IJACTA (2321-4546) is a Peer Reviewed Open Access Journal which publishes articles bi annually. This journal is leading by a group of Eminent Professors and sponsored by Roland Institute of Technology(BPUT). We accept the original research paper which has not been published or under review in any of the journal. IJACTA is for the people who do quality research and it publish with the standard of publication ethics.
Volume 4, Issue 2 ,December -2016 Invites original and quality research paper which is not under review in any journal ...
Volume 4, Issue 2 (SUBMISSION OPEN)
Deadline : 15th November 2016
Publication :15th December 2016
Submit your manuscript at ijactaeditor@gmail.com
Vol 4, No 1 (2016): June
Table of Contents
Articles
A Novel Mathematical Approach to Steganography | PDF [Full Text] |
B. Srinivasa Rao, P. N. V. Prasada Rao, J.S.V. Gopala Krishna | 147-151 |
A Study of Tools, Techniques, and Trends for Big Data Analytics | PDF [Full Text] |
R. Shireesha, Sunil Bhutada | 152-158 |
A Modern Approach for Data Management | PDF [Full Text] |
G. Shravani Priya, P.K. Sahoo | 159-162 |
A Survey on Big Data Predictions | PDF [Full Text] |
Kamsali Naveena, T.Venkat Narayana Rao | 163-166 |
IP spoofing and its Detection Technique | PDF [Full Text] |
Maderi Lavanya, P K Sahoo | 167-169 |
Scanning Tool For Identification of Image With Malware | PDF [Full Text] |
Rama Priyanka, P.K. Sahoo | 170-175 |
Automated detection of fake profiles using simple framework: SVM | PDF [Full Text] |
A. Madhavi, V. Surya Narayana Reddy | 176-181 |
Detecting Anomalies for Large Sensors Data Contextually | PDF [Full Text] |
Neelu Patel, P. K. Sahoo | 182-185 |
Gemini- an Effective Mechanism for Website Phishing Attacks | PDF [Full Text] |
Ch. Sai Subhashini, P. K. Sahoo | 186-193 |
CSRF Attacks On Web Applications | PDF [Full Text] |
Narra Manaswini, P. K. Sahoo | 194-197 |
Log Management In Cloud Through Big Data | PDF [Full Text] |
G. Gayatri Likhita, P. K. Sahoo | 198-204 |
Protecting Cloud Based Multimedia Content Using 3-D Signatures. | PDF [Full Text] |
M. Niharika, P.K. Sahoo | 205-208 |
The Expediency in Detection of Jammer Intrusion in Wireless Transmission | PDF [Full Text] |
C.Kavya Reddy, P. K. Sahoo | 209-213 |
Tracking of Lost Phones through MMSnap | PDF [Full Text] |
B. Vyshali, P. K. Sahoo | 214-219 |
Otp Using Biometrics Embellish Security For Online –Trasactions (OLT) | PDF [Full Text] |
K. Madhavi, P. K. Sahoo | 220-226 |
Network Security-Methods | PDF [Full Text] |
E. Mamatha, D. Rambabu | 227-230 |
IoT Applications, Security Threats. | PDF [Full Text] |
V.M.Hima Bindu, D Rambabu | 231-235 |
Improved QOS In Cloud Computing Feedback System | PDF [Full Text] |
Halavath Balaji, K.F. Bharati, N. Divya | 236-240 |
An Immaculate Face Recognition Structure Through Intrinsic Figuring | PDF [Full Text] |
M . Sathvika, Prasanta Kumar Sahoo | 241-246 |
IJACTA is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. Based on a work at www,ijacta.com.