| S.No | Articles | Ref. No |
| 1 |
Authorize Client Inspection and Data Dynamics for Secure Storage in Cloud Computing - P Ram Mohan Rao, P Anjusha, N Subba Reddy, S Narasimha Rao |
IJCTT-V41P103 |
| 2 |
Cloud Computing: Privacy, Mobility and Resources Utilization - Tariq Alwada’n, Omar Al-Zitawi, Jalal Omer Atoum |
IJCTT-V41P106 |
| 3 |
Achieving High Quality Tweet Segmentation using the HybridSeg Framework - Dr Ilaiah Kavati, Dayakar P, E. Amarnath Reddy, Vinay Kumar Thumu |
IJCTT-V41P107 |
| 4 |
A Survey on Image Segmentation Using Threshoding Methods -Shubham Arjariya, Dr. Mahesh Motwani, Dr. Shikha Agrawal |
IJCTT-V41P111 |
| 5 |
Digital Watermarked Anaglyph 3D Images Using FrFT - Rakesh Y, Dr.K.Sri Rama Krishna |
IJCTT-V41P113 |
| 6 |
Study and Analysis of Factors Responsible For Failures of Software Project - Prof. Ashvini Shende, Dr.Janardan Pawar |
IJCTT-V41P114 |
| 7 |
Digital Image Watermarking Using Fuzzy Logic and Genetic Algorithm - Arun Kumar R, T.Venkat Narayana Rao |
IJCTT-V41P118 |
| 8 |
Security Metrics and the Risks: An Overview - Rana Khudhair Abbas Ahmed |
IJCTT-V41P119 |