Survey Report
A Survey on Bit keys in Cryptography
V. Rama Kanth, K. Aditya Kumar and K.Keerthana
Int. J. Res. Appl.(Volume – 1, Issue – 1, Page No’s: 1–5)
DOI: http://dx.doi.org/10.17812/IJRA.1.1(1)2014
Received: 12th March, 2014; Accepted: 07th April, 2014; Published: 21st April, 2014
Abstract |  Full Paper
Survey Report
A Survey Report on Security for Testing Phase of Software Development Process
Ashok Kumar Gottipalla and Dr. Prasanth Yalla
Int. J. Res. Appl.(Volume – 1, Issue – 1, Page No’s: 6–11)
DOI: http://dx.doi.org/10.17812/IJRA.1.1(2)2014
Received: 17th March, 2014; Accepted: 10th April, 2014; Published: 23rd April, 2014
Abstract |  Full Paper
Research Article
Molecular Docking of HIV-1 Protease using Alkaloids from Tinospora cordifolia
Sainath Namthabad and Estari Mamidala
Int. J. Res. Appl.(Volume – 1, Issue – 1, Page No’s:12–16)
DOI: http://dx.doi.org/10.17812/IJRA.1.1(3)2014
Received: 20th March, 2014; Accepted: 12th April, 2014; Published: 23rd April, 2014
Abstract |  Full Paper
Research Article
A Ranking Model Framework for Multiple Vertical Search Domains
Dr. Shoban Babu Sriramoju and Ramesh Gadde
Int. J. Res. Appl.(Volume – 1, Issue – 1, Page No’s: 17–22)
DOI: http://dx.doi.org/10.17812/IJRA.1.1(4)2014
Received: 24th March, 2014; Accepted: 04th April, 2014; Published: 23rd April, 2014
Abstract |  Full Paper
Research Article
Telugu Pronominal Anaphora Resolution
M. Sadanandam and D. Chandra Mohan
Int. J. Res. Appl.(Volume – 1, Issue – 1, Page No’s: 23–30)
DOI: http://dx.doi.org/10.17812/IJRA.1.1(5)2014
Received: 24th March, 2014; Accepted: 06th April, 2014; Published: 26th April, 2014
Abstract |  Full Paper
Case Study
Advance text Steganography algorithms: An overview
K. Aditya Kumar, Dr. Suresh Pabboju and Neela Megha Shyam Desai
Int. J. Res. Appl.(Volume – 1, Issue – 1, Page No’s: 31–35)
DOI: http://dx.doi.org/10.17812/IJRA.1.1(6)2014
Received: 25th March, 2014; Accepted: 06th April, 2014; Published: 26th April, 2014
Abstract |  Full Paper
Survey Report
A Survey on attacks and Defense Mechanisms in phishing
V.Ramakanth, Neela Megha Shyam Desai and T.Shyam Prasad
Int. J. Res. Appl.(Volume – 1, Issue – 1, Page No’s: 36–39)
DOI: http://dx.doi.org/10.17812/IJRA.1.1(7)2014
Received: 23rd March, 2014; Accepted: 08th April, 2014; Published: 29th April, 2014
Abstract |  Full Paper