Volume 3, Issue 1-2, January 2015
Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function
Bidisha Goswami, Ravichandra G.
Pages: 1-8     Published Online: Dec. 27, 2014
DOI: 10.11648/j.ajam.s.2015030102.11
Abstract | Full-Text PDF (381KB)
View 3712                 Downloads 222
Digital Restoration of Archaeological Heritage
Supriya P. Deshpande, Preeti Sangamesh
Pages: 9-13     Published Online: Dec. 19, 2014
DOI: 10.11648/j.ajam.s.2015030102.12
Abstract | Full-Text PDF (488KB)
View 2891                 Downloads 123
A Survey on Various Task Scheduling Algorithms Toward Load Balancing in Public Cloud
Pradeep Naik, Surbhi Agrawal, Srikanta Murthy
Pages: 14-17     Published Online: Dec. 30, 2014
DOI: 10.11648/j.ajam.s.2015030102.13
Abstract | Full-Text PDF (214KB)
View 3089                 Downloads 403
Browse journals by subject