S.No Articles Ref. No
1

Towards Comprehensive Approach to Information Security Management: Empowering the Human Factor for Enhanced Security

- Abbas H. Imam

 IJCTT-V71I8P101
2

A Framework for Enhancing Computer Network Dependability in Universities

- James Ekadakada Omasaja, Betty Mayeku, Daniel Otanga

 IJCTT-V71I8P102
3

An Analysis of Data Quality Requirements for Machine Learning Development Pipelines Frameworks

- Sandeep Rangineni

 IJCTT-V71I8P103
4

API Integration using GraphQL

- Anshumali Ambasht

 IJCTT-V71I8P104
5

Internet of Things (IoT) and its Application to Insurance Systems & Technology

- Neeraj Kaushik

 IJCTT-V71I8P105
6

Data Democratization: Empowering Non-Technical Users with Self-Service BI Tools and Techniques to Access and Analyze Data Without Heavy Reliance on IT Teams

- Alekhya Achanta

 IJCTT-V71I8P106
7

A Study on Fake News Detection Techniques using Machine Learning

- Rohan Prasad, Ambar Dutta

 IJCTT-V71I8P107
8

Indexing Robotic Process Automation Products

- Shreekant Mandvikar

 IJCTT-V71I8P108
9

Kubernetes and Docker: An Introduction to Container Orchestration and Management

- Sumit Sachdeva

 IJCTT-V71I8P109
10

Enhancing Glaucoma Detection: An Integrated Approach Using Virtual Reality and Artificial Intelligence for Visual Field Testing

- Manas Joshi

 IJCTT-V71I8P110
11

Automation of Vendor Invoice Process with OpenText Vendor Invoice Management

- Venkata Sathya Kumar Koppisetti

 IJCTT-V71I8P111