CONFERENCE DATE: Mysore, 12-05-2013 |
FPGA Implementation Of A Distributed Canny EDGE Detector | |||||||||||
Page(s): | 01-06 | ||||||||||
Author | Divya.D, Sushma P.S | ||||||||||
|
Simulation approach to detect clone attack in Wireless sensor network | |||||||||||
Page(s): | 07-13 | ||||||||||
Author | Varsha A.Khandekar, Piyush Singh, Gaurav Shrivastava | ||||||||||
|
Using A Simple CRT Based Packet Splitting Algorithm To Minimize The Energy Consumption In Wireless Sensor Networks | |||||||||||
Page(s): | 14-19 | ||||||||||
Author | Naveenkumar P S, Vasudev K Parvati | ||||||||||
|
The Transitivity of Trust Problem in the Interaction of Android Applications | |||||||||||
Page(s): | 20-23 | ||||||||||
Author | Abhijith.Saralay | ||||||||||
|
Improvement of Voltage Regulation in Wind Farm to Weak-Grid Connection Using UPQC | |||||||||||
Page(s): | 24-29 | ||||||||||
Author | S. Lopamudra, Sreekanth Nethagani, T. Deva Raju | ||||||||||
|
A Survey of Different Types of Network Security Threats and its Countermeasures | |||||||||||
Page(s): | 30-33 | ||||||||||
Author | Harshitha B, N Ramesh | ||||||||||
|
Digital Watermarking to Protect The Integrity of a Biomedical Image in Wavelet Domain | |||||||||||
Page(s): | 34-38 | ||||||||||
Author | Shilpashree .M.S, J.Satish Babu | ||||||||||
|
Fine Grained Access Control (FGAC) For Authorizing Third Party Applications Using OAUTH (A Survey) | |||||||||||
Page(s): | 39-44 | ||||||||||
Author | Kavitha K R, Ramesh N | ||||||||||
|
Secure Sharing Of Car Using ABE | |||||||||||
Page(s): | 45-50 | ||||||||||
Author | Anusha K.S, Asha C.Korwar, Somashekhar N.K, Bhargavi K | ||||||||||
|
Dynamic Resourcing By Virtualization With Implementation Of Parallel Data Processing In The Cloud | |||||||||||
Page(s): | 51-53 | ||||||||||
Author | Venkataravananayak K, Harish R, Madhu B K | ||||||||||
|
Indian Stock Market Predictor System | |||||||||||
Page(s): | 54-58 | ||||||||||
Author | Vivek John George, Darshan M. S, Sneha Pricilla, Arun S, CH. Vanipriya | ||||||||||
|
Privacy- Energy Efficient and Secured Range Queries in Sensor Networks | |||||||||||
Page(s): | 59-61 | ||||||||||
Author | Ambarish, Jeeva R, Shivananda Swamy C, Kavitha J S, Madhura S M | ||||||||||
|
Efficient Chunk Scheduling Algorithm For Cooperative Download In VANET | |||||||||||
Page(s): | 62-67 | ||||||||||
Author | Vijaylakshmi R.S, Masoom BI, Arathi P | ||||||||||
|
Fuzzy Based Image Enhancement In The Compressed Domain | |||||||||||
Page(s): | 68-71 | ||||||||||
Author | Yogitha S.K, Savitri Raju | ||||||||||
|
Efficient Remote E-Voting In Indian Scenario | |||||||||||
Page(s): | 72-75 | ||||||||||
Author | Swetha. R, Kundan Kumar, Mohana Saha, Qaisar Ali, Suma. V | ||||||||||
|
Ontology Life Cycle Model For Information Retrieval In Composite Web Servers | |||||||||||
Page(s): | 76-79 | ||||||||||
Author | Roshni Kanth, Shilpashree, Shrishail Math | ||||||||||
|
Introduction To Secure Network Discovery In Trusted Assistance Routing For Wireless Sensor Networks | |||||||||||
Page(s): | 80-82 | ||||||||||
Author | Poornashree Prasad, Madhu B K, Niramala Hiremani, Rekha V S | ||||||||||
|
Theory of Sheltered Interface Detection For Independent System In Manet Attacks | |||||||||||
Page(s): | 83-85 | ||||||||||
Author | Pushpalatha C, Madhu B K, Niramala Hiremani, Rekha V S | ||||||||||
|
Risk Prevention Technique In Software Development | |||||||||||
Page(s): | 86-90 | ||||||||||
Author | Raghavi K Bhujang, Nirmala R, Shruthi R, Ravindra A, Prabhavathi Raju, Suma. V | ||||||||||
|
Systematic Approach To Decision Making In The Compression of Medical Dicom Images | |||||||||||
Page(s): | 91-96 | ||||||||||
Author | Shruthi Subramanya Rao, Shraddha Panbude, Mandar Sohani, Kasi Viswanathan Agilandam | ||||||||||
|
Design of 2x4 Microstrip Monopulse Patch Antenna In C-Band | |||||||||||
Page(s): | 97-101 | ||||||||||
Author | Chaithra M.V, Muskan Sharma, Prerna Bagri, Nandita Deshmukya | ||||||||||
|
Multi-Feature Background Modelling And Subtraction Using KDA With Support Vector Machine | |||||||||||
Page(s): | 102-106 | ||||||||||
Author | Sowmya C.S, Shwetha.V | ||||||||||
|