Volume-3 , Issue-3 , Mar - 2015 Go Back

Open Access   Article

Real Time Extraction and Processing of Social Tweets

B. M. Bandgar and Binod Kumar
Research Paper | Journal Paper
Vol.3 , Issue.3 , pp.1-6, Mar-2015
Open Access   Article

Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography

Anirban Bhowmick, Vishal Kapur and Surya Teja Paladi
Research Paper | Journal Paper
Vol.3 , Issue.3 , pp.7-12, Mar-2015
Open Access   Article

Study of Various Image Noises and Their Behavior

Sumit Kushwaha and Rabindra Kumar Singh
Research Paper | Journal Paper
Vol.3 , Issue.3 , pp.13-17, Mar-2015
Open Access   Article

Applying GQM Approach towards Evaluation of Defect Management in Free/Open Source Software Projects

Anu Gupta
Research Paper | Journal Paper
Vol.3 , Issue.3 , pp.18-23, Mar-2015
Open Access   Article

Server Hardening: Securing Unix-like workstations

Yogender Bhardwaj
Review Paper | Journal Paper
Vol.3 , Issue.3 , pp.24-32, Mar-2015
Open Access   Article

Review On Car-License-Plate Detection Systems

Supriya Muravade, Amruta shete, Priyanka Takale, Gyankamal Chhajed
Review Paper | Journal Paper
Vol.3 , Issue.3 , pp.33-37, Mar-2015
Open Access   Article

Android Based Fuel and Resource Saving System

Ketki Deshmukh, Mansi Mali, Surendra Patil and Kiran Jadhav
Review Paper | Journal Paper
Vol.3 , Issue.3 , pp.38-41, Mar-2015
Open Access   Article

A Survey on Image/Video Quality Assessment- some Challenges and limitations

Renuka.H and M.Azath
Research Paper | Journal Paper
Vol.3 , Issue.3 , pp.42-45, Mar-2015
Open Access   Article

Study on Noise and Its Removal Techniques

Mary Sruthy Pious and M.Azath
Review Paper | Journal Paper
Vol.3 , Issue.3 , pp.46-50, Mar-2015
Open Access   Article

An Improved Weighted Clustering for Ad-hoc Network Security New

Basant Kuamr Verma and Binod Kumar2
Research Paper | Journal Paper
Vol.3 , Issue.3 , pp.51-55, Mar-2015
Next    Last