1 |
Dual Steganography for Hiding Video in Video
E. Ramya , P. Selvigrija
|
75-79 |
|
2 |
Dimensionality Reduction Techniques for Document Clustering- A Survey
G.Kalaivani , K.Aravi
|
80-83 |
|
3 |
Lung Disease Classification Using Support Vector Machine
D.KAVINYA , DR. A.GNANA BASKARAN
|
84-86 |
|
4 |
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
T.Punitha , M.Sindhu
|
87-90 |
|
5 |
Using FRD Algorithm for Cluster Head Selection and Certificate Revocat..
V.Dhinesh , M.Sivakumar
|
91-95 |
|
6 |
Hyper spectral Image Analysis using Harmonic Analysis with BFO Optimiz..
Keerthika.S , Sivaranjini.R
|
96-102 |
|
7 |
A Survey on Analysis of Reversible Data Hiding in Encrypted Image
Nithya.R , M.Usha
|
103-108 |
|
8 |
An Approach to Verification Witness by Information Reuse
Mrs.L.Leema Priyadarsini , Mrs.D.Vidhyabharathi
|
109-111 |
|
9 |
A Survey on Various Resource Allocation Policies in Cloud Computing En..
S.Sathishkumar , M.Krishnamoorthi
|
112-116 |
|
10 |
A Hybrid Approach of RFID and WSN System for Efficient Data Collection
A.Sivabalasubramanian , V. Jackins
|
117-120 |
|
11 |
Security in Mobile Adhoc Networks
Ms.Soumya.P.S , Mrs.T.Manjula
|
121-125 |
|
12 |
Design of Zeta Converter Based Electronic Ballast for Fluorescent lamps
G.Nithya , B.Vinoth Kumar
|
126-132 |
|
13 |
Dynamic Load Balancing in Multimedia Cloud Computing with GA an immigr..
Mahadevan T , Dr M Newlin Rajkumar
|
133-136 |
|
14 |
An Improved Integration Test Case from Unit Tests
P Maria shalini , N.Basker
|
137-140 |
|