IJCAT - International Journal of Computing and Technology

Latest Volume 1, Issue 2 research articles from IJCAT Journal published on 31st March 2014

www.IJCAT.org

March 2014 Volume 1, Issue 2
  
 Implementing Deletion Recovery on Android
 
Akhil C JoyArjun VMithun KShebix Xavier
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages01-07
  
  
 Secure Sharing of Data over Cloud Computing using Different Encryption Schemes An Overview
 
Raseena MHarikrishnan G R
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages08-11
  
  
 Securing Images using Encryption Techniques A Survey
 
Vrinda AMr. Arun Anoop M
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages12-16
  
  
 Clustering Methods of Web Pages: A Survey
 
Aliya EdathadathilSyed Farook.K
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages17-20
  
  
 Location Update Schemes in Mobile Ad Hoc Networks
 
Aqeela S UmmerSreekanth E S
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages21-23
  
  
 Relative Study on Malayalam-English Translation using Transfer Based Approach
 
Shahana.I.LSharafudheen.K.A
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages24-29
  
  
 Parallel Workload Scheduling in Cloud: A Survey
 
Shahabanath K KSreekesh Namboodiri T
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages30-33
  
  
 Study on Security Breaches in Php Applications
 
Santosh Naidu PAmulya Patcha
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages34-38
  
  
 A Survey on Trust Management in Peer to Peer Systems
 
Manju JohnGovindaraj.E
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages39-42
  
  
 DDoS: Attack Analysis and Countermeasures
 
Sujina mol M SAneesh M Haneef
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages43-46
  
  
 Cement Mill Feeder Control System
 
Mr.Ratnan PJithin JoseMohammed Rafi K.TYoosaf Nisar K
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages47-52
  
  
 Self-Improved ODMP Protocol (ODMP-E)
 
Mr.Prashant B KumbharkarDr. T R Sontakke
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages53-58
  
  
 Securing Websites through Multi-CAPTCHA
 
Mr. Shaik Muhammed ManzoorMrs. Kumari R Soumya
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages59-62
  
  
 A New Topology for Power Quality Improvement for Hybrid Wind, Solar and Diesel Generator Energy System using D-STATCOM
 
Umamaheswari.SVigayaGowri.G
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages63-71
  
  
 Modelling and Simulation of Pressure Sensitivity of Bragg Grating Sensor for Structural Health Monitoring Application
 
Bilkish MondalDr. Preeta SharanZakir Hussain
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages73-77
  
  
 Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect
 
Aumreesh SaxenaSourabh Singh
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages78-82
  
  
 User Deadline Based Job Scheduling in Grid Computing
 
S.Gokul DevR.Lalith Kumar
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages83-90
  
  
 Two Ways Security on Cloud Computing using Cryptography and Intrusion Detection: A Review
 
Tony Durgadas JagyasiTony Durgadas Jagyasi
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages91-93
  
  
 Modeling of Sigma-Delta Modulator Non- Idealities with Two Step Quantization in MATLAB/SIMULINK
 
Shashant JaykarKuldeep PandeAtish PeshattiwarAbhinav Parkhi
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages94-99
  
  
 A Distributed Method to Protect Disruption Tolerant Networks from the Effects of Packet Overflow
 
Shwetha T JResmi S
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages100-105
  
  
 Electronic Toll Collection System for Efficient Traffic Control System using ANPR
 
Dr.M.GomathiV.Megala
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages106-113
  
  
 Energy Economization using Multimedia Cloud Computing
 
Swati TiwariPraveen Sen
 
Full Text Paper| Year: March 2014| Volume 1Issue 2| Pages114-116
  
  
 Fuzzy Logic Based Control of Wind Turbine Driven Squirrel Cage Induction Generator Connected to Grid

Comments

  1. http://ijcat.org/IJCAT-2014/1-2/Securing-Images-using-Encryption-Techniques-A-Survey.pdf

    ReplyDelete

Post a Comment

Popular posts from this blog

Journal of Engineering and Architecture (The journal is published by the American Research Institute for Policy Development)

Saveetha Engineering College, "IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)"

MAT JOURNALS