ISSN 2278-9723
 

. Year: 2020, Volume: 8, Issue: 1

    Technical Note

  1. Workstation Cluster’s Hadoop Distributed File System Simulation and Modeling
    IBRAHIM R
    . 2020; 8(1): 1-4
    » Abstract » PDF» doi: 10.31838/ijccts/08.01.01

  2. The Use of Deep Data Locality towards a Hadoop Performance Analysis Framework
    WICKRAMASINGHE.K
    . 2020; 8(1): 5-8
    » Abstract » PDF» doi: 10.31838/ijccts/08.01.02

  3. VANET Communication Range Degradation: An Experimental Study on the Ole of Interference 2.0
    VISHEGUROV S. K
    . 2020; 8(1): 9-12
    » Abstract » PDF» doi: 10.31838/ijccts/08.01.03

  4. Examining DoD’s Implementation of FITARA and the Implication for IT-Based Defense Systems: A U.S. Case Study
    MURODOV S.S.
    . 2020; 8(1): 13-16
    » Abstract » PDF» doi: 10.31838/ijccts/08.01.04

  5. Data-Driven Decision-Making and Its Effectiveness in Computer Technology-Led Operations: A Case Analysis
    GALEEV R.R.
    . 2020; 8(1): 17-20
    » Abstract » PDF» doi: 10.31838/ijccts/08.01.05

  6. Evaluating the Efficacy of Using Computerized Shifting Information Systems (NCSIS) in organizations – Towards Effective and Computer Technology-Based Administration
    BAROS D.K.
    . 2020; 8(1): 21-24
    » Abstract » PDF» doi: 10.31838/ijccts/08.01.06



Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles