sitemap
- IJCTT
- Comparative Analysis of Traditional and AI-Driven Data Governance: A Systematic Review and Future Directions in IT
- Effective Multi Cloud Security Using AI Technologies
- Scalable AI Model Deployment with AWS SageMaker and EKS
- Exploring Data Security and Privacy Challenges in Master Data Governance Systems
- Building Autonomous AI Agents based AI Infrastructure
- The Future of Customer Experience is now: How AI is Leading the Charge in Customer-Centric Innovation
- Advancements and Challenges in Face Recognition Technology
- A Review of Machine Learning Based Approaches for Solar Irradiation Forecasting
- Machine Learning Algorithms and its Impact on Customer Engagement
- Challenges, Solutions, and Best Practices in Post Deployment Monitoring of Machine Learning Models
- Investigating the Relationship between Fuel Consumption and Fuel Properties: A Regression Analysis
- SAP HANA Workload Management: A Comprehensive Study on Workload Classes
- Cybersecurity in Healthcare: Protecting Critical Infrastructure Against Evolving Threats
- Enhancing Microservice Resiliency and Reliability on Kubernetes with Istio: A Site Reliability Engineering Perspective
- AWS Event Driven Architecture
- Volume-72 Issue-11 November 2024
- Examine the Role of WAAP, WAF, TLS and mTLS in Protecting APIs from Advance Cyber Attacks
- Navigating Integration Complexities in Hybrid BI and Data Lake Architectures
- Optimizing A/B Testing in React Native Mobile Apps: A Comparative Analysis of Forced Variant Selection Methods
- AI in the Trenches: How Machine Learning is Fighting Cybercrime
- Securing the Future: AI-Driven Cyber Defenses in a Hyperconnected World
- Security Challenges and Solutions in Cloud-Based Software Systems
- Real-Time EHR Analysis and Predictive Healthcare Decisions: A Novel API Framework
- Comparative Analysis of Cataract Eye Disease Detection Using Yolov8 and Yolov10
- A Novel Approach to Incorporating LLMs in Mid-size Organizations for Customer Insight Generation Using Tree of Thoughts Methodology
- Exploring SAP ETL Tools: Features and Functionality
- Green Software Quality: A Comprehensive Framework for Sustainable Metrics in Software Development
- Kubernetes: Ensuring High Availability for Your Applications
- Artificial Intelligence (AI) in Banking Bill Payments
- A Picture is worth a thousand colors - Using Computer Vision to Color Tag E-Commerce Products
- Overcoming Security Obstacles in Serverless Function as-a-Service (FaaS) for Healthcare Insurance
- Multi-Screen Customer Relationship Management (CRM) Systems: Analysis of Considerations and Complexity
- Applying User Experience in an Enterprise CRM: Considerations and Process to Balance UX Innovation with an Iterative Delivery Mindset
- Enhancing Retail and AdTech Efficiency with Cloud and AI-Driven Customer Insights
- Cloud Migration Strategies for Mainframe Modernization: A Comparative Study of AWS, Azure, and GCP
- Advancements in Artificial Intelligence, Machine Learning and Deep Learning, Robotics and Industry 4.0: A Systematic Review on Application, Issues, and Electronic Markets
- Vulnerabilities, Privacy Risks, and Ethical Implications of Residential Proxy Services
- Optimization of Class Scheduling Problem: A Multi-Constraint Approach for Effective Resource Allocation and Space Utilization
- Machine Learning Recommender System for an Enhanced Students Course Selection
- Scaling Data Engineering with Advanced Data Management Architecture: A Comparative Analysis of Traditional ETL Tools Against the Latest Unified Platform
- Volume-72 Issue-10 October 2024
- Empowering Intelligent Enterprises: Leveraging SAP's SIEM Intelligence for Proactive Cybersecurity
- AI and Machine Learning Integration in Oracle Field Service
- AI-Driven Optimization of Hospital Operating Rooms
- Asynchronous Inference Graph Execution for Model Routing in Machine Learning Systems
- Artificial Intelligence in Dermatology: Improving Diagnostic Accuracy in Nail Disorders Through Deep Learning Algorithms
- Digital Ground Zero: An In-Depth Analysis of 2023's Zero-Day Vulnerabilities
- AI-Driven Approaches to Improve Accessibility Testing Across IoT Devices
- Model-Based Safety Analysis for Autonomous Driving
- How to Secure APIs to Defend Against Emerging Cyber Threats to Digital Web Assets
- TMS in Connected Systems Enhancing Logistics Efficiency and Integration
- Prediction of Financial Bubbles and Back-Testing of a Trading Strategy
- Export Compliance Integration with ERP Order Management - An Overview
- Enhancing Cloud Vulnerability Management Using Machine Learning: Advancing Data Privacy and Security in Modern Cloud Environments
- Perspectives On Solving Cybersecurity Using AI Techniques
- Modern Trends in No SQL Data Bases
- AI Agentic Scriptless Automation in Software Testing
- MVVM Design Pattern in Software Development
- Merge In-Transit Methodologies in Enterprise Resource Planning for Logistics
- The Role of AI in Improving Customer Service, Fraud Detection, and Risk Management in Banking
- The Impact of Open Banking Regulations on the Banking Industry
- Building Castles in the Cloud: Architecting Resilient and Scalable Infrastructure
- Optimizing Web Presence: Effective Strategies for Website Consolidation and Content Optimization
- Efficient Deployment and Updating of Features in Load-Balanced Elastic Distributed System
- A Comparative Analysis of Native vs React Native Mobile App Development
- Master Data Management: A Must for Every Organization
- Automate Escheatment Process (AP Checks) in Oracle E-Business Suite (EBS) R12 Payables
- Smart Health Companion: An App for Tracking Diagnoses and Recommending Next Steps
- A Meta-Analytic Examination of the Effects of Personalized Digital Marketing on Consumer Purchasing
- AI and the Personalization-Privacy Paradox: Balancing Customized Marketing with Consumer Data Protection
- SOLID Design Principles in Software Engineering
- Bibliometric Analysis of Artificial Intelligence and Focus in Morocco: A Comprehensive Study (2014-2023)
- Volume-72 Issue-9 September 2024
- Mitigating the Misuse of Generative AI: Navigating the Emerging Threat Landscape and Modern Security Paradigms
- The Role of Open-Source Software in Enterprise Applications: Benefits, Risks, and Adoption Strategies
- Exploring Machine Learning Algorithm to Analyze Young Adults' Perception of Hunger Issues in the Context of the United Nations' Zero Hunger Initiative
- Open Source and Open Targets: A Comprehensive Analysis of Software Supply Chain Attacks in Open-Source Software
- SAP Business Transformation: Steps for Effective Cutover and Data Migration
- Leveraging Artificial Intelligence and Machine Learning for Data-Driven Marketing Strategy: A Framework for Marketing Managers
- SFTP Integration Method – An Option to Consider in SAP ERP Integration Projects
- Applications of Generative AI in Modern Operating Rooms
- Innovative Telecom: MVNOs and MVNAs Leveraging Cloud-Based Technologies
- AI-Powered Networked Management: The Future of MVNOs and MVNAs
- Implementing Serverless Computing Architectures for Expandable and Cost-Effective Cloud Applications
- Optimizing Rail Track Maintenance by Integrating Geometry Data with Cloud Data Lake and IoT
- Automated Validation Framework in Machine Learning Operations for Consistent Data Processing
- Towards a Decision Support Tool for Service Identification in Service-Oriented Architecture
- Optimizing Business Processes in IT Security through Automated Reporting and Risk Assessment
- Preparing for the Unexpected Outages for Your Mission-Critical Cloud Infrastructure with Confidence
- Enhancing Query Performance Through Relational Database Indexing
- Large Language Models: Revolutionizing Pervasive Computing
- Exploring Cloud Computing Adoption in Supply Chain Management: Key Drivers and Challenges
- Leveraging Technology for Financial Compliance Excellence
- Visualizing Higher-Dimensional Data
- A Practical Overview of Real-Time System Implementation in Linux Kernel
- Integrating CRM and ERP Insights for Optimized Product Development Using CNN-LSTM Hybrid Models
- Enhancing Endpoint Security through Collaborative Zero-Trust Integration: A Multi-Agent Approach
- Advanced Sales Prediction for ERP Systems Using Generative Adversarial Networks
- Chain Reaction: Analyzing Trends and Crafting Defenses Against Software Supply Chain Attacks
- Big Data Engineering Using Hadoop and Cloud (GCP/AZURE) Technologies
- Big Data Integration with ERP Systems for Innovation and Efficiency
- E-Stylist: A Machine Learning Aided Fashion Stylist
- House of Cards: Framework for Memory Experiments in VR
- AI and Cybersecurity in 2024: Navigating New Threats and Unseen Opportunities
- Predictive Analytics in Data Engineering
- AI-Driven Load Balancing for Energy-Efficient Data Centers
- Volume-72 Issue-8 August 2024
- DevOps Deciphered: A Comparative Analysis of Tools Powering the DevOps Revolution
- Password Security using Mutation Technique in Cloud Computing
- Electronic Filing of 1099 Forms Using Oracle Fusion Payables
- Improved Decision Support System for Personal Loan Eligibility Using Artificial Neural Networks
- Integration of Artificial Intelligence and SAP in the Supply Chain Management of Healthcare Industry
- The Importance of Governance and Guardrails in Generative Artificial Intelligence
- Enabling Artificial Intelligence within C-Stores for Fueling Industry
- Comparing High Availability and Disaster Recovery in Multi-Cloud Environments
- Empirical Assessment of Nonconformity Score Functions for Classifiers in Conformal Prediction
- Leveraging IoT and Data Analytics in Logistics: Optimized Routing, Safety, and Resource Planning
- Strategies for Integrating Generative AI in Industrial Settings
- Analyze and Optimize Data Pipelines with Effective Data Models
- Boost Call Center Operations: Google's Speech-to-Text AI Integration
- The Convergence of Big Data Analytics and CRM Practices: A Review
- Volume-72 Issue-7 July 2024
- Improving Lifestyle Choices with Diabetes Prediction with Help of R Programming
- Generative AI and the Future of Workforce in Marketing
- Evaluating Automation Using Supply Chain Cloud Solutions
- Optimizing Payment Approvals: Dynamic Programming Approach
- Hybrid Hardware in Loop Architecture for Autonomous Vehicles
- Go-To-Market Transformation with Generative AI
- Harnessing IoT Potential with Generative AI: Utilizations, Real-world Examples, and Boundaries
- Modernizing Financial Technology Infrastructure, Enterprise Systems and Cybersecurity in the Digital Age
- Empowering Cloud Security: Pioneering an Interactive Multi-Factor Authentication Framework for Cloud User Verification
- Performance Benchmarking of Serverless Computing Platforms
- IoT-Driven Real-Time Data Collection and Analysis for Lean Manufacturing
- A Guide to Cloud Computing: Selecting the Right Provider, Evaluating Platforms, and Optimizing Your Cloud Journey
- Predicting Used Car Prices with Regression Techniques
- Innovation through Informatica Intelligent Master Data Management for AI-Driven Enterprises
- Optimizing Data Ingestion Processes using a Serverless Framework on Amazon Web Services
- Data Product Management: Strategies, Challenges, and Opportunities
- Revolutionizing Cryptocurrency Operations: The Role of Domain-Specific Large Language Models (LLMs)
- Understanding of Ethical Artificial Intelligence and Implementation using SAP AI
- Artificial Intelligence in Product Management
- Applications of Generative AI for Scaling Security Teams
- How Real-Time Streaming Helping Fraud Detection for Trade Clearing Firms
- Architectural Considerations for Integrating with Finacle
- Comparative Analysis of Panel Data Regression Models on Nigeria Money Deposit Bank Dataset
- AI-Enhanced Cyber Threat Detection
- Advancing Secure Authentication for Data Security with Dynamic Risk Assessment and Machine Learning in PUF-Based Systems
- Role of Business Analysts in Cloud-Enabled Digital Transformation
- Harnessing Chaos: The Role of Chaos Engineering in Cloud Applications and Impacts on Site Reliability Engineering
- Applications of Micro-Frontend Application Development in a Customer Support CRM
- Advancing CRM Capabilities: A Comparative Analysis of Predictive Analytics Integration
- Volume-72 Issue-6 June 2024
- Building a Data-Savvy Organization: The Intersection of Organizational Change Management and Data Literacy
- Enhancing Resilience in IoT Architectures for Critical IT Systems: A Comprehensive Review
- Optimization with Interprocess Communication via Channels - A CSP Approach
- A Review on AI and ML Transformation in Human Resources Management
- Real-Time Sentiment Analysis of Twitter Streams for Stock Forecasting
- Harnessing Cloud Computing for Real-Time Mortgage Data Analytics and Reporting
- Predictive Analysis of Smart Spray Solutions
- Increasing Efficiency of Goods Receipt with Mobility Solutions
- AI-Driven Cloud Optimization: A Comprehensive Literature Review
- Scalable Management of Terabytes of In-Flight Connectivity Data Using SQL Server
- A Comprehensive Analysis of Machine Learning Techniques for Churn Prediction in E-Commerce: A Comparative Study
- Large Language Model-Based Autonomous Agents
- Maximizing Procurement Efficiency through Purchase Requisitions Load Building
- Leveraging Artificial Intelligence for Enhancing Regulatory Compliance in the Financial Sector
- Modern Supply Chain: Unleashing the Power of Data and Technology
- Enhancing Product Strategy in Financial Institutions: The Transformative Role of Business Intelligence in Financial Ledger Analysis
- Comparative Analysis of AWS Model Deployment Services
- Development of an Internet of Things Based Smart Greenhouse
- Integrating Traditional BI Tools with Big Data Technologies: Challenges and Solutions
- Elevating Digital Advertising by Streamlining Agency Client Collaboration through Cloud
- Leveraging Data Analytics and AI to Optimize Operational Efficiency in the Oil and Gas Industry
- Enhancing Manufacturing Efficiency with Mobility Applications
- Control Group Selection for A/B Testing Through Optimization
- Generative AI in Digital Advertising Campaigns
- Enhancing Healthcare Security Through Autonomous Data Protection for IoT Systems in Hospital Environments
- Implementing a Zero Trust Architecture in Hybrid Cloud Environments
- The Importance of Data-Driven Decision-Making in Public Health
- Blockchain Empowerment in Sanctions and AML Compliance: A Transparent Approach
- Volume-72 Issue-5 May 2024
- E-Delivery Microservices Based Multi-Channel Communications Delivery Framework
- Real-Time Object Detection and Recognition in FPGA-Based Autonomous Driving Systems
- AI for Cloud Ops Transformation and Innovation
- Enhancing Machine Learning Life Cycle through Advanced Data Engineering
- Enhancing Payment Ecosystems: The Role of Stablecoins in Modern Finance
- AI-Powered Data Cleansing: Innovative Approaches for Ensuring Database Integrity and Accuracy
- Cash Flow Acceleration with Generative Artificial Intelligence (Gen AI)
- Harnessing the Power of Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM) Systems for Sustainable Business Practices
- Comparative Analysis of Artificial Intelligence (GenAI) in Business Intelligence Platforms
- Supercharged Attacks: Analyzing Generative AI Usage by Cyber Threat Actors
- Transforming Banking in the Digital Age: The Strategic Integration of Large Language Models and Multi-Cloud Environments
- Exploring the Challenges of Serverless Computing in Training Large Language Models
- Implementing Omnichannel Strategies for Global Customer Engagement: A Project and Change Management Approach
- Addressing Safety Concerns in AI Systems: An Analysis and Remediation Strategies
- Generative AI Security: Protecting Users from Impersonation and Privacy Breaches
- Real-Time Adaptive Access Control (RTAAC) for Enhanced Security and Privacy in Access Management
- Enhancing Digital Privacy: The Application of Zero-Knowledge Proofs in Authentication Systems
- Volume-72 Issue-4 April 2024
- Evolution of Technical Workforce with AI: What Future Holds?
- Integrating User Experience and Acceptance in Authentication: A Synthesis of Technology Acceptance Model and User-Centered Design Principles
- Machine Learning-Enhanced IDS: RFE-LSTM-Based Model for Cloud Security
- A Blueprint for Responsible AI - Public Health Sector
- Predicting Well Performance and Reservoir Behaviour Using Deep Neural Networks
- Evolution of Automation to Hyperautomation: Leveraging RPA, AI ML, NLP for Optimal Operational Efficiency
- Optimizing Worker’s Compensation Outcomes Through Technology: A Review and Framework for Implementations
- Framework for Optimized Sales and Inventory Control: A Comprehensive Approach for Intelligent Order Management Application
- Machine Learning-Driven Predictive Data Quality Assessment in ETL Frameworks
- Application of Machine Learning Techniques in Fintech Integrations in the fields of Fraud Detection and AML
- System Integration, From Middleware to APIs
- Intelligent Automation with SAP S/4 HANA Situation Handling for Cash Management
- Transforming Enterprise Resource Planning Data Migration through Artificial Intelligence
- AI-Driven Query Optimization: Revolutionizing Database Performance and Efficiency
- Harnessing Blockchain Technology and SAP Integration to Revolutionize Supply Chain Transparency and Sustainability
- Volume-72 Issue-3 March 2024
- Comparative Analysis of Veracode and BlackDuck for Enhancing Application Security in Cloud Environments
- Data Quality Framework for Large-Scale Enterprise Data and ML Systems
- Data Virtualization Architecture Framework using Multi-Engine Data Platforms for Big Data Analytics and Machine Learning
- Overcoming Challenges in Deploying Large Language Models for Generative AI Use Cases: The Role of Containers and Orchestration
- Building a Cash Flow Underwriting System: Insights from Implementation
- Industry 4.0 and Web Design: Unlocking the Potential of the Digital Landscape Through Innovation
- Enhancing Maintenance Efficiency in Oil & Gas Service Stations: A Review and Case Study
- AI-Enhanced Clinical Decision Support Systems with Neural Networking
- Building a Data-Driven Culture: Empowering Organizations with Business Intelligence
- Implementing Infrastructure-as-Code with Cloud Disaster Recovery Strategies
- Web Evolution to Revolution: Navigating the Future of Web Application Development
- Implementing Workplace Flexibility – A Conceptual Literature
- Designing Digital Payment Experiences: The Crucial Role of User-Centered Design and Effective User Feedback Integration
- Beyond Deployment: Unveiling the Dynamics of Shift-Right Testing
- Transforming Customer Experience and Operations with Modern Master Data Management
- MLOps Antipatterns and Mitigation Approaches
- Volume-72 Issue-2 February 2024
- The AI Revolution in Healthcare Product Management
- Enhancing Developer Experience by Reducing Cognitive Load: A Focus on Minimization Strategies
- FinTech - Automatic Payment Process in the ERP System
- Revolutionizing AI and Computing the Neuromorphic Engineering Paradigm in Neuromorphic Chips
- Automate Enterprise Resource Planning with Bots
- Botnet Detection and Mitigation: A Comprehensive Literature Review
- Understanding Web 3.0: Opportunities and Challenges for Developers
- Streamlining HR Processes: An In-depth Analysis of Robotic Process Automation (RPA) Integration
- Cyber Security using Cryptographic Algorithms
- 5G IoT and HL7 FHIR for Mission Critical Healthcare Applications
- Lawful and Righteous Considerations for the Use of Artificial Intelligence in Public Health
- Transmission Deviation based Windowed Training for Intrusion Detection on Streaming Data
- Guaranteed Delivery in Enterprise Integration Architecture with IPaaS Environment
- The Modern Technology Has Disrupted Today’s World: An Analytical Review of How Technology Affected Quality of Human Interaction
- For Me Page: User-Centric Content Curation
- Experimental Analysis of Wireless Power Transfer Efficiency: Efficiency and Distance Show Inverse Relation
- Asynchronous Data Stream Ingestion in Distributed Cloud Infrastructure
- IJCTT - 2024 Issues
- Volume-72 Issue-1 January 2024
- Elevating Emergency Healthcare - Technological Advancements and Challenges in Smart Ambulance Systems and Advanced Monitoring and Diagnostic Tools
- Bridging Data Gaps in Finance: The Role of Non-Participant Models in Enhancing Market Understanding
- Revolutionizing Consumer Data Analysis: The Development and Impact of a Unique Customer Identifier
- Digital Transformation for Business Technology Operations with Artificial Intelligence (AI) Led Hyperautomation
- Unraveling the Adoption Drivers of Fintech in India: An Empirical Analysis
- Data Intelligence and Artificial Intelligence (AI) in SAP Ecosystem- SAP Datasphere
- Big Data Analytics in Cloud – Comparative Study
- ELS+ Stream: A Cloud-based Platform for Data Extraction, Streaming, Analysis and Decision-Making with Generative AI Capabilities
- User-Centric Design Principles and Their Impact on Digital Product Success
- A Novel Concept to Monitor Speed, Position, Direction of Rotation and Fault Detection using Multi Color / Multi-Material Encoder Disc and a Single Channel Sensor in an Embedded System
- Centralized Computer System for Property Management
- Sentiment Analysis for Online Reviews for Brand Imaging and Customer Retention
- Exploring How User Behavior Shapes Cybersecurity Awareness in the Face of Phishing Attacks
- The Hybrid World of HPC and Cloud
- The Future of Web Development: An In-depth Analysis of Micro-Frontend Approaches
- Volume-71 Issue-12 December 2023
- Business Planning and Forecasting using AI and Machine Learning with the SAP Analytics Cloud – SAC
- Data and Algorithms: Reviewing the Role of Machine Learning in the Real Estate Sector
- Securing Data Platforms: Strategic Masking Techniques for Privacy and Security for B2B Enterprise Data
- Data Governance and Quality Management in Data Engineering
- Real-Time Threat Detection with JavaScript: Monitoring and Response Mechanisms
- Artificial Intelligence for Symptomatic Detection and Classification of Suspected Cases of Filovirus Disease in Africa: An Explorative Approach
- Volume-71 Issue-11 November 2023
- Design and Architecture for a Centralized, Extensible, and Configurable Scoring Application
- Artificial Intelligence (AI) and Automated Machine Learning Capabilities in SAP Analytics Cloud (SAC)
- Mitigating Latency in IoT Devices: A Machine Learning Approach to Identifying and Addressing Key Contributing Factors
- Redefining Efficiency: Computational Methods for Financial Models in Python
- Enhancing Road Safety: Detecting Texting Distracted Driving with Eye-Tracking and Machine Learning
- Towards Next-Generation Healthcare: Architectural Insights into an AI-Driven, Smartwatch-Compatible mHealth Application
- Augmenting Intelligent Document Processing (IDP) Workflows with Contemporary Large Language Models (LLMs)
- Credit Card Analytics: A Review of Fraud Detection and Risk Assessment Techniques
- Big Data in Finance: An Architectural Overview
- Advancing Financial Operations: Leveraging Knowledge Graph for Innovation
- Navigating the Complex Intersection of Cybersecurity, IoT, and Artificial Intelligence in the Era of Web 3.0
- Securing the Future: Exploring the Convergence of Cybersecurity, Artificial Intelligence, and Advanced Technology
- Cloud Data Warehousing and AI Analytics: A Comprehensive Review of Literature
- Volume-71 Issue-10 October 2023
- Modular Monoliths: Revolutionizing Software Architecture for Efficient Payment Systems in Fintech
- Effects of AI in Scrabble
- Revolutionizing Medical Device Implants: Unleashing the Power of Industry 5.0
- 5G Network Slicing to Deliver Improved User Experience
- Real World Data-Driven Transformation in Healthcare & Life Science: Evidence-Based Analytics, Machine Learning and AI Applications
- Assessment of Technical Information Quality using Machine Learning
- Assessing Mobile Money Transfer Systems Usability based on Heuristics Evaluation
- Important Considerations for Maximizing Performance and Ensuring Uninterrupted Operation with the Cassandra Database
- Automation of Triangulation, Inter-Company, or Intra-Company Procurement in SAP SCM
- Volume-71 Issue-9 September 2023
- Evolution of Enterprise Data Warehouse: Past Trends and Future Prospects
- Automation of Vendor Invoice Process with OpenText Vendor Invoice Management
- Enhancing Glaucoma Detection: An Integrated Approach Using Virtual Reality and Artificial Intelligence for Visual Field Testing
- Kubernetes and Docker: An Introduction to Container Orchestration and Management
- Indexing Robotic Process Automation Products
- A Study on Fake News Detection Techniques using Machine Learning
- Data Democratization: Empowering Non-Technical Users with Self-Service BI Tools and Techniques to Access and Analyze Data Without Heavy Reliance on IT Teams
- Internet of Things (IoT) and its Application to Insurance Systems & Technology
- API Integration using GraphQL
- An Analysis of Data Quality Requirements for Machine Learning Development Pipelines Frameworks
- A Framework for Enhancing Computer Network Dependability in Universities
- Towards Comprehensive Approach to Information Security Management: Empowering the Human Factor for Enhanced Security
- Volume-71 Issue-8 August 2023
- The Importance of EHR in Revolutionizing Healthcare Delivery and Financial Success
- Generative AI and Machine Learning based Modern Data Architecture with AWS Cloud and Snowflake
- AI and Data Intelligence: The Next Generation Technology Innovation
- Image Recognition from Deep Features using Implicit Split Logarithmic Loss-Based Optimized Random Forest
- Framework for Continuous Testing
- Optimizing Database Performance: Strategies for Efficient Query Execution and Resource Utilization
- Volume-71 Issue-7 July 2023
