# Details Page No
#1
Design and Structural Modification of Industrial Plateau Honing Machine
R Kumar, Nandeesha H L
1 - 9
#2
5G Communication Technology – Do They Interfere with Flight Communication Signals
Shiva Prasad N G, Harish V, Ashok G V
10 - 14
#3
Design Thinking Approach to Manage Home Inventory
Pankaj S. Ardak
15 - 18
#4
Tribological Behaviour of Aluminium/WC Metal Matrix Composite Using ANN
Deepak S, Balasubramanya H S, Nandeesha H L, Veeresh Kumar G B, Divakara Shetty A S
19 - 24
#5
Green Accounting for a Sustainable Economy: A Case Study of Marico Ltd
Srivaideshwari S, Sai Sushmitha V
25 - 30
#6
Literature Survey on Big-Data Analytics and Tools
Aruna Kumar P, Pavan Kumar M P, Suchethana H C
31 - 44
#7
Experimental Study on Influence of Nature of Fluids on Darcy’s Friction Coefficient
Kanchana H J
45 - 48
#8
An approach to achieve message integrity using SHA-256 and Elliptic Curve Cryptography with Salting
Ganavi M, Prabhudeva S
49 - 56
#9
Securing D2D Communication using Lightweight Cryptography
Ajith Kumar V, K Satyanarayan Reddy
57 - 66
#10
Review report on Security Challenges in D2D Communication
Ajith Kumar V, K Satyanarayan Reddy
67 - 75
#11
Survey on Robust Block-Chain Assisted Internet of Medical Things (IoMT) Infrastructure for Healthcare Sector
Chandini A.G, P.I Basarkod
76 - 86
#12
Securing the Information Contents in Images based on Cellular Automata and Genetic Operations – A Parallel Approach
Jalesh Kumar, Chakrapani D S
87 - 92
#13
LightWeight Public Key Cryptography Based on Cyclic Group of 6x Mod 11 and its Application to Image Encryption
Deeksha, Manisha Shalini Mascarenhas, Raghavendra A
93 - 100
#14
A Comprehensive study on RSA Prime Factorization Algorithms
Murthy D H R
101 - 104
#15
Cryptographic Key Management Using Elliptic Curve X448 for Multiuser Environment
Mohan Naik R, Sowmya T K
105 - 111
#16
Application of Superpixels Segmentation in Digital Image Forgery Detection
Shwetha B
112 - 116
#17
Light Weight Cryptographic Algorithms- A Comparison for IoT Sensor Data
Latha P, Andhe Pallavi
117 - 120
#18
Context Sensitive Privacy Algorithm Method for Users in Cloud
H. Manoj T. Gadiyar, Thyagaraju G S, R H Goudar
121 - 125