1
                : [14]
		Collection home page
      
      
 
	 
   
  
  
  
  
        
	
    
    
    
    
        Collection's Items (Sorted by Submit Date in Descending order): 1 to 14 of 14
    
    
    
    
      
| Issue Date | Title | Author(s) | 
| Jun-2015 | The Performance Evaluation of H.264SVC Video Transmission Over Ad-Hoc Networks | Kiran, B | 
| Jun-2015 | Secure data retrieval for decentralized disruption tolerant military networks | Ananda Kumar, H N | 
| Jun-2015 | Real Time Data Hiding Technique Based On Different Types Of Attack | Sowmya, S | 
| Jun-2015 | Phase-Based Binarization Of Ancient Document Images | Vandana, B | 
| Jun-2015 | New image watermarking scheme for information security | Anil Kumar, C J | 
| Jun-2015 | Mobile health monitoring with privacy and integrity(MHealth) | Manjunath Swamy, C | 
| Jun-2015 | Leveraging social networks for P2P content based file sharing in disconnected MANETs | Sneha, N P | 
| Jun-2015 | HYPERSPECTRAL IMAGE CLASSIFICATION THROUGH BI-LAYER GRAPH BASED LEARNING | Archana, M R | 
| Jun-2015 | GSM based Electronic Notice Board | Shashidhar, S | 
| Jun-2015 | Fair scheduling of time slots in cognitive radio network | Impana Appaji | 
| Jun-2015 | Denial-of-Service Attack DetectionBased on Multivariate Correlation Analysis | Nasreen Fathima | 
| Jun-2015 | AUTOMATIC MISSED CALLS RECORDER AND REMINDER | Anil Kumar, B H | 
| Jun-2015 | Anomaly detection from video using block based approach | Putte gowda, D | 
| Jun-2015 | Android Application for Group Buying using Aadhar Card | Sunitha Patel, M S | 
    
    
        Collection's Items (Sorted by Submit Date in Descending order): 1 to 14 of 14