• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Volume 5, Number 3, 2013
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Publisher: Science International

Citations


Search


Most Cited


Role of Information Communication Technologies Adoption in SMES: Evidence from Botswana
49 Citations

Combined K-Nearest Neighbors and Fuzzy Logic Indoor Localization Technique for Wireless Sensor Network
34 Citations

Critical Factors of Implementing Knowledge Management in School Environment: A Qualitative Study in Hong Kong
29 Citations

Indexed In


  • ASCI-Database
  • Asian Digital Library
  • Google Scholar
Asian Digital Library

Volume 5, Number 3, 2013


SPECIAL ISSUE

Research Journal of Information Technology Volume 5, Number 3, 0-0, 2013

PDF

Horse Communication against Harsh Attack: A Stego Ride

V. Thanikaiselvan and P. Arulmozhivarman

Research Journal of Information Technology Volume 5, Number 3, 263-276, 2013

Abstract PDF Fulltext Citations XML References

High Performance Pixel indicator For Colour Image Steganography

Rengarajan Amirtharajan, K. Mohamed Ashfaaq, A. Kingsly Infant and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 3, 277-290, 2013

Abstract PDF Fulltext Citations XML References

Admission Control Scheme for QoS Support in IEEE 802.11e Wireless LAN

Rathnakar Achary, V. Vaithiyanathan and Pethuru Raj

Research Journal of Information Technology Volume 5, Number 3, 291-303, 2013

Abstract PDF Fulltext Citations XML References

Kubera Kolam: A Way for Random Image Steganography

Rengarajan Amirtharajan, Krishnamourthy Karthikeyan, Malligaraj Malleswaran and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 3, 304-316, 2013

Abstract PDF Fulltext Citations XML References

Random Abrasion on Image for Security Magnification

Amirtharajan , R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 3, 317-328, 2013

Abstract PDF Fulltext Citations XML References

Rubik’s Cube: A Way for Random Image Steganography

Rengarajan Amirtharajan, M. Venkata Abhiram, G. Revathi, J. Bharathsimha Reddy, V. Thanikaiselvan and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 3, 329-340, 2013

Abstract PDF Fulltext Citations XML References

Why Image Encryption for Better Steganography

Rengarajan Amirtharajan, P. Archana and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 3, 341-351, 2013

Abstract PDF Fulltext Citations XML References

A Smart Train Using the DPWS-based Sensor Integration

V. Venkatesh, V. Vaithayanathan, Pethuru Raj, K. Gopalan and R. Amirtharajan

Research Journal of Information Technology Volume 5, Number 3, 352-362, 2013

Abstract PDF Fulltext Citations XML References

A New Steganography Algorithm against Chi Square Attack

V. Thanikaiselvan, K. Santosh, D. Manikanta and Rengarajan Amirtharajan

Research Journal of Information Technology Volume 5, Number 3, 363-372, 2013

Abstract PDF Fulltext Citations XML References

High Capacity Triple Plane Embedding: A Colour Stego

Rengarajan Amirtharajan, G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 3, 373-382, 2013

Abstract PDF Fulltext Citations XML References

Pixel Indicates, Standard Deviates: A Way for Random Image Steganography

R. Amirtharajan, V. Rajesh, P. Archana and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 3, 383-392, 2013

Abstract PDF Fulltext Citations XML References

Comparison of Wavelet Filters in Hybrid Domain Watermarking

V. Elamaran, K. Narasimhan, P.V.M. Vijayabhaskar and G. Shiva

Research Journal of Information Technology Volume 5, Number 3, 393-401, 2013

Abstract PDF Fulltext Citations XML References

NIZKP to Achieve Authentication in Ad-hoc Networks

S. Samundeeswari and V.S. Shankar Sriram

Research Journal of Information Technology Volume 5, Number 3, 402-410, 2013

Abstract PDF Fulltext Citations XML References

Humanoid as a Sensor Node

A. Ranjit, Amit Raj and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 3, 411-418, 2013

Abstract PDF Fulltext Citations XML References

MPLS Based Adaptive Concurrent Multipath Packet Dispersion Architecture for VoIP Networks

J. Faritha Banu and V. Ramachandran

Research Journal of Information Technology Volume 5, Number 3, 419-426, 2013

Abstract PDF Fulltext Citations XML References

A Smarter E-currency Management System

G. Manikanta Chaitanya, Pinjerla Sandeep and Rengarajan Amirtharajan

Research Journal of Information Technology Volume 5, Number 3, 427-434, 2013

Abstract PDF Fulltext Citations XML References

Seeing and Believing is a Threat: A Visual Cryptography Schemes

Rengarajan Amirtharajan, Sumaiya Sulthana and J.B.B. Rayappan

Research Journal of Information Technology Volume 5, Number 3, 435-441, 2013

Abstract PDF Fulltext Citations XML References

Elucidating the Robust and Resilient Cloud Security Solution Approaches

Pethuru Raj, C. Nithya, A. Parvathy, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan

Research Journal of Information Technology Volume 5, Number 3, 442-448, 2013

Abstract PDF Fulltext Citations XML References

Chaotic Interleaving for Secured OFDM

N.R. Raajan, B. Monisha, R. Vishnupriya, Niranjana Rangarajan, G.N. Jayabhavani and C. Nishanthini

Research Journal of Information Technology Volume 5, Number 3, 449-455, 2013

Abstract PDF Fulltext Citations XML References

An Efficient Steganographic Method by using Image Fragments With High Security

B. Elangovan and S. Mohana

Research Journal of Information Technology Volume 5, Number 3, 456-461, 2013

Abstract PDF Fulltext Citations XML References

Secured Login System

N.R. Raajan, G. Shiva, P.V.M. Vijayabhaskar, P. Mithun and J. Peter Raj

Research Journal of Information Technology Volume 5, Number 3, 462-467, 2013

Abstract PDF Fulltext Citations XML References

Unsupervised Neural Network for Content Based Image Retrieval by Utilizing Content and Model Annotations

P. Ambika and J. Abdul Samath

Research Journal of Information Technology Volume 5, Number 3, 468-472, 2013

Abstract PDF Fulltext Citations XML References

ACKNOWLEDGEMENT TO THE REVIEWERS

Research Journal of Information Technology Volume 5, Number 3, 473-473, 2013

PDF

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved