S.No |
Articles |
Ref. No |
1 |
Analysis and Design Information System Personal Financial Management Based on Android
- Riad Sahara, Hendra Prastiawan, Ahmad Adi Pratama
|
IJCTT-V57P101 |
2 |
Impact of Semantic Coding of Emotional Speech on Speech Coding Performance
- Firos A , Utpal Bhattacharjee
|
IJCTT-V57P102 |
3 |
Prediction of Rabbit Population with Computer Application using Biotechnology
- Olagunju, M., Adeniyi, A. E. and Oladele, T. O.
|
IJCTT-V57P103 |
4 |
Impact of Data Mining on Big Data Analytics: Challenges and Opportunities
- Priyanka Gautam,Prof (Dr.) Y.P Singh
|
IJCTT-V57P104 |
5 |
Smart Energy Management Using Internet of Things
- R. Prashanth,K.M. Viknes,P. Yuvaraj,Dr. C. Geetha
|
IJCTT-V57P105 |
6 |
MESH Encryption : A Multifarious Synchronized Haze
- Akshay R, Persis Urbana Ivy B, Shanmugapriya S, Anandha Vishnu P
|
IJCTT-V57P106 |
7 |
IT Services Evaluation Model Based on Fuzzylogic
- Mohammed Alfarhan, Mahmoud Kamel and Mostafa Saleh
|
IJCTT-V57P107 |
8 |
Applied Constraints on Sequential Pattern Mining with Prefixspan Algorithm
- Kalpesh A. Kshatriya, Bhavikkumar M. Patel, Hitesh B. Patel
|
IJCTT-V57P108 |
9 |
Predicting the Semantic Orientation of Communication Over Social Networking
- Harshal Mittal
|
IJCTT-V57P109 |
10 |
IOT Based Health Monitoring Wearable Device Using Security Mechanisms for Storage
- Mrs. G. Abinaya, Mr. Kartik Singh Rathore, Ms. Anushka Khandelwal, Mr. Ritik Raj, Ms. Sonal Gupta
|
IJCTT-V57P110 |
11 |
Fully homomorphic computation- A scheme to provide end-to-end data confidentiality in the cloud
- Priyanka C, Priya Darshini C, Vinayak G Shavi, Sarvar Begum
|
IJCTT-V57P111 |
12 |
Test Case Generation Techniques
- Anchal Chauhan, Ravi Shankar Singhal, Pramod Kumar Yadav
|
IJCTT-V57P112 |
13 |
Performance evaluation of Reactive routing protocols in MANET using NS-3 Simulation
- Tarali Kalita, Prof. Shikhar Kr. Sarma
|
IJCTT-V57P113 |
14 |
Extraction and Analytics from Twitter Social Media with Pragmatic Evaluation of MySQL Database
- Abhijit Bandyopadhyay
|
IJCTT-V57P114 |
15 |
A Novel Method for Home Security by Face Recognition system to visually Impaired
- Soppari Kavitha , Illuri Kalyan Kumar, Dandiveni nakul Kumar
|
IJCTT-V57P115 |
16 |
Enhancing Binary Classification by Modeling Uncertaion Boundary in Three Way Decision using Multi Document Classification
- N.Murugan
|
IJCTT-V57P116 |
17 |
Securing Data Storage by Virtualization in Cloud using Cryptography Protocols
- Nuthakki praveena, k.madhavi, Geetha. G
|
IJCTT-V57P117 |
18 |
Hashtag Sentiment Analysis using Tweets for the Ternary Classification
- Jael Jayakumar , Indira Tamilselvam , Blessy Selvam
|
IJCTT-V57P118 |
19 |
Survey Paper on Cervical Cancer Detection Through Artificial Intelligence Techniques
- R.Rajpriya, Dr.M.S.Saravanan
|
IJCTT-V57P119 |
20 |
Survey on Various Wavelets Based and Fuzzy Based Methods for Satellite Image Enhancement
- Ekta Mishra, Ankita singh
|
IJCTT-V57P120 |