Объем 2, Проблема 1 (2014)

Специальная статья

Enhanced Data Transmission for Wireless Sensor Networks

  • Karthick.S, Senthil Kumar.V

Специальная статья

An Enhanced Rationalize Security and Efficient Data Gathering In Wireless Sensor Networks

  • Karthick.S, Senthil Kumar.V

Специальная статья

Load Balanced Connection Aware Clustering Algorithm for Wireless Sensor Networks

  • S.Balaganesh, S.Periyasamy

Специальная статья

A NEIGHBOR COVERAGE BASED ROUTING BY GOOD NODE DETECTION IN MANET’S

  • J.Priyanka Sheela, Mr.S. Sundar Raj

Специальная статья

Extracting the Information by Ranking Techniques to Increase the Privacy of Search Engine

  • C.Parimala, Prof.B.Sakthivel

Специальная статья

USING ERED-FEC MECHANISM TO IMPROVING VIDEO QUALITY TRANSMISSION ON WiMAX

  • K.Nisha, M.Anitha

Специальная статья

Secure Reputation Mechanism For Unstructured Peer To Peer System

  • N. Vijaya Kumar., Prof. Senthilnathan

Специальная статья

Enhancing Secured Information in Online Social Network by Text Classifier

  • A.Maheshwari, Prof.B.Sakthivel

Специальная статья

Avoiding Traffic Congestion Using Position Based Routing Protocol in VANET

  • Ms. D. Jeya, Mr P. Ranjith Kumar, Mr G. Naresh kumar

Специальная статья

Visual Impairment and Blindness Identification Using Mathematical Analysis in the Retinal Vessels

  • Decia Augustian, A.Sampath Kumar

Специальная статья

MULTI FOCUS IMAGE FUSION USING MULTI SPECTRAL AND PAN IMAGES

  • Prabhavathi. P, Mr. Ganesh Kumar. K. (Ph.D)

Специальная статья

Cancer Cell Detection Using Mathematical Morphology

  • Sivappriya T , Muthukumaran K

Специальная статья

A Large Scale Analysis Of Information Re-Finding System

  • Prakash.M , Karthika.D, Sophia.J

Специальная статья

Improving Service credibility in Password Authenticated Peer Services

  • Vignesh.R, Karthikeyan.C, Satheesh.K

Специальная статья

TSROD: Time Synchronization By Reducing Ocean’s Delay In Underwater Wireless Networks

  • Ms.R.Vaishnavi karthika, Mr.M.N.Karuppusamy

Специальная статья

Computer Vision Approach for Retrieving Unconstrained Blurred Images

  • K.Sridevi

Специальная статья

Intelligent Wireless Street Lighting System

  • S. Sugapriya, Prof. A. Natarajan

Специальная статья

An improved Automatic Virus particle Detection method based on adaptive K-NN classifier

  • Mr. Dinesh Kumar M.E., Desmond John

Специальная статья

An Enhanced Token Ring Technique for Overhead cut Detection Scheme in Distributed Mesh Networks

  • Mr.S.S.Aravinth, Mr.M.Ramkumar, Mr.S.Someswaran, Mr.K.Aravinthraj

Специальная статья

Secure Sharing Of Related Organization Records in Cloud Computing

  • S.Keerthana

Специальная статья

Design and Detection of Covert Timing Channels and Spyware Using Warden Technique

  • C.Logasundari, V.Menaka, R.Madhubala, G.Misal

Специальная статья

A New Approach For Collaborative Data Publishing Using Slicing And M-Privacy

  • Sathish.R, Silambarashi.G, Saranya.P, Santhosh Kumar.B

Специальная статья

Reachability of Open Source Software

  • R.Kamalraj, R. Sujatha, P. Srisathya

Специальная статья

Obtaining Optimal Software Effort Estimation Data Using Feature Subset Selection

  • Abirami.R, Sujithra.S, Sathishkumar.P, Geethanjali.N

Специальная статья

Collaborative Discovery and Verification of Neighbour position in MANET

  • R.Sagunthala, P.Sharmila, M.Somasundharam

Специальная статья

Seam Carving for Content Aware Video Compression

  • G. Suganya, S. Lavanya, G. Sheeba Farin, G. Karthick

Специальная статья

Regularized Sparse Kernel SFA with Decorrelation Filtering For Separating Correlated Sources

  • Rekha P, S. Shobana, M.E.

Специальная статья

New Dimensional Approach towards Fraps-Face Recognition after Plastic Surgery

  • Beema K.K, S. Shobana, M.E.

Специальная статья

Securing Location and trust extended authentication in mobile ad hoc network

  • Ms. Reshna Wilson A, Mr. Biju Balakrishnan

Специальная статья

Human Gait Based Gender Classification Using Energy Motion Approaches

  • Ms.P.Muthumari, Mrs.D.Suganya, Mrs.S.Ellammal

Специальная статья

Dynamic Resource Allocation And Distributed Video Transcoding Using Hadoop Cloud Computing

  • Shanthi.B.R, Prakash Narayanan.C

Специальная статья

Securable Routing And Elimination Of Adversary Attack From Manet

  • Sureka.N, Prof. S. Chandra Sekaran, M.E.

Специальная статья

Location Based Mobile Secure Social Networks

  • Roshan Sanu. Y, S. Uma Rani

Специальная статья

Intrution Resilience Using Self-Healing Mechanism In Mobile Unattended Wsns

  • Roshil K Das, J.Arun

Специальная статья

Safeguarding Scada Network by Captious State Based Filter

  • I.Karthika, Mr. M. Mohamed Musthafa

Специальная статья

Protection Of User’s Data Using Image Encryption Domain: Image Encryption

  • Balamurugan.S, S.Sureshkumar

Специальная статья

A Solid State Transformer Integrating Distributed Generation and Storage

  • Ponraj.T, Alex george

Специальная статья

Improving The Performance For Failure-Aware Resource Provisioning In Cloud

  • Priyanka P, A Geetha, Biju Balakrishnan

Специальная статья

Accomplishing Minimum Data Sets Transfer Cost in the Cloud through Ant Colony Optimization

  • Thahassin.C, A.Geetha, Raseek.C

Специальная статья

Reverberation Suppression of Noisy Speech Signal

  • Subha S, V.Murugan M.E., (Ph.D).