- Real-Time Data Integration and Analytics: Empowering Data-Driven Decision Making
- Analysis of Enhancing EV Charging Efficiency in the 5G enabled Smart Grid using Network Slicing, Edge Computing, and AI-based EV Charging Prediction
- Adoption of Artificial Intelligence in Cloud Computing
- Graph Networks: Transforming Provider Affiliations for Enhanced Healthcare Management
- An Examination of Machine Learning in the Process of Data Integration
- Securing Cloud Infrastructure: Best Practices for Protecting Data and Applications
- Optimizing Financial Regulatory Compliance through AI: A Business Case Study
- Integrating OCR, Graph Databases, and ETL in Fraud Detection: A Novel Approach
- The Impact of Automated Data Engineering on Cost and Time Savings
- Impact of Generative AI on Data Integration
- Performance Test Engineering Practice for Scaled Agile Framework Leveraging Machine Learning and Artificial Intelligence Techniques
- How Snowflake is Transforming Data Science
- Optimizing DevOps Pipelines with Performance Testing: A Comprehensive Approach
- Contribution of Pedagogical Scripting-Mediatization-Mediation to the Effectiveness of Online Learning System
- Enhancing Cybersecurity Through the Unification of Data Analytics, Artificial Intelligence, and Machine Learning in Big Data Cloud Environments: A Databricks Lakehouse Approach
- Advanced Analytics Driven Financial Management: An Innovative Approach to Financial Planning & Analysis
- Volume-71 Issue-6 June 2023
- Redefining Boundaries in Healthcare: An In-Depth Exploration of Telemedicine's and Wireless Technology’s Role in Emergency Care and Disaster Management
- Industry Best Practices on Implementing Oracle Cloud ERP Security
- Computer Network Security and Technology
- Anticipated Developments in OTT Platforms Over the Next Few Years
- Developing a Data Quality Framework on Azure Cloud : Ensuring Accuracy, Completeness, and Consistency
- Amazon Athena : Serverless Architecture and Troubleshooting
- Service Virtualization in SAP ERP: A Comprehensive Approach to Enhance Business Operations and Sustainability
- Optimizing Scrap Management in Production Planning Processes
- Comparing Product Availability Checks in SAP
- Business Intelligence Challenges and How to Handle Them
- Music Recommendation System
- Future of AR & VR in the Indian Education System
- Volume-71 Issue-5 May 2023
- Performance Tuning and Optimization of Apache Spark Applications
- Fundamentals of Digital Platform: Implementing Successful Content Management System
- SAP Datasphere – Business User-Oriented Approach to Cloud Data Warehousing
- An Introduction to Data Visualization Tools and Techniques in Various Domains
- Life Science Industry: Safeguarding Sensitive Data with SAP Cloud, AI, and Cyber Security
- Designing an AI-Powered Mentorship Platform for Professional Development: Opportunities and Challenges
- The 4D Model: Metrics-Driven Business Growth with SaaS Case Studies
- AR-Driven Customer Engagement : An Innovative Approach to CRM
- Lung Cancer Detection using CT Scan Images in CNN Algorithm
- Transforming Information Extraction: AI and Machine Learning in Optical Character Recognition Systems and Applications Across Industries
- Effective Usage of Artificial Intelligence in Enterprise Resource Planning Applications
- Intelligent Optimization of Import Efficiency-Automated Goods Receipt Process in the Life Science Industry
- From Plant to Patient: Study on SAP Advanced Track and Trace Solution for the Life Science Industry
- Security Challenges and Opportunities in IoT-Driven Cloud Computing: An In-Depth Review
- Blockchain-based CRM Solutions: Securing Customer Data in the Digital Transformation Era
- Optimizing CRM and Supply Chain with Edge Computing: Real-Time Insights and Scalable Solutions
- Future-Proofing Security: AWS Security Hub and Service Now Integration
- AI-Driven Quoting: Enhancing Customer Forecasting & Procurement Optimization
- Volume-71 Issue-4 April 2023
- Revolutionizing Business Processes with SAP Technology: A Buyer's Perspective
- Machine Learning-Based Predictive Maintenance of Industrial Machines
- Revolutionizing HR: The Role and Potential of Chatbots in Human Capital Management
- Impact of using Artificial Intelligence-Based Chatgpt Technology for Achieving Sustainable Supply Chain Management Practices in Selected Industries
- Improving the Performance of the ETL Jobs
- Next-Gen CRM Sales and Lead Generation with AI
- A Model to Detect Keyword Stuffing Spam on Webpages
- Enhancing Customer Experience through Kafka Data Steams for Driven Machine Learning for Complaint Management
- Volume-71 Issue-3 March 2023
- Artificial Intelligence for Customer Complaint Management
- Object Detection for Night Vision using Deep Learning Algorithms
- Data Sharing, Disaster Management, and Security Capabilities of Snowflake a Cloud Datawarehouse
- Research on Improvement of Self-Selective Routing in Wireless Sensor Networks
- Role of ERP Modernization in Digital Transformation: PeopleSoft Insight
- Enhancing Enterprise Application Integration through Artificial Intelligence and Machine Learning
- Region Extraction based Approach for Cigarette usage Classification using Deep Learning
- Amazon Redshift: Performance Tuning and Optimization
- Exploring Popular ETL Testing Techniques
- Literature Review: An Efficient Clustering Approach to Big Data
- Bone Age Prediction with AI Models
- Evaluating Learning Management System Usability Level Towards Online Learning: University Students Perspective
- Future Service Robots: A Review of the Psychological Processes Involved in the Tourism and Hospitality Industries
- Volume-70 Issue-12 December 2022
- An Implementation of Change Data Capture (CDC)
- Smoking Detection using Deep Learning
- Hinglish Profanity Filter and Hate Speech Detection
- Volume-71 Issue-2 February 2023
- Intercompany Processes Efficiency Using Oracle Fusion Erp Cloud – A Systematic Review
- Application of Deep Convolutional Neural Networks to Telugu Scriptsfor Optical Character Recognition
- Enterprise Reporting on SAP S/4HANA using Snowflake as Cloud Datawarehouse
- ETL (Extract, Transform, Load) Best Practices
- The Impact of Artificial Intelligence on the SupplyChain in the Era of Data Analytics
- Functional Analysis of Educational Tools for Elementary School AI Education
- The Solidworks Design Software in a Teaching and Workshop Mode for Creating Daily Products
- Quick Response System for Road Accidents with Automatic Accident Detection and Prevention Using IoT
- Alternative Risk Scoring Data for Small-Scale Farmers
- Volume-71 Issue-1 January 2023
- IJCTT - 2023 Issues
- Step by step guide to reviewers
- Join as Editor
- IJCTT - Hybrid Learning Style and Learning Preference to Explore New Learners' Feature
- Personal Expense Tracker utilizing Amazon Web Services
- Volume70 Issue11 November 2022
- Factors Influencing the Re-Engineering of E-Learning in Teacher Training Colleges in Kenya
- Web-based Campus Complaint Management System (WCCMS)
- An Analysis on High Temperature and Hospitalizations for Cardiovascular Cases in the City of Cabanatuan, Philippines
- Prediction and Classification Model for Academic Performance in Higher Institutions using Fuzzy Logic
- Volume70 Issue10 October 2022
- Comparative Analysis of Security and Privacy Protocols in Wireless Communication
- Study on Compression Methods for Quality Enhancement with Satellite Images
- Prediction of Severity of an Accident Based on the Extent of Injury using Machine Learning
- Monitoring the Performance of Machine Learning Models in Production
- A Study on Sentiment Analysis of Movie Reviews using ML Algorithms
- Search Engine Optimization Metric
- Sales of Medical Devices – SAP Supply Chain
- Volume4 Iss6 No2 (2)
- Volume70 Issue9 September 2022
- A Brief Study of Risks Associated with Multi-Tenant Software Architecture in Cloud Environment
- Analytical and Empirical Survival Study on Natural Image Compression and Classification using Machine Learning Techniques
- Structural Unification of the Logic Objects
- An Investigation Analysis on Secured Communication with Big Data
- How Technology Benefits the Use of Shared Service Models in Business
- Volume70 Issue8 August 2022
- Exploring Artificial Intelligence Integration in Supply Chain Management: A Review
- Experiencing Body Scan and Computer Simulation Virtual Fitting
- Green ICT Opportunities in Economic Sector in Tanzania
- Explainable AI for NLP: Decoding Black Box
- Effective Execution of Mergers and Acquisitions for IT Supply Chain
- Volume70 Issue7 July 2022
- A Case Study to Implement Windows System Hardening using CIS Controls
- Internet of Things (IoT) Security Issues and Challenges
- The Use of UCD Method in Designing SIPI (the Indonesian Translator Information System) User Interface
- Designing User Interface (UI) of KJP-Shop Application Using User-Centered Design (UCD) Method
- Enterprise API Transformation: Driving towards API Economy
- Performances Study of a New Chaos-based Video Encryption Algorithm
- Sentiment Analysis using Multi-Criteria Against Public Figures
- An Integrated Framework for DevSecOps Adoption
- Volume70 Issue6 June
- Volume69 Issue9 (2)
- Demystifying Dew Computing: Concept, Architecture and Research Opportunities
- Design of Hybrid Cryptography System Based on Vigenere Cipher and Polybius Cipher
- A Literature Survey on Writing Style Change Detection Based on Machine Learning: State-Of-The-Art - Review
- Security Test Using StegoExpose on Hybrid Deep Learning Model for Reversible Image Steganography
- Volume70 Issue5 May 2022
- Engineer to Order Approaches in SAP
- Enhanced LSTM Model for Data Center Energy Consumption Forecast
- E-Commerce Security Issues
- Explainable AI – The Errors, Insights, and Lessons of AI
- Sanskrit Programming Language
- Volume70 Issue4 April 2022
- Development of a Process-Driven Model for Extracting User Behavioral Pattern from Web Access Log Files
- Comparative Analysis of Clustering Approaches for Big Data Analysis
- A Review Paper on Application of Model-Driven Architecture in Use-Case Driven Pervasive Software Development
- Volume70 Issue3 March 2022
- Fake News Detection using Machine Learning Algorithm
- A Framework for Successful Corporate Cloud Transformation
- Comparative Analysis of Non-Blind Deblurring Methods for Noisy Blurred Images
- Electronic Card Fraud Detection System in Nigeria Financial Institution Using Hybrid Model Approach
- K-Medoids Clustering Techniques in Predicting Customers Churn: A Case Study in the E-Commerce Industry
- Skeleton Based Human Action Recognition Using Doubly Linked List
- Digital Accessibility Guide for Aging Population
- IJCTT - 2022 Issues
- Volume70 Issue2 February 2022
- Usability Evaluation of Kenyan Universities Websites for Webometrics Ranking
- The Importance of Data and Analytics Provenance and Governance in the Realm of Datafication
- Society Dilemma of Computer Technology Management in Today’s World
- Malnutrition among Filipino Children: A Predictive Analysis using Data Mining Approach
- Determinants of University Students` Perceived Usefulness of Mobile Apps
- Volume70 Issue1 January 2022
- Analysis of SW Education Program of SW Leading Elementary, Middle and High schools
- A Comparative Study on Various Deep Learning Techniques for Arabic NLP Syntactic Tasks
- Development of an SW-Utilized Curriculum Linked to Villages and Online Class Exchange for the Lower Grades of Elementary School
- Massive Open Online Courses in India-Public Opinion and the Road Ahead
- Towards an Ontology for Islamic Finance
- Volume69 Issue12 December 2021
- IoE Security Through Multi-Agent SDN
- Social CRM Framework For University
- The Requirements Elicitation Pyramid – A Theory of Requirements Evolution
- The Effectiveness of the Current Cybersecurity Framework used by the UAE’s Oil and Gas Industry: The Perspective of the Cybersecurity Practitioners
- Internet of Things: An Approach to Enhance Healthcare Quality in Nigeria
- Analysis and Determinants of the Performance of Ivorian Manufacturing Companies
- Volume69 Issue11 November 2021
- Implementation of Python Packages For Image Recognition
- Web Accessibility Quality Index Varies with the Selection of Evaluation Tools
- Contributive Effects of Cloud Computing to Positive Changes of Students’ Academic Information Accessibility
- An Improved Web Fraud Detector And Preventive System With Cortical Algorithm
- Bitcoin and the Theory of Computation
- Virtualization Technologies: Overview, Differences & Similarities
- Hardware Design and Experimental Study for Road Conditions & Smart Detecting System Based on IMU and Ultrasonic Sensor
- Development of Mobile Market Intelligence System (A Case Study of Ede Federal Constituency, Osun State, Nigeria)
- Volume69 Issue10 October 2021
- Semantic Role Labeling Based on Highway-BiLSTM-CRF Model
- Multiple Inheritance Mechanisms in Logic Objects Approach Based on Multiple Specializations of Objects
- Deep Learning For Coffee Disease Classification
- Garbage Classification and Detection for Urban Management
- Classifying Unwanted Emails using Naïve Bayes Classifier
- Predictive Learning Analytics for Student Success towards Outcome Based Education Perspective
- Volume69 Issue9 September 2021
- Greenhouse Farming Using IOT
- A Survey on Digital Payments Security: Recent Trends and Future Opportunities
- A Cloud Transformation Framework to Help Financial Services with Digital and Cloud Transformation
- Designing for Latencies
- Design and Development of Robust and Secure Cluster Routing Algorithm for Manet Based IOT
- Elastic Search Usage of Analysis for Resource Scalability in AWS
- Design and Create the Marketplace to Start a Business During Pandemic
- Volume69 Issue8 August 2021
- Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
- Analysis of IT Capability Impact On Organizational Performance
- Machine Learning In Healthcare for Chronic Kidney Disease Prediction
- Self-Organizing Information for Approaching AI by Relative Entropy
- Detection of Mesoscale Eddies using Structural Statistical Feature
- Quality Assurance Factors: Key Aspects for Software Quality Control and Testing
- At The Cost of Consumer’s Privacy, Data Becomes The Most Expensive Digital Currency
- Stock Market Prediction Using Novel Deep Learning Approaches: A Review
- Air Quality Monitor using Arduino
- Locomotion Control Framework for Snake-like Robot using Deep Reinforcement Learning
- Plants Disease Detection using Image Processing Techniques
- Volume69 Issue7 July 2021
- A Systematic Review of Bluetooth Security Threats, Attacks & Analysis
- Social Media, A Tool For Increased Visibility For Engineering Firms: Risks And Benefits
- A Survey on 7V’s of Big Data Security And Privacy
- Developing English to Dawurootsuwa Machine Translation Model using RNN
- Text Summarization Using Extractive Techniques for Indian Language
- Comparative Study Between Open Source LMS Platforms: Choice of the Moodle e-Learning Platform
- Adaptive E-Learning and Scenarization Tools: The Case of Personalization
- Human Gait Recognition using Discrete Wavelet and Discrete Cosine and Transformation Based Features
- The Reliability and Acceptance of Biometric System in Bangladesh: Users Perspective
- Developing a Web-Based Application for Electronic Equipment Technician Service Order Using the Scrum Method
- Volume69 Issue6 June 2021
- Integration of Pedagogical Videos As Learning Object In An Adaptive Educational Hypermedia Systems According To The Learner Profile
- Text Summarization of News Events Using Semantic Triples
- Food Item Calorie Estimation Using YOLOv4 and Image Processing
- Secure Real Estate Transaction Platform using BlockChain And AngularJS
- DDoS Malicious Node Detection by Jaccard and Page Rank Algorithm in Cloud Environment
- A Machine Learning Based DSS in Predicting Undergraduate Freshmen Enrolment in a Philippine University
- A Survey on Cloud Data Fetching Techniques and Feature Sets
- Amazon Web Services Security Best Practices
- An Analytical Study on Information Technology and Functionality
- Designing and Implementing Shortest and Fastest Paths; A Comparison of Bellman-Ford algorithm, A*, and Dijkstra’s algorithms
- Volume69 Issue5 May 2021
- Impact of Crime Reporting System to Enhance Effectiveness of Police Service
- Improving Online Experience Using Trust Adjustment Factor for Recommender Systems
- Optimization of fuzzy inventory model using Kuhn tucker technique by decagonal fuzzy numbers
- Implementing E-Commerce Platform for Quality Evaluation Using Product Reviews
- test
- Survey On Automated Fare Collection And Document Verification
- A Survey on Prevention from Emerging Viruses
- MOOC Implementation Challenges and Prospects in Higher Technical Education in Indian Scenario-a Review
- An Experimental Analysis of Work-Life Balance Among The Employees using Machine Learning Classifiers
- A Survey on Social Digital Data-Based Sentiment Mining Techniques and Feature
- Variational Autoencoder based Data Augmentation & Corroboration
- A Mutually Exclusive Block-Chain Technology Cluster Approach to Electronic Voting as a Measure to Cob Covid-19 Pandemic Transmission in Developing Nations
- Visualization of Meteorological Data Sets With Open Source GIS
- The Integral of Education Technology in the Society
- Volume69 Issue4 April 2021
- Research Paper on Pro and cons of Mobile Big Data
- Caching in Amazon Web Services
- Multi-Domain Sentiment Analysis
- IJCTT - Analysis of Captcha Security Methods in Web Applications
- Detection of Violent E-mails Using Fuzzy Logic
- Web Service on Android Mobile Platform in Application of Tourism Infrastructure Information
- Media Multitasking: A Cross-Cultural Study
- A Survey On The Increase In Autism Spectrum Disorders Rate And Present Treatments In India
- A Survey on Block Cipher and Chaotic Based Encryption Techniques
- Analysis of Optimization Technique of Same Program Written in Two Different Interfaces i.e. CUI and GUI Using Java and Calculate Their Differences
- Graduate Teaching Through SWAYAM: A Comprehensive Analysis
- Edge Computing – Benefits, Use Cases, Challenges, and Best Practices
- Phishing Website Detection Using Ensemble Technique
- Volume69 Issue3 March 2021
- An Application of Soft System Methodology for Developing SIPI (The Indonesian Translators Information System)
- The Implementation of Soft System Methodology (SSM) in Designing KJP-Shop Application
- Data Transfer Between RDBMS and HDFS By Using the Spark Framework in Sqoop for Better Performance
- Blockchain in Insurance Industry
- Comparison of Apache SOLR Search Spellcheck String Distance Measure – Levenshtein, Jaro Winkler, and N-Gram
- JavAnote: Tool and Strategies to Annotate Javanese Characters
- Convergence of IT and OT – Cybersecurity Related Challenges and Best Practices
- Design and implementation e-Certificate Generator using HTML5 Canvas Context Graphic 2D
- Pipeline Monitoring System: A Feasibility Study
- A System For Identifying Synthetic Images Using Lstm: A Deep Learning Approach
- Modeling The Runtime of Guassian In Quantum Computing Methods
- Haversine Algorithm Design using the Google Maps API Method for Android-based Public Security Applications
- Microsoft Azure Dynamic Pipelines
- Formalization of Image Processing Chains For The Dynamics Forest Cover Using Landsat Satellite Multi-Sensor And Multi-Temporal
- Giving Structure to Unstructured Text Data by Employing Classification
- Benefits of Quantum Computing In Predictive Healthcare System
- Framework For Adoption Of E-Payment Systems For Small And Medium-Sized Enterprises In Kenya
- Volume69 Issue2 February 2021
- Data Intelligence and Planning using AI and Machine Learning with SAP Analytics Cloud - SAC
- IoT Security Techniques Based On Machine Learning: How IoT Devices use AI to Enhance Security
- The Impact of COVID-19 on Cyber Security
- AI-Driven (Smart) Throttling in API Management using Stream Processor and trained ML Models
- A New Dimensions and Directions of an Online Education System
- Automated Students Examination Seat Allocation using Linear Congruential Generator Algorithm
- Diagnostic, Descriptive, Predictive and Prescriptive Analytics with Geospatial Data
- A Study on the Strengthening Method of SW Education Capacity for Pre-elementary School Teachers
- IJCTT - 2021 Issues
- Volume69 Issue1 January 2021
- Customer Relation Management Features on Mobile Web and the Implementation for Universities in Central Java, Indonesia
- Predictive Analysis As a Solution To Branding
- Analytics and Project Management in Investment Banks
- Population Forecasting System Using Machine Learning Algorithm
- Improving Women’s Safety by accelerating Spatio Temporal Crime Prediction of Hotspots
- Trends In Online Education 2020 In India
- COVID-19: The Pandemic’s Impact on the Dissemination of Data in Virtual Teams using Computer-Mediated Communication Technology
- Analysis of Academic Performance in massive Open Online Courses (Moocs) Using Process Mining
- A Business Intelligence Solution for Improving the Higher Educational Learning Process
- A Network Architecture for secure traffic management for the Internet of Things using Virtual Local Area Network
- Business Intelligence Implementation in Healthcare - A Case Study in Sudan
- Volume68 Issue12 No1 December 2020
- Computational Problems Addressed using Machine Learning (ML) In a 5G Network
- A Survey on DDoS Attack Detection Methods Employing Intelligent Techniques
- A Study on QoS and Security techniques of 4G Wireless Network
- Core System Modernization
- An Effective Approach to Contact Tracing Applications for Covid-19
- Hybrid Combination of Error Back Propagation and Genetic Algorithm for Text Document Clustering
- Compressed Representation of Color Information for Converting 2D Images Into 3D Models
- A Hybrid Approach For Fault Tolerance In Datagrid
- Mobile Banking - Security Risks And Security Preventions
- Machine Learning (ML) In a 5G Standalone (SA) Self Organizing Network (SON)
- Scalable multiple representation and dynamic classification by multiple specialization of objects in OO-Prolog
- Pluvial Flood Detection And Prediction Methods
- Volume68 Issue11 No1 November 2020
- Mobile ERP: Implementation and Sustainment Strategies
- An Android Based System for Reporting Coronavirus Outbreak in Educational Institutions using Social Media Services
- Information Technology and Security Analysis
- Motor Vehicle Loss Reporting System Utilizing ALPR and OCR
- Porter`s Competitive Forces Model and SWOT Analysis To Payments
- A Literature Review of Network Function Virtualization (NFV) in 5G Networks
- ERP Implementation and Successful Post Sustainment
- A More Secure Image Encryption Algorithm Using Dual 3-Dimensional Chaotic Maps for RGB Images
- Review Process
- The Performance Analysis of Edge Detection Algorithms for Image Processing Based on Improved Canny Operator
- SSRG JOURNALS
- Website Search Engine Migration - Triggers, Plan, and Execution
- For Reviewers
- Lung Cancer Detection Using Convolutional Neural Network on Histopathological Images
- For Editors
- From Batter to Cake: Bake your Own Security Model in API Management
- Policies
- Excise Tax Calculation for the EU Member States & Third countries using SAP Cloud Solution (SCP)
- Authors Guidelines
- Volume68 Issue10 No1 October 2020
- For Authors
- Supervised Machine Learning Classifiers: Computation of Best Result of Classification Accuracy
- Articles
- Human Capital Management System Using Fishbone Analysis
- Request Order System for Goods and Services Using PIECES Analysis
- Cloud Computing Model For Enhanced Resource Usage In Multi-Tenant Application Environment
- Enhancement of the Performance of Automobile Refrigeration System by using a Cellulose Pad (2)
- The Use of Web 2.0 Tools and Students’ Cognitive Engagement Among Tanzanian University Students
- In Vitro Testing of Implantable Antenna For Glucose Sensing (3)
- Classification of Retinal Images Using Convolutional Neural Network
- Creating a Single SQL Database using Azure portal
- Mode of Payment (2)
- Volume68 Issue9 No1 September 2020
- Prospects of A.I. enabled IoT
- Determination of the psychotypes of drivers using machine learning algorithms using twostage cluster analysis
- Uses Quality of Services for managing network traffic at Ghazni University
- Buildings' Site Management and Supervision: Cost Analysis of Labor Positions
- Prediction And Diagnosis of Liver Disease In Human Using Machine Learning
- How Secured Is The Securer: Biometric Technology Overview
- Object Recognition for Visually Impaired People
- Evaluating Denoising using various techniques based on Peak Signal-to-Noise Ratio and MeanSquare Error on CT Dental Images
- Volume68 Issue8 No1 August 2020
- Real-time Sociotechnical Systems: Early Software Reliability Evaluation
- Caching in Web Applications
- An Intelligent Mobile Application for Customizing Travelers Trips
- The Innovative Application for News Management System
- Spherical Bitwise Weighted Hamming Distance Method
- Designing a non-contact sensor for capturing pacemaker
- Constraints in Prevention of Cybercrime in Public Cybercafés in Kisumu City
- Current Trends In Information Technology: Which Way For Modern It Experts
- Artificial Intelligence in IT
- Review of Business Intelligence Implementation in Healthcare
- Detailed Review of Cloud based Mobile application for the stroke patient
- Volume68 Issue7 No1 July 2020
- Quantum Cloud
- Privacy vs National Security
- Text Summarization using K-Means, Tanimoto Distance & Jaccard Similarity
- Traffic Automation Using Computer Vision
- Review on Credit Card Fraud Detection using Machine Learning Algorithms
- Yolo Real Time Object Detection
- Development of Programmable Camera-Trap
- Maintain and Evaluate students’ performance Using Machine Learning
- The forensic approach uses snort from SQL injection attacks on the server
- An Unsupervised Clustering Approach for Twitter Sentimental Analysis: A Case Study for George Floyd Incident
