ISSN 2278-9723
 

- 


ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran.

Abstract
Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no longer provide enough protection. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus. The goal is to provide a systematic virus detection software solution for network security for computer systems. Instead of placing entire matching patterns on a chip, our solution is based on an antivirus processor that works as much of the filtering information as possible onto a reference memory. The infrequently accessing off-reference data to make the matching mechanism scalable to large pattern sets. In the first stage, the filtering engine can filter out more than 93.1% of data as safe, using a merged shift table. Only 6.9% or less of potentially unsafe data must be precisely checked in the second stage by the exact-matching engine from off-reference memory. In addition to that Dual port BITCAM processing program is used along with the Exact Matching Engine and Bloom Filter process. This Dual port BITCAM processes next to the exact matching engine and bloom filter process. This Dual port BITCAM process is placed exclusively for obtaining higher throughput. To reduce the memory gap and to improve the performance, we also propose three algorithms are used: 1) a skipping algorithm; 2) a cache method; and 3) a prefetching mechanism.

Key words: - Algorithmic Attacks Embedded System, Memory Gap, Network Security, and Virus Detection.


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran
on Google
on Google Scholar
Article Statistics
 Viewed: 1937
Downloaded: 81


How to Cite this Article
Pubmed Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. . 2012; 1(1): 39-44. doi:10.31838/ijccts/01.01.06


Web Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. http://www.ijccts.org/?mno=302643839 [Access: February 16, 2020]. doi:10.31838/ijccts/01.01.06


AMA (American Medical Association) Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. . 2012; 1(1): 39-44. doi:10.31838/ijccts/01.01.06



Vancouver/ICMJE Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. . (2012), [cited February 16, 2020]; 1(1): 39-44. doi:10.31838/ijccts/01.01.06



Harvard Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran (2012) ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. , 1 (1), 39-44. doi:10.31838/ijccts/01.01.06



Turabian Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. 2012. ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. International Journal of Communication and Computer Technologies, 1 (1), 39-44. doi:10.31838/ijccts/01.01.06



Chicago Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. "ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES." International Journal of Communication and Computer Technologies 1 (2012), 39-44. doi:10.31838/ijccts/01.01.06



MLA (The Modern Language Association) Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran. "ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES." International Journal of Communication and Computer Technologies 1.1 (2012), 39-44. Print. doi:10.31838/ijccts/01.01.06



APA (American Psychological Association) Style

J.Nandhini Dr.M. Nithya Dr.S.Prabhakaran (2012) ADVANCE VIRUS DETECTION USING COMBINED TECHNIQUES OF PATTERN MATCHING AND DYNAMIC INSTRUCTION SEQUENCES. International Journal of Communication and Computer Technologies, 1 (1), 39-44. doi:10.31838/ijccts/01.01.06





Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    Nicolo
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Nicolo
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Nicolo
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Nicolo
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Nicolo
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Nicolo
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    Nicolo
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    Nicolo
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    Nicolo
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    Nicolo
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • AUTOMATIC STREET LIGHT CONTROL SYSTEM USING WSN BASED ON VEHICLE MOVEMENT AND ATMOSPHERIC CONDITION
    Sakthi Priya V, Mr.M.Vijayan V.Sakthi Priya,PG Scholar,Master of Engineering in Applied Electronics,Velalar College of Engineering and Technology,Thindal, Erode, India
    . 2017; 5(1): 06-11
    » Abstract » doi: 10.31838/ijccts/05.01.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • AUTOMATIC STREET LIGHT CONTROL SYSTEM USING WSN BASED ON VEHICLE MOVEMENT AND ATMOSPHERIC CONDITION
    Sakthi Priya V, Mr.M.Vijayan V.Sakthi Priya,PG Scholar,Master of Engineering in Applied Electronics,Velalar College of Engineering and Technology,Thindal, Erode, India
    . 2017; 5(1): 06-11
    » Abstract » doi: 10.31838/ijccts/05.01.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • AUTOMATIC STREET LIGHT CONTROL SYSTEM USING WSN BASED ON VEHICLE MOVEMENT AND ATMOSPHERIC CONDITION
    Sakthi Priya V, Mr.M.Vijayan V.Sakthi Priya,PG Scholar,Master of Engineering in Applied Electronics,Velalar College of Engineering and Technology,Thindal, Erode, India
    . 2017; 5(1): 06-11
    » Abstract » doi: 10.31838/ijccts/05.01.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • AUTOMATIC STREET LIGHT CONTROL SYSTEM USING WSN BASED ON VEHICLE MOVEMENT AND ATMOSPHERIC CONDITION
    Sakthi Priya V, Mr.M.Vijayan V.Sakthi Priya,PG Scholar,Master of Engineering in Applied Electronics,Velalar College of Engineering and Technology,Thindal, Erode, India
    . 2017; 5(1): 06-11
    » Abstract » doi: 10.31838/ijccts/05.01.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Nicolo
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    Nicolo
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Nicolo
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Nicolo
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    Nicolo
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Nicolo
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Nicolo
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    Nicolo
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    Nicolo
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    Nicolo
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Optimal Power Allocation for Regenerative Relay over α- Fading Channel
    Dharmraj Himanshu Katiyar
    . 2014; 2(2): 128-134
    » Abstract » doi: 10.31838/ijccts/02.02.10

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Most Cited Articles