Volume-2 , Issue-3 , Mar - 2014 Go Back

Open Access   Article

Triple Security of File System for Cloud Computing

R. Arya
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.148-154, Mar-2014
Open Access   Article

Data Leakage Detection Using Information Hiding Techniques

A. Tale, M. Gunjal, B.A. Ahire
Technical Paper | Journal Paper
Vol.2 , Issue.3 , pp.155-158, Mar-2014
Open Access   Article

Enhance Security Issues Using Data Cipher Algorithm in Cloud

J. Singh, R. Rana
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.159-162, Mar-2014
Open Access   Article

Hiding Existence of Communication Using Image Steganography

S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.163-166, Mar-2014
Open Access   Article

Attack Generation and Vulnerability Discovery in Penetration Testing using Sql Injection

J. Upadhyaya, N. Panda, A.A. Acharya
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.167-173, Mar-2014
Open Access   Article

Implementation and Comparison of Image Fusion using Discrete Wavelet Transform and Principal Component Analysis

V.K. Mishra, S. Kumar, C. Singh
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.174-181, Mar-2014
Open Access   Article

Design and Implementation of Image Fusion System

V.K. Mishra, S. Kumar, R.K. Gupta
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.182-186, Mar-2014
Open Access   Article

Scrum Testing With Backlog Management in Agile Development Environment

S. Harichandan, N. Panda, A.A. Acharya
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.187-192, Mar-2014
Open Access   Article

Effect of Diethyl Ether and DIMETHYL Ether With Liquefied Petroleum Gas on Combustion And Emissions Characteristics of Diesel Engine

M.M. El-Ghobashy El-Hagar
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.193-198, Mar-2014
Open Access   Article

Generation of Testcases from UML Sequence Diagram and Detecting Deadlocks using Loop Detection Algorithm

A. Mallick, N. Panda, A.A. Acharya
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.199-203, Mar-2014
First    Previous    Next    Last