Специальная статья

Detection of Tricking Attack and Localization Of Deceivers In Multiple Wireless Networks

  • Srividhya.A, Ms.M. Anitha

Специальная статья

Large Scale of Content Distribution Using Homomorphic Hash Function

  • Sridevi K, Senthil Nathan K

Специальная статья

An Efficient Storage and a Method Of Network Monitoring Data Compression

  • Sivasakthi, Juveriya

Специальная статья

Profit Maximization in Cloud Computing

  • Saistha N, Senthil Nathan K

Специальная статья

Encryption Techniques for Storing Personal Health Details (PHR) In Privacy Cloud

  • Priya.C, Chandra Sekaran.S

Специальная статья

Mobile Ad-Hoc Networks Capacity Optimized Cooperative Communications

  • R.Karthik, B.Sakthivel

Специальная статья

High-Capacity Reversible Data Hiding In Binary Images by Using Pattern Substitution

  • C.Magishasini, C.Prakashnarayanan

Специальная статья

Low Power Consuming FFT Pipelined Processor

  • A.Soundrakumar

Специальная статья

Fault Secure Encoder and Decoder For Memory Applications

  • V.Jeevitha

Специальная статья

Detection of an Inflammatory Disease Based on Classification of Tissues in Brain MRI

  • R.Vidhya, Mrs.P.Rajarajeswari, Mrs.S.Ellammal

Специальная статья

The Analysis of Power Transformer from Differential Protection Using Back Propagation Neural Algorithm

  • T.Raja Pandi, MKNM.Sakthi Nagaraj, N.Panneer Selvam

Специальная статья

Design of Multi-region SAR Segmentation by Parametric

  • S.Narumalar, V. Madhan kumar

Специальная статья

Design of Wireless Framework for Energy Efficient Street Light Automation

  • P.Nithya, N.Kayalvizhi

Специальная статья

Error Reduction in WiMAX Deinterleaver Address Generator by Using Majority Logic Circuit

  • A.Nandhini, D.Poornima Devi

Специальная статья

Enhancing Security in MANET Using CCRVC Scheme

  • S.Herman Jeeva, D.Saravanan, RM.Chandrasekaran

Специальная статья

Enhanced Security in Manet Using Eaack To Detect Malicious Attack

  • K.Chinthanai Chelvan, I.Anbu Muthu, D.Saravanan

Специальная статья

Enhancing Security in Wireless Ad-Hoc Network Using ZKP

  • M.Soniya, P.Sabarinathan, S.Visnudharsini

Специальная статья

An Energy Efficient Multicast Routing Based On Genetic Algorithm for MANET

  • P.Prasanna, D.Saravanan, RM.Chandrasekaran

Специальная статья

Privacy Preserving Outsourcing for Frequent Itemset Mining

  • M. Arunadevi, R. Anuradha

Специальная статья

Cloud Computing Model for Large Scale System through Merkle Hash Tree

  • S.Dhivyabala, K.Gopalakrishnan

Специальная статья

Time Constrained Datadestruction Using Blowfish Algorithm In Cloud

  • R.K.Vinothraja, T.Krishnakaarthik

Специальная статья

A Fast Clustering Based Feature Subset Selection Using Affinity Propagation Algorithm

  • Mr. M. Senthil Kumar, Ms. V. Latha Jothi M.E

Специальная статья

Post Market Drug Analysis using Irregular Pattern Mining Scheme

  • Mr. S. Prakash, Ms. S. Kanjanadevi

Специальная статья

MULTI ORGANIZATION RECORD SHARING IN CLOUD COMPUTING USING ATTRIBUTEBASED ENCRYPTION

  • Mr. T. Krishnakumar, Ms. S. Kayalvili M.E.

Специальная статья

Anomaly Detection on Data Streams with High Dimensional Data Environment

  • Mr. D. Gokul Prasath, Dr. R. Sivaraj, M.E, Ph.D.

Специальная статья

Batch Verification Scheme for Economic Cloud Storage Services

  • K. Sudha, Mr. S. Sivaraj, ME

Специальная статья

Distributed Cache Model with Stability and Storage Management for MANET

  • S. Padmapriya, Mr. S. Sivaraj, ME

Специальная статья

Optimal Centroid Estimation Scheme for Multi Dimensional Clustering

  • K. Lalithambigai, Mr. S. Sivaraj, ME

Специальная статья

Decision Prevention Mechanism for Frequent Pattern Mining Process

  • L. Gomathi, Mr. A.T. Ravi, ME (Ph.D)

Специальная статья

Privacy Ensured Domain Name Query Scheme with Attack Detection Mechanism

  • M. Dhaarani, Mr. S. Sivaraj, ME

Специальная статья

Efficient Data Delivery Mechanism for Distributed Storages

  • S. Koperundevi, R. Anbarasu, ME

Специальная статья

Graph Clustering and Feature Selection for High Dimensional Data

  • K. Jaganath, Mr. P. Sasikumar

Специальная статья

Optimizing User Navigation with Pattern based Web Site Restructuring Scheme

  • Ms. Jissin Mary Kunjukutty, Ms. A.Priya, ME

Специальная статья

Multi Image Super Resolution and Blind Deconvolution

  • Lincy Annet Abraham, R.Manimekala

Специальная статья

Protecting DNS Query Communication against DDoS Attacks

  • Ms. R. Madhuranthaki, Ms. S. Umarani, M.E., (Ph.D)

Специальная статья

Image Fraud Identification Using Illuminant Analysis

  • P. Kaveen, Dr. G. Singaravel Ph.D.,

Специальная статья

Image Fraud Identification Using Illuminant Analysis

  • P. Kaveen, Dr. G. Singaravel Ph.D.,

Специальная статья

Privacy Preservation for User Profiles In Social Networks

  • Ms. U.P. Umasree, Mr. V. Bhaskar, ME,

Специальная статья

Routing Attack Discovery in WSN

  • J. Sabatini, Mrs. K. Vanitha, M.E., (Ph.D)

Специальная статья

Decentralized Data Allocation with Load Balancing Mechanism

  • A. Rajalakshmi, Dr. A. M. J. Md Zubair Rahman, ME, MS, Ph.D.,

Специальная статья

Mobile Sink based Data Gathering and Forwarding in WSN

  • C. Kanimozhi, Prof. M.Mohamed Musthafa, M.Tech., (Ph.D).

Специальная статья

Mobile Sink based Data Gathering and Forwarding in WSN

  • C. Kanimozhi, Prof. M.Mohamed Musthafa, M.Tech., (Ph.D).,

Специальная статья

Efficient Message Caching Scheme for MANET

  • S. Manju, Mrs. K. Vanitha, M.E., (Ph.D)

Специальная статья

Anonymous Privacy-Preserving Routing In Location Based Dynamic Ad-Hoc Networks

  • G.Gokila, Mrs.F.Salma Rosline Mary, M.E., P.Karthikeyan, Mr.A.Suresh Babu,M.E.

