Abstract

Authors and Affiliations

P. Iswarya , Dr. V. Radha

Keywords

Related Articles

Modern Steganographic technique: A survey

Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence o...

Operating System Security : Security Policies

Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to...

DETECTING AND BLOCKING OF SPAM ZOMBIE MECHANISM

A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of...

Keystone Error Correction Method in Camera-Projector System to Correct the Projected Image on planar surface and tilted projector

Projector camera systems are basically systems that can serve as improvement to projector based applications by addition of visual feedback to the projector. However, unless the projector is precisely aligned to the pres...

The Moderating Factors of 3G User Acceptance Technology in Shimla (India) Using UTAUT Model

The UTAUT model one of the best model that affect the behavior acceptance and also help us predicting the user acceptance technology. UTAUT model is current model that has used in predicting usage of mobiles, computer sy...

Download PDF file
  • EP ID EP89731
  • DOI -
  • Views 150
  • Downloads 0

How To Cite

P. Iswarya, Dr. V. Radha (2015).  . International Journal of Computer Science & Engineering Technology, 6(6), 386-391. https://europub.co.uk/articles/-A-89731