Follow
ijccts
ijccts
communication and computer technologies
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Leach and its descendant protocols: A survey
J Gnanambigai, DN Rengarajan, K Anbukkarasi
International Journal of Communication and Computer Technologies 1 (3), 15-21, 2012
1332012
An overview: Peak to average power ratio in OFDM system & its effect
A Gangwar, M Bhardwaj
International Journal of Communication and Computer Technologies 1 (2), 22-25, 2012
1222012
Predicting the number of blood donors through their age and blood group by using data mining tool
A Sharma, PC Gupta
International Journal of communication and computer Technologies 1 (6), 6-10, 2012
632012
Using encryption algorithms to enhance the data security in cloud computing
M Kaur, M Mahajan
International Journal of Communication 1 (02), 130, 2013
532013
Mobile-id based sybil attack detection on the mobile adhoc network
P Kavitha, C Keerthana, V Niroja, V Vivekanandhan
International Journal of communication and computer Technologies 2 (02), 2014
252014
A crypt analysis of the tiny encryption algorithm in key generation
M Shoeb, VK Gupta
International Journal of communication and computer Technologies 1 (1), 9-14, 2012
182012
Automatic street light control system using wsn based on vehicle movement and atmospheric condition
M Vijayan
International Journal of communication and computer Technologies 5 (1), 6-11, 2017
172017
A reliable ATM protocol and comparative analysis on various parameters with other ATM protocols
AA Duvey, D Goyal, N Hemrajani
International Journal of Communication and Computer Technologies 1 (1), 28-33, 2012
162012
Image encryption using chaotic maps in hybrid domain
S Ramahrishnan, BER Geetha
International Journal of Communication and Computer Technologies 2 (2), 74-74, 2019
112019
Electronic voting machine using internet
M Santhosh, S Kavitha, R Keerthana, L Suganya, S Krishnakumar
International Journal of communication and computer Technologies 4 (2), 72-75, 2016
112016
Faq-Mast TCP for Secure Download
C Ananth, SE Rajavel, I AnnaDurai, A Mydeen, C Sudalai, MR Kingston
International Journal of Communication and Computer Technologies (IJCCTS) 2 …, 2014
112014
A study on cryptographic methods in cloud storage
S Rajasudhan, R Nallusamy
International Journal of Communication and Computer Technologies 2 (01), 2014
102014
An android application for exhibiting Statistical chronicle information
KG S.Monisha, M.Monisha, P. Deepa, R. Sathya
International Journal of communication and computer Technologies 7 (1), 7-9, 2019
92019
Secure Data Transmission In AODV Routing Protocol
KK Srivastava, A Tripathi, AK Tiwari
International Journal of communication and computer Technologies 1 (2), 111-113, 2013
82013
Web log data cleaning for enhancing mining process
V Chitraa, DAS Thanamani
vol 1, 7, 2012
82012
Integrated platform and response system For healthcare using Alexa
SKMK V. Sakthive, Mr. P.V.Kesaven, J.Martin William
International Journal of communication and computer Technologies 7 (1), 14-22, 2019
72019
Efficient Cluster Based Congestion Control in Wireless Mesh Network
R Suba, R Satheeskumar
International Journal of Communication and Computer Technologies 4 (2), 96-101, 2016
72016
Sentence level text clustering using a hierarchical fuzzy relational clustering algorithm
V Abinaya, M Vennila, N Padmanabhan
Proc. of International Journal of Communication and Computer Technologies 2 (10), 2014
72014
Advance virus detection using combined techniques of pattern matching and dynamic instruction sequences
J Nandhini, M Nithya, S Prabhakaran
International Journal of communication and computer Technologies 1 (1), 39-44, 2012
72012
Dynamic smart alert service for women safety system
M Pradeep, R Abinya, SS Anandhi, S Soundarya
International Journal of communication and computer Technologies 5 (2), 58-66, 2017
62017
The system can't perform the operation now. Try again later.
Articles 1–20