Специальная статья

Online Dynamic Assessment

  • Subashini.A, Aishwarya.M, Bhuvenswari.R, Manjuparkavi.R

Специальная статья

Functional Testing Technique Using ODC to Identify And Predict Faults

  • K.Sivaprakash, Prof. Preethi harris

Специальная статья

Human Gait Based Gender Classification Using Energy Motion Approaches

  • Ms.P.Muthumari, Mrs.D.Suganya, Mrs.S.Ellammal

Специальная статья

Automated Testing For the Refactored Codes

  • K.Jeya Ganesh Kumar, Dr.M.S. Geetha Devasena

Специальная статья

Privacy Preserved Association Rule Mining For Attack Detection and Prevention

  • V.Ragunath, C.R.Dhivya

Специальная статья

Visual Text Summarization in Supervised and Unsupervised Constraints Using CITCC

  • S.Mohan Gandhi, T.Suresh Kumar

Специальная статья

K-Tier Computation of Parallel Workload in Cloud

  • P.Karthikeyan, R.Sudhakar

Специальная статья

Automatic Tuning Of OLSR Routing Protocol Using IWD in VANET

  • M.Gunasekar, S.J.Hinduja

Специальная статья

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

  • Dr.S.Valarmathy, R.Karthiprakash, C.Poonkuzhali

Специальная статья

Annotating Multiple Web Databases Using Svm

  • M.Yazhmozhi, M. Lavanya, Dr. N. Rajkumar

Специальная статья

Efficient Load Balanced Routing Algorithm Based On Genetic And Particle Swarm Optimization

  • K.Selvakumar, Dr.M.Senthamil Selvi

Специальная статья

Attention Towards Selfish Nodes Over A Manet Using Arti-Q Technique

  • S.ArunKumar, Mr.A.Bharanidharan

Специальная статья

A Best Vigorous Resource Allocation Autonomously In Cloud

  • S.Rameez Raja, S.Rinesh MBA.,M.E.,(Ph.D)

Специальная статья

Securing Location and trust extended authentication in mobile ad hoc network

  • Ms. Reshna Wilson A, Mr. Biju Balakrishnan

Специальная статья

Comparison Of Cepstral And Mel Frequency Cepstral Coefficients For Various Clean And Noisy Speech Signals

  • M.Kalamani, Dr.S.Valarmathy, C.Poonkuzhali, R.Karthiprakash

Специальная статья

Prevention Model For Phishing Attacks In Web Applications Using Linkguard Algorithm

  • A.Sarannia, U.R.Padma

Специальная статья

Feature Based Classifiation Of Lung Tissues For Lung Disease Diagnosis

  • V.Lakshmi, Ms. P.Krisnaveni, Mrs. S.Ellammal

Специальная статья

An Efficient Approach For Multimedia Transmission Using Multipath Routing In Manet

  • A.Sheganaz, P.D.R.Vijaya Kumar

Специальная статья

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe

  • T.Radhika, S.Vasumathi Kannagi

Специальная статья

Investigation of Recognition Methods in Biometrics

  • Udhayakumar.M, Sidharth.S.G, Deepak.S, Arunkumar.M

Специальная статья

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

  • J.Anbu selva, P.Bharat, S.Mathiyalagan J.Anand

Специальная статья

Optimization Of Energy Efficient Communication To Improve The Lifetime Of Sensor

  • S.Anbarasu, P.Balasubramani, S.Saravanakumar

Специальная статья

Enhancement of secured Mobile voting based on IMEI number as Key

  • Venkatesh J, Viswaprasath KS

Специальная статья

Image Fusion And Denoising Technique: Survey

  • P.Thirumurugan, Dr. S. Sasikumar, C.Sugapriya

Специальная статья

A Cluster Based Group Management Using Zone Leader Allocation In Manet

  • K. Senthil Kumar, Dr. S. Sasi Kumar, Dr. C. Sugapriya

Специальная статья

Dynamic Router Design For Reliable Communication In Noc

  • Mr. G.Kumaran, Ms. S.Gokila, M.E.

Специальная статья

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

  • Ishwarya.M, Mary shamala.L

Специальная статья

AUGMENTING THE SECURITY IN TOR

  • S.Kokilavani, G.Priyadharshini

Специальная статья

Tour Planning For Mobile Data-Gathering Mechanisms In Wireless Sensor Networks

  • D.Yasar Arfath, K.R.Kavitha

Специальная статья

A Image Forensics Analysis by Using DST, Fuzzy and Bayesian Approaches

  • D.Gokila Bharathi, G.Selvavinayagam

Специальная статья

Effective Heart Disease Prediction using Frequent Feature Selection Method

  • S.Saravanakumar, S.Rinesh

Специальная статья

To improve Security enhancement and Lifetime Management Scheme for Wireless Sensor Networks

  • K.R.Senthilnathan, Shalini Merine George

Специальная статья

Semi supervised clustering for Text Clustering

  • N.Saranya

Специальная статья

Secured And Reliable Data Transmission Using Lychrel Numbers Rgb Colors And One Time Password

  • P. Dhivya, S. Mohana Gowri, M. Vijay Kumar

Специальная статья

Audio Alert for Safe Driving by Smartphones

  • R.Ancy Ramya,ME, R.SwathiRamya,M.E., S.Krishnaveni,M.E

Специальная статья

Reducing Routing Overhead In Manet Using Ncpr Protocol

  • Ms.Manjula.R, Mr.Santhosh.R

Специальная статья

Speech Processing Of Tamil Language With Back Propagation Neural Network And Semi- Supervised Traning

  • N.Pushpa, R.Revathi, C.Ramya, S.Shahul Hameed

Специальная статья

Robust Shape Representatio Using Minium Near Convex Decomposition

  • Ms.Sathya Prabha.p, Mr.Santhosh.R

Специальная статья

A Rational Approach For Data Reporting In Wireless Sensor Networks Using Sink Trial Protocol

  • Ms.R.Anitha, Mr.Santhosh M.E.,MBA.,Ph.D

Специальная статья

Neighbor Position Verification in Mobile Ad Hoc Network

  • C. LOURDU RAJA

Специальная статья

Security Scenarios over Cloud Computing through Espousing Multi-Cloud Structure

  • Karthika.RN, Vijay Anand.P

Специальная статья

Range Query Grouping In Spatial Networks Using Dual Distance Measurements

  • S.Udhayakumar M.E., (CSE) , D.Sureshkumar M.E., (CSE)

Специальная статья

Protecting Web Service Composition From Privacy Attacks Using Dynamic Privacy Model

  • Ms.M.Sabrabeebe, Ms.C.Nancy Nightingale

Специальная статья

Thecritical Event Monitoring In Wireless Sensor Networks Using Sleep Scheduling

  • K. Somu, Mr. U.Gowri Sankar

Специальная статья

Performing Enhancement and Providing Minutiae Matching Score in LQFI

  • M.Jayalakshmi, P. Robert

Специальная статья

A Bi-Objective Approach for Cloud Computing Systems

  • N.Geethanjali, M.Ramya

Специальная статья

Data Hiding Using Difference Expension Method

  • YASMEEN M.G,RAJALAKSHMI G

Специальная статья

An Enhanced Memory Management For An Advanced Line Buffer Based Image Processing Pipeline

  • R.Priya,S.Priyadharshini,Thanjaibharathi.

Специальная статья

Moving Object Detection By Background Subtraction

  • V.AISWARYA LAKSHMI, E.ANITHA, S.SELVAKUMARI.