- Security and Privacy Concerns of the Internet of Things? (IoT) in IT and its Help in the Various Sectors across the World
- Blockchain and Bitcoin Security in IT Automation
- AI automation and application in diverse sectors
- Risk Management In Private Sector
- Architectural Approach for Implementing Access Control for Enterprise and Application Data Assets
- New Ways In Artificial Intelligence
- 2019 Issues (2)
- DevOps Automation Advances I.T. Sectors with the Strategy of Release Management
- Cloud Computing in IT and How It’s Going to Help United States Specifically
- Internet of Things Security By Elliptic Curve Cryptography
- Modeling a Unified Virtual Market Platform Using Ontologies and User Characteristics
- Volume68 Issue6 No1 June 2020
- Review on Credit Card Fraud Detection using Machine Learning Algorithms
- Identification of a Person Using Iris Features: Challenges and Trends
- Investigating Factors Affecting the Learning Process in Higher Education - A Case Study
- Analysis of Big Data Tools and Algorithms
- Sentiment Analysis using Naive Bayes Classifier and Information Gain Feature Selection over Twitter
- Simplifying Allen Bradley PLC Digital Logic Programming Using Boolean Algebra Theorems
- Decentralising Stock Exchange Using Blockchain
- A Framework For Integration of Web 3.0 And Social Media Technologies In Government Portals For Personalized Integrated Service Delivery
- A Proposed System for Seizure Prediction and Classification Using Affective Technology
- Data Warehouse Architecture – Leading the next generation Data Science
- Smart IOT Application for Agriculture
- Technical Architect
- Event monitoring framework for Regulatory Compliance
- An Image Encryption Algorithm Based on Scrambling with Reversible Matrix Transformation and Chaotic Diffusion
- A Framework For Scalability On Wireless Connections In Cellular Networks
- Outpainting Images and Videos using GANs
- Hybrid-New Type- Based Proxy Re-Encryption (H-TBPRE) Technique to Ensure Data Integrity in Cloud Computing
- Big Data - Benefits and its Growth
- How to deal with Phishing Scams during COVID 19
- Using a Binary Classification Model to Predict the Likelihood of Enrolment to the Undergraduate Program of a Philippine University
- Volume68 Issue5 No1 May 2020
- Reduce Packet Dropping Using Strongest Cell Handover Algorithm
- Mathematical Model Based On Stability Of The Raspidrone
- Text Sentiment Analysis Using Naïve Baye’s Classifier
- Academic Information System (AIS) to Monitor Students’ Activities
- Medical Record Information System (MRIS) at Hospital X
- Handwritten Mathematical Equations Conversion to LaTeX Equivalent
- Water Management System Using IOT
- Enhancement of Security in Image Watermarking Using Hybrid Technique
- A Functional View of Big Data Ecosystem
- Survey On Coal Mine Safety Monitoring Systems
- Modeling Complements of Positive Integer Numbers Using Advanced Radix and Diminished-Radix Methods
- An Affective-Based E-Healthcare System Framework
- An Organized Recommender System for Nigerian Fashion using Machine Learning
- ICETSH2015`
- An Improved Model for Waste Management Recommender System in Rivers State Using Deep Learning Approach
- An Improved Augmented Agent Framework for Disaster Response (AAFDR) in Academic Communities in Rivers State
- Stress Analysis, Design Formulation and Optimization of Crankpin of Single Cylinder Four Stroke Petrol Engine (2)
- A New Method of Target Tracking with Wireless Sensor Networks
- Modeling User Experience with Universities Websites Based on Webometric Ranking User Analysis
- News Flash (2)
- Brain Tumor Detection Using Image Processing
- Iot Based Smart Controlled Inverter
- Research Issues on Vehicular Ad hoc Network (2)
- Volume68 Issue4 No2 April 2020
- Secured Image encryption/decryption using advanced 4 out of 8 code
- Real Time Tracking & Health Monitoring System of Remote Soldier Using Arm7 (2)
- Restaurant Ordering System using AR, Website Development and Recommender system using ML
- An Authentication Protocol for Secure Processing of ATM Systems by Fusion of Biometric and Crypt-Steganography Techniques
- Centaur - A Self-Driving Car
- Home Automation using HTTP and MQTT Server
- Extracting Large Data using Big Data Mining (2)
- Resource Dependency Framework for Digital Transformation in South African Financial Service Providers
- Development of Arduino Based Real Time Bus Tracking and Monitoring System
- Limitations of Forward and Return Links in UHF RFID with Passive Tags
- Text Detection in Video for Video Indexing
- Survey of Vehicle to Vehicle Communication using LI-FI Technology
- Implementation Of 'CAN' Protocol In Automobiles Using Advance Embedded System
- A Systematic Review on Web Page Classification
- ICT for Sustainable Development without Digital Divide in Africa
- Digitalized Ration Card
- Investigating the application of particle swarm optimization algorithm in the neural network to increase the accuracy of breast cancer prediction
- Safe Driving Using Mobile Phones (2)
- Application of Self-Organizing map for Time-varying biological to predicting of complexity Systems
- Product Development in Agile Manufacturing (3)
- Survey On Leveraging Django and Redis Using Web Scrapping
- Dynamic Traffic Signals Timer Using Iot - A Survey
- Design of a Low Voltage ClassAB CMOS Super Buffer Amplifier with Sub Threshold and Leakage Control (2)
- Security Issues, Challenging and Integration of IoT and Cloud Computing Technology
- Survey of Station-less Bike-sharing System
- Performance Evaluation of Clustering Algorithms (2)
- A Model-Driven Approach for Developing WEB Users Interfaces of Interactive Systems
- Survey on Real Time-Detection of Lung Cancer
- Static Load Analysis Of Tata Ace Ex Chassis And Stress Optimisation Using Reinforcement Technique (2)
- Survey on Decentralized Digital Governance Using Blockchain Technology
- Proactive Crop Supervision with Machine Learning Algorithms for Yield Improvement
- Online Chatbot For Car Dealership
- Detection and Classification of Plant Diseases Using Image Processing and Multiclass Support Vector Machine
- 404
- Volume68 Issue4 No1 April 2020
- Security Systems for DNS Using Cryptography
- Real Time Dehazing System for Automobiles
- Attaining High Bandwidth In Cloud Computing Through SDN-enabled Multi-tree Multicast
- Blockchain Based Fake Medicine Prevention
- Computer Science Career Recommendation System using Artificial Neural Network
- Design and Implementation of Digital Braille System for The Visually Impaired
- Automated Training for Job Interviews
- E-Certificate Generation using Blockchain
- Smart Toilet Monitoring System using IOT
- Sentiment Classification in medical Care with Psychometric Analysis Using Emotion Detection
- Application of Blockchain Technology to HealthCare Sector: A Review
- Online Shop as an interactive media information society based on search engine optimization (SEO)
- Reliability Assessment of Autonomous Systems: A Systematic Review
- Transform Android App into a Savior from Crime Against Women
- Exploring the use of class blog for PBL in K-12 STEM Subject
- Database Design of Raw Materials Information Systems In Bread Company
- Credit Card Fraud Detection from Imbalanced Dataset Using Machine Learning Algorithm
- Spatial Mining of Urban Emergency Events using Crowdsourcing
- Assisting Mute People In Communication Using Flex Sensors
- Smart Search
- Volume68 Issue3 No1 March 2020
- Detection of Gender Using Digital Forensic
- Content
- Autonomic Computing Architecture by Self-defined URI
- Minimum Personnel and Organizational Structure Proposal for Obsolescence Management in a Wellhead Equipment Supplier in the Aftermarket Phase
- Cradle Mountain
- Intrusion Detection Using Tree Based Classifiers
- Classification and Prediction of Slow Learners Using Machine Learning Algorithms
- Custom HTML Module
- Architectural Pattern for Implementing Data Quality Monitoring and Reporting Framework
- Expert System For Diagnosis Of Eye Defect And Recommendation
- Second Blog Post
- Supporting Structure For Prioritizing And Assigning Six Sigma Software Projects Using Fuzzy Logic Topsis And Fuzzy Logic Expert System
- Impact of Digital Humanities And Literary Study In Electronic Era
- Latest Articles Module
- Ship Detection from Satellite Imagery In Deep Learning: Using Sequential Algorithm
- Emerging Technologies to Smart Education
- Menu Module
- IJCTT - 2020 Issues
- Volume68 Issue2 No1 Feruary 2020
- Search
- Host Hardening Review Management System in Enterprise
- Model design and build Web-based package forwarding PT. Tiki Jalur Nugraha Ekakurir
- The Joomla! Project
- Analysis of Breast Cancer And Image Processing Techniques
- Effectiveness of Fuzzy Logic Multiple Attribute Decision Making Approach in Six Sigma Methodology in Software Industry
- Typography
- An Enhanced Mutual Authentication Scheme using One-Time Passwords with Images
- P2P Networks – Pirates Prevention
- Who`s Online
- Programming Languages for Data Mining : A Review
- Information Security Least Privilege Requirement Analysis for SQL Database Backups
- Wobbegone
- Developing Monitoring System for Solar Water Pump based on Wireless Sensor Network in Grigak Beach, Yogyakarta, Indonesia
- Security in wireless sensor networks
- Wonderful Watermelon
- Applications of Machine Learning Algorithms
- Global technology Economic analysis Paradigm
- Wrapper Module
- A Study on the Functionality and Effectiveness of SW Education Tools
- Big Data Architectural Pattern to Ingest Multiple Sources and Standardization to Immune Downstream Applications
- Captcha
- Influence of Information Technology Project Management To Agriculture Sector In Uganda
- Volume68 Issue1 No1 January 2020
- Join as a Representative
- The Architecture of Bot Framework
- Investigating the Success of Business Intelligence in Aligning Higher Education and Labor Market
- Contacts
- Image Contrast Enhancement using DWTSVD
- Location Identification For Optimizing Fidelity And Robustness Using Swarm Intelligence
- Directions
- An Improved Approach to Modern Techniques for Computer Numerical Control (CNC) Machine Operation
- The Most Secured Technology: Blockchain and Its application in Various Sectors
- Feed Display
- Agricultural Monitoring And Management Based On Internet Of Things, Data Analytics And Artificial Intelligent Technologies: Review
- Comparative Study of Support Vector Machine and Naïve Bayes Classification Algorithm on Amazon Data
- Anomaly Detection Using Data Mining Methods
- Performance in Layered Software Architectures: The case of customized organizational software
- Koala
- Volume67 Issue12 No1 December 2019
- MPLS-VPN Impact on VOIP-QoS
- Login Module
- Implementation of Data Mining With Clustering of Big data for Shopping mall’s data using SOM and K-means Algorithm
- MarketVR
- Most Read Content
- Efficient Geographical Routing with Location Service in Intermittently Connected MANETs
- An Interactive Approach for Smart Parking System Using Machine Learning
- System
- Swach App
- A Study On Approach To Ransomware Detection In Network Security
- Breadcrumbs Module
- Wireless Temperature detector System using ARDUINO and IOT
- Optimal Routes for Distributing Refined Products for Kaduna Refining and Petrochemical Company (KRPC), Kaduna, Kaduna State, Northwest, Nigeria.
- Thesis Submission
- System Business Performance Report About Priority Client In Banking
- Authentication
- Design and build Web-based helmet production data system PT. Citra Plastindo Indonesia
- Customer Loyalty of Discount and Promotion Mobile Applications
- Footer Module
- A Comparative Study on Air Quality Analysis Through DNN by SVM, K - Means and Naive Bayes Algorithms
- Making Digital Artifacts On The Web Verifiable and Reliable By Using Cryptographic Hash Key
- Language Switcher
- Ending Out-of - Stock Syndrome in Hospital Pharmacies through Computer - Based Forecasting
- Lung Cancer Detection Model Using Convolution Neural Network and Fuzzy Clustering Algorithms
- News Flash
- Big Data Performance Analysis In Apache And Internet Information Services
- Smart Gym Health/Fitness System android Mobile Application
- Phyllopteryx
- Volume67 Issue11 No1 November 2019
- Data Expenditure Appraisal: Towards the Utilization of Data for I.T Skill Acquisition
- Search
- Research issues in Big Data – A Review
- A Fog Computing Based Architecture for IoT Services and Applications Development
- Site Map
- Implementation And Performance Analysis of Proposed Security Framework For Uidai
- Influence of Exercise in Diabetes Mellitus Prediction in Big Data Using Hadoop/Map Reduce Frame work
- The Joomla! Community
- Design, Simulation And Optimization of A Hybrid Renewable Energy System For Bayero University Kano, Nigeria
- A Parallelized Approach for Colorizing Grayscale Images
- Ormiston Pound
- Implementation of Modified Smart travel Advisory System of User Interest By Using Preprocessing
- Detection of Cyberbullying in Twitter Data Using Machine Learning Techniques
- Latest Users Module
- Graph Partitioning Using Metaheuristic Techniques
- General Relationship Between Technology And Adult Education
- Pinnacles
- A Study On Steganographic Lsb Images By Varying Encryption Algorithms
- Fake News Detection On Social Media Using Machine Learning
- Random Image Module
- A Survey Paper on Sentiment Analysis : Approches, Methods & Challenges
- Comparative Security Vulnerability Analysis of NoSQL and SQL Database Using MongoDB and MariaDB
- Related Items Module
- Adaptive Fibonacci Search Method of Video Key Frame Extraction
- Sources of Agricultural Finance In India- An Overview
- Search Module
- Cyber Physical System Security Model For Remote Sensing Device Protection: A Technical Review
- A Review on Green Wireless Sensor Network Technology And Big Data Analytics Towards Iot
- Spotted Quoll
- Volume67 Issue10 No1 October 2019
- IOT Based Flood Forecasting and Prevention System
- User
- Volume67 Issue9 No1 September 2019
- A Structure and Implementation of Wireless Energy Harvesting
- News Feeds
- Speaker Diarization
- Key Word searching in Speech using QbE and RNN
- Academic Information System Effectiveness Key Factors
- A Review of Emerging Security Issues In Cloud Computing
- Editors
- A Brief Discussion on Two Different Cryptocurrency: BITCOIN & ETHEREUM
- Content Based Image Retrieval using Color Histogram and Discrete Cosine Transform
- Cloud Computing-Challenges and Benefits
- Predicting the Consumer?s Product Purchase Intention Using Regression Analysis at Attribute Level
- Statistics Module
- Structural Analysis Of Fracturing In Sinjar Anticline Using Remote Sensing Technique
- IoT Based Farmers’ Smart Technology, Case Study: Rwanda Meteorology Agency, Kayonza District
- Users
- A Review on Concept of Object Detection Techniques
- Evaluation Of Enhanced Swarm Based Mac Layer Protocol Over Secured Lazy Receiver Processing In Manets
- Weblinks Module
- Aggravation of Mobile Banking Trojan in Android Platform and its Mitigation Techniques
- Properties of WLAN Indoor Fingerprinting Received Signal Strength for Localization
- Editorsxtd
- Measurement of Learning Evaluation Against Assisted by Laboratory Assistants
- Evaluation of Emotional Students During the Final Project Writing Process
- Syndicate Module
- Analyzing Word Error Rate on Optical Character Recognition (OCR) for Myanmar Printed Document Image
- Leaf Disease Detection Using Artificial Neural Network
- Guidelines for Cloud Computing Architecture:Development Process
- Scrutinizing Cross-Platform Mobile App Development Frameworks: PhoneGap and Ionic
- Weblinks
- An Evolving Model of Voice Disorder Detection using Deep Belief Network
- IOT Based Vacuum Cleaner Robot
- Administrator Components
- Controlling Robot By Fingers Using Flex Sensors
- Simplifying Control Flow Graphs for Reducing Complexity in Control Flow Testing
- Volume67 Issue8 No1 August 2019
- HPC Feature for Crowd Outdoor Scenes Estimation
- Content
- A Study of Various Roles in a Successful Data Organization
- Improved Sugeno FIS-2Level DWT Digital Image Watermarking Technique
- Options
- Models and Method for Estimate Information-Time Characteristics of Real-Time Control System
- Types of Leaf Classification using Machine Learning
- Sample Sites
- QRD-Mamdani FIS for Digital Image Watermarking
- Application of Floyd-Warshall Iterative Algorithm for Travelling to the Most Popular Tourist Attractions in Myanmar
- Application of Data Mining Classification Algorithms for Afaan Oromo Media Text News Categorization
- Comparison of Adult Human Emotional States Using Electroencephalography Signals with Voice Recording and Pictures
- What are Article Processing Charges?
- A Survey On Various Architectures, Models And Methodologies For Identifying Brain Tumor
- Power System Small Signal Stability Analysis Using Facts Pod
- Survey on Usage of Machine Learning Techniques in Different Biological Domains
- Classification of Flood Disaster Predictions using the C5.0 and SVM Algorithms based on Flood Disaster Prone Areas
- The Challenges of Cloud Computing in Forensic Science
- The Business Intelligence Use In Healthcare And Its Enhancement By Predictive Analytics
- Challenges Facing E–Commerce: A Case Study of Amazon vs Snapdeal
- Survey Report on Cyber Security related issues on Nuclear Stations, Vehicles and Wireless Networks
- For Authors
- A Review on Domain Based Automatic Speech Recognition Technology
- ERP System As A Inventory Control And Waste Elimination (Pt Vif Case Study)
- For Authors
- Volume67 Issue7 No1 July 2019
- Comprehensive Survey: Automatic Query Expansion
- Publication Ethics
- Avoid Delay of Packets and Improve the Behavior of Switch/Router under Self-Similar-Type Variable Input Traffic
- Predicting Demographic User Using Social Network Site
- Development of a Cryptographically Secure Booking Reference System for Air Travels
- Cloud Computing Adoption in Enterprise: Challenges and Benefits
- Investigation on Local Rice Processing, Packaging and Storage among Farmers in Some South Eastern Nigeria
- Secure HDFS Using OAuth 2.0
- A Scalable Feature Extraction Technique to enhance Multivariable Linear Regression Model for Empirically Derived Patterns-Cereals
- Pre-production Support for Agriculture through Information Exchange
- Detection And Reduction Of Impulse Noise Using Fuzzy Technique
- Production, Activation and Characterisation of PKSBiochar from Elaeis Guineensis Biomass activated with HCl for Optimum Produced Water Treatment
- Agile Cultural Shift and Mindset
- A Review on Multiple Objects Tracking in a Video Scene with Particle Filtering Techniques
- Feature Selection to Reduce Dimensionality of Heart Disease Dataset Without Compromising Accuracy
- Microcontroller Based Servo Motor Control System
- An Innovative Technique of Portable Communication done in 5G Equipment
- Aerial Reconnaisance For Municipal Services Using Gis & Gps Based Target Tracking System
- A Review of EEG Emotion Recognition
- Aims and Scope
- Distance Matters: How Employee Geographical Dispersion Affects the Dissemination of Time-Sensitive Data in Virtual Teams
- Mobile GPS based Traffic Anomaly Detection System for Vehicular Network
- Factors Analysis of the Adoption of Cloud Computing in England
- Volume67 Issue6 No1 June 2019
- CybercrimeAwareness among Students at a Teacher Training College
- Internal and External Analysis Considering the Layers of Three-dimensional Shapes Using CUDA
- An Optimized Smart Grid Solution for Charging and Discharging Services in Cloud Computing using Genetic Algorithm with ANN
- Speech Recognition performance of Dental Nasal an Retroflex nasal Phonomes of Malayalam Language
- Cutting-edge Application Longevity: A Practical Extensionof Agile Methodology in Modernization
- Fuzzy Model For Management Of Hiv/Aids Patients
- Integrity Check Mechanism for Personal Health Record in Cloud using SHA
- User Identification Using Face Recognition System
- Ameliorated Methodology For Retrieval Of Data Using Query By Example
- An IoT Based Driver Assistance System to Detect and Notify the Presence of Potholes and Humps on Roads
- Application of PSO and K-means Clustering algorithm for CBIR
- A Survey of Cryptographic Hash Function (SHA) in Cloud Storage
- A Survey of the Concept of Blockchain security Challenges and Risks
- Geospatial Intelligent Decision Support System Conceptual Framework for Disaster Management in Developing Countries
- Emotional Intelligence and Effective Leadership
- A Survey: Reliability Solutions using Block Chains
- Android based System for Domestic Services
- An Approach To Find Frequent Pattern From Logs Using Modified Apriori Algorithm
- A Study of Risk Factors Associated With Diadetes Using A Multiple Logistic Regression Modelling
- Suggesting Suitable Economic And Political Leaders Using Fuzzy-Analytic Hierarchy Process (Fahp)
- Sentiment Analysis Using Twitter Data
- Clustering-Based Data Analysis With Hadoop
- Cache Contention on Multicore Systems An Ontology-based Approach
- Volume67 Issue5 No2 May 2019
- Ant ColonyPerformance Evaluation and Optimization–based Resource Allocation for D2D Communication
- Emerging Trends In Cloud Computing: Is It A Friend Or Foe For The Economic Development And New Age Of Globalisation: A Case Study Approach
- Acne Detection and Classification System
- Database Security –Threats & Prevention
- Business Stimulation Strategies of Cloud Computing
- Convolutional Neural Network for Detection of Sign Language
- Android Information Leak Potential in Benign, Malware, and Commercial Spyware Applications
- Volume67 Issue5 No1 May 2019
- Big Data Security And Privacy
- Cloud Computing Effect on Enterprises in Terms of Cost
- Improved Features in Integrated Smart Campus System
- Overcoming Security issues using OpenCV and Machine learning
- An Overview on Accessibility to the Graphical Study Materials for Visually Impaired or Blind Students
- Data Mining Techniques for Prediction of Diabetes Dieseas
- Big Data Storage using Synthetic DNA
- Security to the Cloud using RSA and Blowfish Algorithm
- Practicing E-Governance in Nepal: Challenges of Civil Service
- A Survey Based Investigation for Cloud Computing Adoption Internationally
- Design of UWB Microstrip Antenna with Frequency Notch Characteristics
- A Performance Evaluation of E-Learning Model over Wireless Network using Opnet
- Survey on Wireless Sensor Network
- Voice Recognition using MKMFCC and VQ
- An Improvised Word Recognition System using CNN in a Non-Isolated Environment
- Cayley Graph on Nilpotent Groups with and without Hamilton Path
- Real Time Packet in Network Intrusion Detection System Filtering Module
- Implementation of Virtual Reality in Healthcare, Games, Fashion and Education, and it Future
- Bandwidth Enhancement of Patch Antenna For Ultra Wideband Applications
- Volume67 Issue4 No2 April 2019
- Power Management System using Hybrid Ac Micro Grid
- Enhanced Energy Storage and Management Scheme in MH-CRSNs with ACO Algorithm
- Trust Based Secure AOMDV with Homomorphic Encryption for Multi Path Mobile ADHOC Network
- An Improvised Word Recognition System by Hybridizing CNN and SIFT
- Machine Learning and Digital Health
- The Application of Data Mining in Sports and Extracurricular Activities
- Enhanced Subject Allocation and Internal Mark Assessment using .Net Framework Technology
- Transform & Execute Apache Struts 1.x based validations to Bean Validation through JSF
- Architecture of Indian Healthcare Information Management System (HIMS) based on Blockchain
- A Survey Paper on Blockchain Technology, Challenges and Opportunities
- Automated Question Paper Generator and Answer Checker Using Information Retrieval Approach
- Volume67 Issue4 No1 April 2019
- Learning Android Programming through Active Learning Environment
- Weather Based Prediction Model for Recommending the Crop Insurance using CART Algorithm
- Design of New Fuzzy System to Determine the Three-Zone around the Ship
- Analyzing Resource Allocation Strategies with Elasticity in Multi-Tenant Cloud Environment
- Cloud Computing and Data Security Challenges: A Nepal Case
- Easy Health
- Notable Internet Applications of NoSQL Cassandra Database
- Travel Mate an Android Application for Easy Travelling
- Examining the Impact of ATM Adaptation Layers and Service Classes on the Performance of Network
- Apache Struts 1.x based Enterprise System Transformation to JEE 7+, JSF and Prime Faces based Components
- Object Recognition using Deep Convolutional Neural Network
- Transform Dynamic Validation Metadata to Runtime Java Bean Validation Constraint Annotations
- Integrating Association Rules with Decision Trees in Object-Relational Databases
- Classification of Cancerous Profiles using Machine Learning Algorithms
- Event-detection Clustering Algorithm for Wireless Sensor Networks
- Detecting Glucose Level using IR Sensor
- Prevalence of Electronic Fraud in Nigeria Banking System
- Volume67 Issue3 No2 March 2019
- Patient Management System
- Predicting Dengue Using Fuzzy Association Rule Mining
- Home Automation and Control using Hand Gestures and GSM with Smoke Sensor
- An Efficient Unsupervised Learning Model For Routing Protocol
- A Novel Color Chaos-based Image Encryption Algorithm using Half-Pixel-Level Cross Swapping Permutation Strategy
- A Systematic Literature Review of Factors Affecting Cloud Computing Adoption Internationally
- Load Balancing of Heuristic Algorithms on the basis of Performance Metrics in Cloud Computing
- A Novel Spatial Query Search Implementation with Route Server and Location Based Search
- Website for Bulletin Board
- Artificial Intelligence Based Recommendation System for Farmers
- New Approach toward Requirements Analysis at Elicitation Phase in Software Engineering
- Volume67 Issue3 No1 March 2019
- Black Box Logging System for Drones
- An Android Application E-Farmers To Bid-ask via Online
- Deep Learning Based Vehicle Tracking in Traffic Management
