CATEGORIES
IJANA ARTICLES

VOLUME 2
Issue 1
Issue 2
Issue 3
Issue 4
Issue 5
Issue 6
Volume 2 Issue:05 Mar-Apr 2011
How Good Is The DES Algorithm In Image Ciphering?

Said F. El-Zoghdy, Yasser A. Nada, A. A. Abdo
796-803
Heuristic Task Allocation Strategies for Computational Grid

Ashish V. Chandak, Bibhudatta Sahoo, Ashok Kumar Turuk
804-810
Attacking Embedded Systems through Power Analysis

Dr. Sastry JKR, SubbaRao, N Venkata Ram, J. Sasi Bhanu
811-816
Silhouette Based Human Motion Detection and Recognising their Actions from the Captured Video Streams

Deepak. N. A , Dr.U. N. Sinha
817-823
Analysis of Users Web Browsing Behavior Using Markov chain Model

Dr. Diwakar Shukla ,Rahul Singhai
824-830
Noval Mobile Network Service for Road Safety

J.Radhakrishnan, Dr. R.S.Rajesh
831-840
An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel

Deo Brat Ojha, Ajay Sharma, Abhishek Dwivedi, Nitin Pandey,Amit Kumar
841-845
A New Method of APWM Resonant Inverter Topology for High Frequency AC Power Distribution Systems

S.Arumugam, S.Ramareddy
846-853
Comparison of Multidimensional MFCC Feature Vectors for Objective Assessment of Stuttered Disfluencies

Ravi Kumar K M, Ganesan S
854-860
Watermarking Algorithm Using Sobel Edge Detection

P. Ramesh Kumar, K.L.Sailaja
861-867
Implementation of LSB Steganography and its Evaluation for Various File Formats

V. Lokeswara Reddy, Dr. A. Subramanyam,Dr.P. Chenna Reddy
868-872
An Efficient Morphological Salt-and-Pepper Noise Detector

Alok Singh, Umesh Ghanekar,Chakresh Kumar, Chandra Shekhar
873-875
All Copyrights © 2017 , Eswar PublicationsDesigned by , klmn Software Solutions