Специальная статья

Optimized Re-Ranking In Mobile Search Engine Using User Profiling

  • A.VINCY, M.KALAIYARASI, C.KALAIYARASI

Специальная статья

Bottleneck Zone Analysis in Wireless Sensor Network Using XOR Operation and Duty Cycle

  • P.Dhivakar, K. Sindhanaiselvan

Специальная статья

Filtering Injected False Data in Wireless Sensor Networks by Using L, F, S Nodes and Key Distribution

  • Amuthan Mathy.P, Gowri Sankar.U

Специальная статья

Combined Fingerprint Minutiae Template Generation

  • Guruprakash.V, Arthur Vasanth.J

Специальная статья

Securing Data Packets from Vampire Attacks in Wireless Ad-Hoc Sensor Network

  • Mr.M.Rajesh Khanna, S.Divya, Dr.A.Rengarajan

Специальная статья

Improving Service Credibility in Password Authentication Peer Services

  • V. Vijayashanthi, C. Bala Saravanan

Специальная статья

Reduction of End To End Delay Using Priority Queues in Wireless Sensor Network

  • Jayasudha.J , T.Prabakaran

Специальная статья

Performance Enhancement Using Naodv Algorithm In Manet

  • Julian.P, Smiline Arokya Pradeepa.J

Специальная статья

Preventing Private Information Leakage on Social mining

  • A.Krishna Kumar , M.Suriya

Специальная статья

Efficient Resource Allocation And Avoid Traffic Redundancy Using Chunking And Indexing

  • S.V.Durggapriya, N.Keerthika

Специальная статья

Integration of Subspace Clustering and Action Detection on Financial Data

  • Meenu Mathai, Mrs.P.Sumathi

Специальная статья

Decentralized Approach for Balancing Load in Dynamic Cloud Environment

  • Karthick Smiline Britto.J , PrittoPaul.P

Специальная статья

Congestion Based Pricing Resources Managemant In Broadband Wireless Networks

  • M.Banupriya, ME, P.Manokari.B.E (ME) , T.B.Dharmaraj,ME.,

Специальная статья

Electromagnetic Coupling Microstrip Patch Antenna for Improving Wide Bandwidth and Broad Beamwidth

  • G.Karthikeyan, Dr.Meena @ jeyanthi, Ms.S.Soniya, Ms.Thangaselvi

Специальная статья

VLSI Implementation of Reconfigurable Low Power Fir Filter Architecture

  • Mr.K.ANANDAN Mr.N.S.YOGAANANTH

Специальная статья

Access Control Policies Of Socio Networking Websites For Multiple Profile Holders

  • B.Vijaya Kumar, G.Nirmala Devi, V.Vanaja, P.Meena

Специальная статья

A Framework to Enhance Cryptographic Parameter for Data In Cloud

  • R.Sivaranjani, R.Radhika

Специальная статья

Achieve Ranking Accuracy Using Cloudrank Framework for Cloud Services

  • R.Yuvarani, M.Sivalakshmi

Специальная статья

MPPT Algorithm Based PV System Connected To Single Phase Inverter

  • T.Rengaraj, Ms.S.Soniya

Специальная статья

4 Level Authentication Security In Cloud Computing

  • P.Shenbagam, C. Namasivayam

Специальная статья

Privacy-Assured OIRS Service with Performance Speedup in Cloud

  • P.ARUNPRIYA,S.RINESH

Специальная статья

AMAP: Accelerated Message Authentication Protocol for Vehicular ADHOC Networks

  • R. Rajkumar, S.Shahul Hammed

Специальная статья

Rank Preserving Discriminant Analysis for Human Behaviour Recognition Using Dash7 Protocol

  • N.PADMAVATHI, T.MOHANRAJ

Специальная статья

Security Enhanced Service Level Agreement for Cloud Storage Services

  • E.Kiruthika, S.D.PrabuRagavendiran

Специальная статья

Performance Optimization Of Poultry Farm By Using Instrumentation With Help Of Embedded Automation

  • Boopathy.S, Satheesh kumar.M,Mohamed Feroz.A

Специальная статья

Audio Steganography Using Least Significant Bit

  • Sudha Lakshmi N

Специальная статья

Biconnectivity Of Zigbee UMTS Hybrid Network

  • D.DIVYA

Специальная статья

A Trust Based Payment Scheme for Multihop Wireless Networks

  • S.Suganya,S.Dhivya,Y.Jenifer

Специальная статья

Optimal Route Query Based On Forward Search and Backward Search

  • S.KARTHIK

Специальная статья

Packet classification based on priority with shortest path algorithm

  • A.Vijayalalitha, R.Dharmaraj M.E.,(Ph.D)

Специальная статья

Enhancement of a Novel Secure Data Storage & Privacy in Cloud Network

  • V. Nithya, B. Anuradha

Специальная статья

Efficient Power Management in Wireless Communication

  • R.Saranya, Mrs.J.Meena

Специальная статья

Enhancing Digital Forensic Analysis through Document Clustering

  • B.Vidhya, R.Priya Vaijayanthi

Специальная статья

Novel Dynamic Fault Localization for Server side Vulnerabilities

  • C.P.Shabariram, V.Sharmila, J.Francy, R.Anandhi

Специальная статья

A Load Balanced Greening Approach for Proficient Resource Allocation with Cloud Partitioning

  • R.Divya, S. Premkumar deepak

Специальная статья

Enhanced Packet Scheduling Scheme for Wireless Sensor Networks

  • P.Narayani, Mrs.R.Meena prakash , A.R.Devi

Специальная статья

AMI Mesh Networks Based Home Energy Management System

  • G.KausalyaDevi, M.Premkumar

Специальная статья

Accessing Distributed System Using Hashed Fingerprint Recognition

  • R.Mekala, S.A.Jiji Jasmine, Vinisha.D

Специальная статья

Delay Based Scheduling For Cognitive Radio Networks

  • A.R.Devi R.Arun kumar S.Kannagi

Специальная статья

Secure Data Transmission in MANETS Using ELIPTIC Curve Cryptography

  • K.Sangeetha

Специальная статья

Preventing Mobility Device Intrusion And Theft Using Biometric Fingerprint Recognition

  • Vanitha.M, Vidhya Gandhi.P, Rajkumar.M, Rajkumar.S

Специальная статья

Traveling Salesman Problem Solved Using Bio Inspired Algorithms (ABC)

  • S. Saranya, R. Priya Vaijayanthi

Специальная статья

Detection of Text with Connected Component Clustering

  • B.Nishanthi, S. Shahul Hammed

Специальная статья

A Novel Noise Filtering Technique for Denoising MRI Images

  • Priyadharsini.B

Специальная статья

Hybrid Location Based Forward Routing in Manet’s

  • Arjun sankar.J, Ramar.C.K, Venkatesan.N

Специальная статья

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks

  • M.Sudha, J.Sundararajan, M.Maheswari

Специальная статья

Detection of Cancer Using Biclustering

  • Sayana Sunny, M.Pratheba

Специальная статья

A Dempster-Shafer Framework For Decision Fusion In Image Forensics

  • C.R.Lakshmi, Alex george

Специальная статья

Critical Nuggets Identification for Classification Task

  • V.Priya

Специальная статья

A Method of Segmentation For Glaucoma Screening Using Superpixel Classification

  • Eleesa Jacob, R.Venkatesh

Специальная статья

Efficient Algorithms for Incessant Position Based Spatial Queries in Mobile Environments

