Home
Topics
Call For Paper
Publication Charges
Archives
Current Issue
Past Issues
conference
Submission
IRG Journals
Contact Us
Submit Your Article :
editorijctjournal@gmail.com
IJCT - Volume 8, Issue 2 / March - April 2021
Title/Author Name
1
Diabetes Disease Prediction Using Machine Learning And Deep Learning Techniques
-
K.E.Eswari MCA., M.Phil., M.E, S.Vijaya rohini
:
Click Here
IJCT-V8I2P1
2
Face Recognition System Under Morphing Attacks
-
S.Jagadeesan M.Sc(CS)., MCA., M.Phil(CS)., ME(CSE)., S.Sabitha
:
Click Here
IJCT-V8I2P2
3
IMPLEMENTATION OF SHORTEST ROUTE FILE DELIVERY ON THE MESSENGER POPULATION AND CIVIL REGISTRATION OF DKI JAKARTA USING TSP BACKTRACKING METHOD
-
Tikah Sucilawati, Nia Rahma Kurnianda
:
Click Here
IJCT-V8I2P3
4
Data Analysis of Consumer Complaints in Banking Industry using k means clustering and sentiment analysis
-
S.Jagadeesan M.Sc(CS)., MCA., M.Phil(CS)., ME(CSE).,P. Shanmugapriya
:
Click Here
IJCT-V8I2P4
5
Digital Voting System Using Blockchain Technology
-
S.Sambasivam MCA., M.Phil, M.Sowndhar
:
Click Here
IJCT-V8I2P5
6
Crop Yield Prediction using Temperature and Rainfall parameters prediction
-
S.Jagadeesan M.Sc(CS)., MCA., M.Phil(CS)., ME(CSE)., G.Sunil Sharma
:
Click Here
IJCT-V8I2P6
7
Large Scale Urban Vehicular Network Framework With User Level Mobile Node Based Optimal Content Delivery
-
C.Mani MCA., M.E., K.Karuppusamy
:
Click Here
IJCT-V8I2P7
8
Investigating the Schedulability of PeriodicReal-Time Tasks in Virtualized Cloud Environment
-
R.NAVIN KUMAR MCA., M.Phil., B.NEELAMPARI
:
Click Here
IJCT-V8I2P8
9
Image Security Enhancement With Vigenere Knight’s Tour And Advanced Encryption Standard Technique
-
S.Jagadeesan M.Sc(CS)., MCA., M.Phil(CS)., ME(CSE)., R.Indhumathi
:
Click Here
IJCT-V8I2P9
10
Improving the Response Time of M-Learning and Cloud Computing Environment Using Superior Element Multitude Optimization
-
Ms. N. Zahira Jahan M.C.A.,M.Phil., Ms. V.Karthika
:
Click Here
IJCT-V8I2P10
11
Research of a Possibility of Using Blockchain Technology without Tokens to Protect Banking Transactions
-
C.Mani MCA., M.E., S.Arul
:
Click Here
IJCT-V8I2P11
12
MUSIC RECOMMENDATON BASED ON MUSIC CHARACTERISTICS AND USER INTRINSIC COMPONENTS
-
C.Mani MCA., M.E., V.Gopalakrishnan
:
Click Here
IJCT-V8I2P12
13
Bayesian Polytrees with Learned Deep Features for Multi-Class Cell Segmentation
-
R.Navin Kumar MCA., M.Phil. , Sarath Kumar P
:
Click Here
IJCT-V8I2P13
14
Block Chain Based Food Supply Chain Management
-
R.Navin Kumar MCA., M.Phil., G.Abishek
:
Click Here
IJCT-V8I2P14
15
Differential Privacy Preserving of Training Model in Wireless Big Data with Edge Computing
-
S. Sambasivam MCA., M.Phil.,, D. Guhan
:
Click Here
