CONFERENCE DATE: Mysore, 14-05-2014 |
Conflict-Free Transmission Scheduling for Real-Time Queries in Wireless Sensor Networks | |||||||||||
Page(s): | 01-06 | ||||||||||
Author | Naif Abdul Khader, N.Jayaraj | ||||||||||
|
Comparative Analysis of AODV, olsr, tooska Scheme and MAHR Routing Protocols in Mobile Adhoc Network | |||||||||||
Page(s): | 07-11 | ||||||||||
Author | Pooja rani, Ravindra V. Eklarker | ||||||||||
|
Ventricular Arrhythmia Classification By Neural Network Classifier Using Wavelet Transform Features | |||||||||||
Page(s): | 12-16 | ||||||||||
Author | Pannaga P. Kowshik, K. Uma Rani | ||||||||||
|
Implementation of Dense Matrix Multiplication | |||||||||||
Page(s): | 17-20 | ||||||||||
Author | Amrutha K., Ravi Kumar M. N., Panduranga H. T. | ||||||||||
|
Reserving Room before Encryption Using Reversible Data Hiding Technique | |||||||||||
Page(s): | 21-24 | ||||||||||
Author | Divya H. T., Padmaja Devi G., Panduranga H.T. | ||||||||||
|
HCCC and Slbc For Audio Signals | |||||||||||
Page(s): | 25-28 | ||||||||||
Author | Ruchitha Sinha, B.R.Sujatha, Panduranga H. T. | ||||||||||
|
Cloud Based Authentication System | |||||||||||
Page(s): | 29-31 | ||||||||||
Author | Vishal Saswade | ||||||||||
|
Model Based Face Recognition Using Kernel Linear Discriminant Analysis | |||||||||||
Page(s): | 32-35 | ||||||||||
Author | Edward Clint A, Shiloah Elizabeth D | ||||||||||
|
Implementation of VANET Routing Algorithm For Vehicular Traffic Information | |||||||||||
Page(s): | 36-39 | ||||||||||
Author | Pooja.N, Hemalatha SM, Adarsh D, Triveni CL | ||||||||||
|
Real Time Implementation of Optical Flow Switching | |||||||||||
Page(s): | 40-42 | ||||||||||
Author | Usha.M, Chaithra.R, Triveni CL | ||||||||||
|
Safety Guard For Blind Using 8051 | |||||||||||
Page(s): | 43-44 | ||||||||||
Author | Saneesh C T, Deepashree A V, Gagana Divya, Trupti Agrawal | ||||||||||
|
A Novel Method For Downlink Frequency Allocation For Next Generation Wireless Networks | |||||||||||
Page(s): | 45-47 | ||||||||||
Author | Praveenkumar Pujar, Shoaib Kamal, Jose Alex Mathew, Kumari Shruthi | ||||||||||
|
Autonomous Intravenous Infusion System & Health Monitoring | |||||||||||
Page(s): | 48-50 | ||||||||||
Author | Krishnananda, Manjunatha N, Nilay Srivastava, Pradeep Kumar K, Pavan R | ||||||||||
|
Design and Implementation of Multi Carrier CDMA for Wireless Communication Systems | |||||||||||
Page(s): | 51-55 | ||||||||||
Author | Devikarani H S, Ganashree H R, Triveni C L | ||||||||||
|
Reliability in Wireless Sensor Networks by Multipath routing of Encoded Data | |||||||||||
Page(s): | 56-59 | ||||||||||
Author | N S Rekha | ||||||||||
|
Novel Approach on Cancer Detection | |||||||||||
Page(s): | 60-63 | ||||||||||
Author | Hariprasad S. A., Saneesh Cleatus, Anjali Chitaranjan , Ashwini Datta N., Monisha M. Ganesh. | ||||||||||
|
An Efficient Spectrum Sharing Scheme Between Cellular Users And Ad-Hoc Device To Device Users | |||||||||||
Page(s): | 64-67 | ||||||||||
Author | Kumari Shruthi, Fathimath Raihan, Jose Alex Mathew | ||||||||||
|
API Bazzar for Application Sharing Services on-Demand Scenarios by Webservices(soap) A Case Study. | |||||||||||
Page(s): | 68-73 | ||||||||||
Author | Amit Kumar Mannur, Mydhili K Nair | ||||||||||
|
Comparison of Different Attacks on LEACH Protocol In WSN | |||||||||||
Page(s): | 74-77 | ||||||||||
Author | Siddiq Iqbal, Aravind Srinivas S P, Sudarshan G, Sagar S Kashyap | ||||||||||
|
Secured Text And Image Encryption Based On Session | |||||||||||
Page(s): | 78-83 | ||||||||||
Author | Shruthi K.S., G.Padmaja Devi, P.C.Srikanth | ||||||||||
|
Color Image Compression And Encryption Using Spiht And Stream Cipher Algorithm | |||||||||||
Page(s): | 84-88 | ||||||||||
Author | Lavanya K S, Ravi Kumar, P C Srikanth | ||||||||||
|