1
: [14]
Collection home page
Collection's Items (Sorted by Submit Date in Descending order): 1 to 14 of 14
Issue Date | Title | Author(s) |
Jun-2015 | The Performance Evaluation of H.264SVC Video Transmission Over Ad-Hoc Networks | Kiran, B |
Jun-2015 | Secure data retrieval for decentralized disruption tolerant military networks | Ananda Kumar, H N |
Jun-2015 | Real Time Data Hiding Technique Based On Different Types Of Attack | Sowmya, S |
Jun-2015 | Phase-Based Binarization Of Ancient Document Images | Vandana, B |
Jun-2015 | New image watermarking scheme for information security | Anil Kumar, C J |
Jun-2015 | Mobile health monitoring with privacy and integrity(MHealth) | Manjunath Swamy, C |
Jun-2015 | Leveraging social networks for P2P content based file sharing in disconnected MANETs | Sneha, N P |
Jun-2015 | HYPERSPECTRAL IMAGE CLASSIFICATION THROUGH BI-LAYER GRAPH BASED LEARNING | Archana, M R |
Jun-2015 | GSM based Electronic Notice Board | Shashidhar, S |
Jun-2015 | Fair scheduling of time slots in cognitive radio network | Impana Appaji |
Jun-2015 | Denial-of-Service Attack DetectionBased on Multivariate Correlation Analysis | Nasreen Fathima |
Jun-2015 | AUTOMATIC MISSED CALLS RECORDER AND REMINDER | Anil Kumar, B H |
Jun-2015 | Anomaly detection from video using block based approach | Putte gowda, D |
Jun-2015 | Android Application for Group Buying using Aadhar Card | Sunitha Patel, M S |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 14 of 14