<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://localhost:8080/xmlui/handle/1/2388" />
  <subtitle />
  <id>http://localhost:8080/xmlui/handle/1/2388</id>
  <updated>2026-05-01T14:36:17Z</updated>
  <dc:date>2026-05-01T14:36:17Z</dc:date>
  <entry>
    <title>The Performance Evaluation of H.264SVC Video Transmission Over Ad-Hoc Networks</title>
    <link rel="alternate" href="http://localhost:8080/xmlui/handle/1/2402" />
    <author>
      <name>Kiran, B</name>
    </author>
    <id>http://localhost:8080/xmlui/handle/1/2402</id>
    <updated>2021-02-19T22:06:00Z</updated>
    <published>2015-06-01T00:00:00Z</published>
    <summary type="text">Title: The Performance Evaluation of H.264SVC Video Transmission Over Ad-Hoc Networks
Authors: Kiran, B</summary>
    <dc:date>2015-06-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Secure data retrieval for decentralized disruption tolerant military networks</title>
    <link rel="alternate" href="http://localhost:8080/xmlui/handle/1/2401" />
    <author>
      <name>Ananda Kumar, H N</name>
    </author>
    <id>http://localhost:8080/xmlui/handle/1/2401</id>
    <updated>2021-02-19T22:06:56Z</updated>
    <published>2015-06-01T00:00:00Z</published>
    <summary type="text">Title: Secure data retrieval for decentralized disruption tolerant military networks
Authors: Ananda Kumar, H N</summary>
    <dc:date>2015-06-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Real Time Data Hiding Technique Based On Different Types Of Attack</title>
    <link rel="alternate" href="http://localhost:8080/xmlui/handle/1/2400" />
    <author>
      <name>Sowmya, S</name>
    </author>
    <id>http://localhost:8080/xmlui/handle/1/2400</id>
    <updated>2021-02-19T22:06:45Z</updated>
    <published>2015-06-01T00:00:00Z</published>
    <summary type="text">Title: Real Time Data Hiding Technique Based On Different Types Of Attack
Authors: Sowmya, S</summary>
    <dc:date>2015-06-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Phase-Based Binarization Of Ancient Document Images</title>
    <link rel="alternate" href="http://localhost:8080/xmlui/handle/1/2399" />
    <author>
      <name>Vandana, B</name>
    </author>
    <id>http://localhost:8080/xmlui/handle/1/2399</id>
    <updated>2021-02-19T22:06:32Z</updated>
    <published>2015-06-01T00:00:00Z</published>
    <summary type="text">Title: Phase-Based Binarization Of Ancient Document Images
Authors: Vandana, B</summary>
    <dc:date>2015-06-01T00:00:00Z</dc:date>
  </entry>
</feed>