- Pattern Discovery with Web usage Mining using Apriori and FP-Growth Algorithms
- Comparison of Encryption Algorithms during Data Transmission at Rest and in Transit
- Improve the Quality of Remote Sensing Geographical Images Using ConventionalMethods and Discrete Wavelet Transform: A Survey
- The Impact of New Technological Changes to the Marketing Strategy Formulation
- Video Analytics Based Online Traffic Regulation System
- A Novel Study of Application of Information & Communication Technology in Library Classification
- Security and User Interface Usability of Graphical Authentication Systems – A Review
- Data Visualization with Python Pragmatic Eyes
- Phoenix - The Arabic Object-Oriented Programming Language
- A Survey of Techniques for Web Personalization
- Time Series Analysis : A Review of methods
- IJCTT - 2019 Issues
- Volume67 Issue2 No1 February 2019
- SQLite Database and its Application on Embedded Platform
- Spatial Data for Sharia Compliant Smart City: A Review
- Importance of Microcontroller in Automobiles
- Design of Information System Model to Reservation Campus Bus
- Design of Information System Model for the Help Desk
- Volume67 Issue1 No1 January 2019
- Study of Digital Watermarking Algorithms for Digital Rights Management and their Attacks
- Application New Employee Recruitment and Placement
- Internet of Things Platform (IoT) - Comparison of Layered Architectures
- Pattern Evaluation in MBA using A Novel Approach
- IJCTT - 2018 Issues
- IJCTT - 2017 Issues
- IJCTT - 2016 Issues
- IJCTT - 2015 Issues
- IJCTT - 2014 Issues
- IJCTT - 2013 Issues
- IJCTT - 2012 Issues
- IJCTT - 2011 Issues
- A Survey on Cryptographic Algorithms and Access Control Mechanisms to Develop Security to Cyber Physical Systems
- Popular SQL Server Database Encryption Choices
- Classification of Spam Categorization on Hindi Documents using Bayesian Classifier
- Volume66 No1 December 2018
- Sentiment Computing for Visual Emotion Generation on Social Media using Text Mining
- Study on Machine Learning Algorithms
- A Novel Energy Efficient Cluster Based Routing Protocol for MANET with Related Metrics
- IoT Based Wireless Sensor Networks – A Survey
- Volume65 No1 November 2018
- Building E-Voting System for Educational Institutions
- An IoT & AWS Based Smart Door Authentication System for Securing Hospital Maternity Wards
- A Survey on Crop Yield Prediction using Data Mining
- Wave File Encryption using Huffman Compression and Serpent Algorithm
- Implementation of IEEE 802.1X Port-based Authentication Mechanism for Ethernet
- Relationship between Operating System, Computer Hardware, Application Software and Other Software
- Zinc OS-Linux Based OS for Educational Institutes
- Volume64 No1 October 2018
- Effect of Multiple Glazing on the Efficiency of the Flat Plate Solar Collector
- Human Behavioral Analysis Based on Handwriting Recognition and Text Processing
- Techniques for Performance Enhancement of SQL Queries in Relational Databases
- An Overview of Data Analytics in Emergency Management
- Closing the Knowledge/Experience Gap between Generations of Civil Servants using IT knowledge Transfer Platform (2)
- Closing the Knowledge/Experience Gap between Generations of Civil Servants using IT knowledge Transfer Platform
- Imapct of Node Speed Variation on the Performance of a MANET Routing Protocol under OFDM (IEEE 802.11A) and DSSS (IEEE 802.11b)
- Mann-Kendall Test - A Novel Approach for Statistical Trend Analysis
- Real-time Vehicle Inspection and Security Management System
- Contemporary Leadership in IT Projects: A Key to Project Success in Digital Age
- Volume63 No1 September 2018
- Feed-Forward Deep Learning Model for Data Analysis and Prediction
- A Contemporary Survey and Taxonomy of the Distributed Denial-of- Service Attack in Server
- Introduction of Routing and its Types
- The Use of Data Mining Techniques in Analysing Traffic Accidents ( An application on Khartoum State)
- Running Instances of Virtual Machines Concurrently and Securely in Cloud Environment
- Symmetric Image Encryption using Scrambling Technique Based on Matrix Reodering Coding
- Music Genre Classification using Naïve Bayes Algorithm
- A Novel Hyper-Chaos-Based Image Encryption Algorithm Using Bit-Level Permutation and Pixel-Level Diffusion
- Mobile Base Learning Application for Campus on Android Platform, Case Study- University of Tourism, Technology and Business Studies
- Environmental Audio Tagging: Trends and Techniques
- Volume62 No1 August 2018
- Secure Multimodal Biometric Authentication System against Spoofing Attacks
- In-Silico Protein-Ligand Docking Studies against the NS5 Methyltransferase Protein of Dengue Virus
- SQL “+” NoSQL, A Merger with Great Capabilities
- Advancement of Mobile Computing Application with Context - Aware in Higher Institutions
- Image Ciphering Based Onchaotic ANN and Fibonacci Transform Improved by using the Wavelet Transform
- An Efficient Offline Handwritten Signature Verification Method Based on ODBTC Features
- Overseeing Cross-Cultural Issues in Global Software Outsourcing
- A Hybrid Approach for SVD and Neural Networks Based Robust Image Watermarking
- Improving State Invariant Test Oracle Strategy using Mutation Analysis
- Developing Real World Applications using Augmented Reality
- Efficient Authentication Scheme for Vehicular Ad Hoc Networks
- Reliable Scheme for Cluster Head Election in Mobile Ad Hoc Networks
- Towards Multi-Modal Advance Journey Planner in a Co-Modal Framework
- Volume61 No2 July 2018
- Annual Subscription
- Car and Motorcycle Washing Service with Home Washing and Pick up Service Washing Based on WEB at RAN Carwash
- Low-Resource Constraints for Speech Recognition using HDNN
- Energy Efficient Opportunistic Routing for Duty-Cycled Selection in Wireless Sensor Networks
- A Comparative Study of Encryption Security for Cloud Computing
- Cloud Computing Security and Privacy Issues: Comparative Study
- Detection and Analysis of Diabetic Retinopathy
- Effect of Distance and Antenna on Received Signal Strength in Wireless Sensor Network Using XbeeS2B Radios - A Case Study
- Automated Tracking, Reliable and Monitoring of Cloud Resources
- A Probabilistic Approach for Detecting Node Failures in Mobile Wireless Networks
- Image-Based Plant Disease Detection with Deep Learning
- Current Issue
- Volume61 No1 July 2018
- Improving Performance of Map Reduce using DLAJS Algorithm
- Role of Big Data and Predictive Analytics in Business organizations: A Review of Current Status and Research Issues
- Contribution for Improvement of Image Scrambling Technique Based on Zigzag Matrix Reodering
- Key-Aggregate Cryptosystem with Broadcast Aggregate Keys for Secure Data Sharing in Cloud Computing
- Performance Analysis of Implementation of AES (XTS)-MR in HDFS and Its Suitability in UIDAI
- Review On Spyware - A Malware Detection Using Datamining
- Analysis on Privacy Preserving and Data Security for Cloud Data Storage
- Deep Learning models for Video based Facial Recognition Systems: A Survey
- Extracting Conjunction Patterns in Relation Triplets from Complex Requirement Sentence
- Req2Test - Graph Driven Test Case Generation for Domain Specific Requirement
- Security System using Arduino
- Comparative Study on Classification Algorithms for Plant Leaves Disease Detection
- Joint Power Allocation and Beam Forming for Energy-Efficient Multi-Way Multi-Antenna Relay Networks
- Tasks Scheduling with Heterogeneity System in the Cloud Computing using ACO Algorithm
- A Smart App for Mobile Phones to Top-Up User Accounts for Any Network Service Provider in SriLanka
- Volume60 No2 June 2018
- Text Classification using Bi-Gram Alphabet Document Vector Representation
- Design and Implementation of Remote Data Possession Checking Protocol using Homomorphic Hash Fuction for Cloud Data
- Cloud Computing: Effective Concepts
- Leveraging Crowd Sourcing for Proficient Malevolent Users Revealing In Social Networks
- 3D Modeling of the Ball Bearing for the Front Axle Knuckle
- Multi-Criteria Multi Path Routing Protocol using Fuzzy Cardinality Priority Ranking
- Analyzing the Popularity of A City (Hyd) Through Twitter Data
- Bespoke Travel Recommendation System on Social Media
- A Medical ChatBot
- A Novel SCMAC Protocol for Vehicular Network to Access Control Channel
- Volume60 No1 June 2018
- Evaluation of Parsing Techniques in Natural Language Processing
- Redefining Web Revisitation Process using Content and Context Keywords
- A Survey : Adoption of Cloud Computing in Education Sector
- A Cyber-Threat Intelligence Framework for Improved Internet Facilitated Organized Crime Threat Management
- Network Intrusion Detection using Neural Network Based Classifiers
- A Netwoking Smart Phones for Energy Efficient Routing in Disaster Recovery Networks using Teemfon
- Computational Performance for UWSN Protocol in Mobile Sink Data Transmission
- Iot Based Evidence Collection System for Vehicle Accidents
- Recognition of Misbehaviour Actions in Delay Tolerant Networks using Trusted Authority
- A Novel user Authentication Method Based on Freehand Sketches
- An Efficient Integrity Model by Implementing Public Auditing in Cloud
- An Efficient Verification of Data Integrity and Keyword Search for Multi Data Owners by Preserving Privacy in Cloud
- A Survey on Access Control in Cloud Computing
- Performance and Classification Evaluation of J48 Algorithm and Kendall’s Based J48 Algorithm (KNJ48)
- Opinion Mining on PM?s “Man Ki Baat” using R Programming
- Partition Based with Outlier Detection
- A Survey of Existing Leaf Disease Techniques using Artificial Neural Network
- Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
- Secure Visible Light Communication by Caser Cipher and Spiral Wheel Algorithm
- Associative Rule Mining in Large Datasets using Neural Network Algorithm and enhanced Apriori - Based algorithm
- A Preface to Green Computing and its Issues
- An Improved Asynchronous Tuberculosis Diagnosis System using Fuzzy Logic Mining Techniques
- Sentiment Analysis in the IT Domain an Enhanced Approach to VADER Sentiment
- Effective Segmentation in Plain woven Fabric Defect Detection by using Digital Image Processing
- Volume59 No1 May 2018
- A Framework for Electronic Services Integrationand Seamless E-Services Delivery in Nigeria Public Sector
- RDF Data Management Systems Based on NoSQL Databases: A Comparative Study
- Reviews on Augmented Reality: Google Lens
- An Efficient Classification Approach for Predicting Cause of Death using Mixed Probability Rule Based Algorithm
- An Efficient Privacy Preserving Encryption of One to Many Orders Based on Cloud Data Search
- Analysis of Data using K-Means Clustering Algorithm with Min Max Function
- Analysis on DDoS Attacks and Solutions in Virtualized Cloud Environment
- VMWARE Virtualization - Physical to Virtual Migration
- The Application of Internet of Things in Greenhouse
- An SMS Based Fire Alarm and Detection System
- Automatic Document Summarization System Based on Natural Language Processing and Artificial Intelligent Techniques
- Opinion Mining and Sentiment Analysis for Amazon Product Reviews using Lexicon and Rule-Based Approach and Testing on Machine Learning Algorithms
- Usage of Internet of Things in Agriculture Automation
- RFID Based Adhaar Card (2)
- RFID Based Adhaar Card
- Maximization of Content Reachability using Trajectory Mining
- Natural Computing: Performance Analysis of Evolutionary Algorithms for Task Scheduling in Cloud Environment
- Evaluating the Adoption of Health Information Systems in Mengo and Nsambya Hospitals, Kampala, Uganda
- Volume58 No1 April 2018
- Simple analytics in Retail Sales Data using Hadoop
- Survey on Various Wavelets Based and Fuzzy Based Methods for Satellite Image Enhancement
- Survey Paper on Cervical Cancer Detection Through Artificial Intelligence Techniques
- Hashtag Sentiment Analysis using Tweets for the Ternary Classification
- Securing Data Storage by Virtualization in Cloud using Cryptography Protocols
- Enhancing Binary Classification by Modeling Uncertaion Boundary in Three Way Decision using Multi Document Classification
- A Novel Method for Home Security by Face Recognition system to visually Impaired
- Extraction and Analytics from Twitter Social Media with Pragmatic Evaluation of MySQL Database
- Performance evaluation of Reactive routing protocols in MANET using NS-3 Simulation
- Test Case Generation Techniques
- Fully homomorphic computation- A scheme to provide end-to-end data confidentiality in the cloud
- IOT Based Health Monitoring Wearable Device Using Security Mechanisms for Storage
- Predicting the Semantic Orientation of Communication Over Social Networking
- Applied Constraints on Sequential Pattern Mining with Prefixspan Algorithm
- IT Services Evaluation Model Based on Fuzzylogic
- MESH Encryption : A Multifarious Synchronized Haze
- Smart Energy Management Using Internet of Things
- Impact of Data Mining on Big Data Analytics: Challenges and Opportunities
- Prediction of Rabbit Population with Computer Application using Biotechnology
- Volume57 No1 March 2018
- Impact of Semantic Coding of Emotional Speech on Speech Coding Performance
- Analysis and Design Information System Personal Financial Management Based on Android
- Browser Extension for Top-k Instance Retrieval
- Home Automation using IOT
- State of ICT Waste Treatment in Developing Countries and Proposals : Case of Chad
- Data Warehouse Design for Electronic Manufacturing Company
- Attached Object, UI Component Wovening of Attributes using Meta Rule API - JSF
- Comparative Analysis of DSAS and MobiTC in Coastal Coastline Dynamics of Baguida and Agbodrafo Cantons (South-East Togo) from 1986 to 2017
- Analysis and Application of Data Mining in CRM Systems of Healthcare Insurance
- State Management, Partial and Full State Saving Strategy - JavaServer Faces
- Accelerating Hash Join Performance by Exploiting Data Distribution
- Volume56 No1 February 2018
- Voice Control for Flexible Medicine Robot
- Virtual Reality Games to Promote Healthy Behavior Choices
- Cloud Enterprise Resource Planning System
- An Intuitionistic Fuzzy K-Medoids Based Similar Pattern Analysis in Software Defect Prediction
- Mhp Lossless Image Compression Coding Scheme for and Efficient Compressed Image Transmission Through Wireless Networks
- Face Recognition using Locality Preserving Projection on Wavelet Subband and Artificial Neural Network
- JavaServer Faces – Transformation of Facelet to UIViewRoot
- Smart education in Chad
- Volume54 No3
- Security Policy Monitoring System
- Design Concept E-Learning Using Absorb-Do-Connect Type Method For Junior Homeschooling Education
- Volume55 No1 January 2018
- Proposed Control Approach Quasi-Sliding Mode Control
- Future of Software Testing: Novel Perspective, Challenges
- Effects of Grey-Hole Attack onP2P Based Video on Demand (VoD) Services
- Design Concept E-Learning Using Absorb-Do-Connect Type Method For Junior Homeschooling Education
- Web Based Centralized Cooperative Information Management System
- Distributed Denial of Service attack Techniques and Defense Mechanisms
- Introduction to Text Mining with R using packages
- Mouse Control System using LED-Based Colour Detection
- CWHP algorithm for Scheduling Real-Time Transactions
- Cluster based on Load Balancing for Environmental Monitoring in Wireless Sensor Network
- Towards more Efficient for Web Image Search Engine using Dominant Meaning Technique
- Exponential stability of time-delay systems
- An Automated Traffic Surveillance Control system by using STC algorithm
- Volume54 No2 December 2017
- Software Maintainability and Reusability using Cohesion Metrics
- Open Architecture Supervisory Control and Data Acquisition System: Security Enhancement with Defense-in-Depth Strategies
- Metaheuristic Optimization Design for Image Segmentation: Applications to Brain MRI Images
- A Vision on Text Steganography with proper Investigation Report to Identify the Associated Problem
- USE CASE MODELING FOR REQUIREMENT SPECIFICATIONS
- A Recursive Code Generating Algorithm for Automata Control
- A Reliable & Scalable Frame Work for HTTP BotNet Detection
- Reversible data hiding in encrypted images: A survey
- An Inventory Model for Generalized Two Parameter Weibull Distribution Deterioration and Demand Rate with Shortages
- Volume54 No1 December 2017
- On-Time Flight Departure Prediction System Using Naive Bayes Classification Method (Case Study: XYZ Airline)
- NLP in social Networking: An Overview
- Survey on Energy Efficient Clustering Scheme for Prolonging the Lifetime of Wireless Sensor Network with Isolated Nodes
- A Survey on Ayurvedic Medicine Classification using Tensor flow
- Meanings are more than just words: A Cross-Domain Question Answering Tool based on Unsupervised Semantic Feature Learning
- GIS in Chhattisgarh Health Issues
- Internet of Everything: Future Internet
- Automatic Level Crossing Barrier Control System using Arduino on a Model
- A Strategy to Place Contents and Mail Requests in a Cross Infrastructures Traversing Various Information Hubs
- Dynamic base station positioning algorithm for wireless sensor networks
- Sencha – the efficient cross platform development for mobile
- Energy Efficient Green Cloud Data Centres using Dynamic Virtual Machine Placement: A Survey
- Choice Based Curriculum Design
- Parkinson Disease and Voice
- Debugging and Finding the Errors in Security Testing Techniques
- Volume53 No1 November 2017
- Analysis of Parallel Architectures: SIMD, tightly-coupled MIMD, and loosely-coupled MIMD
- Novel Hybrid Finger Print System for Bank Locking System
- Dynamic Proof of Storage (POS)
- A Review on Big Data Concepts and various Analytic Techniques
- Artificial Intelligence (AI) meaning Killer Robots (Smarter Machines) or Intelligent Partners (Smarter People) combining with Trust & Respect to human life
- Volume52 No1 October 2017
- Virtual Infrastructure (Journey from Physical Servers to the Cloud)
- Detection and Analysis of Human Emotions through Voice and Speech Pattern Processing
- Viola-Jones Algorithm Based Approach for Face Detection of African Origin People and Newborn Infants
- Big Data Storage Analytics
- Case Studies of Security in Cloud Computing
- Operating System Simulator to Translate Assembler Code to Machine Code
- Improvement of Scientific Research; Software Package for the Publishing Committee
- Classics of Deep Learning Approach for Human Behaviour Ontology: A Survey
- Increasing the Performance of Vertical Handover Delay for Heterogeneous Wireless Network using BAN Logic & EAP
- Cybercrime and Computer Science Undergraduate Students in Private Universities in Nigeria: An Empirical Investigation
- Improved Real-Time Data Elasticity on Stream Cloud
- A Study on Quality of Service requirements in MANET especially focusing efficient routing procedures
- Privacy Preservation in the cloud: current solutions and open issues
- Volume51 No1 September 2017
- A Framework for Web Based Detection of Journal Entries Frauds using Data Mining Algorithm
- A Study on the Side Channel Attacks in Cloud Data Centers
- Review on Text Mining
- Smart Police Station – Need of an hour
- A Web Crawler Design for Data Warehousing
- Classification Quality of Tobacco Leaves as Cigarette Raw Material Based on Artificial Neural Networks
- A Survey: Big Data Analytics in Health
- Advanced Page Rank Algorithm with Semantics, In Links, Out Links and Google Analytics
- Securing the Operating System A Software Based Approach in Linux
- Mobile Phones for Security and Medical Uses
- Optimization Strategy for Handling Poverty towards Strengthening the Economy in Indonesia
- Standardized Architecture for Conversational Agents a.k.a. ChatBots
- Cyber Forensic Science to Diagnose Digital Crimes- A study
- Design and Analysis of 4- Bit Binary Synchronous Counter by Leakage Reduction Techniques
- A Proposed Method for Text Encryption using Symmetric and Asymmetric Cryptosystems
- MRI Medical Images Enhancement based on Histogram Equalization and Adaptive Histogram Equalization
- Volume50 No2 August 2017
- Fatigue Detection in Drivers using Eye-Blink and Yawning Analysis
- A Secure Novelty Leach Protocol to Extend the Life Time of Wireless Sensor Network
- An Improved Wireless Channel Authentication using Multi-Channel Safety Link Signature for Wireless Networks
- Customize Venture out Arrangement Suggestion Once Multi-Source Huge Online Networking
- A Simply Study and Analysis on Wireless Sensor Network and Its Techniques
- Survey Paper on Clustering of High Dimensional Data Streams
- Embedded Systems in A new way
- Evaluation of Best Steganography Tool using Image Features
- Performance Analysis of Some Neural Network Algorithms using NSL-KDD Dataset
- Volume50 No1 August 2017
- Nearest Automatic Teller Machine (ATM), Minimarket, and Restaurants Finder Application based on GPS Technology (Global Positioning System)
- The Role of SSL/TLS, IPsec & IKEv2 Protocols in Security of E-learning System’s Communications, A Study & Simulation Approach
- A Novel Approach of Encrypted Video Steganography
- Implementation of Rapid Application Development Method on Academic Staff System of Harapan Bersama Polytechnic
- Development System Relationship Model Learning and Consultation for Students Psychology
- Develoment Information System Model Selection Student to Continue Studies Master and Doctor Program (Case Study : International Office of Universitas Mercu Buana)
- A Survey on Automatic Question-answering process in Speech using Spoken term detection
- Study of Windows based .NET ANEKA in Cloud Computing
- Image Enhancement of Medical Images Based on an Efficient Approach of Morphological and Arithmetic Operations
- Cloud Computing – Key Hashing Cryptographic Implication based Algorithm for Service Provider based Encryption and Decryption
- An Approach for Detecting and Preventing SQL Injection and Cross Site Scripting Attacks using Query sanitization with regular expression
- Bounds for the Zeros of a Lacunary Polynomial
- Kinematics Analysis and Simulation of Six - DOF Industrial Robot
- Vehicle Assisted Data Delivery using Ant Colony Optimization
- The Technologies of Voice over Internet Protocol (VoIP) Based Telephony System: A Review
- Genetic Algorithm Approach For Test Case Generation Randomly: A Review
- Designing Nanotechnology Based QCA Full Adders
- Challenges and Prosperity Research in Cloud Computing
- Review of online shopping security protocol of EC: SSL and SET
- Mixed Round Robin Scheduling for Real Time Systems
- Agricultural Data Visualization for Prescriptive Crop Planning
- Implementation of Word Count- Hadoop Framework with Map Reduce Algorithm
- A Novel Method to Monitor Threats in Cloud Computing Environment
- A Face Recognition System using Convolutional Neural Network and Generalized with Facial Expression
- Review Paper on Big Data Analytics in Cloud Computing
- Internet Filtration and Internet Neutrality
- Big Data Security and Privacy- A Survey
- Dictionary Based Text Filter for Lossless Text Compression
- Survey Paper on Secure Digital Cash Payment through Coin Management
- Survey on 2-connectivity in Directed Graphs
- Aspect Mining Model Probabilistic in the Mining of the Metadata
- Sketch-based Image Retrieval using Rotation-invariant Histograms of Oriented Gradients
- An Overview of MOOC in India
- A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet
- Study of Nature Inspired Algorithms
- Volume49 No2 July 2017
- Computable Law and Electoral Act: Concepts and Model of an Expert Assistant
- Pathways in Bioinformatics: A Window in Computer Science
- The Different of Digital Image segmentation Techniques: A Review
- Weight Estimation through Image Analysis
- Assessing the Effectiveness of Accessibility and Usability of Government Website at District Level
- An Efficient Nonnegative Matrix Factorization & Game Theoretic Framework Based Data Clustering
- An Efficient Re-rank and Fuzzy based Color & Edge Feature Extraction for CBIR
- Mobile Devices? Features and Usability: The Nigerian Utilization Experience
- A Review of Web Image Mining Tools, Techniques and Applications
- Handwriting Recognition of Gurmukhi Script: A Survey of Online and Offline Techniques
- Approach for Enhancing Data Availability in MANET
- Biometric Online Voting System in Nigeria
- A Discovery on Web usage mining using Preprocessing
- Mobile Communication: Implication Issues
- Volume49 No1 July 2017
- Software Reusability Factor Based Reuse Readiness Levels
- Efficient Street Lighting
- Noble Feature Extraction of Malware from Contents of File
- Artificial Neural Network based Diagnosis System
- Development and Implementation of Clincal Decision Support System: Success and Risk Factors
- Data Analysis and its Importance in Health Care
- Benefits of Cloud Computing as an ICT Tool in Distance Education
- Underwater Wireless Sensor Networks: A Survey
- Flexible Approach for Data Mining using Grid based Computing Concepts
- Natural Image and Video Decomposition with Applications to Single Image Denoising
- Music Based Mood Classification
- Supervised Machine Learning Algorithms: Classification and Comparison
- Mobile Ad Hoc Networks: An Overview
- Investigation of Switching Behavior of Microstrip Triangular Patch Antenna through Neural Network
- Location-Based Sleep Scheduling of Event Driven Sensor Node in Wireless Sensor Networks
- How to Select a Searching Algorithm-A Comparative Study
- A Survey Paper based on Bluetooth Data Transmission
- Dynamic Dispatch Cluster Ensemble Approach for Mixed Attributes Dataset
- Rational Search Algorithm
- Big Data Analysis for Aids Disease Detection System using Clustering Technique
- Content Based Image Retrieval using Color and Texture Content
- Node Probability based Clustering Approach for Energy Efficient Routing in Wireless Sensor Network
- A Review on Brain Tumor Extraction and Direction from MRI Images using MATLAB
- Haze Removal-using Colour Attenuation Prior