IJCT-V8I2P15
16
Blockchain Based Health Care Administration
-
R.NAVIN KUMAR MCA., M.Phil..,M.THIRUMOORTHI
:
Click Here
IJCT-V8I2P16
17
Data Copy Sweeper
-
S.Sambasivam MCA., M.Phil., J.Senthil Kumar
:
Click Here
IJCT-V8I2P17
18
DISCRIMINATIVE ATHENDICATION BASED OPPERTUNISTIC ROUTING IN WIRELESS SENSOR NETWORK WITH TRUSTWORTHY PATH MECHANISM
-
K.E.Eswari MCA., M.Phil., M.E,, K.Indhu
:
Click Here
IJCT-V8I2P18
19
EFFECTIVE PREDICTION OF PATIENT ADMISSION IN HOSPITAL USING DATA MINING CLASSIFICATION ANALYTICAL TOOL
-
Ms. N. Zahira Jahan M.C.A., M.Phil.,Ms. K. Priyanka
:
Click Here
IJCT-V8I2P19
20
Implementation of Customer Purchase Prediction using Machine Learning Techniques
-
Ms. N. Zahira Jahan M.C.A., M.Phil.,M. Gokul
:
Click Here
IJCT-V8I2P20
21
Eye Pupil Movement Based Cursor Mechanism
-
C.Mani MCA., M.E., P.Gayathri
:
Click Here
IJCT-V8I2P21
22
FACE RECOGNITION BASED ATTENDENCE SYSTEM USING DEEP LEARNING APPROACH
-
K.E.Eswari MCA., M.Phil., M.E, A.Mohanasundaram
:
Click Here
IJCT-V8I2P22
23
Solid Edge 3D Model of Synthesized Eight Link Gear Variable Topology Mechanism
-
H. M. Naveen, Shrinivas S. Balli ,Umesh M. Daivagna
:
Click Here
IJCT-V8I2P23
24
ONTOLOGY BASED DISEASE PREDICTION USING D-MATRIX
-
S.Sambasivam MCA., M.Phil., M Mahendran
:
Click Here
IJCT-V8I2P24
25
PLANT LEAF SHAPE CLUSTERING AND ROT DETECTION
-
Ms. N. Zahira Jahan MCA., M.Phil., P. Karuppusamy
:
Click Here
IJCT-V8I2P25
26
IOT BASED SMART ATTENDANCE SYSTEM WITH BODY TEMPERATURE MEASUREMENT
-
Ms.N.Zahira Jahan MCA., M.Phil.,, M.Prakash
:
Click Here
IJCT-V8I2P26
27
A SURVEY ON NETWORK EMBEDDING COGNITIVE RADIO ENVIRONMENT
-
S.Sambasivam MCA., M.Phil., A Seenivasan
:
Click Here
IJCT-V8I2P27
28
Drowsiness Detection System
-
S. Jagadeesan M.SC(CS)., MCA., M.PHIL(CS)., ME(CSE)., S.N.Mathivanan
:
Click Here
IJCT-V8I2P28
29
ENHANCEMENT OF MARKET DATA PARTITIONING SCALABILITY AND HIGH DIAMENTIONALITY MANAGEMENT USING DEEP LEARNING
-
*K.E.Eswari., MCA., M.Phil.,M.E., P.Sivanandham
:
Click Here
IJCT-V8I2P29
30
ADVERSE MEDICINE REACTION ANALYSIS USING SUPPORT VECTOR MACHINE MODEL
-
C.Mani MCA., M.E., V.Madhan Kumar
:
Click Here
IJCT-V8I2P30
31
Brain tumor detection using machine learning methods
-
Sawan Bhattacharyya,Anushree Chakraborty,Sukanya Das,Shree Mitra
:
Click Here
IJCT-V8I2P31
32
STATISTICAL NEAREST NEIGHBORS FOR IMAGE DENOISING
-
K. E. Eswari., MCA, M.Phil., M.E., V.Gobinath
:
Click Here
IJCT-V8I2P32
33
Smart Attendance Monitoring System Using Facial Recognition
-
P. S. Ezekiel, O. E. Taylor, & F.B. Deedam-Okuchaba
:
Click Here
IJCT-V8I2P33
34
A PROTOTYPE FOR VOICE/APP CONTOLLED ROVER
-
Prof. Smitesh Salian
:
Click Here
IJCT-V8I2P34
35