  • G.Elavarasi, K.Manokaran

Специальная статья

Detection of Pre-Skin Cancer Using Automatic Cell Segmentation Technique

  • Greeshma Rajan

Специальная статья

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis

  • V.S.Subarsana, C.K.Gobu

Специальная статья

Accident Detection Using Android Smart Phone

  • P.Kaladevi, T.Kokila, S.Narmatha, V.Janani

Специальная статья

An Efficient Clustering Method To Find Similarity Between The Documents

  • Kalaivendhan.K, Sumathi.P

Специальная статья

Implements The Spatial Inverted Indexes To Perform Quick Search

  • Sophiya.K, Sounderrajan.T

Специальная статья

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

  • K.Sangamithra, S.Tamilselvan

Специальная статья

Searching Application-Level Meaning for Data Compaction

  • L. Nagarajan

Специальная статья

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

  • Priyanga.R, Maheswari.B, Karthik.S

Специальная статья

Efficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity

  • Karthikeyan.K, Thiruselvi.M

Специальная статья

Efficient Segmentation and Classification of Remote Sensing Image Using Local Self Similarity

  • Karthikeyan.K, Thiruselvi.M

Специальная статья

Detection and Segmentation of Brain Tumors using AdaBoost SVM

  • Nithyapriya.G, Sasikumar.C

Специальная статья

Sensory Data Collection Using Rendezvous Nodes

  • N.Lokesh, D.Gokilapriya

Специальная статья

An Efficient Location Based Routing for Mobile Adhoc Networks

  • S.Saranya, D.Gokilapriya, M.Maheswari

Специальная статья

A Model of Textual Emotion Mining From Text Document

  • S.Sujitha, S.Selvi

Специальная статья

Modified Difference-Histogram based Reversible Data Hiding Scheme

  • E.Gayathri, Dr.K.A.Palaniswamy

Специальная статья

Optimization of Bit Rate in Medical Image Compression

  • Dr.J.Subash Chandra Bose, Mrs.Yamini.J, P.Pushparaj, P.Naveenkumar, Arunkumar.M, J.Vinothkumar

Специальная статья

Minimizing Packet Loss Using Buffer Management Scheme for Video Streaming

  • Kousik Kiran V

Специальная статья

Detecting Anomalies by Online Techniques Using Spam Detection

  • R. Dharani M.E (CSE) , S. Subashini M.Tech (IT) AP/CSE

Специальная статья

Scott Knott Test Based Effective Software Effort Estimation through a Multiple Comparison Algorithms

  • N.Padma priya, D.Vidyabharathi

Специальная статья

Packet Classification Using Standard Access Control List

  • S.Mythrei, R.Dharmaraj

Специальная статья

Reduction of Decoding Time in Majority Logic Decoder for Memory Applications

  • K.Jayalakshmi, B.Sivasankari

Специальная статья

Smart Survillience Rover ? Industarial Monotoring

  • Maheshkumar p

Специальная статья

Reversible Information Hiding in Videos

  • V.Priya

Специальная статья

A Study on Wireless Sensor Networks Localization

  • Poonkodi.K, Vinodhini.B, Karthik.S

Специальная статья

Energy Efficient E-BMA Protocol for Wireless Sensor Networks

  • M.Manivannan, R. Palanikumar. M.Tech,

Специальная статья

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System

  • Bala Kumari P, Bercelin Rose Mary W and Devi Mareeswari M

Специальная статья

Provide Integrity for Spatial Data Outsourcing

  • SivaSakthi S, Bini Tofflin R, Roslinmary M

Специальная статья

Fingerprint Privacy Preservation by Minutiae and Orientation

  • Bercelin Rose Mary.W, Subbulakshmi.N, Bala Kumari.P

Специальная статья

Strength of Evolving Agent Population in MAS

  • M. Eniya, M. Vinothkumar M.E.,(Ph.D)

Специальная статья

Disperse Processing of Presumption Top-K Inquire in Wireless Sensor Networks

  • K.Shanmuga priya, M.Manopriya

Специальная статья

Multiple Class Identification and Categorization with Nuggets on Health Care Data

  • P. Jamuna, G, Mohana Prabha, M.E, (Ph.D)

Специальная статья

Resource Allocation under Uncertainty in Cloud Storage for Computational Environment

  • Deepa.V, Gopalakrishna.L

Специальная статья

Replica Allocation Technique with Mobility Based Beacons In Mobile Ad Hoc Networks

  • Jeyasri.V, Ramamoorthy.P

Специальная статья

Retrieval of Encrypted cloud data using multikeyword

  • C.Rajeshkumar, Dr.K.Rubasoundar

Специальная статья

Tampering and Copy-Move Forgery Detection Using Sift Feature

  • N.Anantharaj

Специальная статья

An Energy Improvement in Cache System by Using Write Through Policy

  • Vigneshwari.S

Специальная статья

On-Demand Routing in Mobile Ad Hoc Network

  • Buvana.P, Arun Sebastian, Deepika.K.S, Keerthivasan.S

Специальная статья

Detecting DDOS Attacks by Circular Protection Network

  • Yamini B, Chithra Devi R

Специальная статья

Protecting Streaming Data Using Provenance Spread Spectrum Watermarking

  • Ramya K P, Revathi M K

Специальная статья

Multiview Pedestrian Detection Based on Online Support Vector Machine Using Convex Hull

  • Revathi M K, Ramya K P, Sona G

Специальная статья

Intelligent network stabilization of dynamical systems using topological condition

  • A.Evangelin, P.Sathiyaseelan

Специальная статья

Cluster Based Certificate Revocation and CBRP in Manet

  • Mathan.S, S.Shahul Hammed

Специальная статья

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code

  • N.S. Monalisa Devi, T. Sounder Rajan

Специальная статья

User Search Histories Based On Query Relevance Using Incremental Algorithm

  • A.Revathi, A.Mekala

Специальная статья

Xml Based Digitalized Secure Information Channel Maintenance in Distributed Broking Systems

  • S.Saravanakumar, M.N.Karuppusamy

Специальная статья

Concept Based Ontology Matching By Concept Enrichment

  • Preethi. M

Специальная статья

A Framework Outline for Word Catalog Based Model in Cloud

  • Mr.C.Sivakumar, Mr.M.Arulprakash M.Tech

Специальная статья

Establishing Adversary Resistant Communication in Wireless Network

  • Sona G, Annapandi P, Addlin Shinney

Специальная статья

Analysis of a DWDM transmission system for multichannel long haul link

  • N.T.Gowree, R.Hemalatha

Специальная статья

Optimization of Content Downloading Using Dynamic Cache Memory

  • Ms.A.Gayathri, Ms.M.M.Chithra, Ms.R.Jeyashree, Mr.A.Premkumar

Специальная статья

Feature Extraction and Analysis of Breast Lesions in UltrasoundB mode and Elastography

