#1
|
|
Design and Structural Modification of Industrial Plateau Honing Machine
R Kumar, Nandeesha H L
|
1 - 9
|
#2
|
|
5G Communication Technology – Do They Interfere with Flight Communication Signals
Shiva Prasad N G, Harish V, Ashok G V
|
10 - 14
|
#3
|
|
Design Thinking Approach to Manage Home Inventory
Pankaj S. Ardak
|
15 - 18
|
#4
|
|
Tribological Behaviour of Aluminium/WC Metal Matrix Composite Using ANN
Deepak S, Balasubramanya H S, Nandeesha H L, Veeresh Kumar G B, Divakara Shetty A S
|
19 - 24
|
#5
|
|
Green Accounting for a Sustainable Economy: A Case Study of Marico Ltd
Srivaideshwari S, Sai Sushmitha V
|
25 - 30
|
#6
|
|
Literature Survey on Big-Data Analytics and Tools
Aruna Kumar P, Pavan Kumar M P, Suchethana H C
|
31 - 44
|
#7
|
|
Experimental Study on Influence of Nature of Fluids on Darcy’s Friction Coefficient
Kanchana H J
|
45 - 48
|
#8
|
|
An approach to achieve message integrity using SHA-256 and Elliptic Curve Cryptography with Salting
Ganavi M, Prabhudeva S
|
49 - 56
|
#9
|
|
Securing D2D Communication using Lightweight Cryptography
Ajith Kumar V, K Satyanarayan Reddy
|
57 - 66
|
#10
|
|
Review report on Security Challenges in D2D Communication
Ajith Kumar V, K Satyanarayan Reddy
|
67 - 75
|
#11
|
|
Survey on Robust Block-Chain Assisted Internet of Medical Things (IoMT) Infrastructure for Healthcare Sector
Chandini A.G, P.I Basarkod
|
76 - 86
|
#12
|
|
Securing the Information Contents in Images based on Cellular Automata and Genetic Operations – A Parallel Approach
Jalesh Kumar, Chakrapani D S
|
87 - 92
|
#13
|
|
LightWeight Public Key Cryptography Based on Cyclic Group of 6x Mod 11 and its Application to Image Encryption
Deeksha, Manisha Shalini Mascarenhas, Raghavendra A
|
93 - 100
|
#14
|
|
A Comprehensive study on RSA Prime Factorization Algorithms
Murthy D H R
|
101 - 104
|
#15
|
|
Cryptographic Key Management Using Elliptic Curve X448 for Multiuser Environment
Mohan Naik R, Sowmya T K
|
105 - 111
|
#16
|
|
Application of Superpixels Segmentation in Digital Image Forgery Detection
Shwetha B
|
112 - 116
|
#17
|
|
Light Weight Cryptographic Algorithms- A Comparison for IoT Sensor Data
Latha P, Andhe Pallavi
|
117 - 120
|
#18
|
|
Context Sensitive Privacy Algorithm Method for Users in Cloud
H. Manoj T. Gadiyar, Thyagaraju G S, R H Goudar
|
121 - 125
|