- Analysis &Estimation of QoS Parameters on LAN Fundamental technologies based on OPNET
- Internet of things: Vision, applications and challenges
- Volume48 No2 June 2017
- Duplicate Detection with Map Reduce and Deletion Procedure
- Detection and Prevention of Sinkhole attack in Manet
- Volume48 No1 June 2017
- An Overview of Pre-processing Techniques in Web usage Mining
- A Big Data Hadoop building blocks comparative study
- Clustering Based Dynamic Load Balancing Algorithm
- Resilient Identity for Blind Users
- Controlling Critical Risks in Healthcare
- Survey On Big Data Analytcis using Hadoop ETL
- Snappy feedback system
- Design and Implementation of IoT Based Home Automation
- A Microstrip-Fed UWB Antenna for WCDMA and X-Band Applications
- Facial Expression Recognition: A Literature Survey
- Machine Learning Based Medicinal Care in Cloud
- An Enhanced Hybridized Model for Recommender System in Healthcare
- Hand Gesture Recognition System
- Brain Image Mining in Cloud based services
- Loop Block Profiling with Performance Prediction
- Big Data Healthcare in Tackling Chronic Diseases-Diabetes
- New Fuzzy Techniques for Real-Time Task Scheduling on Multiprocessor Systems
- The Learning Revolution in Digital Era
- Automated Toll Collection using RFID
- Behavioural Analysis of Android Malware and Detection
- Applying LSB Steganography for Disseminating Academic Testimonials in e-Learning and its Authentication aspects
- Elicitation of Student Learning Experiences from Twitter using Data Mining Techniques
- Review of Offline Handwriting Recognition Techniques in the fields of HCR and OCR
- A Modified Approach in Watermarked Image using Fractal Technology
- A Collective Study of Machine Learning (ML) Algorithms with Big Data Analytics (BDA) for Healthcare Analytics (HcA)
- Smart Monitoring of the Consumption of Home Electrical Energy
- Local Data Security through Encryption
- Volume47 No2 May 2017
- Face Detection and Recognition Techniques: A Quick Overview
- Supplementing Video Accessibility and Availability using Information Bound Reference and DCT
- Review of different types of Anomalies and Anomaly detection techniques in Social Networks based on Graphs
- Cloud-based Context-aware Mobile Applications and Framework for Hajj and Umrah Management
- Wbmmsc: Supervised Classification Procedure of Textures Image Extraction
- Object Detection and Semantic Segmentation using Neural Networks
- Big Data Analytics: Map Reduce Function
- An Effective TDMA Based Routing for Vanet to Reduce Delay
- Fare Estimation using Automated Fare Collection System in Buses
- Density Based Traffic Signal System using PIC Microcontroller
- Proposing a model on Security challenges in cloud computing especially Social Media and Social Sites
- Fusion of Hyper spectral and Multispectral Images using Non-Subsampled Contourlet Transform Domains
- Linear Predictive Coding and Cepstral Analysis for Telugu Speech Recognition
- Cloud Computing Data Breach
- Afaan Oromo News Text Categorization using Decision Tree Classifier and Support Vector Machine: A Machine Learning Approach
- Cloud Database Infrastructure: Database System Transference in Cloud Computing Management and Security
- Volume47 No1 May 2017
- Automated Vehicle Driving Standard
- Afaan Oromo News Text Categorization using Decision Tree Classifier and Support Vector Machine: A Machine Learning Approach
- NCRTTC Part-2
- NCRTTC Part-1
- The New Trends in Compiler Analysis and Optimizations
- Automated Adaptive and Sequential Recommendation of Travel Route
- NCITDCE Part-2
- NCITDCE Part-1
- Multimodal Brain Imaging Technique: A review of the applications in ADHD diagnosis
- Global Positioning System
- Detection and Normalisation of the Temporal Expression in Hindi Text
- Optimization of Cryptography Algorithms in Cloud Computing
- Dynamic Query Form Generation On Multiple Database
- Data Deduplication And Data Sharing With Delegated Access Control
- Sentiment Analysis of Tourists Opinions of Amusement, Historical and Pilgrimage Places: A Machine Learning Approach
- Design and Implementation of Power Consumption Visualization of Individual Appliances using Smart Meters
- Comparative Analysis of Models for Student Performance with Data Mining Tools
- A Review of the Advances in Population Estimation and Human Behaviour Estimation Using Computer Vision and Mobile Phone Data
- Fault Tolerance Avoidance in Cloud Computing Software Applications
- Image Steganography for locked communication scheme
- Design and Implementation of Electronic Training Management System
- Survey on IOT based Smart City
- Imputation of Missing Gene Expressions from Microarray Dataset: A Review
- Development of a Fuzzy Mamdani Inference System for the Assessment of the Academic Standing/Continuation Requirements in Higher Educational Institutions
- Volume46 No1 April 2017
- Building a Scalable Eservice Recommender System
- Code Readability: A Review of Metrics for Software Quality
- A Comparative Analysis of Beenish and Ebeenish in WSN
- Data Replication in Conventional Computing Environment
- Implementation of Interactive and Simple Messaging In Educational Institution
- Energy Aware Resource Allocation for Throughput Maximized IOT Network
- Fuzzy Based Approach for Privacy Preserving in Data Mining
- A Scalable Two Phase Top Down Specialization Approach For Data Anonymization Using Mapreduce On Cloud
- Solution Integration Approach using IoT in Education System
- Design and Development to Catalyze a Transformation in Teaching and Learning at Universities
- Proficient Segmentation Methods for Tumor Detection & Prediction Age in MRI Images
- Hadoop: Move Compute to the Data
- Trusted Execution Environment and Linux- A Survey
- Survey on CRM Analytics in Telecommunication Industry
- Multiple-Objective Particle Swarm Optimization Algorithm for Independent Task Scheduling in Distributed Heterogeneous Computing Systems
- Volume45 No1 March 2017
- Combined Principal Component Analysis and Compression of 12-Lead Electrocardiogram signal using Singular Value Decomposition
- Intrusion Detection a Challenge: SNORT the savior
- Content Based Image Retrieval Using Hierachical and Fuzzy C-Means Clustering
- Concepts and Technologies of Big Data Management and Hadoop File System
- FiLeD: File Level Deduplication Approach
- Optimization of Antenna Parameters Using Artificial Neural Network: A Review
- Performance Analysis of Cryptographic Protocols to Enhance SMS and M-Commerce Security
- Underground Mining Project Equipment Selection Model
- An Efficient system for improved throughput and delay over VOIP
- An Efficient system for Compliance Learning Management System
- Voice Controlled Home Automation Based on MediaTek LinkIt
- A Slotted CSMA/CA of IEEE 802.15.4 Wireless Sensor Networks: A Priority Approach
- Tin Dioxide Sensor Array Network for Air Quality Monitoring
- A Novel approach to Relational Collaborative Topic Regression to Collaborative Topic Regression via Consistently Incorporating Client
- Energy Efficient Cloud Computing Vm Placement Based On Genetic Algorithm
- Secure Authentication System
- Regression Based Software Reliability Estimation: Duane Model
- An Analysis on Wavelet Applications as Speech Data Mining Tools
- An Analysis on Wavelet Applications as Speech Data Mining Tools
- Volume44 No1 February 2017
- MANET Routing Protocols Comparison for Performance Evaluation
- HCI Using Leap Motion Camera
- Unusual Framework for Fault Tolerant in a Cloud Habitat utilizing ACO Algorithm
- Complex Wavelet Transform Based Hyper Analytical Image Denoising by Bivariate Shrinkage Technique
- Feature Selection Techniques for the Classification of Leaf Diseases in Turmeric
- Volume43 No2 January 2017
- Volume43 No1 January 2017
- Enhancing Fault-Tolerance in Ring Topology Based on Waiting Queue and Timestamp
- Overview on segmentation and classification for the Alzheimer’s disease detection from brain MRI
- Cost-Sensitive Access Control for Detecting Remote to Local (R2L) and User to Root (U2R) Attacks
- A Comparative Study on Speech Recognition Approaches and Models
- A Scalable Collaborative Filtering Recommendation Model for Prediction of Movie Rating
- Mobile Computing – challenges in Wireless LANs and Mobile Ad hoc Network
- Construction of a non-linear distortion model and application to 3-D localization
- Generation of Anti-Fractals in SP-Orbit
- A Survey of Opinion Targets and Opinion Words from Online Reviews Based On the Word Alignment Model
- Mining Text Data using different Text Clustering Techniques
- Analysis of Resource Pooling and Resource Allocation Schemes in Cloud Computing
- A review of homomorphic encryption of data in cloud computing
- Large Vocabulary in Continuous Speech Recognition Using HMM and Normal Fit
- Prediction of Web User’s Browsing Behavior using All Kth Markov model and CSB-mine
- Android Development
- Challenges in Implementation of Information System Strategies in Saudi Business Environ-ment: A Case Study of a Bank
- Overview of Fifth Generation Networking
- Capacitance Scaling Based Low Power Comparator Design on 28nm FPGA
- Mobile Banking System in India: Practices,Challenges and Security Issues
- Sustainable Insulation Materials for Green Strategy in Construction
- Cluster usage analysis of timeline based grid scheduling algorithm
- Evaluat?on of the Solar Panels in Terms of Energy Eff?c?ency
- Asurvey on Web and Rule Based Traffic Sentiment Analysis
- Text Classification for Student Data Set using Naive Bayes Classifier and KNN Classifier
- A Survey on Live Video Streaming Over Peer to Peer Network
- Study of Voice Controlled Personal Assistant Device
- Performance study of Face Recognition systems using LBP and ICA descriptors with sparse representation - MRLSR and KNN Classifiers, respectively
- A Machine Learning Approach for Improving Process Scheduling: A Survey
- Detection of Articulation Nodes in Mobile Ad Hoc Network Using Algebraic Graph Theory
- Modeling Connectivity of Ad Hoc Network Using Fuzzy Logic & Regression Analysis
- Volume42 No1 December 2016
- Security Metrics and the Risks: An Overview
- Digital Image Watermarking Using Fuzzy Logic and Genetic Algorithm
- Study and Analysis of Factors Responsible For Failures of Software Project
- Digital Watermarked Anaglyph 3D Images Using FrFT
- A Survey on Image Segmentation Using Threshoding Methods
- Achieving High Quality Tweet Segmentation using the HybridSeg Framework
- Cloud Computing: Privacy, Mobility and Resources Utilization
- Authorize Client Inspection and Data Dynamics for Secure Storage in Cloud Computing
- Volume41 No1 November 2016
- A Brief survey on Intrusion Detection System for WSN
- An Ideal Approach for Detection of Phishing Attacks using Naïve Bayes Classifier
- Snake Toxin Classification using Neural Networks
- An Overview on Automated Brain Tumor Segmentation Techniques
- A Novel Self-adaptive Color Image Encryption Scheme
- Evaluating the Quality of Academic Websites using Proposed Framework – A Survey Study
- Volume40 No1 October 2016
- Age Classification with Motif Shape Patterns on Local Binary Pattern
- Survey Paper on RFID: Radio Frequency Identification
- Low Level Algorithms in Processing Foot Print Images
- Impact of E- Learning Management System Adoption at Mbarara University of Science and Technology
- Secured Data Forwarding Routing Protocol (SDFRP) For Heterogeneous Mobile Ad Hoc Networks
- State of the art in Nastaleeq Script Recognition
- Volume39 No1
- A Survey in Active Queue Management Methods According to Performance Measures
- Survey on Data Mining Algorithms in Disease Prediction
- Enhanced Protocols for Non-Visual Navigation of Smartphone Applications Screen Icons
- A Re-router for Reducing Wire Length in Multi- Layer No-Dogleg Channel Routing
- Android Based Mobile Application to Estimate Nitrogen Content in Rice Crop
- Real-Time Public Vehicle Mobile Tracking System Using Global Positioning System Technology
- Analysis of Periodontitis using R in Big Data
- Unstructured Data: an overview of the data of Big Data
- Probabilistic and Link Based Energy Efficient Routing in MANET
- Hexagonal Prism: A Geometric Primitive for Architecture Design
- Volume38 No1
- Application Design of Toll Payment using QR Code a Case Study of PT. JasaMarga
- Reconstruction and adjustment of surfaces from a 3-D point cloud
- Statistical Analysis of Factors that Influences the Evaluation and Adoption of Multi-Tenant Databases
- Designing An Enterprise Service Bus (ESB) Architecture As Business Model Protocol (BMP) For Distributed Electronic-Commerce Systems And Applications
- Design of Automobiles speed control system using RFID
- Context Provisioning for Mobile Service Ensembles
- Feature Selection Methods in Sentiment Analysis and Sentiment Classification of Amazon Product Reviews
- Design and Analysis of Modified Fast Compressors for MAC Unit
- Effective Hybrid Recommender Approach using Improved K-means And Similarity
- Information Retrieval using Jaccard Similarity Coefficient
- Design and Application of Concurrent Double Key Survey Data Structures
- Data Seclusion in Multi-Owner Model using Dual-Encryption Method in Cloud Computing
- Lock based QOS Aware Data Fusion in MANETS
- Mobile Health Technology Program And Its Cost Effectiveness In Improving Health Service Delivery In Nigeria: A Study Of Dutse Local Government Jigawa, Nigeria
- Study and reviews of smart city based tourism mobile app
- Performance Analysis of AES and DES Cryptographic Algorithms on Windows & Ubuntu using Java
- Enhanced BECAN Based En-Route filtering schemes for injected false data in Wireless Sensor Networks
- Detection and Classification for Blood Cancer – A Survey
- Application of Genetic Algorithm and Machine Learning Techniques for Stock Market P r e d i c t i o n
- Defending Biometric Templates by Multilevel Authentication using BioCryptography and Steganography Techniques
- Efficient Resource Provisioning in Cloud Environment in Terms of Profit using Hybrid Load Balancing Algorithm
- Duality of Iterative Soft Close in Multi Scale Soft Morphological Environment
- Volume36 No1 June 2016
- A Survey of Style Identification Approaches in Music Information Retrieval
- E-Government - an Information Security Perspective
- License Number Plate Recognition using Template Matching
- Spread of Malware within an E-Commerce Network with Quarantine: A Dynamic Model
- GSM Based Automatic Monitoring System for Efficient Power Management
- Reachability in Telemedicine: Concepts, Design and Engineering
- Artificial Intelligence Enabled Detection in Bio Medics
- Control Statement in C Language
- Implementation of Multiagent Learning Algorithms for Improved Decision Making
- Computerized Farming
- GUARDIA- A One Stop Safety Solution
- Review on Meta Classification Algorithms using WEKA
- The Code Sanitizer: Regular Expression Based Prevention of Content Injection Attacks
- Volume35 No1 May 2016
- Queue Control Model in a Clustered Computer Network using M/M/m Approach
- Intelligent Voice Assistant using Android Platform
- Examining Genetic Algorithms as an effective Computational tool in Education-Domain
- Automatic Happiness Strength Analysis of a Group of People using Facial Expressions
- Optimization of Online Job Shop Partitioning and Scheduling for Heterogeneous Systems using Genetic Algorithm
- Harnessing Power of Decision Tree Approach for HPF Prediction using SIPINA and See5
- Approaches of Recommender System: A Survey
- Feature Based Sentiment Analysis of Product Reviews using Modified PMI-IR method
- Clickstream Analysis using Hadoop
- A Brief Review of Classifiers used in OCR Applications
- Effects of DDoS Attacks on Inter-Vehicle Communication - A Survey
- Identification of Sybil Attack on Social Networks
- Iris Image Authentication based on Adaptive Watermarking System
- Mutual Authentication in Cloud Computing - A Review
- Semi Supervised Document Classification Model Using Artificial Neural Networks
- An Analysis on Recent Reviews Pertaining to Web Mining and Its Application Domains
- Improving Energy Efficiency of Femtocell Network with Limited Backhaul Capacity
- Cloud Data Center Security and Cryptography a Survey
- An Enhanced Page Ranking Algorithm Based on Weights and Third level Ranking of the Webpages
- Volume34 No1 April 2016
- Examining Factors of Academic Procrastination Tendency of University Students by using Artificial Neural Network
- Correlation Measurement Between UNSPSC and KBLI 2009 Based on Classification
- Expert System for Land Suitability Evaluation using Data mining‘s Classification Techniques: a Comparative Study
- Comparison between Otsu’s Image Thresholding Technique and Iterative Triclass
- An Overview of Data Warehouse and OLAP Technology Used in Banking System
- Tracking system based on traces analysis and SVM classification
- Data Mining Evolutionary Learning (DMEL) using H base
- Optimization of Geometry, Processes, Signals and Systems in Real World Engineering Problems by Cuckoo Search - A Survey of Recent Literature
- Analysis of Social Networking Platforms to Predict Stock Market Changes
- E-Locker
- arxiv
- Modified Approach for Classifying Multi- Dimensional Data-Cube Through Association Rule Mining for Granting Loans in Bank
- Volume33 No1 March 2016
- Genetic Algorithm and Firefly Algorithm in a Hybrid Approach for Breast Cancer Diagnosis
- Implementation of Common Secure Framework for IoT based Arduino Platform
- A Study on the accessible techniques to classify and predict the risk of Cardio Vascular Disease
- Design and Implementation of Course Progress Monitoring Information System in Secondary Schools
- Volume37 No1 July 2016
- Pertaining the Concept of Risk Evaluation and Prediction for Multi-Dimensional Clustering
- Integer N Frequency Synthesizer using Phase Lock Loop
- Volume32 No1 February 2016
- Jamming Attack Detection using Key Exchange in Wireless Network
- Mining Software Quality from Software Reviews: Research Trends and Open Issues
- Smartphone-based 3D Orientation Estimation for Virtually any Published PC Game
- A study on Internet of Things and its Applications- a review (4)
- A survey of Commit Protocols in Distributed Real Time database systems
- The State of the Art on Educational Data Mining in Higher Education
- IJCTT - ID-Based Directed Multi Proxy Chameleon Signature Scheme with Bilinear Pairing
- IJCTT - A Simple Taxonomy of Multilayer Networks
- Volume31 No1 January 2016
- IJCTT - An Advanced Image Encryption Method Based on Fuzzy Transform in Two Variables and Edge Detection
- IJCTT - Review on Textual Description of Image Contents
- IJCTT - Mining Sequential Patterns from Super Market Datasets
- IJCTT - Security in Near Field Communication for m-payment service
- IJCTT - Session Aware Music Recommendation System with Matrix Factorization technique-SVD
- Join
- IJCTT - Internet of Things for Intelligent Traffic Monitoring System: A Case Study in Denpasar
- IJCTT - Multimedia Protection, Authentication and Advanced Digital Watermarking Techniques: A Survey
- SSRG Journals
- IJCTT - Frequency analysis of Kinyarwanda natural language
- IJCTT - Security Model for Communication and Exchanging Data in Mobile Cloud Computing
- special
- IJCTT - Expert System for Diagnosis and Management of Kidney Diseases
- IJCTT - Extract the Semantic Meaning of Prepositions at Arabic Texts: An Exploratory Study
- call
- IJCTT - An Analytical Evaluation of Matricizing Least-Square-Errors Curve Fitting to Support High Performance Computation on Large Datasets
- IJCTT - Characterizing Healthcare Interaction System as a Service System
- IJCTT - Adaptive resource scaling methods for Multi-tenant cloud system
- IJCTT - A review of security models in cloud computing and an Innovative approach
- IJCTT - Object Tracking Using Features Extracted From Compressed Domain
- IJCTT - Mobile Number Portability in India: Business & Technical Aspects
- IJCTT - Implementation of Viewing and Networking Systems in a Military 3-Dimensional Environment
- IJCTT - Development of a Barcode Reader System
- IJCTT - Ant-based Feature Decomposition Method in Constructing NMC and NBC ensembles
- IJCTT - Flying Virtual Cloud Computing Integrated System (FVCIS)
- IJCTT - Analysis of Schemes proposed for improving the Segment Based Visual Cryptography
- IJCTT - Analysis of the HalfTone Visual Cryptography and proposing a model for illustrating the related schemes
- Volume30 No1 December 2015
- IJCTT - A QoS Load Balancing Scheduling Algorithm in Cloud Environment
- IJCTT - An Investigation into the Effectiveness of Java Code Coverage Tools
- Table
- IJCTT - A Predictive Model for Evaluating Mobile Number Portability in Nigeria
- IJCTT - A New Method for Detection and Estimation of Outliers in Multiple Linear Regression Model
- Conference Sponsors
- IJCTT - Implementation of LAN-Based IP Telephony Simulator
- IJCTT - Implementation of Sight and Shooting Systems with Rule- Based Artificial Intelligence in a Military 3-Dimensional Environment
- FAQ
- IJCTT - Study of Scheduling Techniques in Cloud Computing Environment
- IJCTT - Prevention of Multiple Rushing Attack Nodes in Multicast MANET
- IJCTT - A Simplistic Approach for Registration of Orthogonal Planar Images as a Pre-Preparation for Externally Acquired Cranial Images in Department of Radiation Oncology, Nayati Healthcare and Research Centre
- IJCTT - The Impact of Harmattan Particles on Microwave Propagation in the Savannah Region
- IJCTT - A Survey of Multi Object Tracking and Detecting Algorithm in Real Scene use in video surveillance systems
- IJCTT - Design and Implementation of File Sharing Server
- Join as an Editor
- IJCTT - A Location Aware Safety Companion
- Volume29 No1 November 2015
- Cross Reference
- IJCTT - Semi-Automatic techniquesfor Estimating Climatic Conditions Recorded in the Tree rings
- Author Instruction
- IJCTT - A Defensive Measure of Cloud Server Security with Brief Solution
- IJCTT - Implementation of Computer Graphics on 3D Animation “Good Manners of Ghatotkacha”
- IJCTT - Android Attack Application
- IJCTT - Child Erotic Image Detection System
- IJCTT - An Agent Based Catalog Integration System through Active Learning
- IJCTT - Computer Based Music Notations as Object
- IJCTT - Analysis of Greening of Information Technology Systems in IT Organizations in Sri Lanka
- IJCTT - Software Test case Classification based on `Defect-Rate` of Test Suites
- IJCTT - Dynamic Graph Based Slicing for Object-oriented Programs
- IJCTT - Clustering of Locally Frequent Patterns over Fuzzy Temporal Datasets
- IJCTT - Fogging Jyaguchi Services in Tensai Gothalo
- IJCTT - Costumer’s online security
- IJCTT - Correction of Intensity In-Homogeneity of MR Image Based on Average Median Intensity Value Method
- IJCTT - Contextual KP System With Minimal / Maximal Use Of Selectors
- IJCTT - A Discrete Optimization Model for Designing Cellular Networks Considering Electromagnetic Radiation
- IJCTT - A Review on Computer Assisted Follicle Detection Techniques and Polycystic Ovarian Syndrome (PCOS) Diagnostic Systems
- IJCTT - Captcha as Graphical Password for User Authentication: A New Security Primitive
- IJCTT - Comparative Study of the Promotional Roles of the Media and Parents towards Teenage Sex Education
- Volume28 No1 October 2015
- IJCTT - Assistance Monitoring System Module for Local Government Unit
- IJCTT - Implementation of Levenshtein Distance Algorithm for ECommerce of Bravoisitees Distro
- IJCTT - Development of an Electronic Attendance Biometric Registration System
- IJCTT - Quad-Tree Based Multiple Kernel Fuzzy C-Means Clustering for Gene Expression Data
- IJCTT - A Decision Support System using ANFIS to Determine the Major of Prospective Students in A Vocational School of Indonesia
- IJCTT - Improving Efficiency of Apriori Algorithm
- IJCTT - 3D Graph Drawings: Good Viewing for an Occluded Edges
- IJCTT - Literature Survey for the Comparative Study of Various High Performance Computing Techniques
- IJCTT - Soft Computing based Medical Image Mining: A Survey
- IJCTT - Classification of Hyper spectral Image Using Support Vector Machine and Marker-Controlled Watershed
- IJCTT - DDoS Deflate and APF (Advanced Policy Firewall):A Report
- IJCTT - A Survey on Quality of Service in Cloud Computing
- IJCTT - Sum Aggregation of Time – Series Data with new Preserving System
- IJCTT - Customizing the Methodology of Expanding RUP Software for Safety-Critical Systems
- IJCTT - The Comparison of Gini and Twoing Algorithms in Terms of Predictive Ability and Misclassification Cost in Data Mining: An Empirical Study
- Volume27 No1 September 2015
- IJCTT - Secure Clustering Algorithm for Wireless Sensor Networks in the Perspective of Authentication
- IJCTT - Estimation of Distance complexity in amino acids between Normal and Cancer Liver Cells using Data Mining Techniques
- IJCTT - Distance complexity analysis of DNA Nucleotide Sequence with Normal and Cancer Liver Cells Using Data Mining Techniques
- IJCTT - Automated Railway Gate Controlling System
- IJCTT - Network Intrusion Detection Using One-Class Classification Based on Standard Deviation of Service`s Normal Behavior
- IJCTT - A Multilayer Model of Computer Networks
- Volume26 No1 August 2015
- IJCTT - Analysing Energy Efficiency of Cell Selection Schemes for Femtocell Networks with Limited Backhaul Capacity
- IJCTT - Machine Learning Techniques for Automatic Classification of Patients with Fibromyalgia and Arthritis
- IJCTT - Fast Response Enhanced Multi-queue packet Scheduler scheme for Wireless Sensor Network
- IJCTT - An Overview of Identity Deception Approaches and Its Effects
- IJCTT - Exploratory Secure Transmission of Data with Semantic CPDA Rule in Wireless Sensor Networks
- IJCTT - Avoiding Cross Site Request Forgery (CSRF) Attack Using TwoFish Security Approach
- IJCTT - An Efficient Guilt Detection Approach for Identifying Data Leakages
- IJCTT - A review on Face Detection and study of Viola Jones method
- IJCTT - Our Traditions and Facebook: Are we shifting off the track?
