APPL-1331 | Wheelchair Control Using Eye, Head and Oral Movements Poonam S. Gajwani and Sharda A. Chhabria |
APPL-1332 | FEAST — A Multistep, Feedback Centric, Freshness Oriented Search Engine K. S. Kuppusamy and G. Aghila |
APPL-1333 | Performance Analysis of Web Service under DDoS Attacks Monika Sachdeva, Krishan Kumar, Gurvinder Singh and Kuldip Singh |
APPL-1334 | Use of Artificial Neural Network in Design of Symmetric Cipher Vidya R. Kulkarni, Rashmi M. Jogdand and Sulabha S. Apte |
APPL-1335 | A Prototype Model to Generate Attack Patterns Towards Application Security Metric Generation K. Raja Sekhar, L. S. S. Reddy, U. Jyothi Kameswari and William Kumar Moses |
APPL-1338 | Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network Yudhvir Singh and Yogesh Chaba |
APPL-1339 | Wireless Data Transfer from an Energy Meter M. H. Nerkar, R. K. Navandar and S. M. Jagtap |
APPL-1340 | Implementation of Codec Driver for Network Embedded Devices B. I. D. Kumar, J. Hanumanthappa, K. Thippeswamy and D. H. Manjaiah |
APPL-1341 | Implementation and Design of an Image Based Steganographic Model Souvik Bhattacharyya and Gautom Sanyal |
APPL-1343 | Packet Sniffing: Network Wiretapping Nimisha P. Patel, Rajan G. Patel and Dhiren R. Patel |
APPL-1344 | A Verification Framework for Analyzing Security Implementations in an Enterprise LAN P. Bera, Pallab Dasgupta and S. K. Ghosh |
APPL-1345 | Next Generation of Auto-ID: Applying RFID Technology Rajan G. Patel, Nimisha P. Patel and Dhiren R. Patel |