IJCAT - International Journal of Computing and Technology

Latest Volume 1, Issue 2 research articles from IJCAT Journal published on 31st March 2014

www.IJCAT.org

March 2014 Volume 1, Issue 2
  
 Implementing Deletion Recovery on Android
 
Akhil C JoyArjun VMithun KShebix Xavier
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages01-07
  
  
 Secure Sharing of Data over Cloud Computing using Different Encryption Schemes An Overview
 
Raseena MHarikrishnan G R
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages08-11
  
  
 Securing Images using Encryption Techniques A Survey
 
Vrinda AMr. Arun Anoop M
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages12-16
  
  
 Clustering Methods of Web Pages: A Survey
 
Aliya EdathadathilSyed Farook.K
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages17-20
  
  
 Location Update Schemes in Mobile Ad Hoc Networks
 
Aqeela S UmmerSreekanth E S
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages21-23
  
  
 Relative Study on Malayalam-English Translation using Transfer Based Approach
 
Shahana.I.LSharafudheen.K.A
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages24-29
  
  
 Parallel Workload Scheduling in Cloud: A Survey
 
Shahabanath K KSreekesh Namboodiri T
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages30-33
  
  
 Study on Security Breaches in Php Applications
 
Santosh Naidu PAmulya Patcha
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages34-38
  
  
 A Survey on Trust Management in Peer to Peer Systems
 
Manju JohnGovindaraj.E
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages39-42
  
  
 DDoS: Attack Analysis and Countermeasures
 
Sujina mol M SAneesh M Haneef
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages43-46
  
  
 Cement Mill Feeder Control System
 
Mr.Ratnan PJithin JoseMohammed Rafi K.TYoosaf Nisar K
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages47-52
  
  
 Self-Improved ODMP Protocol (ODMP-E)
 
Mr.Prashant B KumbharkarDr. T R Sontakke
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages53-58
  
  
 Securing Websites through Multi-CAPTCHA
 
Mr. Shaik Muhammed ManzoorMrs. Kumari R Soumya
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages59-62
  
  
 A New Topology for Power Quality Improvement for Hybrid Wind, Solar and Diesel Generator Energy System using D-STATCOM
 
Umamaheswari.SVigayaGowri.G
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages63-71
  
  
 Modelling and Simulation of Pressure Sensitivity of Bragg Grating Sensor for Structural Health Monitoring Application
 
Bilkish MondalDr. Preeta SharanZakir Hussain
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages73-77
  
  
 Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect
 
Aumreesh SaxenaSourabh Singh
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages78-82
  
  
 User Deadline Based Job Scheduling in Grid Computing
 
S.Gokul DevR.Lalith Kumar
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages83-90
  
  
 Two Ways Security on Cloud Computing using Cryptography and Intrusion Detection: A Review
 
Tony Durgadas JagyasiTony Durgadas Jagyasi
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages91-93
  
  
 Modeling of Sigma-Delta Modulator Non- Idealities with Two Step Quantization in MATLAB/SIMULINK
 
Shashant JaykarKuldeep PandeAtish PeshattiwarAbhinav Parkhi
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages94-99
  
  
 A Distributed Method to Protect Disruption Tolerant Networks from the Effects of Packet Overflow
 
Shwetha T JResmi S
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages100-105
  
  
 Electronic Toll Collection System for Efficient Traffic Control System using ANPR
 
Dr.M.GomathiV.Megala
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages106-113
  
  
 Energy Economization using Multimedia Cloud Computing
 
Swati TiwariPraveen Sen
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages114-116
  
  
 Fuzzy Logic Based Control of Wind Turbine Driven Squirrel Cage Induction Generator Connected to Grid

Comments

  1. http://ijcat.org/IJCAT-2014/1-2/Securing-Images-using-Encryption-Techniques-A-Survey.pdf

    ReplyDelete

Post a Comment

Popular posts from this blog

MAT JOURNALS

Journal of Engineering and Architecture (The journal is published by the American Research Institute for Policy Development)

Pubicon Icon for your publication....