  • S.Sasikala, B.kirthika, P.S. Dharsana

Специальная статья

Hand Gesture Recognition using MACD

  • Geethu Prakasan, Bimal Bose B.S

Специальная статья

A Technique to Prevent Dynamic Unsafe Component Loadings

  • M.Malathi, Mrs.P.Sumathi, M.E., Dr.S.Chitra M.E., Ph.D

Специальная статья

Dynamic Congestion Control with Multihop Scheduling Algorithm For Mobile Ad-Hoc Network

  • Naveena.G, Hemal Babu.H

Специальная статья

Robust Data Authenticity and Group Signature Mechanism for Enhanced Cloud Security Process

  • D.Sharmili, B. Palani Chelvam

Специальная статья

Content Based Analysis Improves Audiovisual Archieve Retrieval

  • Muthusankar.D, Kalaiselvi.M, Karthik.M, Mahendravarma.A

Специальная статья

Multi Keyword Web Crawling Using Ontology In Web Forums

  • J.Santhiya

Специальная статья

Mining Of Inconsistent Data in Large Dataset In Distributed Environment

  • M.Shanthini

Специальная статья

Mobile Virus Prevention Techniques: A Survey Perspective

  • R.Dhaya, M.Poongodi

Специальная статья

High Throughput, Low Area, Low Power Distributed Arithmetic Formulation for Adaptive Filter

  • G.Selvapriya, M.Mano, K.RekhaSwathiSri, Mr S.Karthick

Специальная статья

Robust Cloud Resource Provision

  • M.Sharmila Banu

Специальная статья

An Analysis of Unwanted Messages Filtering Methods from OSN User Walls

  • Mr. K.Arulmurugan, Mr.P.Ranjithkumar

Специальная статья

Simulation on Cyber War in Cloud Computing

  • Arul Selvam. P, Jeevanantham. G

Специальная статья

Particle Filtering Framework and Occlusion Handling Using Region Based Tracking Technique for 2-D and 3-D Image Sequences

  • J.Cynthia Esther Rani, R.Sathya, R.D. Sathiya

Специальная статья

Unstructured Data into Intelligent Information Analysis and Evaluation

  • Dr.S.Chitra M.E, Ph.D, Mrs.N.Shunmuga Karpagam M.E, Mr.K.Venkataramanan

Специальная статья

Design of Double Tail Comparator for High Speed ADC

  • S.Sivasathya, T.Manikandan

Специальная статья

Improving Word Similarity Using PPMIC with Estimates of Word Polysemy

  • Nagajothi P, Hemalatha L, Kumari K, Jeevarathinam S

Специальная статья

Intrusion Detection Using Double Guard In Multi- Tier Architecture

  • K.Kavitha, S.V.Anandhi

Специальная статья

Improving energy and cost-effective workflow scheduling in cloud computing

  • MuthuSowmya.S, ArunKumar.B

Специальная статья

Acknowledgment-Based Secure Authentication Method for Manet

  • Dr.J.Subash Chandra Bose, U.Akila Devi, M.Prasanalaxmi, K.Malathi, K.P.Vinodhini, S.Saranya

Специальная статья

A Self Adaptive Approach for Defending Flood Attacks in Disruption Tolerant Networks

  • P.Sakthipriya, P.Rajeswari

Специальная статья

An Anonymous Authentication and Secure Communication Protocol in Ad-hoc Networks

  • D. Pavun Kumar, Mr S.Sundar Raj M.Tech

Специальная статья

Security Using Anonymization and Slicing

  • Mr.K.Manikanda Prabhu

Специальная статья

Implementation of Pick and Place Operation, Battery Backup and Zone Control in Automated Guided Vehicle

  • Saravana Sundar.T, R.C.Vignesh, G.Moorthi, Nivedhan.M

Специальная статья

Clustering of Data with Mixed Attributes based on Unified Similarity Metric

  • M.Soundaryadevi, Dr.L.S.Jayashree

Специальная статья

Balancing the Load to Reduce Network Traffic in Private Cloud

  • A.Shenbaga Bharatha Priya, J.Ganesh

Специальная статья

Inferring Private Information from Social Network Using Collective Classification

  • A.Annapoorani, Ms.P.Indira Priya

Специальная статья

Measure of Implicit Relationship between Words by Network Count

  • Keerthana.S.M, V.Rajakumareswaran

Специальная статья

Design and Implementation of Efficient Binary to Residue Converter Using Moduli Method

  • Vidhyalakshmi.M, Prof.Satyabama

Специальная статья

An Effective Cluster-Based Routing With Link Quality For Power Varied Manets

  • Jerrin Joe Francis, Vignesh S

Специальная статья

Robust Rate control for Video Streaming in Heterogeneous Environment

  • B. Nandhini, S. VinothKumar M.E.,

Специальная статья

Low Power Multi Bit Flip Flops Design for VLSI Circuits

  • L.Ange Prabha, S.Joy

Специальная статья

Image Mining: frameworks and techniques

  • Madhumathi.k, Dr.Antony Selvadoss Thanamani

Специальная статья

A Relevant Clustering Algorithm for High- Dimensional Data

  • Bini Tofflin.R1, Kamala Malar.M2, Sivasakthi.S3

Специальная статья

Improved Client Data Security with Aggregated Query Using CDAMA

  • Ms.S.Kanimozhi, Mrs.K.Makanyadevi

Специальная статья

Secured Routing For Manet Using Friend Based Adhoc Routing (FAR)

  • Ms.K.Deepa, Mrs.V.Durgadevi

Специальная статья

Design of Hybrid Multicasting Network for Authentication

  • R.Vidhyalakshmi, P.Sankardayal, G.Sankareeswari

Специальная статья

Sum Query Evaluation over Uncertain Data

  • Roslinmary M, Saravana Kumar T and Addlin Shinney R

Специальная статья

Privacy Preserved Data Scheduling For Cloud Data Services

  • Mr.R.Sathish, Mr.T.Sathishkumar M.C.A., M.E.,

Специальная статья

An Effective Approach for Detecting and Preventing Sqlinjection Attacks

  • M. Roslinmary, S. Sivasakthi, A. Shenbaga Bharatha Priya

Специальная статья

An Effective Approach for Detecting and Preventing Sqlinjection Attacks

  • M. Roslinmary, S. Sivasakthi, A. Shenbaga Bharatha Priya

Специальная статья

Privacy Preserving Public Auditing for Data in Cloud Storage

  • M.Priya, E. Anitha, V.Murugalakshmi

Специальная статья

Combined Cluster Based Ranking for Web Document Using Semantic Similarity

  • V.Anthoni sahaya balan, S.Singaravelan.M.E.

