APPL-1315 | SACOM: Secure Ant Colony Optimization for MANETs K. R. Ramkumar, M. Ravichandran, N. Hemachandar, D. Manoj Prasadh and M. Ganesh Kumar |
APPL-1318 | Reversible, Multilayered Watermarking Scheme for Fundus Images Using Intra-Plane Difference Expanding S. Poonkuntran, R. S. Rajesh and P. Eswaran |
APPL-1320 | Fibonacci Based Position Substitution (FBPS) Encoder for Secured Message Transmission J. K. Mandal and Mangalmay Das |
APPL-1321 | BER Analysis For WCDMA System In Radio Environment Suyeb Ahmed Khan, Jasvir Singh and Mahmood Mian |
APPL-1323 | Analysis of Constructive Neural Network Learning Algorithms for Pattern Classification S. S. Sridhar and M. Ponnavaikko |
APPL-1324 | Assessment of Strong User Authentication Schemes in Cloud Based Computing Mohit Mathur and Nitin Saraswat |
APPL-1325 | Carry Value Transformation (CVT): It's Application in Fractal Formation Pabitra Pal Choudhury, Sudhakar Sahoo, Birendra Kumar Nayak and Sk. Sarif Hassan |
APPL-1326 | Study of the Impact of Various Network Traffic Parameters to Improve QoS H. K. Harish, U. P. Kulkarni and A. R. Yardi |
APPL-1327 | Efficient Wireless Channel Quality Feedback Schemes Using Optimization Techniques Balamurali |
APPL-1328 | A New Approach for Clustering Variable Length Documents Niraj Kumar and Kannan Srinathan |
APPL-1329 | SHA -256 Based n-Bit EPC generator for RFID Tracking Simulator M. Ayoub Khan and Sanjay Ojha |
APPL-1330 | Enhancing Mobile Agent Applications with Security and Fault Tolerant Capabilities R. N. Sreedevi, U. N. Geeta, U. P. Kulkarni and A. R. Yardi |