- IJCTT - Phishing Attacks and Counter Measures
- Volume25 No1 July 2015
- IJCTT - Performance Evaluation of Quadtree & Hough Transform Segmentation Techniques for Iris recognition using Artificial Neural Network (Ann)
- IJCTT - Stream Control Transmission Protocol Performance Analysis in Disk Local Area Network Services
- IJCTT - Protect Knowledge Retrieval for Localized Disruption Tolerant Military Networks
- IJCTT - Operating System Process Modeling: An Implementation of Association Learning Algorithms using Router Kernel Simulated Data
- IJCTT - Facial Expression Recognition using Analytical Hierarchy Process
- IJCTT - A Relational Data Model of Natural Langange Processing on Nahwu Learning
- IJCTT - Unveiling Hidden Dependencies with Rough Sets Methods
- Volume24 No1 June 2015
- IJCTT - Implementation of Adaptive Wavelet Thresholding and Nonlocal Means for Medical Image Enhancement for Noise Reduction
- IJCTT - The Adverse Effect of Watering Hole Attack in Distributed Systems and the Preventive Measures
- IJCTT - A Novel Approach to Face Detection using Image Parsing and Morphological Analysis
- IJCTT - Study of HSV Color Space Deviations and Histograms in Image Steganography
- IJCTT - Voice recognition Using back propagation algorithm in neural networks
- IJCTT - Brief Overview of Automated Industrial Plant: A Review
- IJCTT - Efficient Layout Design of 4-Bit Full Adder using Transmission Gate
- IJCTT - A Novel Approach for Classification of Indoor Scenes
- IJCTT - Integrating Grid Computing Technology into Multimedia Application
- IJCTT - QR Images: an Automatic Method to Embed QR codes in to Color Images
- IJCTT - Extraction, Visualisation and Analysis of Co- Authorship Based Academic Social Networks
- IJCTT - Literature Survey on Multicast Routing Protocols in MANETS
- IJCTT - Security mechanism for Collision Avoidance and Attack Prevention Formants
- IJCTT - Matrix-Chain Multiplication Using Greedy and Divide-Conquer approach
- IJCTT - Algorithmic Analysis of Edge Ranking and Profiling for MTF Determination of an Imaging System
- IJCTT - Combining and Analysing Apriori and K-Means Algorithms for Efficient Data Mining on the Web
- IJCTT - A Hybrid Approach for content based image retrieval from large Dataset
- Volume23 No1 May 2015
- IJCTT - Automated Espial of Microaneurysm and Grading of Diabetic Retinopathy in Fundus Images Using Ensemble-Based System
- IJCTT - A Comparative study of Usability Evaluation Methods
- IJCTT - A Comparative Study of Data Mining Classification Techniques using Lung Cancer Data
- IJCTT - Present and Future Perspective on Optimization of Road Network Management
- IJCTT - Diabetes Classification Using Cascaded Data Mining Technique
- IJCTT - Karyotyping Techniques of Chromosomes: A Survey
- Volume22 No1 April 2015
- IJCTT - Study On Multiscale Image Analysis: Theory And Applications
- IJCTT - The role of Information and Communication Technology in Healthcare Management for Efficient Healthcare Delivery in Nigeria
- IJCTT - Wavelet Based Image Analysis:A Comprehensive Survey
- IJCTT - Automatic Question Generation System from Punjabi Text using Hybrid approach
- IJCTT - Offline Signature Verification for Detecting Signature Forgery: A Comparative Study
- IJCTT - Hand Gesture Recognition for Indian Sign Language: A Review
- IJCTT - Learning Ranking Model Adaption in the vector of the Domain- Specific Search
- IJCTT - Evaluating the Performance and the Strength of CryptoBI Algorithm
- IJCTT - Extractive Summarization Method for Arabic Text - ESMAT
- IJCTT - Ancient Indian Scripts Image Pre-Processing and Dimensionality Reduction for Feature Extraction and Classification: A Survey
- IJCTT - Approaches to Thermal Management in Handheld Devices: A Survey
- IJCTT - Industrial Computing Systems: A Case Study of Fault Tolerance Analysis
- IJCTT - Improving Prediction Accuracy Based On Optimized Random Forest Model with Weighted Sampling for Regression Trees
- IJCTT - Web Crawl Detection and Analysis of Semantic Data
- Volume21 No1 March 2015
- IJCTT - Fast Data Collection in Ring Based Wireless Sensor Network
- IJCTT - A Comparative Study: RTOS and Its Application
- IJCTT - A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates
- Volume20 No1 Feb 2015
- IJCTT - E-Assessment System Based on Natural Language Processing for Arabic Language
- IJCTT - Service Differentiation based on Contention Window with Enhanced Collision Resolution LR-WPANs
- IJCTT - A Qualitative Study on Perspectives of Retailers about RFID System in Turkey
- IJCTT - Cloud Computing for Retailing Industry: An Overview
- IJCTT - Adaptive Context-Aware Data Management Scheme for Mobile Environments
- IJCTT - Efficient Robust Interactive Personalized Mobile Search Engine
- IJCTT - Big Data Analysis: Apache Storm Perspective
- Volume19 No1 Jan 2015
- IJCTT - Survey of Content Based Lecture Video Retrieval
- IJCTT - Disaster Preparedness in Universities
- IJCTT - Assessing Moodle as Learning Management System Platform for English Course Based TOEFL
- IJCTT - Extended SQL Aggregation for Database Transformation
- IJCTT - An Approach for Detecting and Preventing DoS Attacks in LAN
- IJCTT - Archive
- IJCTT - Learning Analytics: A Survey
- IJCTT - Towards Innovative System for Hadith Isnad Processing
- IJCTT - Conditional Activity-Based Model for Describing User Experience Using Category Theory
- IJCTT - Automation of Ash Handling System with Event Logger
- IJCTT -Enhanced Classification to Counter the Problem of Cluster Disjuncts
- IJCTT -Image Restoration Technique for Fog Degraded Image
- IJCTT - A Novel Integrated Approach for Big Data Mining
- IJCTT - Telecommunications Infrastructure Consequence to Economic Growth in Malaysia: Time Series Analysis
- IJCTT - Object classification Techniques using Machine Learning Model
- IJCTT - Secure and Privacy-Preserving Distributed File Systems on Load Rebalancing in Cloud Computing
- IJCTT - Secure User Authentication & Graphical Password using Cued Click-Points
- IJCTT - A Statistical Survey on Imperial Data Handling in Big Data
- IJCTT - Optimization of Software Quality using Management and Technical Review Techniques
- IJCTT - An Efficient Method to Identify the Most Frequent Item Sets Using Database Count Algorithm and Effective Aco Algorithm in a Peer to Peer Network
- IJCTT - Securely Data Sharing with Indeterminate ID Allocation
- IJCTT - Wireless Sensor Expedition of Extensive Choice to Preserve the Quality
- IJCTT - Tracking of Local Area Adversaries in Wireless Sensor Networks
- IJCTT - Modern Framework for P2P Integrated Systems over Trust Model for Self-Organizing Nodes
- Volume18 No1 December 2014
- IJCTT - A Secure Online Application Safeguarding Data with Stegnography based Watermarking
- IJCTT - A Novel Framework for Construing User Search Intension with Feedback sessions
- IJCTT - Identify Effective Factors for Improving E-Trust of E-Transactions in the Context of E-Commerce and E-Government
- Copyright Infringement
- IJCTT - Threshold and binarization for document image analysis using otsu’s Algorithm
- IJCTT - Elephant Localization Estimation within Acoustic Sensor Network Based On Real Time Data
- IJCTT - Performance Comparison of FSA Red & Apriori Algorithm’s in Mutation Analysis
- IJCTT - Patient Health Care Analysis based on ANFIS Sugeno Model
- IJCTT - Placement Prediction Analysis in University Using Improved Decision Tree Based Algorithm
- IJCTT - A Nonlinear Stochastic Optimization Model for Water distribution network problem with reliability consideration
- IJCTT - Survey of Spell Checking Techniques for Malayalam: NLP
- Statistical Data
- IJCTT - Survey of Intrusion Detection Techniques in LEACH
- IJCTT - A Literature Survey on Facial Expression Recognition techniques using Appearance based features
- Review Process
- IJCTT - Reliability and Energy Efficient Cluster Based Routing Protocol for Wireless Sensor Networks
- IJCTT - Retina based Personal Identification System using Skeletonization and Similarity Transformation
- IJCTT - An Application to Secure Multimedia Data in Cloud Environment using Paillier Cryptography
- Special Issue
- IJCTT - An Efficient Secure Image Watermarking Using Wavelet Transform
- IJCTT - Extraction of Unstructured Data Records and Discovering New Attributes from the Web Documents
- IJCTT - Analytical Comparison of Noise Reduction Filters for Image Restoration Using SNR Estimation
- IJCTT - A Comparative Study of Various Distance Measures for Software fault prediction
- IJCTT - Digital Forensic Identification, Collection, Examination and Decoding of Windows Registry Keys for Discovering User Activities Patterns
- IJCTT - Real Time Hand Gesture Recognition for Smart Classroom Environment
- Home
- Volume17 No2 November 2014
- IJCTT - Efficient Data Transmission Using Energy Efficient Clustering Scheme for Wireless Ad-Hoc Sensor Network
- IJCTT - Towards a Consistent, Sound and Complete Conceptual Knowledge
- IJCTT - Performance Evaluation and Testing of EAACK-Secure IDS for MANETs: Brief Study
- IJCTT - Comparative Analysis of Algorithms in Supervised Classification: A Case study of Bank Notes Dataset
- IJCTT - A Parallel Genetic Algorithm for Three Dimensional Bin Packing with Heterogeneous Bins
- IJCTT - A Survey on Data Aggregation in Big Data and Cloud Computing
- Volume17 No1 November 2014
- IJCTT - Phishing Email Filtering Techniques A Survey
- IJCTT - A Secure Framework for Mollifying Attacks in Cloud
- IJCTT - Data Mining: Classification Techniques of Students’ Database A Case Study of the Nile Valley University, North Sudan
- IJCTT - Supporting Search-As-You-Type Using SQL in Databases
- IJCTT - A Framework for Geographical based Approximate String Search
- IJCTT - A Contemporary Framework for P2P Connected Systems through Trust Model for Self Organizing Nodes
- IJCTT - A Design of Secure Confront based Social Network for Exigency and Trade-offs
- IJCTT - A Multi Objective Model For Fish Processed Production Planning Under Uncertainty
- IJCTT - A Formal Approach to Distributed System Security Test Generation
- IJCTT - A Cloud-Based Watermarking Method for Health Data and Image Security
- IJCTT - Data Science: Bigtable, MapReduce and Google File System
- IJCTT - Survey on Various Techniques of User Authentication and Graphical Password
- IJCTT - Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding
- IJCTT - Perpetuate Data Report based on the Slicing Approach
- IJCTT - Cluster-Based Trust Model for Online Reputation System
- IJCTT - An Etiquette Approach for Public Audit and Preserve Data at Cloud
- IJCTT - A Novel Approach for Secure Data Sharing in Multi-Owner groups in Cloud
- Volume16 No1 October 2014
- IJCTT - Measuring Sustainability Impact of Software
- IJCTT - A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture
- IJCTT - Cost Minimization by QR Code Compression
- IJCTT - Personal Assistant to Facilitate User Task Automation
- IJCTT - Review on Detection of Plant Leaf Diseases Using Color Transformation
- IJCTT - Usability of E-Government Services in Developing Countries
- IJCTT - Image Steganography by Enhanced Pixel Indicator Method Using Most Significant Bit (MSB) Compare
- IJCTT - Real Time Apps Using SignalR
- IJCTT - A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification
- IJCTT - Classification of Image Registration Techniques and Algorithms in Digital Image Processing – A Research Survey
- IJCTT - Secure Cloud Storage through Public Auditing and Cryptographic Primitives
- IJCTT - A Rumination of Error Diffusions in Color Extended Visual Cryptography
- IJCTT - Simulation of Jelly Fish Periodic Attack in Mobile Ad hoc Networks
- IJCTT - Robust Intrusion Detection Mechanism for Mobile Adhoc Networks
- Volume15 No1 September 2014
- IJCTT - Heterogeneous Multi Core Processors for Improving the Efficiency of Market Basket Analysis Algorithm in Data Mining
- IJCTT - A Comprehensive Review of Early Detection of Diabetic Retinopathy from Digital Fundus Images
- IJCTT - Real Time and Past Positional Location Analysis of Friends in a Social Network Using Smart Devices
- IJCTT - Iris Recognition based on Wavelet Transform and Probabilistic Neural Network
- IJCTT - Detection of Voiced, Unvoiced and Silence Regions of Assamese Speech by Using Acoustic Features
- IJCTT - Run Time Bubble Sort – An Enhancement of Bubble Sort
- IJCTT - Implementation of Path Finding Algorithms in a 3-Dimentional Environment
- IJCTT - Review of Role Based Access Control Method for Securing User Space in Cloud Computing
- IJCTT - Computing the Solution of the Hartree Equation with Repulsive Harmonic Potential
- Volume14 No1 August 2014
- IJCTT - A Proposed Framework for Development of a Visualizer Based on Memory Transfer Language (MTL)
- IJCTT - Vulnerabilities and Defensive Mechanism of CSRF
- IJCTT - Vendor Lock-In Winds Relocation to Meta Cloud
- IJCTT - Secured Health Monitoring System in Mobile Cloud Computing
- IJCTT - Web Crawler: Extracting the Web Data
- IJCTT - Assessment of Response Time for New Multi Level Feedback Queue Scheduler
- IJCTT - Energy-Aware Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks
- IJCTT - Audio Steganography by Direct Sequence Spread Spectrum
- IJCTT - Performance Comparison of Data Mining Algorithms: A Case Study on Car Evaluation Dataset
- IJCTT - A Fuzzy Differential Evolution Algorithm for Job Scheduling on Computational Grids
- IJCTT - Image Compression Using MH Encoding
- IJCTT - Fungus/Disease Analysis in Tomato Crop using Image Processing Techniques
- IJCTT - An Land Cover Fuzzy Logic Classification By Maximumlikelihood
- IJCTT - The Study of Various Code Coverage Tools
- IJCTT - Automation of Identifying Abnormal Chromosomes in M-FISH
- IJCTT - Intrusion Detection Based On Fuzzy Logic Approach Using Simplified Swarm Optimization
- Volume13 No1 July 2014
- IJCTT - A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)
- IJCTT - Cluster Based Anomaly Detection in Wireless LAN
- IJCTT - A Synonym Based Approach of Data Mining in Search Engine Optimization
- IJCTT - Classification of Devnagari Numerals using Multiple Classifier
- IJCTT - Classification of Efficient Imputation Method for Analyzing Missing Values
- IJCTT - Intelligent Mobile System for Healthcare Based On WSN and Android
- IJCTT - Virtualization Approaches in Cloud Computing
- IJCTT - A Novel Mathematical Model for (t, n)-Threshold Visual Cryptography Scheme
- IJCTT - A Study on Recognition of Handwritten Character Images
- IJCTT - Design and Development of Mobile Phone Based Healthcare System for Emergency Situation
- IJCTT - A Comparative Study of Hidden Web Crawlers
- IJCTT - Prevention and Detection Techniques for SQL Injection Attacks
- IJCTT - A Review on Failure Node Recovery Algorithms in Wireless Sensor Actor Networks
- IJCTT - E-Learning Quality Criteria and Aspects
- IJCTT - Securing Medical Images by Watermarking Using DWT-DCT-SVD
- IJCTT - A Review of ZeroAccess peer-to-peer Botnet
- IJCTT - Performance Comparison of Two Streaming Data Clustering Algorithms
- IJCTT -Integration of Cloud Computing and Web2.0 Collaboration Technologies in E-Learning
- IJCTT -Smart city analysis using spatial data and predicting the sustainability
- IJCTT -An Approach To Understand Human Behaviour Pattern
- IJCTT -Multi-Packet Reception Technology in Random Access Wireless Networks: A Survey
- IJCTT -A study on the Tizen Operating System
- Volume12 No1 June 2014
- IJCTT - Providing the Secure Data Transmission in the Network Using Open Source Packet Analyzer
- IJCTT - Electric Load Forecasting using a Neural Network Approach
- IJCTT - Comparative Analysis of Textural Features Derived from GLCM for Ultrasound Liver Image Classification
- IJCTT - Unsupervised Opinion Mining From Text Reviews Using SentiWordNet
- IJCTT - IDS in Cloud Environment
- IJCTT - Techniques Used for Detection of Mobile Spyware
- IJCTT - Zigbee-Based Smart Ordering System (S.O.S)
- IJCTT - Attribute Based User Control Access for Cloud Storage Data
- IJCTT - Clinical Decision Support System in HealthCare Industry Success and Risk Factors
- IJCTT - Energy Efficiency in Cloud Data Centers Using Load Balancing
- IJCTT - VirtuMob : Remote Display Virtualization Solution For Smartphones
- IJCTT - Pre-processing of ECG Signals Using Filters
- IJCTT - Improvement on LEACH: Seeded LEACH-KED
- IJCTT - Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm
- IJCTT - A Review of Multi-Protocol Label Switching: Protocol for Traffic Engineering on Internet
- IJCTT - Handwritten Nastaleeq Script Recognition with BLSTM-CTC and ANFIS method
- IJCTT - Piecewise Watermarking by clustering using similarity measure in Images
- IJCTT - Prognosis of Diabetes Using Data mining Approach-Fuzzy C Means Clustering and Support Vector Machine
- IJCTT - Classification of Basmati Rice Grain Variety using Image Processing and Principal Component Analysis
- IJCTT - A Meta-heuristic Approach for Image Segmentation using Firefly Algorithm
- IJCTT - A Survey of Coverage-Based Broadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
- IJCTT - Simulation of File Arrivals and Departures on Buffer sizing in Access Routers
- IJCTT - Android Based Mobile Application Development And Its Security
- IJCTT - Design of an Optical Receiver using Transimpedance amplifier with light detector and Equalization in MOS Technologies
- IJCTT - Design of Adder in Multiple Logic Styles for Low Power VLSI
- IJCTT - Implementation of SOBEL Edge Detection on FPGA
- IJCTT - Analysis of VoIP Traffic with Multiple Packet Transfer
- IJCTT - Analysis of VoIP Traffic with Multiple Packet Transfer
- IJCTT - Automation of Network Protocol Analysis
- IJCTT - Cross Reference Strategies for Cooperative Modalities
- IJCTT - Dynamic Reconstruct for Network Photograph Exploration
- IJCTT - Context-Based Adaptive Variable Length Coding based Compression Scheme for Images
- IJCTT - A Novel Datamining Based Approach for Remote Intrusion Detection
- IJCTT - Template Extraction from Heterogeneous Web Pages Using Text Clustering
- IJCTT - A Survey on Protecting Privacy Using Biometric of Fingerprint Combination (2)
- IJCTT - Detection of Calcification Using Filter in Mammograms – A Survey
- Reformation with Neural Network in Automated Software Testing
- Discovering Conditional Functional Dependencies
- IJCTT - A New Web Based Student Annual Review Information System (SARIS) With Student Success Prediction
- IJCTT - An Efficient Query Mining Framework Using Spatial Hidden Markov Models for Automatic Annotation of Images
- IJCTT - Efficient Anonymous Routing Protocols in Manets: A Survey
- CAT PART - 3 2020
- Volume11 No1 May 2014
- IJCTT - Secure and Reliable Watermarking in Relational Databases
- IJCTT - Evaluation of Common Encryption Algorithm and Scope of Advanced Algorithm for Simulated Wireless Network
- IJCTT - Nature Inspired Energy Efficient Wireless Sensor Networks: Using Duty-Cycled Wake-up Scheduling Swarm Intelligence
- IJCTT - Comparative Analysis of Edge Based Single Image Superresolution
- IJCTT - Detection of Spoofing Using Packet Marking Algorithm
- IJCTT - Significance of Web 2.0 Technology and its Application in Academic Libraries
- CAT PART - 2 2020
- IJCTT - Integrating Security and Usability at Requirement Specification Process
- IJCTT - A Procedural Performance Comparison of Soft Thresholding Techniques for Medical Image Denoising
- CAT PART - 1 2020
- IJCTT - Performance Analysis of SEP and LEACH for Heterogeneous Wireless Sensor Networks
- IJCTT - Application of Machine Learning Techniques in Aquaculture
- IJCTT - Automatic Database Clustering: Issues and Algorithms
- IJCTT - The Development of Web Based Expert System for Diagnosing Children Diseases Using PHP and MySQL
- IJCTT - An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism
- IJCTT - Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization
- IJCTT - Information Security and Risk Management for Banking System
- IJCTT - Updating the Routing Position in Adhoc Networks by using Adaptive Position
- IJCTT - Decision Support System to Majoring High School Student Using Simple Additive Weighting Method
- IJCTT - A Survey on Protecting Privacy Using Biometric of Fingerprint Combination
- IJCTT - A Survey on Mobility Management Protocols for Improving Handover Performance
- IJCTT - An Effort Prediction Framework for Software Code Quality Measurement Based on Quantifiable Constructs for Object Oriented Design
- IJCTT - Ensemble Classifiers and Their Applications: A Review
- IJCTT - Novel Sensing Approach for Predicting SLA Violations
- IJCTT - Information Hiding and Attacks : Review
- IJCTT - Journey from Data Mining to Web Mining to Big Data
- IJCTT - Web Mining using Artificial Ant Colonies : A Survey
- IJCTT - Review of MANETS Using Distributed Public-key Cryptography
- IJCTT - Cloud Computing: A Strategy to Improve the Economy of Islamic Societies
- IJCTT - Analysis of Job Scheduling Algorithms in Cloud Computing
- IJCTT - Reduced Energy Consumption using Wireless Body Area Networks In health monitoring
- IJCTT - Depth Sensor Based Skeletal Tracking Evaluation for Fall Detection Systems
- IJCTT - Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environmentv
- IJCTT - Control Algorithm for Adaptive Front Light Systems
- IJCTT - Creation of Load Balanced Mail Server Management System Using Cloud Computing
- IJCTT - A Comparative study Between Fuzzy Clustering Algorithm and Hard Clustering Algorithm
- IJCTT - Different Type of Feature Selection for Text Classification
- IJCTT - Web Content Classification: A Survey
- IJCTT - A Novel Approach for Identifying the Stages of Brain Tumor
- IJCTT - An Evaluation Agent System for Enhancing Wikipedia Management
- IJCTT - Performance Enhancement in Power aware Ad hoc Routing using Highly Probable Link
- Volume10 No2 April 2014
- Volume10 No1 April 2014
- IJCTT - ACO, Its Modification and Variants
- IJCTT - A Survey of Machine Learning Algorithm in Network Traffic Classification
- IJCTT - Natural Radioactivity Measurements in different regions in Najaf city, Iraq
- IJCTT - Risk Assessment in Online Banking System
- IJCTT - Securing Web Accounts Using Graphical Password Authentication through Watermarking
- IJCTT - Importance and Techniques of Information Hiding : A Review
- IJCTT - Improved 3-Dimensional Security in Cloud Computing
- IJCTT - An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack
- IJCTT - New Julia and Mandelbrot Sets for Jungck Ishikawa Iterates
- IJCTT - A Privacy Preserving of Composite Private/Public Key in Cloud Servers
- IJCTT - Facilitating Document Annotation Using Content & Querying Value
- IJCTT - Object Deployment Using Data Trans-Reception in Military Applications
- IJCTT - A Study on Big Data Integration with Data Warehouse
- IJCTT - An Efficient Speaker Diarization using Privacy Preserving Audio Features Based of Speech/Non Speech Detection
- IJCTT - Ensuring Accountability for Data Sharing in Cloud
- IJCTT - Link Prediction in Protein-Protein Networks: Survey
- IJCTT - Improving the Efficiency of Call Admission Control in Wireless Cellular Communication Networks by Frequency Sharing Techniques
- IJCTT - A Novel Mechanism for Secure and Efficient VANET Communication
- IJCTT - To Improve Data Security by Using Secure Data Transmission
- IJCTT - Image Search Reranking
- IJCTT - Proactive Web Server Protocol for Complaint Assessment
- IJCTT - Anomaly Detection Based on Access Behavior and Document Rank Algorithm
- IJCTT - Plain Woven Fabric Defect Detection Based on Image Processing and Artificial Neural Networks
- IJCTT - A Puzzle Based Authentication Scheme for Cloud Computing
- IJCTT - Analysis on the Performance of Wireless Protocols
- IJCTT - Cluster Head Election and Multi Hop Using Fuzzy Logic for Wireless Sensor Network
- Knowledge Management Applications & Technologies in the Digital Transformation Age
- IJCTT - A Tree of Life Approach for Multidimensional Data
- IJCTT - Reconstruction Models for Attractors in the Technical and Economic Processes
- Impacts of TAG and TAW Signaling Protocols on Packets Delay over OBS Networks
- IJCTT - Multi-Level Association Rule Mining: A Review
- IJCTT - An Improved Naive Bayes Classification to Enhance Image Registration
- IJCTT - Reducing Binding update in NEMO Supported PMIPV6
- IJCTT - A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting
- IJCTT - Advanced Vehicle Tracking System on Google Earth Using GPS and GSM
- IJCTT - Efficient Preprocessing and Patterns Identification Approach for Text Mining
- IJCTT - WiFiPos: An In/Out-Door Positioning Tool
- IJCTT - Maximizing Communication Quality with Bandwidth Guarantees in Wireless Mesh Networks
- IJCTT - Vertical Clustering of 3D Elliptical Helical Data
- IJCTT - Statistical Anomaly Detection Technique for Real Time Datasets
- IJCTT - Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS
- IJCTT - Advanced Accident Avoidance System for Automobiles
- The Essential Role of Sensitivity Analysis in System Biology Models
