Random Image Steganography and Steganalysis: Present Status and Future Directions
Rengarajan Amirtharajan, Jiaohua Qin and John Bosco Balaguru Rayappan
Information Technology Journal Volume 11, Number 5, 566-576, 2012
Abstract PDF Fulltext Citations XML References
Exploring the Academic Collaboration Chance in Open Research Community
Information Technology Journal Volume 11, Number 5, 577-586, 2012
Abstract PDF Fulltext Citations XML References
Inverted Pattern in Inverted Time Domain for Icon Steganography
Rengarajan Amirtharajan and John Bosco Balaguru Rayappan
Information Technology Journal Volume 11, Number 5, 587-595, 2012
Abstract PDF Fulltext Citations XML References
Improving the Performance of Packet Transfer in Network Mobility
M. Dinakaran and P. Balasubramanie
Information Technology Journal Volume 11, Number 5, 596-604, 2012
Abstract PDF Fulltext Citations XML References
Study on an Improved Algorithm based on LEACH Protocol
Chunyao Fu, Wei Wei and Ang Wei
Information Technology Journal Volume 11, Number 5, 605-612, 2012
Abstract PDF Fulltext Citations XML References
An Anonymous Authentication Scheme Based on Fully Homomorphic Encryption in P2P Networks
Xiaoliang Wang, Yuling Liu and Hengfu Yang
Information Technology Journal Volume 11, Number 5, 613-619, 2012
Abstract PDF Fulltext Citations XML References
Double Adaptive Fuzzy Sliding Mode Control Scheme for Electro-hydraulic Velocity Servo System
Rui Tang, Qi Zhang and Shao Jiang Wang
Information Technology Journal Volume 11, Number 5, 620-625, 2012
Abstract PDF Fulltext Citations XML References
Image Retrieval Based on Topological Features of Gray-level Co-occurrence Networks
Zheng-Liang Huang, Shi-Ze Guo and Zhe-Ming Lu
Information Technology Journal Volume 11, Number 5, 626-631, 2012
Abstract PDF Fulltext Citations XML References
A p-Laplace Equation Model for Image Denoising
Information Technology Journal Volume 11, Number 5, 632-636, 2012
Abstract PDF Fulltext Citations XML References
The Research on Sort Method of Consumers Brand Preference Under Uncertain Environment
Information Technology Journal Volume 11, Number 5, 637-641, 2012
Abstract PDF Fulltext Citations XML References
Lane Detection Algorithm at Night Based-on Distribution Feature of
Boundary Dots for Vehicle Active Safety
Ronghui Zhang, Haiwei Wang, Xi Zhou, Lei Wang and Tonghai Jiang
Information Technology Journal Volume 11, Number 5, 642-646, 2012
Abstract PDF Fulltext Citations XML References
An Adaptive Block Truncation Coding Algorithm Based on Data Hiding
Information Technology Journal Volume 11, Number 5, 647-650, 2012
Abstract PDF Fulltext Citations XML References
A Multi-stage Design of Intermediate Frequency Digital down Converter
C.F. Ruan, J.Y. Hua, W.K. Kuang, Z.J. Xu and Z.L. Zheng
Information Technology Journal Volume 11, Number 5, 651-657, 2012
Abstract PDF Fulltext Citations XML References
Integrating Service Quality Model in Quality Improvement: An Empirical Study of Employees Satisfaction for Hot Spring Industry
Information Technology Journal Volume 11, Number 5, 658-665, 2012
Abstract PDF Fulltext Citations XML References