Специальная статья

Restructure Search Results for Efficient Web Search

  • Addlin Shinney R, Saravana Kumar T and Roslinmary M

Специальная статья

A Secure Erasure Code-Based Multi Cloud Architecture with Privacy and Preservation

  • Kousalya.K, Nagajothi.A

Специальная статья

SECUDROID - A Secured Authentication in Android Phones Using 3D Password

  • Ms. Chandra Prabha K M.E. Ph.D., Mohamed Nowfel E S, Jr., Gowtham V, Dhinakaran V

Специальная статья

Ranking the Relationship on Wikipedia through Strength Determination

  • S.P.Angaiyarkanny, G.Sharmila

Специальная статья

Dynamic Resource Allocation Using Nephele Framework in Cloud

  • Anand Prabu P, Dhanasekar P, Sairamprabhu S G

Специальная статья

ADA: Data Aggregation Scheme for Dynamic Application Using PBDR in Wireless Sensor Networks

  • B.Mahalakshmi (ME., CSE) , R.Rajavignesh ME.,

Специальная статья

Optimum Service Interval and Service Period: MBR in Wireless Networks

  • Ms. K.Tamilarasi, Mrs. R.Bharathi

Специальная статья

Packet Concealing From Discriminating Selective Jamming Attacks Using Prevention Methods

  • Mr. A.Rajesh Kumar, Mrs. R.Bharathi

Специальная статья

Semantic Analysis based Dirichlet Clustering Scheme for Text Documents

  • C.Selvarathi, M.E, K.Karthika

Специальная статья

An Enhancement in Data Collection

  • R.Sangeetha, V.Seethalaksmi

Специальная статья

Effective Neighbor Identification with False Report Verification Using Manets

  • M.Abinaya, Mrs K.Thamaraiselvi

Специальная статья

Balancing privacy and Utility in Defect Prediction by Privatization Algorithm

  • Dr.S.Chitra, P.Sumathi, T.Kanchana

Специальная статья

User Centric Privacy Access control For MHealthcare Emergency in Opportunistic Computing

  • M.Anandhajothi, S.Hasan Hussain

Специальная статья

Balancing privacy and Utility in Defect Prediction by Privatization Algorithm

  • Dr.S.Chitra, P.Sumathi, T.Kanchana

Специальная статья

Modified Networks Selection Scheme for 4G System Based On QOS

  • K.Saranya, B.Jeeva

Специальная статья

Query Services in Cost Efficient Cloud Using Query Analysis

  • VanthanaPriya.J, ArunKumar.B

Специальная статья

Applications of Security System

  • G.Ramachandran, Jayanthi S, E.Ravishankar, P.Balaji, S.SivaPrakash

Специальная статья

Scheduling Enabled Compressive Data Collection Scheme For Wireless Sensor Networks

  • Kalaiyarasi.R, Rajeswari.S

Специальная статья

Mobile Health Monitoring Based On New Power Management Approach

  • R.Kanimozhi, M.Suguna

Специальная статья

Reversible Gate Based Testable Sequential Circuits

  • K.Rekha swathi sri, M.Mano, G.Selvapriya

Специальная статья

Real Time Sentiment Classification Using Unsupervised Reviews

  • E.Divya

Специальная статья

Improving Scalability of R-Dictionary Using Keyword Based Approach

  • G.Kokila, Dr.R.Rajasekaran

Специальная статья

Detection and Localization of Multiple Spoofing Attackers in Wireless Network

  • Mekala R, Arul V, Keerthana B, Sobana J

Специальная статья

A Novel Method of Vehicle Accident Protection and Early Precaution System

  • M.Rajesh kumar

Специальная статья

Cluster Tree Based Hybrid Document Similarity Measure

  • M. Varshana Devi

Специальная статья

An Overview of Knowledge Discovery Database and Data mining Techniques

  • Priyadharsini.C, Dr. Antony Selvadoss Thanamani

Специальная статья

Virtual Shopping Application for Android Devices Using Virtual Reality

  • Dr.J.Subashchandra Bose, Yuvaraj.S, Siva.R, Sabarisan.K, Kannan.P, Santhosh Kumar.S.M

Специальная статья

Modified K-Means Algorithm for Initial Centroid Detection

  • D. Sharmila Rani, V.T.Shenbagamuthu

Специальная статья

Data Access Control in Cloud Using Attribute Based Revocation Algorithm

  • Karthikeyan.C, Vignesh.R

Специальная статья

TPA Based Batch Auditing Mechanism for Commercial Clouds

  • Mr.R.Sathyaraj, Dr.V.K.Manavala Sundaram M.E., Ph.D.,

Специальная статья

Reputation and Quality of Service for Wireless Sensor Networks Using Ant Colony Optimization

  • J. Arulanand, K. Syed Ali Fathima

Специальная статья

Efficient Method for Secure Transmission from Malicious Nodes through Certificate Authentication

  • M.L.Vijin Stephi and Dr.B.Latha

Специальная статья

Design of 2/3 prescalerLow Power Flexible Multiband Divider

  • R.Naveenkumar, V.A.Saravanan

Специальная статья

Enhance Privacy Preserving In Location Based Service

  • Karthik R, Anguraj S

Специальная статья

Cloud-based Secure Log Management using Homomorphic Encryption to reduce Communication Overhead

  • Deepalakshmi.A, Mohanraj.T

Специальная статья

Security for Smart Distribution Grid By Using Wireless Communication

  • S.K.Saranya, Dr.R.Karthikeyan

Специальная статья

Invariant Based Integration of Web Service Interface Testing

  • V.Alanthuraiyan1, E.Kruthika2, R.Devisri3

Специальная статья

Low Cost (PUF) Physical Unclonable Function Using Secured Clock Network

  • Muthumeenakshi.N, Rajaprabha.R

Специальная статья

Attribute Based Encryption with Privacy Protection in Clouds

  • Geetanjali. M, Saravanan. N

Специальная статья

Establishing SSH Connection and Interfacing GSM/GPRS Functionality with Raspberry PI

  • Mrs.P.Suvitha Vani, Miss.Nithyappriya.G

Специальная статья

An Efficient Algorithm to Mitigate Packet Drop Attack in AODV Protocol

  • Arunprasath.M, Mr.M.Mohana Sundharam

Специальная статья

Face Verification across Ages Using Self Organizing Map

  • B.Mahalakshmi, K.Duraiswamy, P.Gnanasuganya, P.Aruldhevi, R.Sundarapandiyan

Специальная статья

Dynamic Profile Based Technique to Detect Flooding Attack in MANET

  • Sathish.T, Sasikala.E

Специальная статья

Design of Dipole Antenna Using Mom

  • K.Priyadharshini, Mrs.G.Brenie Sekar

Специальная статья

Vehicle Detection Using Gabor Filter

  • B.Sahayapriya, S.Sivakumar

Специальная статья

Multi Focus Image Fusion Using Joint Sparse Representation

  • Prabhavathi.P

Специальная статья

Authentication and Intrusion Detection System for Mobile Ad-Hoc Networks

  • R.Divya, N.Saravanan

Специальная статья

ETAM Enhanced Trust Authentication Mechanism for Vehicular Ad Hoc Networks

  • J. Martina Jasmine

Специальная статья

Content Based Image Retrieval System-an Evaluation

  • N.Shanmugapriya, R.Nallusamy

Специальная статья

A Clustering Mechanism for Energy Efficient Routing Path

  • Nangai Abinaya S, Sudha R

Специальная статья

Key Generation for Outsourced Storages in Clouds

  • Sandeep.S, Vijayakumar.P, Anand.V

Специальная статья

A Framework for Secret Sharing In Multisession Trust Negotiation

  • S. Pavithra, R. Jeyanthi

Специальная статья

Smart Energy Meter with Instant Billing and Payment

  • R. Dhananjayan, E. Shanthi

Специальная статья

Algorithmic-Technique for Compensating Memory Errors in JPEG2000 Standard

  • M. Pradeep Raj, E.Dinesh

Специальная статья

Car Authentication and Accident Intimation System Using GPS and GSM

  • R.Monisha, Jessen Joseph Leo, B.T.Tharani Sri Sakthi

Специальная статья

An Effective Approach for Video Copy Detection and Identification of Misbehaving Users

