S.No Articles Ref. No
 1

An Advanced Image Encryption Method Based on Fuzzy Transform in Two Variables and Edge Detection

- Pankaj Sambyal, Vivek Sambyal

 IJCTT-V31P101
 2

A Simple Taxonomy of Multilayer Networks

- Andrey A. Shchurov, Radek Ma?ík

 IJCTT-V31P105
 3

ID-Based Directed Multi Proxy Chameleon Signature Scheme with Bilinear Pairing

- Tejeshwari Thakurh

 IJCTT-V31P107
 5

The State of the Art on Educational Data Mining in Higher Education

- Mohamed Osman Hegazi, Mazahir Abdelrhman Abugroon

 IJCTT-V31P109
 6

A survey of Commit Protocols in Distributed Real Time database systems

- Fadia A. Elbagir, Ahmed Khalid, Khalid Khanfar

 IJCTT-V31P111
 7

Smartphone-based 3D Orientation Estimation for Virtually any Published PC Game

-Anas Fattouh

 IJCTT-V31P113
 8

Mining Software Quality from Software Reviews: Research Trends and Open Issues

- Issa Atoum, Ahmed Otoom

 IJCTT-V31P114