International Journal of Computer
Trends and Technology
Volume 69 Issue 3
Research Article IJCTT-V69I3P101
Comparison of Apache SOLR Search Spellcheck String Distance Measure – Levenshtein, Jaro Winkler, and N-Gram
Parameswara Rao Kandregula
Research Article IJCTT-V69I3P103
Data Transfer Between RDBMS and HDFS By Using the Spark Framework in Sqoop for Better Performance
Hariteja Bodepudi
Research Article IJCTT-V69I3P104
The Implementation of Soft System Methodology (SSM) in Designing KJP-Shop Application
Dwi Wulandari Sari, Kurnia Gusti Ayu
Research Article IJCTT-V69I3P105
An Application of Soft System Methodology for Developing SIPI (The Indonesian Translators Information System)
Kurnia Gusti Ayu, Dwi Wulandari Sari
Research Article IJCTT-V69I3P106
Phishing Website Detection Using Ensemble Technique
Priyanka Sharma, Rajni Ranjan Singh Makwana
Research Article IJCTT-V69I3P107
Edge Computing – Benefits, Use Cases, Challenges, and Best Practices
Prashant Tyagi
Research Article IJCTT-V69I3P108
Graduate Teaching Through SWAYAM: A Comprehensive Analysis
Pranav Mathur, Sumaiya Jawed, Narayan Sharma, Anju Kaicker
Research Article IJCTT-V69I3P109
Analysis of Optimization Technique of Same Program Written in Two Different Interfaces i.e. CUI and GUI Using Java and Calculate Their Differences
Dr. Arpana Chaturvedi, Dr. Deepti Khanna, Deepit Aggarwal, Ayush Prasad
Research Article IJCTT-V69I3P110
A Survey on Block Cipher and Chaotic Based Encryption Techniques
Jyoti Kansari, Avinash Dhole, Yogesh Rathore
Research Article IJCTT-V69I3P111
A Survey On The Increase In Autism Spectrum Disorders Rate And Present Treatments In India
Dr. S.Selvi, Mrs.D. Mohanapriya, Dr.P.Thamilselvan, Ms.Shamle Raj.N
Research Article IJCTT-V69I3P112
Media Multitasking: A Cross-Cultural Study
Joseph Gray, Damian Schofield
Research Article IJCTT-V69I3P113
Web Service on Android Mobile Platform in Application of Tourism Infrastructure Information
Sariyun Naja Anwar, Isworo Nugroho, Rina Candra Noor Santi, Edy Supriyanto
Research Article IJCTT-V69I3P114
Detection of Violent E-mails Using Fuzzy Logic
Victoria Oluwatoyin Oyekunle, Prince Oghenekaro Asagba, Fubara Egbono