- IJCTT - Dynamic Grouping of Semantically Similar User Search Histories
- IJCTT - A Modified Perceptual Constrained Spectral Weighting Technique For Speech Enhancement
- Children aged 6 to 12 transport in Greater Jakarta
- IJCTT - Secured Packet Hiding Technique for Packet Jamming Attacks
- IJCTT - Proficient And Protected Content Dispensation In Distributed Environment To Client Proxy-Based Transcoding Approach
- Review on consumers’ privacy and economic value acceptance in Smart Grid implementation
- IJCTT - An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET
- IJCTT - FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor
- Traffic Safety Analysis for Minorities in Urban and Rural Regions
- IJCTT - Feature Subset Selection with Fast Algorithm Implementation
- IJCTT - J48 Classifier Approach to Detect Characteristic of Bt Cotton base on Soil Micro Nutrient
- Methods of Making Laboratory Scale CPHMA Specimens
- IJCTT - Secure and Faster NN Queries on Outsourced Metric Data Assets
- IJCTT - Improved Authentication and Integrity Verification in Wireless Sensor Networks
- Travel Behavior towards Shared Mobility Among Malaysian Users: Insights from a Preliminary Study
- IJCTT - Robust Watermarking Framework with DCT Based Encryption
- special issue Robotics
- IJCTT - An Adaptive Log Based Realtime Network Scans in LAN
- AIIC Number-1 August 2020
- IJCTT - PMA-Chord: Peer Mobility Adaptable Lookup for Chord Protocol
- IJCTT - Database Based Validation of Union of Two Multigranular Rough Sets
- IJCTT - A Presumption Mold of Visual Cryptography Design with Dynamic Groups
- IJCTT - Security Strategies for Online Social Networks
- IJCTT - Meticulous Tasks of Various Cryptographic Techniques in Secure Communications
- IJCTT - An Effective Method of Eye Detection Using Segmentation and Projection
- IJCTT - Performance Evaluation of VOIP over Multi Radio Multi channel Network
- IJCTT - Load-Balancing Multipath Switching System with Flow Slice
- IJCTT - Review on Implementation of Intrusion Detection in Physical Network
- IJCTT - A Literature Survey on Face Recognition Techniques
- IJCTT - Analyzing the Road Traffic and Accidents with Classification Techniques
- IJCTT - Block Floating Point Implementations for DSP Computations in Reconfigurable Computing
- IJCTT - Multi-Cloud Based Framework for Improved Service Availability and Security
- IJCTT - Software Requirement Specification Using Reverse Speech Technology
- IJCTT - Tight Bounds on SINR with ZFBF and Feedback
- IJCTT - Analysis of Energy Aware Data Center using Green Cloud Simulator in Cloud Computing
- IJCTT - Enhancing File Security by Rijndael Algorithm Using Combination of Other New Generation Security Algorithms
- IJCTT - A Review on Reconstruction Based Techniques for Privacy Preservation of Critical Data
- IJCTT - An Optimization Technique for Image Watermarking Scheme
- IJCTT - End-To-End Trust Based Transmission Optimization in Smartgrid Network Architecture
- IJCTT - Performance Analysis of AODV and OLSR using OPNET
- IJCTT - Network Packet Jamming Detection and Prevention Using Hiding Method
- IJCTT - Improved Clustering and Naïve Bayesian based Binary Decision tree with Bagging Approach
- IJCTT - Deployment and Evaluation of a Multi-Hop Wireless Network
- IJCTT - Robust Efficient Power Management Technique for MIMO Network Interfaces
- IJCTT - Advanced EGMP Based Multicast for Ad-Hoc MIMO
- IJCTT - Efficient Channel Estimation Based on LTE in OFDM
- IJCTT - A Selfishness Aware Neighbor Coverage Based Probabilistic Rebroadcast Protocol for Manets
- IJCTT - Shamir Secret Sharing Based Authentication Method with Data Repair Capability for Gray Scale Document Images via the Use of PNG Image
- IJCTT - An Adaptive Approach Foe Creating Behaviour Profiles and Recognizing Computer Users
- IJCTT - Ranking Based Approach to Maximize Utility of Recommender Systems
- IJCTT - Anti-Jamming Schemes to Prevent Selective Jamming Attacks
- IJCTT - User- And Query-Conditional Ranking for Web Databases
- IJCTT - Clustering Subspace for High Dimensional Categorical Data Using Neuro-Fuzzy Classification
- IJCTT - An Expatiate Game-Theory Based Analysis OnMultiattacker Scenario in MANETS
- IJCTT - Trust-Based Secure And Energy Efficient Routing Framework For WSNS
- IJCTT - Knowledge Based Context Awareness Network Security For Wireless Networks
- IJCTT - CBC And Interleaved CBC Implementations Of PACMA Cryptographic Algorithm
- IJCTT - Product Evaluation In Elliptical Helical Pipe Bending
- IJCTT - Image Enhancement Of Under Water Images Using Structured Preserving Noise Reduction Algorithm
- IJCTT - An Optimal Swarm Intelligence Approach For Test Sequence Restructuring To Conserve Power Usage In VLSI Testing
- IJCTT - Mitigating Selective Blackhole Attacker By Using Divergence Metric Based Advanced Intrusion Detection System
- IJCTT - Preparing Data Sets For Data Mining Using CASE, PIVOT And SPJ
- IJCTT - FPGA Implementation Of Efficient And High Speed Template Matching Module
- IJCTT - Web Service Composition By Using Broker
- IJCTT - Exploring Load Balancing To Solve Various Problems In Distributed Computing
- IJCTT - A Review On Data Hiding Techniques In Encrypted Images
- IJCTT - Efficient Data Clustering with Link Approach
- IJCTT - Integration of GIS and Cloud Computing for Emergency System
- IJCTT - Procure Sharing Of Health Records In Cloud Using Attribute Based Encryption
- IJCTT - Chorography Control In Ad Hoc Networks With Cooperative Communications
- IJCTT - An Anti Phishing Framework For Blocking Service Attacks Using Visual Cryptography
- IJCTT - A General Framework For Managing Firewall Policy Anomalies
- IJCTT - Diagnosis Of Ovarian Cancer Using Artificial Neural Network
- IJCTT - An Illumination And Proficient Photography Image Fusion Based On Gradient Exposure
- IJCTT - Simulating the Multiple Time-Period Arrival in Yield Management
- IJCTT - Design And Implementation Of USART IP Soft Core Based On DMA Mode
- IJCTT - Particle Swarm Optimization For Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller
- IJCTT - Analyzing The Senior High School Students’ Learning Attitude And Cognition Toward Computer Science Education
- IJCTT - Exploring Resource Provisioning Cost Models in Cloud Computing
- IJCTT - Secure Data Dynamics in Tandem with Dynamic Resource Allocation
- IJCTT - Improving Recommendations Through Re-Ranking Of Results
- IJCTT - Cluster Based Fault Identification And Detection Algorithm For WSN- A Survey
- IJCTT - A Robust Mechanism For Detection Of Loss Of Community In WSN
- IJCTT - Execution Planning for Continuous Queries over Dissemination Network of Data Aggregators
- IJCTT - An Empirical Evaluation of Internal Gateway Protocols (IGP) for Real Applications
- IJCTT - Improvised Convert Channel Capacity In Mls Networks
- IJCTT - Maximizing Quality and Performance of Network Through Adaptive Traffic Engineering
- IJCTT - Multi-Class Tweet Categorization Using Map Reduce Paradigm
- Volume9 No2 March 2014
- IJCTT - Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms
- IJCTT - A Novel Incremental Information Extraction Using Parse Tree Query Language And Parse Tree Databases
- IJCTT - A Survey on Web Page Prediction and Prefetching Models
- IJCTT - Multi-User Tool for Scientific Work Flow Composition
- IJCTT - Cloud Based Secure Storage Dynamics for Personal Health Records
- IJCTT - Detection Of Distributed Sensor Cloning Attacks And Use Of Zero Knowledge Protocol (ZKP) In WSN’s
- IJCTT - Efficient Packet Logging Scheme for Tracing Source of Attack
- IJCTT - Remarks on new Digital Signature Algorithm based on Factorization and Discrete Logarithm problem
- IJCTT - Effcient Semantic Similarity Based Fcm For Inferring User Search Goals With Feedback Sessions
- IJCTT - Image Edges Strengthening Filter Based Color Filter Array Interpolation
- IJCTT - Performance Evaluation of Skull Stripping Methods and Tools
- IJCTT - Design Of Electronic Toll Collection (Etc) System On Arm- 7 Using Rfid Techonology
- IJCTT - An Optimization Technique for CRC Generation
- IJCTT - Anomaly Detection Using Pagerank Algorithm
- IJCTT - Improving classification Accuracy of Neural Network through Clustering Algorithms
- IJCTT - Key Features and Optimum Performance of Network Simulators: A Brief Study
- IJCTT - Web data extraction using the approach of segmentation and parsing
- IJCTT - Usage of Apriori Algorithm of Data Mining as an Application to Grievous Crimes against Women
- IJCTT - Improving an aggregate recommendation diversity Using ranking-based tactics
- IJCTT - An Advanced and more Efficient Built-in Self-Repair Strategy for Embedded SRAM with Selectable Redundancy
- IJCTT - Crop Growth Prediction Based On Fruit Recognition Using Machine Vision
- IJCTT - A Knowledge Based Model for Pecularised Web Information Gathering using Ontologies
- IJCTT - A Review on Green Software Development in a Cloud Environment Regarding Software Development Life Cycle: (SDLC) Perspective
- IJCTT - New Metric for Quality Analysis of Deblocked Images
- IJCTT - Design and Development of Tapered Spiral Helix Antenna
- IJCTT - Hybrid Authentication Model for Multicast Protocol in AD-HOC Networks
- IJCTT - An Efficient Approach for Color Pattern Matching Using Image Mining
- IJCTT - A Comparative Study of Different TCP Variants in Networks
- IJCTT - E-mail Classification Using Genetic Algorithm with Heuristic Fitness Function
- IJCTT - A Security Mechanism for Video Data hiding
- IJCTT - Web Content Mining Techniques Tools & Algorithms – A Comprehensive Study
- IJCTT - A Hybrid Approach for Data Hiding using Cryptography Schemes
- IJCTT - An Imperial Investigation of Validation Problem of Top Indian Websites
- IJCTT - Performance Estimation of 2*3 MIMO-MC-CDMA in Rayleigh Fading Channel
- IJCTT - Toward Increased Discoverability of Open Educational Resources and Open Courseware
- IJCTT - A Review: Wireless Sensor Networks and Its Application, Platforms, Standards and Tools
- IJCTT - Performance Estimation of 2*3 MIMO-MC-CDMA using Convolution Code
- IJCTT - Improved Password Authentication System against Password attacks for web Applications
- IJCTT - Improved Background Matching Framework for Motion Detection
- IJCTT - A Novel Homomorphic Against Intersession Coding attacks Using InterMac
- IJCTT - Improved VEDA and Unwanted Edge Removal approaches for License Plate Detection
- IJCTT - Data Security Threat Evaluation Using Bayesian Prioritization Method
- IJCTT - A New Framework for Cloud Computing security using Secret Sharing Algorithm over Single to Multi- Clouds
- IJCTT - Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis
- IJCTT - Authentication Using Hand geometry And Finger geometry biometric Techniques
- IJCTT - Data structures and DBMS for CAD Systems- A review
- IJCTT - Performance Comparison of Host based and Network based Anomaly Detection using Fuzzy Genetic Approach (FGA)
- IJCTT - Emphasis and emerging trends on virtualization of cloud infrastructure with security challenges
- IJCTT - Classification Rule Discovery Using Genetic Algorithm-Based Approach
- IJCTT - Design and VLSI Implementation of Low Voltage and Low Dropout Voltage Regulator
- IJCTT - An Efficient Response Time for Shrew Attack Protection in Mitigating Low-Rate Tcp-Targeted Attacks
- IJCTT - Diagnosis for Dengue Fever Using Spatial Data Mining
- IJCTT - An E-Commerce application for Presuming Missing Items
- IJCTT - Applying Technology Acceptance (TAM) model to determine the acceptance of Nursing Information System (NIS) for Computer Generated Nursing Care Plan among nurses
- IJCTT - Detection of Spams using Extended ICA & Neural Networks
- IJCTT - Contour-based Target Detection in Real-time Videos
- IJCTT - How to Choose an Economic Cloud Deployment Model
- IJCTT - Optimizing Energy Consumption Using Cluster based Approach for Collision Avoidance in Wireless Sensor Network
- IJCTT - Reliable Energy Efficient Clustering Scheme Analysis Using Mobile Sink in Wireless Sensor Networks
- IJCTT - A Literature Review: Stemming Algorithms for Indian Languages
- IJCTT - Survey on software testing techniques in cloud computing
- IJCTT - A survey on multi cloud systems for data progression
- IJCTT - Hybrid impulsive and switching control for the four-dimensional energy resources supply-demand system
- IJCTT - Image Denoising Based on Wavelet Techniques Using Thresholding for Medical Images
- IJCTT - Performance Analysis of Fast wavelet transform and Discrete wavelet transform in Medical Images using Haar, Symlets and Biorthogonal wavelets
- IJCTT - Pin Point Localization Technique in Commercial Areas Using Wireless Sensor Network
- IJCTT - Computational Grid System Load Balancing Using an Efficient Scheduling Technique
- IJCTT - SARIMA Model for Natural Rubber production in India
- IJCTT - Off-line Handwritten Malayalam Character Recognition Using Gabor Filters
- IJCTT - An Efficient Edge Detection Approach based on Bacterial Foraging Optimization
- Volume9 No1 March 2014
- IJCTT - Asynchronous TDMA Based MAC Protocol for Fast and Efficient Data Collection in Wireless Sensor Networks
- IJCTT - Mouse Control using a Web Camera based on Colour Detection
- IJCTT - Enhancing Dictionary Based Preprocessing for Better Text Compression
- IJCTT - Detection of Bold Italic and Underline Fonts for Hindi OCR
- IJCTT - Implementation of Hybrid Error Model Using Super Resolution for Medical Images
- IJCTT - Wireless Sensor Network and Hierarchical Routing Protocols: A Review
- IJCTT - A New Cellular Automata Model for Two Lane Traffic System Incorporating Sensitive Driving and Traffic Light Signals
- IJCTT - A Theoretical Review on SMS Normalization using Hidden Markov Models (HMMs)
- IJCTT - Advance Cryptography Scheme for Data Hiding using Advance Hill cipher DES
- IJCTT - Averting Buffer Overflow Attack in Networking OS using – BOAT Controller
- IJCTT - DESIGN AND ANALYSIS OF LIGHT WEIGHT MOTOR VEHICLE FLYWHEEL
- IJCTT - Comparative Study of Speech Encryption Algorithms Using Mobile Applications
- IJCTT - Thermal Analysis of Shell and Tube Heat Ex-Changer Using C and Ansys
- IJCTT - Movie Review Classification and Feature based Summarization of Movie Reviews
- IJCTT - An Overview of Techniques Used for Extracting Keywords from Documents
- IJCTT - Zone Based Node Replica Detection in Wireless Sensor Network Using Trust
- IJCTT - Evapotranpiration Model Using AI Controller for automatic Irrigation system
- IJCTT - Long Term Forecasting with Fuzzy Time Series and Neural Network: a comparative study using Sugar production data
- IJCTT - Structural Analysis Of Multi-Plate Clutch
- IJCTT - Fibre Glass Cutting By Using Abrasive Jet Machining and Analysis of Process Parameters
- IJCTT - An Implementation of Reverse Caesar cipher (RCC) Algorithm in Google Cloud using Cloud SQL
- IJCTT - Smart Ordering System via Bluetooth
- IJCTT - Flow Simulation over a Multi-Stage Launch Vehicle with Strapons Using CFD Techniques
- IJCTT - A Novel Delay Oriented Reactive Routing Protocol for QoS Provisioning in MANETs
- IJCTT - Speckle Noise Reduction based on Discrete Wavelet Transform
- IJCTT - Advance Scheme for Secret Data Hiding System using Hop-field LSB
- IJCTT - Progressive Tool Design and Analysis for 49 Lever 5 Stage Tools
- IJCTT - FPGA Implementation of Face Detection using Skin Segmentation and AdaBoost Algorithm
- IJCTT - Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud
- IJCTT - Foundation for Frequent Pattern Mining Algorithms’ Implementation
- IJCTT - A Critical Study on Wireless Network Attacks for Preventing Channel Congestion
- IJCTT - Ovarian Follicle Detection for Polycystic Ovary Syndrome using Fuzzy C-Means Clustering
- IJCTT - Automatic Railway Gate and Crossing Control based Sensors & Microcontroller
- IJCTT - Dynamic Intrusion alerts generation and Aggregation using Intelligent IDS
- IJCTT - Area Efficient FPGA Based Bidirectional Network on Chip Router through Virtual Channel Regulator
- IJCTT - Potential Covert Channel In Distributed Database
- IJCTT - A Survey on Energy aware offloading Techniques for Mobile Cloud Computing
- IJCTT - An Efficient Clustering and Distance Based Approach for Outlier Detection
- IJCTT - Web Page Prediction Techniques: A Review
- IJCTT - A Secure DCT Image Steganography based on Public-Key Cryptography
- IJCTT - Noise Resilient Periodicity Mining In Time Series Data bases
- IJCTT - Appraisal of Social Learning Potentials in Some Trending Mobile Computing Applications
- IJCTT - Content Based Image Retrieval System Using Feature Classification with Modified KNN Algorithm
- IJCTT - Identification of Effective Public Cloud on User Query
- IJCTT - Fuzzy Feature Clustering for Text Classification Using Sequence Classifier
- IJCTT - mplementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept
- IJCTT - Object Motion Detection in Video Frames Using Background Frame Matching
- IJCTT - A Novel Attack Detection in Wireless Sensor Networks by Using Sequential Probability Ratio Test
- IJCTT - Modified Tumour Cut Algorithms For MRI Image Segmentation of Brain Tumours
- IJCTT - Investigating the Quality of local E-Government Websites Using Mixed Techniques: Web Diagnostic Tools and Manual Investigation
- IJCTT - Analysis of Fuzzy Technology based Scheduler in MANETs
- IJCTT - Spirit of Identity Fraud And Counterfeit Detection
- IJCTT - On-line Handwritten English Character Recognition Using Genetic Algorithm
- IJCTT - Development of the Content Based Image Retrieval Using Color, Texture and Edge Features
- IJCTT - Medical Image Segmentation Using Modified K Means And Cellular Automata Algorithms
- IJCTT - State of the art: Compression of 3D meshes
- IJCTT - Cryptanalytic JH and BLAKE Hash Function for Authentication and Proposed Work Over BLAKE-256 Using C
- IJCTT - Performance Analysis of Ship Tracking using PID/Fuzzy Controller
- IJCTT - System Atchitecture of WirelessUSB Flash devices
- IJCTT - Implementation of Flash ADC using Multisim Technology
- IJCTT - Analytical Learning of a Delay Aware Routing Protocol for Multi-hop Mobile Ad-hoc Networks
- IJCTT - Bandwidth-Aware AODV based Routing Protocol in MANETs
- IJCTT - Performance Evaluation of Machine Learning Classifiers in Sentiment Mining
- IJCTT - Analysis on Feature Extraction of Periocular Region(Soft biometrics) using LBP, PCA, ICA & Gabour filters
- IJCTT - Securing ATM Using Graphical Password Authentication Scheme
- IJCTT - Survey on Security Issues and Solutions in Cloud Computing
- IJCTT - A Digital Watermarking for Lifting Based Compression And Encryption of JPEG 2000 Images
- IJCTT - The Cluster Leader Election in Manets
- IJCTT - A Hybrid & Robust Wavelet Based Video Watermarking Scheme for Copyright Protection Using Principal Component Analysis
- IJCTT - Hadoop Mapreduce Framework in Big Data Analytics
- IJCTT - A Robust Watermarking of Compressed and Encrypted JPEG 2000 Images
- IJCTT - A Security Enhanced Approach For Digital Image Steganography Using DWT And RC4 Encryption
- IJCTT - Virtual Learning Environments – A Survey
- IJCTT - Understanding Location Manager in Android and Implementing an Optimal Image Geotagging Application
- IJCTT - Implementation of RISC Processor for Convolution Application
- IJCTT - Privacy preserving visualization using CLUSTERING
- IJCTT - An Efficient Approach for Script Identification
- IJCTT - MANET: Security Aspects and Challenges
- IJCTT - Sparse Transform Matrix at Low Complexity for Color Image Compression
- IJCTT - A Soft Computing Approach for Heart Disease Analysis
- IJCTT - Background and Foreground Human Character Segments for Video Object Segmentation
- IJCTT - An Improved Swarm Based Approach for Efficient Document Clustering
- IJCTT - Modern Developments in Optimization Model based on Generalized Confidence Interval Method
- IJCTT - Performance comparison of web service in IaaS cloud and standard deployment model
- IJCTT - A Survey of Mobile Ad Hoc Networks Routing Algorithm
- IJCTT - Implementation Techniques of Website Layout Designing
- IJCTT - Resolving Vulnerability Of First Hop Redundancy Protocol Using Md5 Authentication
- IJCTT - Improved Clustering using Hierarchical Approach
- IJCTT - An Analysis on Privacy Preserving in Cloud Computing
- IJCTT - Review Study For Inter-Operability Of Manet Protocols In Wireless Sensor Networks
- IJCTT - An Effective Approach to Information Hiding for Secure Message Transmission
- IJCTT - Reliable Computing In Ad Hoc Networks
- IJCTT - Congestion Avoidance by TCP
- IJCTT - Comparison of Dynamic Routing Protocols: RIP and OSPF
- IJCTT - Clone Attacks Detection In Wireless Sensor Networks
- IJCTT - A Survey on Host to Host Congestion Control
- IJCTT - Comparative Study on Global and Local Alignment methods
- IJCTT - Towards Achieving Secured and Decentralized Accountability in Cloud Computing
- IJCTT - A Parametric Chain based Routing Approach for Underwater Sensor Network
- IJCTT - General Framework for Biomedical Knowledge With Data Mining Techniques
- IJCTT - Client Puzzle Approach for Improving Confidentiality
- IJCTT - Differential thresh holding algorithm for edge detection in noisy environment
- IJCTT - Mental Stress and its Implications on Reaction time
- IJCTT - Automatic fingerprint Identification Using Minutiae Matching
- IJCTT - Biomedical Image Registration Using Fuzzy Logic
- IJCTT - Semi Supervised Color Image Segmentation Using Region Based Method
- IJCTT - Automated Test Oracle Methods
- IJCTT - Seasonal Time Series and Transfer Function Modelling for Natural Rubber Forecasting in India
- IJCTT - Estimation of Arterial Stiffness by using PPG Signal: A Review
- IJCTT - Slicing Technique For Privacy Preserving Data Publishing
- IJCTT - An Integrated Research Analysis of Cloud Forensics for Secured Computing Environment
- IJCTT - Wireless LAN Security: Addressing Challenges, Attacks and Solutions
- IJCTT - Fusion of CT and MRI images using Discrete Multiwavelet Transform
- IJCTT - Implementation Opass Authentication Protocol System for net Security
- IJCTT - Securing User’s Data in HDFS
- IJCTT - Development of an Iris-Based Access Control System Using a Two-Level Segmentation Approach
- IJCTT - Assuring Data Sharing and Culpability as a Service in Cloud
- IJCTT - Reviewing Effectiveness of CAPTCHA
- IJCTT - Analysis of Different Techniques for Finger-Vein Feature Extraction
- IJCTT - TJ-ACA: An Advanced Cryptographic Algorithm for Color Images using Ikeda Mapping
- IJCTT - An Efficient Approach For Integrating Data Mining Into Cloud Computing
- IJCTT - Chain Clustered Communication Protocol for WSN
- IJCTT - Mobile Location-Based Tour guide System
- IJCTT - Artificial Bee based Optimized Fuzzy c-Means Clustering of Gene Expression Data
- IJCTT - An Efficient Interaction Pattern Discovery For Human Meetings
- IJCTT - Comparative analysis of Speech Compression on 8-bit and 16-bit data using different wavelets
- IJCTT - Challenges and issues in 4G – Networks Mobility Management
- IJCTT - Image segmentation using K-mean clustering for finding tumor in medical application
- IJCTT - Hybridization of Symmetric Key Encryption and Visual Cryptography
- IJCTT - Reduction of Greedy Forwarding using Overlay Multicasting in Mobile Ad Hoc Networks
- IJCTT - A New Approach for Providing the Data Security and Secure Data Transfer in Cloud Computing
- IJCTT - Modification of Instruction Set Architecture in a UTeMRISCII Processor
- IJCTT - Cat Swarm based Optimization of Gene Expression Data Classification
- IJCTT - Emerging Network Technologies that are Likely to Become Widely Available in the Future
- IJCTT - Methodological approach for Face Recognition Using Artificial Neural Networks
- IJCTT - A Novel Approach for Detection and Prevention of Wormhole Attack In Ad-hoc Networks
- IJCTT - Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security
- IJCTT - A Study on Educational Data Mining
- Annual Subscription
- IJCTT - Block Motion Based Dynamic Texture Analysis: A Review
- IJCTT - Video Watermarking Using Wavelet Transformation
- IJCTT - Cryptoviral Extortion: A virus based approach
- IJCTT - Advanced Replica-Based Data Access Prediction and Optimization Approach in Distributed Environment
- IJCTT - Resource Provisioning Cost of Cloud Computing by Adaptive Reservation Techniques
- IJCTT - Review of First Hop Redundancy Protocol and Their Functionalities
- IJCTT - A Novel Tree Based Security Approach for Smart Phones
- IJCTT - An Efficient Cloud Storage with Secure Dynamic Data Modification
- IJCTT - Secure web mining framework for e-commerce websites
- IJCTT - Zone Divisional Network with Double Cluster Head for effective communication in WSN
- IJCTT - Contrast Enhancement Using Bi-Histogram Equalization With Brightness Preservation
- IJCTT - ROI Estimation of Data Warehouse with Bottom Up Architecture and Top Down Implementation
- IJCTT - Affective Embedded Systems: a Requirement Engineering Approach
- IJCTT - Entrenched Visual Cryptography using Secret Sharing Scheme with public Key
- IJCTT - Extraction of Persistence and Volatile Forensics Evidences from Computer System
