音量 3, 問題 3 (2012)

テクニカルノート

A TECHNICAL DISCUSSION ON REQUIREMENT ENGINEERING WITH AN EXAMPLE

  • Onkar Nath Pandey , D.B.Ojha

テクニカルノート

VEHICULAR AD HOC NETWORKS

  • Manjot Kaur, Sukhman Kaur and Gurpreet Singh

総説

PROCESS SUPPORT FOR REQUIREMENTS ENGINEERING

  • Onkar Nath Pandey , D.B.Ojha

総説

ANALYSIS OF DIFFERENT VULNERABILITIES IN AUTO TELLER MACHINE TRANSACTIONS

  • Navneet Sharma and Dr.Vijay Singh Rathore

総説

A CLOSER LOOK INTO THE RECTANGULAR CODES: WHERE THE PARITY CHECK PREDOMINATES

  • Romi Banerjee, Saptarshi Naskar and Samar Sen Sarma

研究論文

A NEW METRICS FOR PREDICTING NETWORK SECURITY LEVEL

  • Tito Waluyo Purboyo, Budi Rahardjo, Kuspriyanto, and Intan Muchtadi-Alamsyah

研究論文

IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY

  • Mr . Vikas Tyagi, Mr. Atul kumar, Roshan Patel, Sachin Tyagi, Saurabh Singh Gangwar

研究論文

AN ADAPTIVE STEGANOGRAPHY TECHNIQUE FOR GRAY AND COLORED IMAGES

  • Sherish Johri and Amit Asthana

研究論文

A STUDY OF GENETIC ALGORITHM TO SOLVE TRAVELLING SALESMAN PROBLEM

  • Naveen Kumar, Karambir, Rajiv Kumar

研究論文

MULTI AGENT BASED APPROACH FOR NETWORK INTRUSION DETECTION USING DATA MINING CONCEPT

  • Ankita Agarwal, Sherish Johri, Ankur Agarwal, Vikas Tyagi, Atul Kumar

研究論文

A NOVEL STEGANOGRAPHY TECHNIQUE FOR GRAY AND COLORED IMAGES

  • Ankita Agarwal, A. K. Vatsa

研究論文

A CLOSER LOOK INTO THE RECTANGULAR CODES: WHERE THE PARITY CHECK PREDOMINATES

  • Romi Banerjee, Saptarshi Naskar and Samar Sen Sarma