Volume 3, Issue 1-2, January 2015
Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function
Bidisha Goswami, Ravichandra G.
Pages: 1-8     Published Online: Dec. 27, 2014
DOI: 10.11648/j.ajam.s.2015030102.11
Abstract | Full-Text PDF (381KB)
View 3786                 Downloads 223
(This article belongs to the Special Issue )
Digital Restoration of Archaeological Heritage
Supriya P. Deshpande, Preeti Sangamesh
Pages: 9-13     Published Online: Dec. 19, 2014
DOI: 10.11648/j.ajam.s.2015030102.12
Abstract | Full-Text PDF (488KB)
View 2967                 Downloads 125
(This article belongs to the Special Issue )
A Survey on Various Task Scheduling Algorithms Toward Load Balancing in Public Cloud
Pradeep Naik, Surbhi Agrawal, Srikanta Murthy
Pages: 14-17     Published Online: Dec. 30, 2014
DOI: 10.11648/j.ajam.s.2015030102.13
Abstract | Full-Text PDF (214KB)
View 3170                 Downloads 405
(This article belongs to the Special Issue )
Browse journals by subject