Volume 3, Issue 3, Pages 136 - 185 ( March - 2014 )

1)
Image Steganography Using HBC and RDH Technique
Pages 136 - 139
Hemalatha .M Prasanna.A Dinesh Kumar R Vinothkumar D

10.7753/IJCATR0303.1001

Show Preview
  |  
Download PDF
2)
An Interactive visual Textual Data Analysis by Event Detection and Extraction
Pages 140 - 145
Danu. R Pradheep Narendran. P Ranjith Kumar. C Bharath. B

10.7753/IJCATR0303.1002

Show Preview
  |  
Download PDF
3)
Mobile Device Protection Using Sensors
Pages 146 - 149
Anna Rose Vembil Shilna Latheef Swathy Ramadas Anil Antony

10.7753/IJCATR0303.1003

Show Preview
  |  
Download PDF
4)
Brain Tumor Detection Using Artificial Neural Network Fuzzy Inference System (ANFIS)
Pages 150 - 154
R. J. Deshmukh R.S. Khule

10.7753/IJCATR0303.1004

Show Preview
  |  
Download PDF
5)
The Study of Problems and Applications ofCommunication Era in (Virtual) E-learning
Pages 155 - 158
Amin Ashir Sedigheh Navaezadeh Sara Ziagham

10.7753/IJCATR0303.1005

Show Preview
  |  
Download PDF
6)
Adaptive Neural Fuzzy Inference System for Employability Assessment
Pages 159 - 164
Rajani Kumari Vivek Kumar Sharma Sandeep Kumar

10.7753/IJCATR0303.1006

Show Preview
  |  
Download PDF
7)
Re-enactment of Newspaper Articles
Pages 165 - 168
Thilagavathi .N Archanaa S.R Lavanya.K Valarmathi.S

10.7753/IJCATR0303.1007

Show Preview
  |  
Download PDF
8)
Cloud Computing: Technical, Non-Technical and Security Issues
Pages 169 - 175
Wada Abdullahi Alhaji Idi Babate Ali Garba Jakwa

10.7753/IJCATR0303.1008

Show Preview
  |  
Download PDF
9)
Stepping Stone Technique for Monitoring Traffic Using Flow Watermarking
Pages 176 - 179
S.R.Ramya A. Reyana

10.7753/IJCATR0303.1009

Show Preview
  |  
Download PDF
10)
A Survey of Web Spam Detection Techniques
Pages 180 - 185
Mahdieh Danandeh Oskuie Seyed Naser Razavi

10.7753/IJCATR0303.1010

Show Preview
  |  
Download PDF