ISSN 2278-9723
 

. Year: 2019, Volume: 7, Issue: 2

    Technical Note

  1. SECURITY THREATS AND AUTHENTICATION APPROACHES IN WIRELESS SENSOR NETWORKS
    R.SUDHAKAR, RAJAKUMARI.J, POORNIMA.S, RAMYA.V
    . 2019; 7(2): 1-3
    » Abstract » PDF» doi: 10.31838/ijccts/07.02.01

  2. Case Report

  3. BLOCKCHAIN BASED UNFORGED LICENSE
    J.KIRUTHIKA, V.POOVIZHI, P.KIRUTHIKA, E.MADURA.M.E, P.NARMATHA
    . 2019; 7(2): 4-7
    » Abstract » PDF» doi: 10.31838/ijccts/07.02.02

  4. Technical Note

  5. EMBEDDED ASSISTIVE STICK FOR VISUALLY IMPAIRED PEOPLE
    Dr.K.SRINIVASAN, R. DENICASHELUS, B.DEEBIKAA, S.HARIRAM2
    . 2019; 7(2): 8-12
    » Abstract » PDF» doi: 10.31838/ijccts/07.02.03

  6. Quantum-Dot Cellular Automata based Public Key Cryptography
    Dr. M SANTHI, NANDA KUMAR, G.UDHAYA KUMAR, S.MOHANDOSS, R.VENKATASUBRAMANIYAN
    . 2019; 7(2): 13-18
    » Abstract » PDF» doi: 10.31838/ijccts/07.02.04

  7. ROPE CLIMBING BOT
    R.DEVI, S.RAJAMEENAKSHI, S.VIGNESH, M.MUKESH RAJ
    . 2019; 7(2): 19-21
    » Abstract » PDF» doi: 10.31838/ijccts/07.02.05

  8. Case Report

  9. WEB BASED ONLINE MACHINE CONTROLLING AND MONITORING USING PLC VIA MODBUS COMMUNICATION
    KARTHIK. R, MIRUTHULA. A, NITHEESWARI. N
    . 2019; 7(2): 22-26
    » Abstract » PDF» doi: 10.31838/ijccts/07.02.06

  10. DRUG INVENTORY INFORMATION SYSTEM IN ASY-SYIFAA YUKUM JAYA ISLAMIC HOSPITAL
    NUNGSYIATI, NURZAMAN, TRI SUSILOWATI, ARIF DIAN WAHYUDI
    . 2019; 7(2): 27-31
    » Abstract » PDF» doi: 10.31838/ijccts/07.02.07



Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles