Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence o...
Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to...
A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of...
Projector camera systems are basically systems that can serve as improvement to projector based applications by addition of visual feedback to the projector. However, unless the projector is precisely aligned to the pres...
The UTAUT model one of the best model that affect the behavior acceptance and also help us predicting the user acceptance technology. UTAUT model is current model that has used in predicting usage of mobiles, computer sy...
EP ID EP89731
DOI -
Views 150
Downloads 0
How To Cite
P. Iswarya, Dr. V. Radha (2015). . International Journal of Computer Science & Engineering Technology, 6(6),
386-391. https://europub.co.uk/articles/-A-89731
Sign In Europub
For faster login or register use your social account.
Modern Steganographic technique: A survey
Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence o...
Operating System Security : Security Policies
Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to...
DETECTING AND BLOCKING OF SPAM ZOMBIE MECHANISM
A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of...
Keystone Error Correction Method in Camera-Projector System to Correct the Projected Image on planar surface and tilted projector
Projector camera systems are basically systems that can serve as improvement to projector based applications by addition of visual feedback to the projector. However, unless the projector is precisely aligned to the pres...
The Moderating Factors of 3G User Acceptance Technology in Shimla (India) Using UTAUT Model
The UTAUT model one of the best model that affect the behavior acceptance and also help us predicting the user acceptance technology. UTAUT model is current model that has used in predicting usage of mobiles, computer sy...