Search Results - "Jothy, N."

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    A secure color image steganography using integer wavelet transform by Jothy, N., Anusuyya, S.

    “…Steganography is a technology that is used to conceal the information within some objects such as image, audio or video so that no one can sense the…”
    Get full text
    Conference Proceeding
  2. 2

    An efficient power multiple valued look up table for adder circuit using quaternary FPGA by Anbarasi, M., Jothy, N.

    “…VLSI technology is used for designing, verifying, fabricating and testing a chip. In look up table (LUT) system, the more interconnections are increasingly the…”
    Get full text
    Conference Proceeding
  3. 3

    Maximising connectivity and throughput using effective routing protocol in vehicular ad-hoc network by Jothy, N., Madhumathy, M., Jayanthi, K.

    “…In VANETs, the vehicles are nodes, which move at very high speed leading to frequent changes in topology resulting in the loss of data that causes failure in…”
    Get full text
    Conference Proceeding
  4. 4

    Secured Routing in VANETs Using Lightweight Authentication and Key Agreement Protocol by Sandou, D. Kiruba, Jothy, N., Jayanthi, K.

    “…Vehicular Ad hoc Network (VANETs) allows the vehicles on the roads to form a self-organized network and is blooming up in a exotic way to support intelligent…”
    Get full text
    Conference Proceeding