. Year: 2013, Volume: 1, Issue: 2 - Development of Reversible Programmable Gate Array
C.Sivaranjith,M.Subramani PG Scholar, Assistant professor, K.S.R C E
. 2013; 1(2): 72-78
» Abstract » PDF» doi: 10.31838/ijccts/01.02.01
- Enhanced Approach For Handwritten Text Recognition Using Neural Network
Aman Puri Kamlesh Lakhwani
Suresh Gyan Vihar University Jaipur
. 2013; 1(2): 79-82
» Abstract » PDF» doi: 10.31838/ijccts/01.02.02
- GPH Algorithm: Improved CBC improved BIFID cipher Symmetric Key Algorithm
Dinesh Goyal Naveen Hemrajani, Kritika Paliwal Department of Computer Science,Suresh Gyan Vihar University,
. 2013; 1(2): 83-86
» Abstract » PDF» doi: 10.31838/ijccts/01.02.03
- High Speed 3d DWT VlSI Architecture for Image Processing Using Lifting Based Wavelet Transform
Senthilkumar.M Uma.S Assistant Professor PG Student, KSRCE
. 2013; 1(2): 87-91
» Abstract » PDF» doi: 10.31838/ijccts/01.02.04
- Key Hiding of Multimedia Applications in Multimedia File
Vishal Kumar Gupta, Mohammad Shoeb Computer science & Engineering, Institute of Technology & Management
. 2013; 1(2): 92-95
» Abstract » PDF» doi: 10.31838/ijccts/01.02.05
- MINIMIZING DELAY AND MAXIMIZING LIFETIME FOR WIRELESS SENSOR NETWORKS WITH ANYCAST
Abhay Raman, Ankit Kr. Singh, Abhishek Rai
Institute of Technology & Management
. 2013; 1(2): 96-99
» Abstract » PDF» doi: 10.31838/ijccts/01.02.06
- Particle Swarm Optimization for Solving Economic Load Dispatch Problem
Priyanka Sinha Gyan Vihar School of Engineering and Technology
. 2013; 1(2): 100-105
» Abstract » PDF» doi: 10.31838/ijccts/01.02.07
- RECITAL INVESTIGATION OF IPv4 AND IPv6 USING WIRED NETWORKS IN OMNET++
Pallavi Gupta Savita Shiwani Computer Science Department Suresh Gyan Vihar University India
. 2013; 1(2): 106-110
» Abstract » PDF» doi: 10.31838/ijccts/01.02.08
- Secure Data Transmission In AODV Routing Protocol
Kartik Kumar Srivastava, Avinash Tripathi, Anjnesh Kumar Tiwari
. 2013; 1(2): 111-113
» Abstract » PDF» doi: 10.31838/ijccts/01.02.09
- Security of PHR in Cloud Computing by Using Several Attribute Based Encryption Techniques
Neetha Xavier, V.Chandrasekar
. 2013; 1(2): 114-118
» Abstract » PDF» doi: 10.31838/ijccts/01.02.10
- The Security in Private Cloud Computing
Abhinava Kumar Srivastava , Divya Kant Yadav,Sandeep Kumar Pandey
. 2013; 1(2): 119-129
» Abstract » PDF» doi: 10.31838/ijccts/01.02.11
- Using encryption Algorithms to enhance the Data Security in Cloud Computing
MANDEEP KAUR MANISH MAHAJAN
. 2013; 1(2): 130-133
» Abstract » PDF» doi: 10.31838/ijccts/01.02.12
- VEBEK-Working & Functionalities
Aditya Shukla, Anurag Pandey, Saurabh Srivastava
. 2013; 1(2): 134-142
» Abstract » PDF» doi: 10.31838/ijccts/01.02.13