Volume 5, Issue 3, Pages 115 - 175 ( March - 2016 )

1)
Security Requirements and Security Threats In Layers Cloud and Security Issues Open Source Cloud
Pages 115 - 125
Roya Morshedi Ali Payandeh Ali Pourghaffari

10.7753/IJCATR0503.1001

Show Preview
  |  
Download PDF
2)
Pricing Models for Cloud Computing Services, a Survey
Pages 126 - 131
Taj Eldin Suliman M. Ali Hany H. Ammar

10.7753/IJCATR0503.1002

Show Preview
  |  
Download PDF
3)
Identification of Spam Emails from Valid Emails by Using Voting
Pages 132 - 136
Hamoon Takhmiri Ali Haroonabadi

10.7753/IJCATR0503.1003

Show Preview
  |  
Download PDF
4)
Vehicular Messaging In IOT Using Epidemic Routing
Pages 137 - 140
Vrushali Pavitrakar Navnath Kale

10.7753/IJCATR0503.1004

Show Preview
  |  
Download PDF
5)
Holistic Approach for Arabic Word Recognition
Pages 141 - 146
Talaat M. Wahbi Mohamed E. M. Musa

10.7753/IJCATR0503.1005

Show Preview
  |  
Download PDF
6)
Digital Watermarking Applications and Techniques:A Brief Review
Pages 147 - 150
Aaqib Rashid

10.7753/IJCATR0503.1006

Show Preview
  |  
Download PDF
8)
A Review on Feature Extraction Techniques and General Approach for Face Recognition
Pages 156 - 158
Aakanksha Agrawal Steve Samson

10.7753/IJCATR0503.1008

Show Preview
  |  
Download PDF
9)
Solve Big Data Security Issues
Pages 159 - 164
Abhinandan Banik Samir Kumar Bandyopadhyay

10.7753/IJCATR0503.1009

Show Preview
  |  
Download PDF
10)
Computer Interface for Electroluminescence (EL)
Pages 165 - 171
Ajay Kumar Mishra

10.7753/IJCATR0503.1010

Show Preview
  |  
Download PDF