Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
Rengarajan Amirtharajan and John Bosco Balaguru Rayappan
Research Journal of Information Technology Volume 4, Number 4, 124-139, 2012
Abstract PDF Fulltext Citations XML References
Authentication Time of IEEE 802.15.4 with Multiple-key Protocol Using Distributed Message Authentication Code Algorithm
Saif Al-Alak, Zuriati Zukranian, Azizol Abdullah and Shamala Subramiam
Research Journal of Information Technology Volume 4, Number 4, 140-154, 2012
Abstract PDF Fulltext Citations XML References
Combined K-Nearest Neighbors and Fuzzy Logic Indoor Localization Technique for Wireless Sensor Network
Azat Rozyyev, Halabi Hasbullah and Fazli Subhan
Research Journal of Information Technology Volume 4, Number 4, 155-165, 2012
Abstract PDF Fulltext Citations XML References
LBTC: A Conceptual Energy Saving Framework for Mobile Ad hoc Networks
N.K. Ray and A.K. Turuk
Research Journal of Information Technology Volume 4, Number 4, 166-175, 2012
Abstract PDF Fulltext Citations XML References
Inter-domain Authentication Scheme in a Distributed Mobile Network
Research Journal of Information Technology Volume 4, Number 4, 176-185, 2012
Abstract PDF Fulltext Citations XML References
A Novel Routing Algorithm for Energy Optimization in Wireless Sensor Networks
Ademola P. Abidoye, Nureni A. Azeez, Ademola O. Adesina and Kehinde K. Agbele
Research Journal of Information Technology Volume 4, Number 4, 186-194, 2012
Abstract PDF Fulltext Citations XML References
Moving Target Detection in Complex Background
Yu-Long Qiao and Xian-Rui Song
Research Journal of Information Technology Volume 4, Number 4, 195-203, 2012
Abstract PDF Fulltext Citations XML References
Fast and Accurate Template Matching Algorithm Based on Image Pyramid and Sum of Absolute Difference Similarity Measure
Research Journal of Information Technology Volume 4, Number 4, 204-211, 2012
Abstract PDF Fulltext Citations XML References
Multi-symbol Encapsulation and Discrete Cosine Transform in Multiple Access System
Research Journal of Information Technology Volume 4, Number 4, 212-219, 2012
Abstract PDF Fulltext Citations XML References
Graceful Graph For Graceful Security-Towards A Ste (G) Raph
V. Thanikaiselvan, P. Arulmozhivarman, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan
Research Journal of Information Technology Volume 4, Number 4, 220-227, 2012
Abstract PDF Fulltext Citations XML References
Criticality Estimation for Software Components: An Empirical Approach
Pooja Batra, Arun Sharma and Maitreyee Dutta
Research Journal of Information Technology Volume 4, Number 4, 228-234, 2012
Abstract PDF Fulltext Citations XML References
The Evolution of Reusable Programs Using Genetic Algorithm
Research Journal of Information Technology Volume 4, Number 4, 235-240, 2012
Abstract PDF Fulltext Citations XML References