
UI/UX design and Front-end dev – NaviSensei
Connecting passionate instructors with aspiring learners KURVA JEEVAN KUMAR1, MULLANGI SANKETHAN REDDY2, YAMINI CHOUHAN3, DHANAVATH…
ALCOHOL SENSING AND ENGINE LOCKING SYSTEM
PANTHAM ABHINANDANA1, PENDRAM SHIRISHA2, FAROOQHUSSAIN MOHAMMAD3, DANGETI MANOJ4, KARRU SRIHITHA5 1Dept. of Computer Science &…
IOT BASED FISH FEEDER SYSTEM
K. PRIYADARSHINI1, B. THARUN2, MR FAROOQ HUSSAIN MOHAMMAD3, K. ANJI4, V. NEELIMA5 1Dept. of Computer…
IOT – BASED SUICIDE PREVENTION SYSTEM (FOR HOSTELS)
VULLENGALA RAJ KUMAR1, DAMERA SHIVA PRASAD2, MOUNIKA3, NARLAPURAM SRAVAN KUMAR4, YAYA AVANTHI5 1Dept. of Computer…
An Enhanced Bandwidth Utilization Framework for Internet of Things (IoT) Network Infrastructure
Victoria Welekwe1, Matthias Daniel2, V.T. Emmah3 1Department of Computer Science, Rivers State University, Port Harcourt,…
Urbanization and Mental Health: Rethinking Public Spaces to Support Well-being
Bianca Egbosimba1 1Department of Public Health, Missouri State University, Springfield, Missouri, 65897, United States of…
Evolving Legal Frameworks of Corporate Social Responsibility in Southeast Asia
IJCT - International Journal of Computer Techniques Authors: Prajwal Bhattarai, Academic Activist | Leadership Coach…
Unified Security Management Tools Required for Centralize Control and Management of Security Policies Across Multi-cloud Platform
Unified Security Management Tools for Multi-cloud Platform | IJCT Journal | Low Publication Fees |…
Autonomous Vehicle Control, Part XII: Quadrotor UAV Altitude Control using I-PD, PI-D and 2DOF Controllers compared with a PID Controller
Autonomous Vehicle Control, Part XII: Quadrotor UAV Altitude Control Autonomous Vehicle Control, Part XII: Quadrotor…
Cybersecurity in the Age of Cloud Computing: Threats, Challenges, and Mitigation Strategies
Cybersecurity in Cloud Computing: Threats, Challenges, and Mitigation Strategies | IJCT Journal | Low Publication…

