•  
  •  
 

International Journal of Computer and Communication Technology

Volume 7, Issue 3 (2016)

Articles

PDF

ANALYSIS OF KNOWLEDGE SHARING PRACTICES IN DISTRIBUTED AGILE ENVIRONMENT
NISHA GUPTA and JAGPUNEET KAUR BAJWA
DOI: 10.47893/IJCCT.2016.1357

PDF

APPLICATION AND SIMULATION OF ROUTE OPTIMIZATION IN MOBILE IP
GEETHANJALI. N, BRINDHA. G, DEENU MOL.A, and SINDHU. M
DOI: 10.47893/IJCCT.2016.1358

PDF

DIGITISED HUMAN LIFE FORM ISOMORPHIC ALGORITHM
T. MOHANAN, V. MOHANATHAN, D. JEEVANANDHAM, and I. SARAVANAN
DOI: 10.47893/IJCCT.2016.1359

PDF

EASYC -AN INTERACTIVE TEXT EDITOR FOR C
SURIYA PRAKASH.S, MOHANA. E, MEGALA .S, and SAKTHI BAALAJI.T
DOI: 10.47893/IJCCT.2016.1360

PDF

EYEGAZE COMMUNICATION SYSTEM
SHASHANK MADHAV, GAURAV CHIPTE, and PRANOTI GADDAMWAR
DOI: 10.47893/IJCCT.2016.1361

PDF

RADIO ACCESS NETWORK REQUIREMENT FOR NEW DEPLOYMENT OF WIMAX IN DHAKA
Tawhid Kawser, MOHAMMED R. AL-AMIN, KHONDOKER Z. ISLAM, and SIFAT-E- MOHAMMAD
DOI: 10.47893/IJCCT.2016.1362

PDF

A SURVEY ON MOBILE AGENT ITINERARY PLANNING IN WIRELESS SENSOR NETWORKS
LINGARAJ. K and ARADHANA. D
DOI: 10.47893/IJCCT.2016.1363

PDF

DYNAMIC JOB SCHEDULING IN GRID COMPUTING
JANI KUNTESH KETAN and ARPITA SHAH
DOI: 10.47893/IJCCT.2016.1364

PDF

STUDY ON IMPROVEMENT IN RSA ALGORITHM AND ITS IMPLEMENTATION
P. SAVEETHA and S. ARUMUGAM
DOI: 10.47893/IJCCT.2016.1365

PDF

VULNERABILITY ASSESSMENT AND PENETRATION TESTING
SACHIN UMRAO, MANDEEP KAUR, and GOVIND KUMAR GUPTA
DOI: 10.47893/IJCCT.2016.1367

PDF

MODELING OF BRAIN, MIND USING COMPUTER SIMULATION
VAISHALI GORE
DOI: 10.47893/IJCCT.2016.1368

PDF

SURVEY OF BOTNETS AND DETECTION TOOLS
VIVEK ARYA and ASHISH CHAUHAN
DOI: 10.47893/IJCCT.2016.1369

PDF

MATHEMATICAL MODEL OF INFORMATION AND A NEW APPROACH OF CODING IN IT
S. K. PARHI and L. DAS
DOI: 10.47893/IJCCT.2016.1371

PDF

FRAMEWORK FOR IMPLEMENTING KNOWLEDGE MANAGEMENT IN ENGINEERING INSTITUTE
NARENDRA U P and PRADEEP B S
DOI: 10.47893/IJCCT.2016.1372

IJCCT Cover Art