Role of Internet of Things in Transportation Industry During Covid19 Pandemic
-
Dorothy Bundi, Dismas Kitaria
:
Click Here
IJCT-V8I2P35
36
A Survey on Cloud Security Threats and Solution for Secure Data in Data Stages
-
BL.Nithiasree, BL.Raam Prakash, R.Shenbaga Sundar
:
Click Here
IJCT-V8I2P36
37
Psychological Affects Change Working Scenario of Human During COVID-19
-
Shawni Dutta , Prof. Samir Kumar Bandyopadhyay
:
Click Here
IJCT-V8I2P37
38
Spatial Domain Segmentation Algorithm for Tumour Detection and Wavelet Based Texture Analysis
-
Shawni Dutta , Prof. Samir Kumar Bandyopadhyay
:
Click Here
IJCT-V8I2P38
39
Developing BuJel Application Using Extreme Programming (XP)Methodology
-
Dwi Wulandari Sari, Kurnia Gusti Ayu
:
Click Here
IJCT-V8I2P39
40
Developing KSAM (Kenyang Bersama) Application Using Extreme Programming Methodology
-
Kurnia Gusti Ayu, Dwi Wulandari Sari
:
Click Here
IJCT-V8I2P40
41
Securing Data and Providing Privacy Assurance using Revocation in Distributed Cloud Server
-
C.Surya, S.Banumathi, A.Neelavathi, B.Pooja, R.Manonmani
:
Click Here
IJCT-V8I2P41
42
Sensitive Based Privacy Preserving on Shared Data in Cloud using Reversible Data Hiding with Encryption
-
C.Surya, V.Kalaivani, K.Kaviya, T.Thangamathi
:
Click Here
IJCT-V8I2P42
43
Multiparty NetBanking Security Based on Face Biometrics Using Deep Learning Algorithm
-
A.Sumathi, S.Kalpana, A.Soundharya, R.Ranjitha
:
Click Here
IJCT-V8I2P43
44
Facial Expression Recognition Based on Deep Learning Algorithm for Annotated the Music in Player
-
M.Saravanan, M.Kowsalya, T.Kanimozhi, B.Vaitheeswari, T.Kanmani
:
Click Here
IJCT-V8I2P44
45
Application Of Data Mining To Predict The Graduation Students With K-Nearest Neighbor Algorithm and Learning vector quantization desktop Based On Study Program Information System Faculty Of Technology BUDI LUHUR UNIVERSITY
-
Andri Kusuma Wardana, Indra Darmawan, Ardiane Rossi Kurniawan Maranto
:
Click Here
IJCT-V8I2P45
46
DRIVER EXHAUSTION DETECTION BASED ON FACIAL NODAL POINTS
-
R.Sivabalan, P.Ajaykumar,M.Renganathan, G.Vignesh
:
Click Here
IJCT-V8I2P46
47
Disease Prediction using Machine Learning based on User Symptoms
-
Ananya Ubarhande, Kalpit Vyas, Sahil Sapar, Rutuja Jadhav , Prof. Rupali Waghmode
:
Click Here
IJCT-V8I2P47
Articles are under in peer review process, Please submit your article
Click Here
IJCT Management
Home
Aim & Scope
Indexing
Author instruction
Call for paper
Current Issues
special issue
Review process
Impact factor
Board members
Publication ethics
Copyright Infringement
Join as a Reviewer
FAQ
Downloads
CopyrightForm
Paper Template
IJCT Policy
Terms & Conditions
Cancellation & Refund
Privacy Policy
Shipping &Delivery
Publication Rights
Plagiarism Policy