ijccts
ijccts
communication and computer technologies
Verified email at ieee.org - Homepage
TitleCited byYear
An overview: Peak to average power ratio in OFDM system & its effect
A Gangwar, M Bhardwaj
International Journal of Communication and Computer Technologies 1 (2), 22-25, 2012
712012
Leach and its descendant protocols: a survey
J Gnanambigai, N Rengarajan, K Anbukkarasi
International Journal of Communication and Computer Technologies 1 (3), 15-21, 2012
692012
Using encryption algorithms to enhance the data security in cloud computing
M Kaur, M Mahajan
International journal of communication and computer technologies 1 (12), 56-59, 2013
352013
Predicting the number of blood donors through their age and blood group by using data mining tool
A Sharma, PC Gupta
International Journal of communication and computer Technologies 1 (6), 6-10, 2012
322012
Mobile-id Based Sybil Attack detection on the Mobile ADHOC Network
P Kavitha, C Keerthana, V Niroja, V Vivekanandhan
International Journal of communication and computer Technologies 2 (02), 2014
172014
A crypt analysis of the tiny encryption algorithm in key generation
M Shoeb, VK Gupta
International Journal of Communication and Computer Technologies 1 (38), 2013
102013
A reliable ATM protocol and comparative analysis on various parameters with other ATM protocols
AA Duvey, D Goyal, DN Hemrajani
International Journal of Communication and Computer Technologies 1 (56), 192-197, 2013
102013
Image encryption using chaotic maps in hybrid domain
S Ramahrishnan, B Elakkiya, R Geetha, P Vasuki, S Mahalingam
International Journal of Communication and Computer Technologies 2 (5), 44-48, 2014
82014
A study on cryptographic methods in cloud storage
S Rajasudhan, R Nallusamy
International Journal of Communication and Computer Technologies 2 (01), 2014
72014
Web log data cleaning for enhancing mining process
V Chitraa, DAS Thanamani
International Journal of Communication and Computer Technologies 1 (11), 2012
62012
A Compact Design of Multiband Microstrip Patch Antenna for GSM, Bluetooth and WiMAX Applications
S Atchaya, N Dhanalakshmi, R Veeramani
International Journal of Communication and Computer Technologies 2 (1), 1-4, 2014
52014
Electronic voting machine using internet
M Santhosh, S Kavitha, R Keerthana, L Suganya, S Krishnakumar
InternationalCommunication and computer Technologies, 2016
42016
Secure Data Transmission In AODV Routing Protocol
KK Srivastava, A Tripathi, AK Tiwari
International Journal of Communication and Computer Technologies 1 (04), 2013
42013
A research study on packet sniffing tool TCPDUMP
A Gupta
International Journal of Communication and Computer Technologies 1 (49), 172-174, 2013
42013
Advance virus detection using combined techniques of pattern matching and dynamic instruction sequences
J Nandhini, DM Nithya, DS Prabhakaran
International Journal of Communication and Computer Technologies 1 (45), 156-161, 2013
42013
Improvement of power quality using PQ Theory based series hybrid active power filter
K Sundararaju, P Sukumar
International journal of communication and computer technologies. 4 (2 …, 2016
32016
Sentence Level Text Clustering using a Hierarchical Fuzzy Relational Clustering Algorithm
V Abinaya, M Vennila, N Padmanabhan
International Journal of Communication and Computer Technologies, 02 2 (02 …, 2014
32014
Particle swarm optimization for solving economic load dispatch problem
P Sinha
Int J Commun Comput Technol 1, 63, 2013
32013
Energy efficient deployment of mobile node in wireless Sensor networks ‘
C Sivaranjani, A Surendar, TC Sakthevel
International Journal of Communication and Computer Technologies 1 (20), 75-78, 2013
32013
Automatic street light control system using wsn based on vehicle movement and atmospheric condition
VS Priya, M Vijayan
International Journal of Communication and Computer Technologies 5 (2), 10-17, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20