S.No Articles Ref. No
1

A Cyber-Threat Intelligence Framework for Improved Internet Facilitated Organized Crime Threat Management

- Oluwafemi Oriola

 IJCTT-V60P101
2

 A Survey : Adoption of Cloud Computing in Education Sector

- Nishant Katiyar,Dr. Rakesh Bhujade

 IJCTT-V60P102
3

 Redefining Web Revisitation Process using Content and Context Keywords

- Bhagyashree, Assoc.Prof.Jyoti Patil

 IJCTT-V60P103
4

 Evaluation of Parsing Techniques in Natural Language Processing

- Ankita Nohria, Harkiran Kaur

 IJCTT-V60P104
5

 A Novel SCMAC Protocol for Vehicular Network to Access Control Channel

- S.J.Sujitha, Dr.U.Kumaran, Mr. J. P. Jayan

 IJCTT-V60P105
6

A Medical ChatBot

- Mrs. Rashmi Dharwadkar, Dr.Mrs. Neeta A. Deshpande

 IJCTT-V60P106
7 Bespoke Travel Recommendation System on Social Media

- M.Saranya ,A.Prema

 IJCTT-V60P107
8

 Analyzing the Popularity of A City (Hyd) Through Twitter Data

- Vaddadi Vasudha Rani , Dr.K.Sandhya Rani

 IJCTT-V60P108
9

Multi-Criteria Multi Path Routing Protocol using Fuzzy Cardinality Priority Ranking

- Supreet Kaur, Mandeep Singh Bandral

 IJCTT-V60P109
10

3D Modeling of the Ball Bearing for the Front Axle Knuckle

- Rami Matarneh, Svitlana Sotnik, Vyacheslav Lyashenko

 IJCTT-V60P110
11

Leveraging Crowd Sourcing for Proficient Malevolent Users Revealing In Social Networks

- R.Madhubala,A.Prema

 IJCTT-V60P111
12

 Cloud Computing: Effective Concepts

- M E Purushoththaman

 IJCTT-V60P112
13

 Design and Implementation of Remote Data Possession Checking Protocol using Homomorphic Hash Fuction for Cloud Data

- Ajay S Kulkarni, Guntumadugu Girish Raj

 IJCTT-V60P113
14

Text Classification using Bi-Gram Alphabet Document Vector Representation

- Fatma Elghannam

 IJCTT-V60P114
15

A Smart App for Mobile Phones to Top-Up User Accounts for Any Network Service Provider in SriLanka

- C. L. Ishani S. Fonseka

 IJCTT-V60P115