bookmarks  

    No matching posts.
  • ⟨⟨
  • ⟩⟩

publications  2  

  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 12-19 (January 2019)1. Timmons, D., Harris, J. M., Roach, B. (2014), The Economics of Renewable Energy, A GDAE Teaching Module on Social and Environmental Issues in Economics. Online. Available: http://www.ase.tufts.edu/gdae/education_materials/modules/RenewableEnergyEcon.pdf accessed February, 2018. 2. Rawat, D., Sauni, P. (2015, July-August), Importance and Prospects of Renewable Energy: Emerging Issues in India, International Journal of Art & Humanity Science (IJAHS), e-ISSN: 2349-5235, Volume 2, Issue 4, pp. 11-18. 3. Bhatt, R., Macwan, J.E.M., Bhatt, D., Patel, V. (2010), Analytic Hierarchy Process Approach for Criteria Ranking of Sustainable Building Assessment: A Case Study, World Applied Sciences Journal 8 (7), pp. 881-888, ISSN 1818-4952, Retrieved from https://pdfs.semanticscholar.org/bdee/4a4c30d0dd1aed3245021704d2871b50b516.pdf accessed Jan 10, 2018. 4. Raha, P., Sarkar, D. (2013), Energy Audit Report of Nabo Jibon - Howrah, conducted by Energy Management Department, Master of Public System Management, Indian Institute of Social Welfare & Business Management, Kolkata. 5. Thakurta, A. G., Ghosh, D., Umashankar, S. (2004), Project Report on Energy Audit of IISWBM Building, conducted by Energy Management Department, Master of Public System Management, IISWBM, Kolkata. 6. IISWBM (2015), Study of Energy Use and the Working of Solar P. V. Net Metering System at RKM Vivekananda Centenary College - Rahara, conducted by Energy Management Department, Master of Public System Management, Indian Institute of Social Welfare & Business Management, Kolkata. 7. Gupta, N. (2015), Sustainable Energy Studies at Sri Mayapur Dham, conducted by Energy Management Department, Master of Public System Management, Indian Institute of Social Welfare & Business Management, Kolkata. 8. Dutta, P. (2015), Assessment of the Potential of Biomass based Cogeneration at Sri Mayapurdham, conducted by Energy Management Department, Indian Institute of Social Welfare & Business Management, Kolkata. 9. Majumdar, S.B., Choudhury, B.K. (2017), Greening Buildings: Action based on Identification of Retrofitted Parameters, IJIRAE, Vol. 4, Issue 8, ISSN (Online): 2349-2163. 10. Majumdar, S.B., Choudhury, B.K. (2017), Application of Scientific Decision Supporting Tool to Optimize Energy Consumption in way of Greening the Existing Buildings, IJIRSET, Vol. 6, Issue 8, ISSN (Online): 2319-8753..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VIII): 471-474 (September 2018)1. K. Wu and C. Wang, “Steganography using reversible texture synthesis” IEEE Transactions on Image Processing Vol.24 pp 130-139,January 2015 2. Shreyank N Gowda, “An Advanced Diffie-Hellman Approach to Image Steganography ” IEEE Transactions on advance network and telecommunication system Vol.19 pp 1-4,june 2016 3. Sherin Sugathan, “An Improved LSB Embedding Technique for Image Steganography ” International conference on applied and theoretical computing and communication technology Vol.33 pp 609-612,2016 4. S. Singh and V. K. Attri Dual Layer Security of data using LSB Image Steganography Method and AES Encryption Algorithm International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 8, No. 5 , pp. 259-266 ,2015 5. Utsav Sheth and Shiva Saxena, “Image Steganography Using AES Encryption and Least Significant Nibble ” International conference on communication and signal processing Vol.11 pp 0876-0879,2016 6. Radu Pietraru, “Secure communication method based on encryption and steganography” International conference on control system and computer science Vol.31 pp 453-458,2017 7. Y Manjula and K B Shivakumar ,”Enhanced Secured Image Steganography using Double Encryption Algorithm” International Conference on Computing for Sustainable Global Development (IndiaCom),2016 8. Tanushree Shelare and Varsha Powar,”A secure transmission approach using B-Trees in steganography”International Conference on Automatic Control and Dynamic Optimization Techniques,2016 9. https://www.sans.org/reading-room/whitepapers/vpns/review-chaffing-winnowing-876 10. http://www.asp.net/: This is the official Microsoft ASP.NET web site. It has a lot of: tutorials, training videos, and sample projects. 11. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6850714&queryText%3Dimage+steganography 12. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6658020&queryText%3Dimage+steganography.
    6 years ago by @ijiris
    (1)
     
     
  • ⟨⟨
  • 1
  • ⟩⟩