Search Results - "Jothy, N."
-
1
A secure color image steganography using integer wavelet transform
Published in 2016 10th International Conference on Intelligent Systems and Control (ISCO) (01-01-2016)“…Steganography is a technology that is used to conceal the information within some objects such as image, audio or video so that no one can sense the…”
Get full text
Conference Proceeding -
2
An efficient power multiple valued look up table for adder circuit using quaternary FPGA
Published in 2016 10th International Conference on Intelligent Systems and Control (ISCO) (01-01-2016)“…VLSI technology is used for designing, verifying, fabricating and testing a chip. In look up table (LUT) system, the more interconnections are increasingly the…”
Get full text
Conference Proceeding -
3
Maximising connectivity and throughput using effective routing protocol in vehicular ad-hoc network
Published in 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (01-03-2017)“…In VANETs, the vehicles are nodes, which move at very high speed leading to frequent changes in topology resulting in the loss of data that causes failure in…”
Get full text
Conference Proceeding -
4
Secured Routing in VANETs Using Lightweight Authentication and Key Agreement Protocol
Published in 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (01-03-2018)“…Vehicular Ad hoc Network (VANETs) allows the vehicles on the roads to form a self-organized network and is blooming up in a exotic way to support intelligent…”
Get full text
Conference Proceeding