S.No | Articles | Ref. No |
1 |
Overcoming Security issues using OpenCV and Machine learning - Aditi, Vivek Kumar Jha, Saikat Maity |
IJCTT-V67I5P101 |
2 |
Improved Features in Integrated Smart Campus System - J.Vinoth Kumar,S.Pathur Nisha ,K.Arun Patrick, P.Shanthi |
IJCTT-V67I5P102 |
3 |
Cloud Computing Effect on Enterprises in Terms of Cost - Haleem Khan, Yu Jiong |
IJCTT-V67I5P103 |
4 |
- Muhammad Danish |
IJCTT-V67I5P104 |
5 |
Android Information Leak Potential in Benign, Malware, and Commercial Spyware Applications - Nerijus Šatkauskas |
IJCTT-V67I5P105 |
6 |
Convolutional Neural Network for Detection of Sign Language - Dr.Mahesh kaluti, Manoj Athreya C.S, Manish M.G,M.P Mahadeva Aradhya,Raghavendra S |
IJCTT-V67I5P106 |
7 |
Business Stimulation Strategies of Cloud Computing - Khaled Elbehiery, Hussam Elbehiery |
IJCTT-V67I5P107 |
8 |
Database Security –Threats & Prevention - Simanta Shekhar Sarmah |
IJCTT-V67I5P108 |
9 |
Acne Detection and Classification System - T M Geethanjali, Apoorva M, Noopur G, Priyadarshini H S, Varun P |
IJCTT-V67I5P109 |
10 |
Cache Contention on Multicore Systems An Ontology-based Approach - Maruthi Rohit Ayyagari |
IJCTT-V67I5P110 |
11 |
- Dr. Kamaljit Kaur , Tajinder Singh Sahdev , Anmoldeep Singh Sahdev |
IJCTT-V67I5P111 |
12 |
Ant ColonyPerformance Evaluation and Optimization–based Resource Allocation for D2D Communication - Mohammed Mahmoud Abd El-Hamid Nasr , Mohamed Fared Zaghloul , Reda Abo Elez , Ahmed Rashad Khalifa |
IJCTT-V67I5P112 |
13 |
Clustering-Based Data Analysis With Hadoop - Ms. Shweta Bhonde, Prof. Mirza Baig |
IJCTT-V67I5P113 |
14 |
Sentiment Analysis Using Twitter Data - Remya B Nair, Sruthimol E K |
IJCTT-V67I5P114 |
15 |
Suggesting Suitable Economic And Political Leaders Using Fuzzy-Analytic Hierarchy Process (Fahp) - AJAYI, Olusola Olajide,ADERELE, Tolulope Busayo,ELEMESE, Tolulope Olawale, ADETUYI, Tolu Emmanuel |
IJCTT-V67I5P115 |