ijccts
ijccts
communication and computer technologies
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Leach and its descendant protocols: A survey
J Gnanambigai, DN Rengarajan, K Anbukkarasi
International Journal of Communication and Computer Technologies 1 (3), 15-21, 2012
1002012
An overview: Peak to average power ratio in OFDM system & its effect
A Gangwar, M Bhardwaj
International Journal of Communication and Computer Technologies 1 (2), 22-25, 2012
932012
Predicting the number of blood donors through their age and blood group by using data mining tool
A Sharma, PC Gupta
International Journal of communication and computer Technologies 1 (6), 6-10, 2012
522012
Using encryption algorithms to enhance the data security in cloud computing
M Kaur, M Mahajan
International Journal of Communication 1 (02), 130, 2013
502013
Mobile-id Based Sybil Attack detection on the Mobile ADHOC Network
P Kavitha, C Keerthana, V Niroja, V Vivekanandhan
International Journal of communication and computer Technologies 2 (02), 2014
212014
A reliable ATM protocol and comparative analysis on various parameters with other ATM protocols
AA Duvey, D Goyal, DN Hemrajani
International Journal of Communication and Computer Technologies 1 (56), 192-197, 2013
142013
A crypt analysis of the tiny encryption algorithm in key generation
M Shoeb, VK Gupta
International Journal of Communication and Computer Technologies 1 (38), 2013
132013
A study on cryptographic methods in cloud storage
S Rajasudhan, R Nallusamy
International Journal of Communication and Computer Technologies 2 (01), 2014
102014
Image encryption using chaotic maps in hybrid domain
S Ramahrishnan, B Elakkiya, R Geetha, P Vasuki, S Mahalingam
International Journal of Communication and Computer Technologies 2 (5), 44-48, 2014
92014
Automatic street light control system using wsn based on vehicle movement and atmospheric condition
V Sakthi Priya, MM Vijayan, V Sakthi Priya
International Journal of Communication and Computer Technologies 5 (1), 06-11, 2017
82017
Electronic voting machine using internet
M Santhosh, S Kavitha, R Keerthana, L Suganya, S Krishnakumar
InternationalCommunication and computer Technologies, 2016
72016
Sentence level text clustering using a hierarchical fuzzy relational clustering algorithm
V Abinaya, M Vennila, N Padmanabhan
Proc. of International Journal of Communication and Computer Technologies 2 (10), 2014
72014
Advance virus detection using combined techniques of pattern matching and dynamic instruction sequences
J Nandhini, M Nithya, S Prabhakaran
International Journal of Communication and Computer Technologies 1 (45), 156-161, 2013
72013
Web log data cleaning for enhancing mining process
V Chitraa, DAS Thanamani
vol 1, 7, 2012
72012
Dynamic smart alert service for women safety system
M Pradeep, RASS Anandhi, S Soundarya
International Journal of Communication and Computer Technologies 5 (2), 58-66, 2017
62017
A Compact Design of Multiband Microstrip Patch Antenna for GSM, Bluetooth and WiMAX Applications
S Atchaya, N Dhanalakshmi, R Veeramani
International Journal of Communication and Computer Technologies 2 (1), 1-4, 2014
62014
Secure Data Transmission In AODV Routing Protocol
KK Srivastava, A Tripathi, AK Tiwari
International Journal of Communication and Computer Technologies 1 (2), 111-113, 2013
62013
An android application for exhibiting Statistical chronicle information
KG S.Monisha, M.Monisha, P. Deepa, R. Sathya
International Journal of communication and computer Technologies 7 (1), 7-9, 2019
52019
Improvement of power quality using PQ Theory based series hybrid active power filter
K Sundararaju, P Sukumar
International Journal of Communication and Computer Technologies 4 (2), 4007 …, 2016
52016
Search Accuracy in Web information Retrieval
T Gupta, A Sharma
International Journal of Communication and Computer Technologies, 2 (2), 98 105, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20