An Extended Framework for Evaluation of Open Source Software Adoption in Small
Businesses
M.K. Mijinyawa and L. Abdulwahab
Research Journal of Information Technology Volume 6, Number 4, 248-269, 2014
Abstract PDF Fulltext Citations XML References
Study of QR Code Zero Watermarking Systems in Contourlet-SVD and SVD Domains
under Noise Attacks
R. Velumani and V. Seenivasagam
Research Journal of Information Technology Volume 6, Number 4, 270-290, 2014
Abstract PDF Fulltext Citations XML References
Logic Elements Consumption Analysis of Cellular Automata Based Image Encryption on FPGA
Sundararaman Rajagopalan, Har Narayan Upadhyay, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan
Research Journal of Information Technology Volume 6, Number 4, 291-307, 2014
Abstract PDF Fulltext Citations XML References
Galois Field Proficient Product for Secure Image Encryption on FPGA
S. Rajagopalan, H.N. Upadhyay, J.B. Balaguru Rayappan and R. Amirtharajan
Research Journal of Information Technology Volume 6, Number 4, 308-324, 2014
Abstract PDF Fulltext Citations XML References
Android Malware Detection System Classification
Mohd Zaki Mas`ud, Shahrin Sahib, , Mohd Faizal Abdollah, Siti Rahayu Selamat and Robiah Yusof
Research Journal of Information Technology Volume 6, Number 4, 325-341, 2014
Abstract PDF Fulltext Citations XML References
Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity
M. Padmaa and Y. Venkataramani
Research Journal of Information Technology Volume 6, Number 4, 342-355, 2014
Abstract PDF Fulltext Citations XML References
Compiler Optimization and Plain Text Pre-Processing to Hoist the Height of HIGHT in AVR Platform
Siva Janakiraman, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan
Research Journal of Information Technology Volume 6, Number 4, 356-367, 2014
Abstract PDF Fulltext Citations XML References
Image
Encryption
Padmapriya Praveenkumar, R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi and Rengarajan Amirtharajan
Research Journal of Information Technology Volume 6, Number 4, 368-378, 2014
Abstract PDF Fulltext Citations XML References
An Effective Hybrid Scheduling for Checkpoint Based Grid Environment
Research Journal of Information Technology Volume 6, Number 4, 379-388, 2014
Abstract PDF Fulltext Citations XML References
Load Balancing Clustering in WSN using MABC
Research Journal of Information Technology Volume 6, Number 4, 389-398, 2014
Abstract PDF Fulltext Citations XML References
Multilevel Encryption System Using RC4 and Steganography
Shinjit Kamal Borah and Surajit Borah
Research Journal of Information Technology Volume 6, Number 4, 399-405, 2014
Abstract PDF Fulltext Citations XML References
A Combined Schema for Surveillance
Priya Govindarajan and K.S. Ravichandran
Research Journal of Information Technology Volume 6, Number 4, 406-412, 2014
Abstract PDF Fulltext Citations XML References
Transforming Open Access Scholarly Publishing and Scientific Delivery: Challenges
and Opportunities in Asian Regions
Research Journal of Information Technology Volume 6, Number 4, 413-426, 2014
Abstract PDF Fulltext Citations XML References