Volume 2 :: Issue 2 :: IJACECT

Table Of Content                                                               editorialEditorial
Sl. No. Title and Authors Page No.
1. SECURE BANKING APPLICATION USING VISUAL CRYPTOGRAPHY AGAINST FAKE WEBSITE AUTHENTICITY THEFT
Chandrasekhara & Jagadisha
1-5
2. VHDL IMPLEMENTATION OF 1553 PROTOCOL USING ACTEL IP CORE
Roopesh N.M, Archana & Lakshmi Narasimhan
6-11
3. SYNTHESIS USING 65NM LIBRARY OF SPI MASTER-SLAVE WITH WISHBONE INTERFACE
V. Raghava Thej Deep & Sujatha S
12-16
4. REDUCING ACCESS DELAY IN MACHINE TO MACHINE WIRELESS COMMUNICATION OVER LTE
Gyan Prakash Pandey & Jayaraj N
17-22
5. RTVTI (REAL-TIME VEHICULAR TRAFFIC INFORMATION) ON CITY ROADS FOR VANET USING QUALNET SIMULATION
Neha Khan, Swapna S, Qumera Sultana & Manjunath P S
23-29
6. RS RESILIENT STEGANOGRAPHY TECHNIQUE WITH GA BASED OPTIMIZATION
Jigyashu Keshri & Sharmila. K. P
30-38
7. COMPARISON OF INITIAL AND CONTINUOUS NEIGHBOR DISCOVERY IN ASYNCHRONOUS SENSOR NETWORKS
Laxmi Shabadi, Praveen . D, Ravi. K, Sidram Raddy & Vinod. P
39-43
8. OPTIMIZED CHARACTERIZATION METHOD OF IO’S OF INTEGRATED CIRCUITS
Surendra Nandyala & Latha H N
44-48
9. MULTI-MODALITY IMAGE FUSION OF PET/CT BY INTEGRATING METHODS, DWT-PCA
Sharanabasavaraj, Guruprasad. S , M.Z Kurian & H. N. Suma
49-53
10. IMPLEMENTATION OF FAST DOUBLE PARALLEL IMAGE PROCESSING USING SORT OPTIMIZATION ALGORITHM
Sawant Sapna Sham & Roopa M
54-58
11. RECOGNITION OF EMOTION FROM MARATHI SPEECH USING MFCC AND DWT ALGORITHMS
Dipti D. Joshi, M.B. Zalte
59-63
12. DESIGN OF SPACE DATA LINK SUBLAYEROF TELECOMMAND DECODER USING CCSDS PROTOCOL
Triveni K, Shilpa K.C
64-69
13. ASIC IMPLEMENTATION OF 128 BIT KEY RC5 CIPHER
Raghunatha & Sowmya Sunkara
70-74
14. ASIC IMPLEMENTATION OF MULTI-THREADED PIPELINED AES CRYPTO PROCESSOR
Subramanya. N & Prapulla .G
75-79
15. Authentication of Grayscale Document Images by using PNG Image with a Data Repair Capability
T.M.Prasanth, K.Jansi Lakshmi, I.Suneetha
80-83