# |
Details |
Page No |
Download |
1. |
Design and Structural Modification of Industrial Plateau Honing Machine
R Kumar, Nandeesha H L |
1-9 |
|
2. |
5G Communication Technology – Do They Interfere with Flight Communication Signals
Shiva Prasad N G, Harish V, Ashok G V |
10-14 |
|
3. |
Design Thinking Approach to Manage Home Inventory
Pankaj S. Ardak |
15-18 |
|
4. |
Tribological Behaviour of Aluminium/WC Metal Matrix Composite Using ANN
Deepak S, Balasubramanya H S, Nandeesha H L, Veeresh Kumar G B, Divakara Shetty A S |
19-24 |
|
5. |
Green Accounting for a Sustainable Economy: A Case Study of Marico Ltd
Srivaideshwari S, Sai Sushmitha V |
25-30 |
|
6. |
Literature Survey on Big-Data Analytics and Tools
Aruna Kumar P, Pavan Kumar M P, Suchethana H C |
31-44 |
|
7. |
Experimental Study on Influence of Nature of Fluids on Darcy’s Friction Coefficient
Kanchana H J |
45-48 |
|
8. |
An approach to achieve message integrity using SHA-256 and Elliptic Curve Cryptography with Salting
Ganavi M, Prabhudeva S |
49-56 |
|
9. |
Securing D2D Communication using Lightweight Cryptography
Ajith Kumar V, K Satyanarayan Reddy |
57-66 |
|
10. |
Review report on Security Challenges in D2D Communication
Ajith Kumar V, K Satyanarayan Reddy |
67-75 |
|
11. |
Survey on Robust Block-Chain Assisted Internet of Medical Things (IoMT) Infrastructure for Healthcare Sector
Chandini A.G, P.I Basarkod |
76-86 |
|
12. |
Securing the Information Contents in Images based on Cellular Automata and Genetic Operations – A Parallel Approach
Jalesh Kumar, Chakrapani D S |
87-92 |
|
13. |
LightWeight Public Key Cryptography Based on Cyclic Group of 6x Mod 11 and its Application to Image Encryption
Deeksha, Manisha Shalini Mascarenhas, Raghavendra A |
93-100 |
|
14. |
A Comprehensive study on RSA Prime Factorization Algorithms
Murthy D H R |
101-104 |
|
15. |
Cryptographic Key Management Using Elliptic Curve X448 for Multiuser Environment
Mohan Naik R, Sowmya T K |
105-111 |
|
16. |
Application of Superpixels Segmentation in Digital Image Forgery Detection
Shwetha B |
112-116 |
|
17. |
Light Weight Cryptographic Algorithms- A Comparison for IoT Sensor Data
Latha P, Andhe Pallavi |
117-120 |
|
18. |
Context Sensitive Privacy Algorithm Method for Users in Cloud
H. Manoj T. Gadiyar, Thyagaraju G S, R H Goudar |
121-125 |
|