ISSN 2278-9723
 

. Year: 2018, Volume: 6, Issue: 1

    Technical Note

  1. Computer Technology Applications and the Data Protection Concept
    HRUNYK I.
    . 2018; 6(1): 12-15
    » Abstract » PDF» doi: 10.31838/ijccts/06.01.03

  2. The Current State of Artificial Intelligence (AI) and Implications for Computer Technologies
    ASADOV B.
    . 2018; 6(1): 15-18
    » Abstract » PDF» doi: 10.31838/ijccts/06.01.04

  3. The Use of Computer Technological Simulation for Designing a Cisco Hierarchical Framework at the Hilton Hotel
    ONOPREYCHUK D.
    . 2018; 6(1): 19-22
    » Abstract » PDF» doi: 10.31838/ijccts/06.01.05

  4. An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » PDF» doi: 10.31838/ijccts/06.01.01

  5. A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » PDF» doi: 10.31838/ijccts/06.01.02