ISSN 2278-9723
 

. Year: 2013, Volume: 1, Issue: 2

  1. Development of Reversible Programmable Gate Array
    C.Sivaranjith,M.Subramani PG Scholar, Assistant professor, K.S.R C E
    . 2013; 1(2): 72-78
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.01

  2. Enhanced Approach For Handwritten Text Recognition Using Neural Network
    Aman Puri Kamlesh Lakhwani Suresh Gyan Vihar University Jaipur
    . 2013; 1(2): 79-82
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.02

  3. GPH Algorithm: Improved CBC improved BIFID cipher Symmetric Key Algorithm
    Dinesh Goyal Naveen Hemrajani, Kritika Paliwal Department of Computer Science,Suresh Gyan Vihar University,
    . 2013; 1(2): 83-86
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.03

  4. High Speed 3d DWT VlSI Architecture for Image Processing Using Lifting Based Wavelet Transform
    Senthilkumar.M Uma.S Assistant Professor PG Student, KSRCE
    . 2013; 1(2): 87-91
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.04

  5. Key Hiding of Multimedia Applications in Multimedia File
    Vishal Kumar Gupta, Mohammad Shoeb Computer science & Engineering, Institute of Technology & Management
    . 2013; 1(2): 92-95
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.05

  6. MINIMIZING DELAY AND MAXIMIZING LIFETIME FOR WIRELESS SENSOR NETWORKS WITH ANYCAST
    Abhay Raman, Ankit Kr. Singh, Abhishek Rai Institute of Technology & Management
    . 2013; 1(2): 96-99
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.06

  7. Particle Swarm Optimization for Solving Economic Load Dispatch Problem
    Priyanka Sinha Gyan Vihar School of Engineering and Technology
    . 2013; 1(2): 100-105
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.07

  8. RECITAL INVESTIGATION OF IPv4 AND IPv6 USING WIRED NETWORKS IN OMNET++
    Pallavi Gupta Savita Shiwani Computer Science Department Suresh Gyan Vihar University India
    . 2013; 1(2): 106-110
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.08

  9. Secure Data Transmission In AODV Routing Protocol
    Kartik Kumar Srivastava, Avinash Tripathi, Anjnesh Kumar Tiwari
    . 2013; 1(2): 111-113
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.09

  10. Security of PHR in Cloud Computing by Using Several Attribute Based Encryption Techniques
    Neetha Xavier, V.Chandrasekar
    . 2013; 1(2): 114-118
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.10

  11. The Security in Private Cloud Computing
    Abhinava Kumar Srivastava , Divya Kant Yadav,Sandeep Kumar Pandey
    . 2013; 1(2): 119-129
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.11

  12. Using encryption Algorithms to enhance the Data Security in Cloud Computing
    MANDEEP KAUR MANISH MAHAJAN
    . 2013; 1(2): 130-133
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.12

  13. VEBEK-Working & Functionalities
    Aditya Shukla, Anurag Pandey, Saurabh Srivastava
    . 2013; 1(2): 134-142
    » Abstract » PDF» doi: 10.31838/ijccts/01.02.13



Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles