Volume 5, Issue 10, Pages 619 - 682 ( October - 2016 )

1)
Government Web Application Security: Issues and Challenges - A Case of India
Pages 619 - 626
Dr.V.Ranga Rao

10.7753/IJCATR0510.1001

Show Preview
  |  
Download PDF
2)
Safety-driven Software Product Line architectures Design, A Survey Paper
Pages 627 - 640
Mozamil Ebnauf Elgodbe Hany H. Ammar

10.7753/IJCATR0510.1002

Show Preview
  |  
Download PDF
3)
Proposing a New Job Scheduling Algorithm in Grid Environment Using a Combination of Imperialist Competition
Pages 641 - 647
Arman Alizadeh Ali Harounabadi Mehdi Sadeghzadeh

10.7753/IJCATR0510.1003

Show Preview
  |  
Download PDF
4)
Proposing a Scheduling Algorithm to Balance the Time and Energy Using an Imperialist Competition Algorithm
Pages 648 - 653
Arman Alizadeh Ali Harounabadi Mehdi Sadeghzadeh

10.7753/IJCATR0510.1004

Show Preview
  |  
Download PDF
5)
Pipelining Concept for Low Power DES Implementation
Pages 654 - 656
Ansiya Eshack S. Krishnakumar

10.7753/IJCATR0510.1005

Show Preview
  |  
Download PDF
6)
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fuzzy Cross-Layer Approach
Pages 657 - 663
Maryam Ravaei Javad Mirabedini Ali Harounabadi

10.7753/IJCATR0510.1006

Show Preview
  |  
Download PDF
7)
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-layer Approach
Pages 664 - 670
Maryam Ravaei Javad Mirabedini Ali Harounabadi

10.7753/IJCATR0510.1007

Show Preview
  |  
Download PDF
8)
Literature Survey: Clustering Technique
Pages 671 - 674
Ajinkya V. Jiman Prof. Harmeet K. Khanuja

10.7753/IJCATR0510.1008

Show Preview
  |  
Download PDF
9)
Literature Survey: Secure transmitting of data using RSA public key implemented with Vedic method
Pages 675 - 677
Mohit D. Singanjude Prof. R. Dalvi

10.7753/IJCATR0510.1009

Show Preview
  |  
Download PDF
10)
Enhancement of Payload Capacity for Image Steganography based on LSB
Pages 678 - 682
Vidya Verma Abhishek Kajal Isha Kajal

10.7753/IJCATR0510.1010

Show Preview
  |  
Download PDF