CONFERENCE DATE: Bengaluru, 15-02-2015 |
Laptop Security From Thefts By Android Phones Using GPM | |||||||||||
Page(s): | 1-3 | ||||||||||
Author | John J P, K. Prudhvi Yaswanth, Pruthvi M C | ||||||||||
|
Analysis Of Image Segmentation Techniques For Brain Tumor Detection | |||||||||||
Page(s): | 4-9 | ||||||||||
Author | Manjunatha C, Laxmi G Gulappagol | ||||||||||
|
Cluster Based Routing Mechanism For Advanced Delay-Tolerant Networks | |||||||||||
Page(s): | 10-13 | ||||||||||
Author | Shivaramu K.N, R Pramod, Madan Kumar T.N | ||||||||||
|
Advanced Approach For Multicast Communication In MANET Using EGMP Protocol | |||||||||||
Page(s): | 14-17 | ||||||||||
Author | Shivaramu K.N, Deepthi.P.Nair, Keerthanbopann. | ||||||||||
|
Cloud-Assisted Mobile-Access Of Privacy Preserving Audited Health Data | |||||||||||
Page(s): | 18-28 | ||||||||||
Author | Tirupati Divya, Jaladanki Babu | ||||||||||
|
Damage Analysis Of A Laminated Composite Finite Plate With Multiple Edge Crack And Cutout | |||||||||||
Page(s): | 29-36 | ||||||||||
Author | Amit K.Srivastava, Achchhe Lal | ||||||||||
|
Increasing The Efficiency Of A PV System Using Dual Axis Solar Tracking | |||||||||||
Page(s): | 37-41 | ||||||||||
Author | Adarsh S., Abhishek Anand, Jayant Singla | ||||||||||
|
Classification Of Emotions From EEG Using K-Nn Classifier | |||||||||||
Page(s): | 42-45 | ||||||||||
Author | Vaishnavi L. Kaundanya, Anita Patil, Ashish Panat | ||||||||||
|
PLC Scada Based Boiler Control Operation | |||||||||||
Page(s): | 46-50 | ||||||||||
Author | Gowtham. N, Jayandhan.V.K, Karthik.K | ||||||||||
|
A Novel Approach Of Low Power Area And Delay Efficient Ladder Fischer Carry Select Adder | |||||||||||
Page(s): | 51-55 | ||||||||||
Author | Ayyappadas PS, Jisha Jacob | ||||||||||
|
Designing For Advance Identification Of Inevitable Drowsiness Using Galvanic Skin Response | |||||||||||
Page(s): | 56-59 | ||||||||||
Author | Muruganezhumali, Venkatsubramaniam | ||||||||||
|
Identification Of Generation Source At Consumer Entity Of Deregulated System | |||||||||||
Page(s): | 60-65 | ||||||||||
Author | Mayuri R. Natkut, N.D.Ghawghawe | ||||||||||
|
Properties And Effects Of Copper Slag In Concrete | |||||||||||
Page(s): | 66-70 | ||||||||||
Author | M. V. Patil | ||||||||||
|
Filter Unwanted Messages On OSN User Wall | |||||||||||
Page(s): | 71-74 | ||||||||||
Author | Pankaj.A.Kamble, Rahul. S. Dudhane, Amol O. Gharpande | ||||||||||
|
Effective Broadcast Scheduling In Wireless Sensor Network By Optimization Of Latency | |||||||||||
Page(s): | 75-79 | ||||||||||
Author | A.Fathima Ramzi, N. Sabiyath Fatima | ||||||||||
|
Watermarking Scheme For Image Content Authentication | |||||||||||
Page(s): | 80-84 | ||||||||||
Author | K.Balasamy M.E., Ishwarya G, Mahalakshmi M | ||||||||||
|
Fabrication of S.I. Engine To Use Acetylene As Fuel | |||||||||||
Page(s): | 85-88 | ||||||||||
Author | Suyash Kamal Soni, Rahul Jain, Adarsh Choubey, Abhineet Sharma | ||||||||||
|
Evaluation System For Our Social Private Cloud Computing | |||||||||||
Page(s): | 89-92 | ||||||||||
Author | Jamilah Jaha, Navrati Saxena, Rayan Jaha | ||||||||||
|
Wideband Code Division Multiple Access | |||||||||||
Page(s): | 93-103 | ||||||||||
Author | Brajbala Modi, Pallavi Pahadiya | ||||||||||
|
Distributed Event Detection In Wireless Sensor Network For Disaster Management | |||||||||||
Page(s): | 104-107 | ||||||||||
Author | Monali Dhote, Priyanka Gulhane, Monika Pawar, Mamta Ajmire | ||||||||||
|
Energetic Multicast Traffic Grooming In WDM Networks With Re-Configurable Light-Trees | |||||||||||
Page(s): | 108-111 | ||||||||||
Author | C.Ganesh Kumar, K.Aparna | ||||||||||
|