Agarwal, Application Text Steganographic Approaches: A Comparison International Journal of Network Security & Its Applications, 5(1), 2013, 91-106.
Text steganography is most challenging because of the presence of very less redundant information in text documents as compared to the images and audio.
 Vedaprabhu, B.; Vinoy, K.J.; , "A double U-slot patch antenna with dualWideband characteristics," Communications (NCC), 2010 NationalConference on , vol., no., pp.1-4, 29-31 Jan.
75, 397-407, 2007.
 Yang, F.; Xue-Xia Zhang; Xiaoning Ye; Rahmat-Samii, Y.; "Wide-bandE-shaped patch antennas for wireless communications," Antennas and Propagation, IEEE Transactions on, vol.49, no.7, pp.1094-1100, Jul 2001
 Hadian, A.M.; Hassani, H.R.;, "Wideband Rectangular Microstrip Patch Antenna with U-Slot," Antennas and Propagation, 2007.
The most common examples of heterogeneous catalysis in industry involve the reactions of gases being passed over the surface of a solid, often a metal, a metal oxide or a zeolite (Table 1).
"Ductility-base seismic design of steel plate shear walls: Practical application using standard sections", Department of Civil Engineering, Indian Institute of Technology Bombay, Mumbai, India , pp 93 – 98.
 Ghosh Siddhartha, Farooq Adam, Das Anirudha (2009).
The models are analyzed by Response Spectrum analysis as per IS 1893:2002 and design has been carried out by using IS 800-2007.
Key words: Steel plate shear wall (SPSW), steel building, strip model, IS 800-2007, IS 1893-2002, Response spectrum method, tension field action, seismic design
 Londhe R.S.
By considering both strength and collapsibility, cube pattern with different internal structure designs were developed using SolidWorks software and analysis by ANSYS software.
Polymer may react differently than wax when it comes to the burnout process which is a critical part in IC that determines the quality of the final cast product.
Dheeraj Rane, An Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Real Environment, International Journal of advanced Computer Research(IJACR) Volume 1, September 2011.
 Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki and Sugata Sanyal," A Survey on Security Issues in Cloud Computing".
In this paper we have discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of various security algorithms
Key words: Algorithms: AES, Blowfish, DES, RSA, Cloud Computing, Data Security
 Zhidong Shen, Li Li , Fei Yan, Xiaoping Wu , Cloud Computing System Based on Trusted Computing Platform,(2010) International Conference on Intelligent Computation Technology and Automation.
Cloud Computing solves many problems of conventional computing, including handling peak loads, installing software updates, and, using excess computing cycles.
Adequate use is made of both forward and inverse lifting schemes so as to reduce the computational complexity by a factor of two and achieve superior compression performance in terms of encoding time, decoding time,peak signal to noise ratio PSNR and better compression ratio(CR).
 Content Based Image Retrieval Using SVM Algorithm, International Journal of Electrical and Electronics Engineering (IJEEE) ISSN (PRINT): 2231 – 5284, Vol-1, Iss-3, 2012
 Content based Image Retrieval using Implicit and Explicit Feedback with Interactive Genetic Algorithm, International Journal of Computer Applications (0975 – 8887) Volume 43– No.16, April 2012