2009 First International Conference on Computational Intelligence, Communication Systems and Networks, 2009
... [10] Ioannis N. Kouris, Christos H. Makris, Athanasios K. Tsakalidis, "Effic... more ... [10] Ioannis N. Kouris, Christos H. Makris, Athanasios K. Tsakalidis, "Efficient automatic discovery of 'hot' itemsets", Information Processing Letters, Volume 90, Issue 2, Pages: 65 - 72, 2004. ... 52-62, December 1987. [36] M. Stonebreaker, E.Hanson and S.Potamianos, A Rule ...
2009 First International Conference on Computational Intelligence, Communication Systems and Networks, 2009
Page 1. Image Clustering using Color and Texture Manish Maheshwari Dr. Sanjay Silakari Dr. Mahesh... more Page 1. Image Clustering using Color and Texture Manish Maheshwari Dr. Sanjay Silakari Dr. Mahesh Motwani Department of Computer Science & Application, Makhanlal C. National University of Journalism and Communication, Bhopal, MP, India ...
2010 International Conference on Computational Intelligence and Communication Networks, 2010
Encryption is used to securely transmit data in open networks. Each type of data has its own feat... more Encryption is used to securely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper, we introduce a Elliptic Curve Cryptography (ECC) with knapsack for image encryption and analysis the result. The results showed that the less Encryption Time, less
International Conference on Information Technology: New Generations, 2009
In this paper a combined method of image compression and encryption is presented. Unlike earlier ... more In this paper a combined method of image compression and encryption is presented. Unlike earlier method of image compression and encryption presented separately. The model is achieved by using discrete wavelet transform (DWT) of any image is decompose into n levels, which corresponds to higher frequency band and then apply RLE for each decomposition blocks. The encryption part of this
2009 Sixth International Conference on Information Technology: New Generations, 2009
Abstract Modern wireless communication system based on wireless sensor network is strictly depend... more Abstract Modern wireless communication system based on wireless sensor network is strictly depends on medium access mechanism to improve its performance. CSMA is modifying here in its CSMA/CA format and trying to enhancing its performance same as ...
2009 First International Conference on Computational Intelligence, Communication Systems and Networks, 2009
... [10] Ioannis N. Kouris, Christos H. Makris, Athanasios K. Tsakalidis, "Effic... more ... [10] Ioannis N. Kouris, Christos H. Makris, Athanasios K. Tsakalidis, "Efficient automatic discovery of 'hot' itemsets", Information Processing Letters, Volume 90, Issue 2, Pages: 65 - 72, 2004. ... 52-62, December 1987. [36] M. Stonebreaker, E.Hanson and S.Potamianos, A Rule ...
2009 First International Conference on Computational Intelligence, Communication Systems and Networks, 2009
Page 1. Image Clustering using Color and Texture Manish Maheshwari Dr. Sanjay Silakari Dr. Mahesh... more Page 1. Image Clustering using Color and Texture Manish Maheshwari Dr. Sanjay Silakari Dr. Mahesh Motwani Department of Computer Science & Application, Makhanlal C. National University of Journalism and Communication, Bhopal, MP, India ...
2010 International Conference on Computational Intelligence and Communication Networks, 2010
Encryption is used to securely transmit data in open networks. Each type of data has its own feat... more Encryption is used to securely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper, we introduce a Elliptic Curve Cryptography (ECC) with knapsack for image encryption and analysis the result. The results showed that the less Encryption Time, less
International Conference on Information Technology: New Generations, 2009
In this paper a combined method of image compression and encryption is presented. Unlike earlier ... more In this paper a combined method of image compression and encryption is presented. Unlike earlier method of image compression and encryption presented separately. The model is achieved by using discrete wavelet transform (DWT) of any image is decompose into n levels, which corresponds to higher frequency band and then apply RLE for each decomposition blocks. The encryption part of this
2009 Sixth International Conference on Information Technology: New Generations, 2009
Abstract Modern wireless communication system based on wireless sensor network is strictly depend... more Abstract Modern wireless communication system based on wireless sensor network is strictly depends on medium access mechanism to improve its performance. CSMA is modifying here in its CSMA/CA format and trying to enhancing its performance same as ...
Uploads
Papers by Sanjay Silakari