Conditional Hybrid Approach for Intrusion Detection
Research Journal of Information Technology Volume 8, Number 3, 55-65, 2016
Abstract PDF Fulltext Citations XML References
Analyzing Google File System and Hadoop Distributed File System
Research Journal of Information Technology Volume 8, Number 3, 66-74, 2016
Abstract PDF Fulltext Citations XML References
A Road Map to Bio-inspired Software Engineering
Research Journal of Information Technology Volume 8, Number 3, 75-81, 2016
Abstract PDF Fulltext Citations XML References
Tri Layer Image Encryption Based on Quantum Principle
R. Sridevi, P. Philominathan, Padmapriya Praveenkumar, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan
Research Journal of Information Technology Volume 8, Number 3, 82-87, 2016
Abstract PDF Fulltext Citations XML References
Watermarking System for the Security of Medical Image
Databases used in Telemedicine
Research Journal of Information Technology Volume 8, Number 3, 88-97, 2016
Abstract PDF Fulltext Citations XML References
Tasks Scheduling in Cloud Computing Environment using Workflowsim
Pradeep Singh Rawat, Priti Dimri and G.P. Saroha
Research Journal of Information Technology Volume 8, Number 3, 98-104, 2016
Abstract PDF Fulltext Citations XML References