumar

 IJCTT-V49P126
 27

A Novel Method to Monitor Threats in Cloud Computing Environment

- K.Arthi, M.Rajeev Kumar, B.Bhagyashree

 IJCTT-V49P127
 28

Implementation of Word Count- Hadoop Framework with Map Reduce Algorithm

- Keerthi.Bangari, Sujitha.Meduri, Ch.CY.Rao

 IJCTT-V49P128
 29

Agricultural Data Visualization for Prescriptive Crop Planning

- Harshitha B P, Amith R, Abhishek S, Rohit Vibhu C

 IJCTT-V49P129
 30

Mixed Round Robin Scheduling for Real Time Systems

- Pallab Banerjee, Biresh Kumar, Probal Banerjee

 IJCTT-V49P130
 31

Review of online shopping security protocol of EC: SSL and SET

- Vishakha Prabhakar Rode

 IJCTT-V49P131
 32

Challenges and Prosperity Research in Cloud Computing

- Niharika Singh, Ajay Jangra

 IJCTT-V49P132
 33

Designing Nanotechnology Based QCA Full Adders

- Wani Shah Jahan

 IJCTT-V49P133
 34

Genetic Algorithm Approach For Test Case Generation Randomly: A Review

- Deepak kumar, Manu Phogat

 IJCTT-V49P134
 35

The Technologies of Voice over Internet Protocol (VoIP) Based Telephony System: A Review

- Odii J. N., Nwokoma F.O., Onwuama T.U., Ejem A

 IJCTT-V49P135
 36

Vehicle Assisted Data Delivery using Ant Colony Optimization

- Ishwarpreet Kaur Grewal, Dr. Sandeep Harit

 IJCTT-V49P136
 37

Kinematics Analysis and Simulation of Six - DOF Industrial Robot

- Linna Xu, Zhenhua Wang, Yameng Zhai

 IJCTT-V49P137
 38

Bounds for the Zeros of a Lacunary Polynomial

- M.H. Gulzar, Ajaz Wani

 IJCTT-V49P138
 39

An Approach for Detecting and Preventing SQL Injection and Cross Site Scripting Attacks using Query sanitization with regular expression

- Monali Sachin Kawalkar, Dr. P. K. Butey

 IJCTT-V49P139
 40

Cloud Computing – Key Hashing Cryptographic Implication based Algorithm for Service Provider based Encryption and Decryption

- D. Ramesh, Dr. B, Rama

 IJCTT-V49P140
 41

Image Enhancement of Medical Images Based on an Efficient Approach of Morphological and Arithmetic Operations

- Usha Ramasamy, Perumal K

 IJCTT-V49P141
 42

Study of Windows based .NET ANEKA in Cloud Computing

- Bimal. VO, Sreya. PP

 IJCTT-V49P142
 43

A Survey on Automatic Question-answering process in Speech using Spoken term detection

- M.Mamatha, T.Bhaskar Reddy

 IJCTT-V49P143