Title and Authors Name |
---|
Identifying spammers and fake users identification in online social networking sites Shaik Mobina Int. J. Commun. Inf. Technol., 2020; 1(2): 01-05 |
An approach to creating wireless network interface amongst IPv4, IPv6 and dual stack networks Dipti Chauhan, Jay Kumar Jain, Anshu Shrivastava Int. J. Commun. Inf. Technol., 2020; 1(2): 06-10 |
A novel survey on green computing Jay Kumar Jain, Chandrapal Singh Dangi Int. J. Commun. Inf. Technol., 2020; 1(2): 11-14 |
Natural language processing: A literature survey Amit Shrivastava, Jay Kumar Jain Int. J. Commun. Inf. Technol., 2020; 1(2): 15-20 |
Evolution of industrial IoT & Its future aspects Jayant Shukla, Neeti Shukla, Jay Kumar Jain Int. J. Commun. Inf. Technol., 2020; 1(2): 21-23 |
Crop yield prediction for formers using random forest approach Punith Sai V Int. J. Commun. Inf. Technol., 2020; 1(2): 24-27 |
Identification of phishing websites using ML techniques Sirisha Derangula Int. J. Commun. Inf. Technol., 2020; 1(2): 28-32 |
Identifying glaucoma fundus images using image processing Sai Sravanthi Kammala Int. J. Commun. Inf. Technol., 2020; 1(2): 33-36 |
Machine learning for product sales forecasting Swetha Ravuru Int. J. Commun. Inf. Technol., 2020; 1(2): 37-40 |
Using machine learning algorithm for loan providing to house Reddi Babusamikeri Int. J. Commun. Inf. Technol., 2020; 1(2): 41-45 |
Information technology to manage the COVID-19 Pandemic: Expansion of a technical structure based on practical experience in Kashmir Dr. Khair ul Nisa and Shah Nawaz Ayoub Int. J. Commun. Inf. Technol., 2020; 1(2): 46-51 |