Table Of
Content
Editorial |
| Sl. No. |
Title and Authors |
Page No. |
| 1. |
SECURE BANKING APPLICATION USING VISUAL CRYPTOGRAPHY AGAINST FAKE WEBSITE AUTHENTICITY THEFT
Chandrasekhara & Jagadisha
|
1-5 |
| 2. |
VHDL IMPLEMENTATION OF 1553 PROTOCOL USING ACTEL IP CORE
Roopesh N.M, Archana & Lakshmi Narasimhan
|
6-11 |
| 3. |
SYNTHESIS USING 65NM LIBRARY OF SPI MASTER-SLAVE WITH WISHBONE INTERFACE
V. Raghava Thej Deep & Sujatha S
|
12-16 |
| 4. |
REDUCING ACCESS DELAY IN MACHINE TO MACHINE WIRELESS COMMUNICATION OVER LTE
Gyan Prakash Pandey & Jayaraj N
|
17-22 |
| 5. |
RTVTI (REAL-TIME VEHICULAR TRAFFIC INFORMATION) ON CITY ROADS FOR VANET USING QUALNET SIMULATION
Neha Khan, Swapna S, Qumera Sultana & Manjunath P S
|
23-29 |
| 6. |
RS RESILIENT STEGANOGRAPHY TECHNIQUE WITH GA BASED OPTIMIZATION
Jigyashu Keshri & Sharmila. K. P
|
30-38 |
| 7. |
COMPARISON OF INITIAL AND CONTINUOUS NEIGHBOR DISCOVERY IN ASYNCHRONOUS SENSOR NETWORKS
Laxmi Shabadi, Praveen . D, Ravi. K, Sidram Raddy & Vinod. P
|
39-43 |
| 8. |
OPTIMIZED CHARACTERIZATION METHOD OF IO’S OF INTEGRATED CIRCUITS
Surendra Nandyala & Latha H N
|
44-48 |
| 9. |
MULTI-MODALITY IMAGE FUSION OF PET/CT BY INTEGRATING METHODS, DWT-PCA
Sharanabasavaraj, Guruprasad. S , M.Z Kurian & H. N. Suma
|
49-53 |
| 10. |
IMPLEMENTATION OF FAST DOUBLE PARALLEL IMAGE PROCESSING USING SORT OPTIMIZATION ALGORITHM
Sawant Sapna Sham & Roopa M
|
54-58 |
| 11. |
RECOGNITION OF EMOTION FROM MARATHI SPEECH USING MFCC AND DWT ALGORITHMS
Dipti D. Joshi, M.B. Zalte
|
59-63 |
| 12. |
DESIGN OF SPACE DATA LINK SUBLAYEROF TELECOMMAND DECODER USING CCSDS PROTOCOL
Triveni K, Shilpa K.C
|
64-69 |
| 13. |
ASIC IMPLEMENTATION OF 128 BIT KEY RC5 CIPHER
Raghunatha & Sowmya Sunkara
|
70-74 |
| 14. |
ASIC IMPLEMENTATION OF MULTI-THREADED PIPELINED AES CRYPTO PROCESSOR
Subramanya. N & Prapulla .G
|
75-79 |
| 15. |
Authentication of Grayscale Document Images by using PNG Image with a Data Repair Capability
T.M.Prasanth, K.Jansi Lakshmi, I.Suneetha
|
80-83 |