- IJCTT - A Literature Review on Analysis of MRI Images of Rheumatoid Arthritis through Morphological Image Processing Techniques
- IJCTT - An Improved Algorithm for Reducing False and Duplicate Readings in RFID Data Stream Based on an Adaptive Data Cleaning Scheme
- IJCTT - Assessment of University of Ilorin (Unilorin) Website using Webometrics Ranking Parameters
- IJCTT - Requirements to Build a System that Uses Machine Learning Based Approach for Analysis of Forensic Data
- IJCTT - Comparative study of Page Ranking Algorithms for Web Mining
- IJCTT - Data Leakage Detection System for Diabetes Patients DB
- IJCTT - Generating associations rule mining using Apriori and FPGrowth Algorithms
- IJCTT - Aggregation of Digital Forensics Evidences
- IJCTT - Green Computing
- IJCTT - Naïve Bayes Classifier with Various Smoothing Techniques for Text Documents
- IJCTT - A Survey on Open Source Software using Questionnaire
- IJCTT - Enable open Veri?ability and Data Dynamics for Storage protection in Cloud Computing
- IJCTT - Privacy preserving public auditing system for data storage security in Cloud Computing
- IJCTT - Data Storage Security in Multiple Unrelated Cloud Architecture
- IJCTT - Managing Latency Equalization Through Restored Routers
- IJCTT - Isolation Protection and Location Auditing System for Wireless Networks
- IJCTT - Web Site Optimization To Rank High
- IJCTT - Adiabatic Logic For Low Power Application Using Design 180nm Technology
- IJCTT - Code Detection and Evaluation Using Search Based Refactoring
- IJCTT - Network Security Using Quantum Cryptography
- IJCTT - Forestalling of Flooding Attacks in Wireless Ad Hoc Networks
- IJCTT - Improvement in Qos using sink mobility in WSN
- IJCTT - A Review of DFA Minimizing State Machines Using Hash-Tables
- IJCTT - A Comparative study on clustering of data using Improved K-means Algorithms
- IJCTT - State of the art: Compression of 3D meshes
- IJCTT - Mining Frequent Itemsets Using Apriori Algorithm
- IJCTT - Enhancing the lifetime of LEACH Protocol using NNA for Wireless Sensor Network
- IJCTT - Spartan 3E Synthesizable FPGA Based Floating-Point Arithmetic Unit
- IJCTT - A Dual Objective Scheduling Scheme for Computational Grids
- IJCTT - New Vision of the Computer Operating System
- IJCTT - Grid Based Multipath Energy Aware Routing Protocol for WSNs
- IJCTT - Association Technique in Data Mining and Its Applications
- IJCTT - A Support Vector Machine and Information Gain based Classification Framework for Diabetic Retinopathy Images
- IJCTT - Data invulnerability and data integrity verification of multi cloud storage
- IJCTT - Neuro-Fuzzy Classification
- IJCTT - An Automatic Detection and Assessment of Diabetic Macular Edema Along With Fovea Detection from Color Retinal Images
- IJCTT - Reducing Chain Complexity using Honey Bee Optimization in Wireless sensor network
- IJCTT - Study on Computer Numerical Simulations Calculation of Structural Wind Load
- IJCTT - Protection Method Against Unauthorised Issues In Network-Honeypots
- IJCTT - Prevention Proposals for Threats in Internet Services
- IJCTT - Fractal Image Compression using Soft Computingm
- IJCTT - An approach for segmentation of medical images using pillar K-means algorithm
- IJCTT - A Novel Approach of Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations
- IJCTT - Web SR Development with Touch Screen System
- IJCTT - OBRT : Lossless Video Compression Using DCT and DWT Techniques
- IJCTT - Dependable and Secure Storage Services in Cloud Computing
- IJCTT - AMPLE Using IGP Based Traffic Engineering
- IJCTT - Analysis of Multi Leg Stock Trading System
- IJCTT - Mining Customer Behavior Knowledge to Develop Analytical Expert System for Beverage Marketing
- IJCTT - Identifying Text in Images Using OCR Testing
- IJCTT - Power Reduction and Speed Augmentation in LFSR for Improved Sequence Generation Using Transistor Stacking Method
- IJCTT - Energy Aware DSDV and FSR Routing Protocols in Mobile Ad Hoc Networks
- IJCTT - HADOOP the Ultimate Solution for BIG DATA Problems
- IJCTT - Cloud Services Portability for secure migration
- IJCTT - False Data Detection Using MAC pairs in Wireless Sensor Networks
- IJCTT - Providing Cloud Services over Mobile Cloud Data
- IJCTT - A Puzzle Based Client-Server Authentication Model with Secure Data Transfer
- IJCTT - An Investigation on Estimating Demand Data and Semantic Resource Allocation
- IJCTT - Outsourcing with secure accessibility in mobile cloud computing
- IJCTT - Certain investigation on Captcha design based on splitting, rotating and grid’s usage in the images against OCR
- IJCTT - Deployment of Computing Clusters in MultiCloud Environment for MTC Applications
- IJCTT - Fingerprint Minutiae Matching using Region of Interest
- IJCTT - Offline Signature Verification System using a Set of Simple Shape Based Geometric Features
- IJCTT - Ranked Keyword Search in Cloud Computing
- IJCTT - Attack Pattern Discovery for Autonomous System
- IJCTT - Security Issues and Solutions for Cloud Computing
- IJCTT - A Method for Creating Mosaic Image with Small Size Database
- IJCTT - The Issues with Reengineering of Agile System’s Assets
- IJCTT - Data-Base Security Using Different Techniques: A Survey
- IJCTT - Algorithms for Computer Aided Diagnosis – An Overview
- IJCTT - Evaluation of Lossless Watermarking Techniques
- IJCTT - Secure Multi Party Computation For Participating Parties
- IJCTT - Zigbee based Smart Street Lighting System
- IJCTT - Energy Efficient Approaches: Altruist Energy Efficient Approach is the Best
- IJCTT - Optimized Content Extraction from web pages using Composite Approaches
- IJCTT - An Efficient Information Extraction Model for personal named entity
- IJCTT - Hypertext : Data Model To Reduce Disorientation
- IJCTT - Neural Techniques for Improving the Classification Accuracy of Microarray Data Set using Rough Set Feature Selection Method
- IJCTT - Attribute-Based Encryption Techniques in Cloud Computing Security : An Overview
- IJCTT - E-Governance: A move towards paperless Administration in India
- IJCTT - Enabling MultiLevel Secured Framework for Remote Attestation
- IJCTT - Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
- IJCTT - A Survey of Spelling Error Detection and Correction Techniques
- IJCTT - A Hybrid Estimation of Distribution Algorithm with Random Walk local Search for Multi-mode Resource-Constrained Project Scheduling problems
- IJCTT - An Efficient Classification Approach for the XML Documents
- IJCTT - A FEC Decoding in LTE and WiMAX Systems
- IJCTT - Study on the evolutionary game of real-estate developers and commercial banks
- IJCTT - Vaccination strategies of a modified SIS model on complex networks
- IJCTT - A Review On Document Oriented And Column Oriented Databases
- IJCTT - Automatic Bus Recognition Through Mobile
- IJCTT - Secure CRM Cloud Service using RC5 Algorithm
- IJCTT - SQL Query Optimizer-based Query Progress Indicator
- IJCTT - Scalable Communication for Web Applications by Using Windows Azure Serive
- IJCTT - Security and Access Control Evaluation for Cloud Data Centers
- IJCTT - Cloud Information Accountability Frameworks for Data Sharing in Cloud - A Review
- IJCTT - Unassailable Fuzzy Keyword Searching in Cloud Storages
- IJCTT - Distributed Attribute Based Encryption for Patient Health Record Security under Clouds
- IJCTT - Automatic Rule Extraction from Frequent Rules In Similar Network Sites
- IJCTT - An NMF and Hierarchical Based Clustering Approach to support Multiviewpoint-Based
- IJCTT - A Survey on UWB Antennas Used For Breast Cancer Detection
- IJCTT - Handling Traffic Dynamics in Multipath Routing Topology
- IJCTT - Optimal Price Distribution Strategy for Mobile Service Providers
- IJCTT - An Effectual Failure Factor Augmented Aggregation Techniques for Computational Grid
- IJCTT - Data Analysis using Mapper and Reducer with Optimal Configuration in Hadoop
- IJCTT - Human Identification Using Finger and Iris Images
- IJCTT - Securing the Images Using Biometric Cryptography Technique
- IJCTT - Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack
- IJCTT - Data Storage in Cloud Environment Enhance Privacy
- IJCTT - An Approach to Medical Image Classification Using Neuro Fuzzy Logic and ANFIS Classifier
- IJCTT - Review of Digital Watermarking System: A Robust Method for Protection
- IJCTT - “FESCIM” for Multi-Hop Cellular Network
- IJCTT - Performance and Dependency Analysis of Data in Distributed Systems
- IJCTT - Eradicate Energy Inefficiencies That Reduce The Lifetime Using Clustering Approach For WSN
- IJCTT - Different prospects of Office Automation Systems
- IJCTT - A Novel Hybrid Approach Using Kmeans Clustering and Threshold filter for Brain Tumor Detection
- IJCTT - Data Security and Privacy in Data Mining: Research Issues Preparation
- IJCTT - Spectral Flatness Measurements for Detection of C-Worms
- IJCTT - Improving Segmentation by Denoising Brain MRI ../images through Interpolation Median Filter in ADTVFCM
- IJCTT - A Comparative Study of Various Parallel Longest Common Subsequence Algorithms
- IJCTT - A Overview of Software Verification Validation and Selection Process
- IJCTT - Secure Mobile System Using NTRU Encrypt
- IJCTT - Dual Encryption Schema With Cheating Text and NTRU
- IJCTT - Profile Based Search Engine
- IJCTT - Routers Optimization and Minimizing Forwarding States with Explicit Multicast Forwarding
- IJCTT - Multicasting Over Manet Through Segmp By Secure Zone Leader Election
- IJCTT - Reliable Data Delivery in Mobile Ad-Hoc Network using Fisheye State Routing
- IJCTT - An Application of Collaborative Data Mining in Social Network for Viral Marketing
- IJCTT - Architecting Service based Sensor Networks for the adept assimilation
- IJCTT - High performance Level Conversion Flip Flop for Dual Supply Systems
- IJCTT - A Color Image Compression Using Pixel Correlation and Its Comparison with Existing Algorithms
- IJCTT - Classification using Neural Network & Support Vector Machine for Sonar dataset
- IJCTT - Distributed Algorithm for Fast Detecting the Failure Nodes Chronicles
- IJCTT - Dynamical Modified R.R. CPU Scheduling Algorithm
- IJCTT - Analysis of MIMO-OFDM Signals with Optimum Equalization
- IJCTT - Enhanced Segmentation Method for Iris Recognition
- IJCTT - Neural Network Design in Cloud Computing
- IJCTT - Image Processing Techniques in Face Recognition
- IJCTT - Classification of Diabetes Mellitus using Modified Particle Swarm Optimization and Least Squares Support Vector Machine
- IJCTT - A Review on Impersonation Attack in Mobile Ad-Hoc Network
- IJCTT - Survey on Sparse Coded Features for Content Based Face Image Retrieval
- IJCTT - A Survey on Semi-Supervised Learning Techniques
- IJCTT - Congestion based Route Discovery AOMDV Protocol
- IJCTT - Implementation of attribute value faceted value classification scheme for constructing Reuse Repository
- IJCTT - A Review on Botnet and Detection Technique
- IJCTT - Mining Positive and Negative Association Rules Using CoherentApproach
- IJCTT - A Modular and Extendable Approach to Database Encryption at Multi-granularity Level
- IJCTT - Novel Energy Efficient MAC Protocol for Data Collection in Event Based Wireless Sensor Network
- IJCTT - Reducing Network Intrusion Detection using Association rule and Classification algorithms
- IJCTT - Feature Extraction from web data using Artificial Neural Networks
- IJCTT - Particle Swarm Optimization in Transliteration
- IJCTT - Robust Semantic Framework for web search engine
- IJCTT - An Improving Genetic Programming Approach Based Deduplication Using KFINDMR
- IJCTT - Dynamic Frequency Hopping: A Major Boon Towards Performance Improvisation of a GSM Mobile Network
- IJCTT - Discovering Conditional Functional Dependencies
- IJCTT - A Study on Post mining of Association Rules Targeting User Interest
- IJCTT - Bilingual Subject-based Information Retrieval in NECLIB2 Digital Library
- IJCTT - A new Digital Signature Algorithm based on Factorization and Discrete Logarithm problem
- IJCTT - Fingerprint Recognition Using Minutia Matching
- IJCTT - Introduction to KEA-Means Algorithm for Web Document Clustering.
- IJCTT - A New Reduced Clock Power Flip-flop for Future SOC Applications
- IJCTT - Novel Approach for Color Extended Visual Cryptography Using Error Diffusion.
- IJCTT - Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm
- IJCTT - A Comprehensive Image Segmentation Approach For Image Registration
- IJCTT - Wireless Web Content Management Using J2ME
- IJCTT - Retrieval Of Digital Images Using Texture Feature With Advanced Genetic Algorithm
- IJCTT - Development of Data leakage Detection Using Data Allocation Strategies
- IJCTT - A Survey on Dynamic Job Scheduling in Grid Environment Based on Heuristic Algorithms
- IJCTT - Remote Based Intelligent Video Surveillance System
- IJCTT - Neural Network associated with recognition of Facial Expressions of Basic Emotions
- IJCTT - Efficient Techniques for Online Record Linkage
- IJCTT - RFID-Based Hospital Real Time Patient Management System
- IJCTT - Web Mining Privacy using Advanced DSA – Spatial LBS Case Study
- IJCTT - An Energy Efficient Remote Data Collection and Reprogramming of Wireless sensors Networks
- IJCTT - Novel method for power quality improvement using active power filter
- IJCTT - Message Security over Image Communication
- IJCTT - Event Dissemination Protocol for SNS inspired P2P Games
- IJCTT - Development Of Intelligent Network For Offline Signature Verification Using Pixel Density, Directional Method And Both Method Together
- IJCTT - A Comparative Analysis of DSDV and DSR in Different Scenario of Mobile Ad Hoc Network
- IJCTT - Habitant One-Time Furtive Mechanisms for Quick Common Validation in Mobile Interactions
- IJCTT - Comparative Study of Data Cluster Analysis for Microarray
- IJCTT - High Utility Mining Algorithm for Preprocessed Web Data
- IJCTT - Comparative Study of Data Cluster Analysis for Microarray
- IJCTT - UsenetMHT: Usenet With Deletion
- IJCTT - A Survey On Deduplication Methods
- IJCTT - Automatic Bus Recognition Through Mobile
- IJCTT - Session Based Protocol: Data Sharing in an Overlay System
- IJCTT - Extended CurlCrawler: A focused and path-oriented framework for crawling the web with thumb
- IJCTT - DRP: A Novel Approach for Requirement Planning in Supply Chain Management
- IJCTT - Embedded Web Server for Web-Based Network Element Management Using Arm Technology
- IJCTT - Secure Transmission Services in Wireless Networks using Key Trees
- IJCTT - Self Organizing Map based Clustering Approach for Trajectory Data
- IJCTT - SIMULATION AND PERFORMANCE ANALYSIS OF DSDV, OLSR, DSR AND ZRP ROUTING PROTOCOLS IN MANETs
- IJCTT - Cost Estimation Tool for Commercial Software Development Industries
- IJCTT - DRP: A Novel Approach for Requirement Planning in Supply Chain Management
- IJCTT - Nearest Neighbour Based Outlier Detection Techniques
- IJCTT - Classification Based Outlier Detection Techniques
- IJCTT - Document Clustering in Web Search Engine
- IJCTT - A novel approach for the detection of SYN Flood Attack
- IJCTT - A Novel Approach for Supply chain In Distributed Networks Using Multi Echelon
- IJCTT - Survey on Computer Crime Scene Investigation Forensic Tools
- IJCTT - Implementation and Comparative Analysis between Different Precision Interval Arithmetic based Multiplication using Modified Array Method
- IJCTT - FPGA Based Area And Throughput Implementation of JH And BLAKE Hash Function
- IJCTT - Performance analysis of Linear appearance based algorithms for Face Recognition
- IJCTT - A Security Design combining the advantages of Cryptanalysis and Anonymous routing protocol to achieve data secrecy and anonymity
- IJCTT - Performance Analysis of Asynchronous Optical Burst Switching Networks
- IJCTT - A Novel SHA-1 approach in Database Security
- IJCTT - Ray’s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices
- IJCTT - Behaviour based Trust Management using geometric mean approach for Wireless Sensor Networks
- IJCTT - Imputation Framework for Missing Values
- IJCTT - RDFS:An Extension To RDF
- IJCTT - Face Comparison Using PSO Algorithm
- IJCTT - BSMR: Byzantine-Resilient Secure Multicast Routing In Multihop Wireless Networks
- IJCTT - Evaluation of Teacher’s Performance Using Fuzzylogic Techniques
- IJCTT - Predicting Software Bugs Using Web Log Analysis Techniques and Naïve Bayesian Technique
- IJCTT - Computation of the largest Eigenvalues using Power method and Gerschgorin circles method
- IJCTT - Dynamic Buffer Sizing Algorithms for 802.11 Wireless Networks
- IJCTT - Secured Storage of Outsourced Data in Cloud Computing
- IJCTT - Secured Location Monitoring System in Wireless Sensor Networks
- IJCTT - Agent Based Urban Traffic and Transportation Control with Cloud Computing
- IJCTT - Scab Diseases Detection of Potato using Image Processing
- IJCTT - A Survey On Text Categorization
- IJCTT - Evaluation Method of Forex Trading Analysis Tool
- IJCTT - New framework in Sensitive Rule Hiding
- IJCTT - Robust IP Spoof Control Mechanism Through Packet Filters
- IJCTT - Universal Numeric Segment Display for Indian Scheduled Languages: an Architectural View
- IJCTT - Code Clone Detection with Refactoring support Through Textual analysis
- IJCTT - Fault Detection and Test Minimization Methods for Combinational Circuits - A Survey
- IJCTT - An Authenticated Policy-Compliant Routing
- IJCTT - Data Mining in Adaptive Control of Distributed Computing System Performance
- IJCTT - A Novel Implementation of ARM based Design of Firewall to prevent SYN Flood Attack
- IJCTT - Multi-Agent System Approach for Congestion Control in ATM Networks
- IJCTT - Nearest Neighbour Classification for Wireless Sensor Network Data
- IJCTT - Image Quality Analysis of Deblocked Images
- IJCTT - Standard Ethernet Interface as an Embedded Communication Network for controlling and monitoring the devices
- IJCTT - Fragile and Blind Reversible Watermarking Method for Color Images using 4-Level DWT
- IJCTT - Removal of High Density Salt Pepper Noise in Noisy Images Using Decision Based UnSymmetric Trimmed Median Filter (DBUTM)
- IJCTT - A QOS-Aware Software Selection Method Based On Service Credibility Evaluation.
- IJCTT - Design and Development of a Secured Routing Scheme for Mobile Ad hoc Networks (MANETs)
- IJCTT - Low Power testing by don’t care bit filling technique.
- IJCTT - Dependency grammar feature based noun phrase extraction for text summarization.
- IJCTT - An IP Trace back System to Find the Real Source of Attacks
- IJCTT - A Study on Conduct of Teams in an It and a BPO Company
- IJCTT - Credit Card Fraud Detection Analysis
- IJCTT - Computer Assisted Instruction For Teaching/Learning Process And Its Effects On Students’Performance In Tertiary Institutions
- IJCTT - A Routing-Driven Public-Key Cryptosystem Based Key Management Scheme for a Sensor Network
- IJCTT - Security Solution for WSN Using Mobile Agent Technology 6
- IJCTT - A Novel Implementation of Fuzzy Keyword Search over Encrypted Data in Cloud Computing
- IJCTT - Design of a Scheme for Secure Rouitng in Mobile Adhoc Networks
- IJCTT - Robust and secure digital signature for image authentication over wireless Channels
- IJCTT - GLIP: A Concurrency Control Protocol for Clipping Indexing
- IJCTT - By Performance Metrics Analysis of CLR JVM– A Survey
- IJCTT - Leaf Classification Using Shape, Color, and Texture Features
- IJCTT - Object Recognition using SVM-KNN based on Geometric Moment Invariant
- IJCTT - Readiness of Requirement Engineering towards Global Collaboration and Communication
- IJCTT - Comparative Analysis of Data warehouse Design Approaches from Security Perspectives
- IJCTT - Robots with biological brain
- IJCTT - Discriminative Features Selection in Text Mining Using TF-IDF Scheme
- IJCTT - Evaluating Efficacy of Forward Error Correction Coding
- IJCTT - Design and Analysis of On-Chip Router for Network On Chip
- IJCTT - Comparative Analysis of AES and RC4 Algorithms for Better Utilization
- IJCTT - Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
- IJCTT - Location-based Services Routing in Networks
- IJCTT - Connected Component Analysis and Change Detection for Images
- IJCTT - Computer Aided Diagnosis System For The Identification And Classification Of Lessions In Lungs
- IJCTT - Implementation and Analysis of Image Restoration Techniques
- IJCTT - Stroke economy approach for constructing complex expert system using multi agent architecture.
- IJCTT - Gray Eye Traffic Surveillance
- IJCTT - A Fraud Detection Approach in Telecommunication using Cluster GA
- IJCTT - A Step towards Precision Farming of Rice Crop by Estimating Loss Caused by Leaf Blast Disease Using Digital Image Processing and Fuzzy Clustering.
- IJCTT - Regionalisation as Spatial Data Mining Problem: A Comparative Study.
- IJCTT - A Survey on Network Security and Attack Defense Mechanisam for Wireless sensor Network
- IJCTT - Web Services Security Architectures for Secure Service Oriented Analysis and Design
- IJCTT - An Entropy Decision Model for Selection of Enterprise Resource Planning System
- IJCTT - An Intelligent Architecture for Multi-Agent Based M-Health Care System
- IJCTT - Limitations of Practical Quantum Cryptography
- IJCTT - A Cost-efficient Approach for Dynamic and Geographically-diverse Replication of Components in Cloud Computing
- IJCTT - Adaptive E-learning System: A Review
- IJCTT - Web Intelligence
- IJCTT - Multiple Unit GSM Controlled Devices
- IJCTT - Application software for graphical interface Online theatre booking system
- IJCTT - Handwritten Signature Verification using Instance Based Learning
- IJCTT - A Conceptual Framework For Extending Distance Measure Algorithm For Data Clustering
- IJCTT - Impacts of E-Content
- IJCTT - Algorithm for Intelligent Network Visualization and Threat Analysis
- IJCTT - Face Recognition Using Neural Network and Eigenvalues With Distinct Block Processing
- Volume8 No1 February 2014
- IJCTT - MCA Learning Algorithm for Incident Signals Estimation:A Review
- IJCTT - BPR: Evaluation of Existing Methodologies and Limitations
- IJCTT - Vector Space Models to Classify Arabic Text
- IJCTT - Design and Analysis of Power Efficient PTL Half Subtractor Using 120nm Technology
- IJCTT - OSI Reference Model: An Overview
- IJCTT - Wireless Sensor Based Remote Monitoring System For Fluoride Affected Areas Using GPRS and GIS
- IJCTT - A survey on Human Computer Interaction Mechanism Using Finger Tracking
- IJCTT - A Study of Local Binary Pattern Method for Facial Expression Detection
- IJCTT - LWRP: Low Power Consumption Weighting Replacement Policy using Buffer Memory
- IJCTT - A Survey on Spatial Co-location Patterns Discovery from Spatial Datasets
- IJCTT - Enhancing Rural Development in Tamilnadu through ICT: An Evaluation of Latest Technologies in the scheme MGNREGS
- IJCTT - Cluster Chain Based Relay Nodes Assignment
- IJCTT - A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach
- IJCTT - Energy Saving Technique in Wireless Mobile Ad-hoc Network for Reliable Communication
- IJCTT - LSSVM-ABC Algorithm for Stock Price prediction
- call
- Join
- Special Issue Proposal
- arx
- Volume3 Issue5 Issue 2012
- Volume3 Issue4 Issue 2012
- IJCTT - Aligning Cloud Computing Security with Business Strategy
- Paper Submission
- IJCTT - Security in MANET Against DDoS Attack
- Call for Paper
- Home
- IJCTT - An Efficient Boundary Detection and Image Segmentation Method Based on Perceptual Organization
- IJCTT - Cyclic Sensing MAC Protocol for Multicast Routing in Mobile Ad-Hoc Networks
- IJCTT - Dynamic Load Balancing Algorithm in the Global-Local Order
- IJCTT - Early Proliferation Stage of Detecting Diabetic Retinopathy Using Bayesian Classifier Based Level Set Segmentation
- Volume7 No1 January 2014
- Volume6 No2 December 2013
- Volume6 No1 December 2013
- volume5 No6
- Volume5 No2 November 2013
- Volume5 No1 November 2013
- Volume4 Iss10 No2 October 2013
- Volume4 Iss10 No1 October 2013
- Volume4 Iss9 No1
- Volume4 Iss8 No2
- Volume4 Iss8 No1
- Volume4 Iss7 No2
- Volume4 Iss7 No1
- Volume4 Iss6 No2
- Volume4 Iss6 No1
- Volume4 Iss5 No3
- Volume4 Iss5 No2
- Volume4 Iss5 No1
- Volume4 Iss4 No4
- Volume4 Iss4 No3
- Volume4 Iss4 No2
- Volume4 Iss4 No1
- Volume4 Iss3 No3
- Volume4 Iss3 No2
- Volume4 Iss3 No1
- Volume4 Iss2 No2
- Volume4 Iss2 No1
- Volume4 Iss1
- Volume3 Iss6 Issue 2012
- Volume3 Iss3 No2
- Volume3 Iss3 No1
- Volume3 Iss2 No2
- Volume3 Iss2 No1
- Volume3 Iss1 No2
- Volume3 Iss1 No1
- Volume2 Iss2 No2
- Volume2 Iss2 No1 Issue 2011
- IJCTT-Volume 2 Iss 1 No 1 Issue 2011
- IJCTT-Volume 1 Iss 3 No 2 Jul to Aug Issue 2011
- IJCTT-Volume 1 Iss 3 No 1 Jul to Aug Issue 2011
- Volume1 Iss2 No1 May to Jun Issue 2011
- Volume1 Iss1 No1 March to April Issue 2011
- APC
- IJCTT - Security Loopholes Of 802.11 Wireless LANs And Their Solutions
- EFES2015
- International Journal of Engineering Trends and Technology Current Issue
- Online Payment