Volume 3, Issue 1-2, January 2015
Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function
Bidisha Goswami, Ravichandra G.
Pages: 1-8     Published Online: Dec. 27, 2014
DOI: 10.11648/j.ajam.s.2015030102.11
Abstract | Full-Text PDF (381KB)
View 3677                 Downloads 219
Digital Restoration of Archaeological Heritage
Supriya P. Deshpande, Preeti Sangamesh
Pages: 9-13     Published Online: Dec. 19, 2014
DOI: 10.11648/j.ajam.s.2015030102.12
Abstract | Full-Text PDF (488KB)
View 2861                 Downloads 121
A Survey on Various Task Scheduling Algorithms Toward Load Balancing in Public Cloud
Pradeep Naik, Surbhi Agrawal, Srikanta Murthy
Pages: 14-17     Published Online: Dec. 30, 2014
DOI: 10.11648/j.ajam.s.2015030102.13
Abstract | Full-Text PDF (214KB)
View 3044                 Downloads 401
Browse journals by subject