IJACTA

IJACTA (2321-4546) is a Peer Reviewed Open Access Journal which publishes articles bi annually. This journal is leading by a group of Eminent Professors and sponsored by Roland Institute of Technology(BPUT). We accept the original research paper which has not been published or under review in any of the journal. IJACTA is for the people who do quality research and it publish with the standard of publication ethics.

 

Google Scholar

 


Journal Homepage Image

Volume 4, Issue 2  ,December -2016 Invites original and quality research paper which is not under review in any journal ...

Volume 4, Issue 2    (SUBMISSION OPEN)
Deadline : 15th  November 2016

Publication :15th December 2016

Submit your manuscript at ijactaeditor@gmail.com

ijacta_640



Vol 4, No 1 (2016): June

Table of Contents

Articles

A Novel Mathematical Approach to Steganography PDF [Full Text]
B. Srinivasa Rao, P. N. V. Prasada Rao, J.S.V. Gopala Krishna 147-151
A Study of Tools, Techniques, and Trends for Big Data Analytics PDF [Full Text]
R. Shireesha, Sunil Bhutada 152-158
A Modern Approach for Data Management PDF [Full Text]
G. Shravani Priya, P.K. Sahoo 159-162
A Survey on Big Data Predictions PDF [Full Text]
Kamsali Naveena, T.Venkat Narayana Rao 163-166
IP spoofing and its Detection Technique PDF [Full Text]
Maderi Lavanya, P K Sahoo 167-169
Scanning Tool For Identification of Image With Malware PDF [Full Text]
Rama Priyanka, P.K. Sahoo 170-175
Automated detection of fake profiles using simple framework: SVM PDF [Full Text]
A. Madhavi, V. Surya Narayana Reddy 176-181
Detecting Anomalies for Large Sensors Data Contextually PDF [Full Text]
Neelu Patel, P. K. Sahoo 182-185
Gemini- an Effective Mechanism for Website Phishing Attacks PDF [Full Text]
Ch. Sai Subhashini, P. K. Sahoo 186-193
CSRF Attacks On Web Applications PDF [Full Text]
Narra Manaswini, P. K. Sahoo 194-197
Log Management In Cloud Through Big Data PDF [Full Text]
G. Gayatri Likhita, P. K. Sahoo 198-204
Protecting Cloud Based Multimedia Content Using 3-D Signatures. PDF [Full Text]
M. Niharika, P.K. Sahoo 205-208
The Expediency in Detection of Jammer Intrusion in Wireless Transmission PDF [Full Text]
C.Kavya Reddy, P. K. Sahoo 209-213
Tracking of Lost Phones through MMSnap PDF [Full Text]
B. Vyshali, P. K. Sahoo 214-219
Otp Using Biometrics Embellish Security For Online –Trasactions (OLT) PDF [Full Text]
K. Madhavi, P. K. Sahoo 220-226
Network Security-Methods PDF [Full Text]
E. Mamatha, D. Rambabu 227-230
IoT Applications, Security Threats. PDF [Full Text]
V.M.Hima Bindu, D Rambabu 231-235
Improved QOS In Cloud Computing Feedback System PDF [Full Text]
Halavath Balaji, K.F. Bharati, N. Divya 236-240
An Immaculate Face Recognition Structure Through Intrinsic Figuring PDF [Full Text]
M . Sathvika, Prasanta Kumar Sahoo 241-246


Creative Commons License
IJACTA is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. Based on a work at www,ijacta.com.