  • S.Sujatha, G.Kalaiarasi

Специальная статья

Intrusion Detection System to Detect Malicious Misbehaviour Nodes in Manet

  • M.Vijay, R.Sujatha

Специальная статья

A New Algorithm for Finding Automatic Clustering In Unlabeled Datasets

  • S Chitra, G Komarasamy

Специальная статья

Efficient Optimization of Sparql Basic Graph Pattern

  • Ms.M.Manju, Mrs. R Gomathi

Специальная статья

Dynamic Key Management System for improving security in Three-Tier environment

  • P.Kabil dev, II - ME (CSE) , O.M. Soundara Rajan

Специальная статья

Global Innovations in Cloud Computing Services and Deployment

  • Fathima Rifaa.P

Специальная статья

High Speed Boosted CMOS Differential Logic for Ripple Carry Adders

  • S.Mohan, A.Anitha

Специальная статья

Preserving Data Integrity in Cloud Storage

  • Jegadeesan.K, Sivakumar.K

Специальная статья

Reduce Traffic in Optical Switching Networks by Using Control Packet Buffering Method

  • Saranya.N, Sathya.K, P. Vijaya

Специальная статья

Green Computing For System Efficiency and Optimization

  • L.Dhanam, Sumathi Sivaraj, R. Vanathi

Специальная статья

Using Interleaving Techniques with FEC Mechanisms to Deal with Burst Errors

  • M.SangeethaPriya, C.Devipriya, Dr. N.Saravana selvam

Специальная статья

Remote Monitoring of Vital Signs in Chronic Heart Failure Patients

  • M.Arunkumar

Специальная статья

Copy Frame Detection in Video by Using Data Mining Techniques

  • K.Girija, R.Maheswaran, P.Sabarinathan

Специальная статья

Lossless Compression and Efficient Reconstruction of Colour Medical Images

  • M.Suganya, A.Ramachandran, D.Venugopal, A.Sivanantha Raja

Специальная статья

A Study on Optimization Algorithms for Clustering Gene Expression Data

  • Athul Jose, Chandrasekar P

Специальная статья

Per-Colorant-Channel High Capacity Color Barcodes: An Interference Cancellation Framework

  • Soma. V, Vijaya Lakshmi. P

Специальная статья

Time Constrained Data Destruction in Cloud

  • S. Christina Suganthi Monica, M.Subasini

Специальная статья

GeoZigBee: A Wireless GPS Wristwatch Tracking Solution

  • Sathish kumar.R, Vengadapathiraj.M

Специальная статья

Implementing Black hole Password Entry Technique For Mitigating Shoulder-surfing Threat

  • Yogesh Babu.B, Visvanathan.G

Специальная статья

Digitalised Secure Information Channel Maintenance in Distributed Broking System

  • A. Uma Maheswari, Mrs.V.Muthamilselvi

Специальная статья

Multi Resolution Pruning Based Co-location Identification in Spatial Data

  • Mrs.V.Prema, R.Selvasudhan

Специальная статья

Integrating Colors, Shapes and Motions Using Active Contour Based Visual Tracking

  • P. Kiruthika, J.Sathya priya, S.P. Prakash

Специальная статья

A Cost Effective Multicast Key Management Scheme for Secure Group Communication

  • R Keerthana, Dr.N.M Saravana Kumar

Специальная статья

Dynamic Architecture for Scalable and Proficient Group Key Management

  • G M Mythili, N M Saravana Kumar

Специальная статья

Enhanced Intrusion Detection for Zombie Exploration Attacks in Mobile Adhoc Networks

  • M.Srimathi, L.Mary Shyamala M.Tech.

Специальная статья

Dynamic Economic Dispatch for Power Generation Using Hybrid optimization Algorithm

  • G.Karthika, Mr.M.Vigneshwaran, M.E.

Специальная статья

To Enhance the Lifetime of WSN Network using PSO

  • K.SyedAliFathima, T.Sumitha

Специальная статья

Multi Sink based Data Collection Scheme for Wireless Sensor Networks

  • B.Sudhakar, K.Sangeetha,

Специальная статья

Service and Data Security for Multi Cloud Environment

  • Rajkumar B, Balamurugan K

Специальная статья

Power Quality Improvement using Hysteresis Voltage Control of DVR

  • J Sivasankari, U.Shyamala, M.Vigneshwaran

Специальная статья

Single Query Optimization of SPARQL Using Ant Colony Optimization

  • Ms.P R Rupashini, Mrs. R Gomathi

Специальная статья

Practical Approach for Achieving Minimum Data Sets Storage Cost In Cloud

  • M.Sasikumar, R.Sindhuja, R.Santhosh

Специальная статья

A Survey on Wireless Sensor Network Security

  • S. Mohan, S. Grace Diana. S. Ramya

Специальная статья

Analysis of ECG Signals for Arrhythmia Using MATLAB

  • Sibushri.G

Специальная статья

Determination of LMP for Congestion Management in Electricity Market

  • K.Kamal dass, P.Kanakaraj, M.Prabavathi

Специальная статья

Providing High Security in User for Vehicular Ad- Hoc Network

  • S.Manoranjitha, M.Vasanthi

Специальная статья

A Semantic Model for Concept Based Clustering

  • S.Saranya, S.Logeswari

Специальная статья

Preventing DNS Queries Against DDOS Attack

  • P.Soniya, Mrs.S.Rajeswari

Специальная статья

A Unified Scheduling For Multi-Hop Wireless With Order Optimal Per Flow Delay

  • D.Elayarani, R.Parijatham

Специальная статья

Profit based unit commitment using IPPDT and genetic algorithm

  • A.Prakash, M.Yuvaraj

Специальная статья

Various Segmentation Techniques in Image Processing: A Survey

  • Suganya, Menaka

Специальная статья

MST Clustering and Relevancy Analysis for Key Element Identification Process

  • Satheesh V, Poongothai T

Специальная статья

ICGICT Allocation of DG for IEEE 33 Bus Systems

  • S.Ishwarya, P.R.Surya

Специальная статья

RFID Based Smart Grid with Power Factor Maintenance in Load Side

  • B.Rajesh Kumar,G.kiruthika

Специальная статья

Presence Server For Mobile Ubiquity Services In Presence Cloud

  • D. Dhiravida Vasantha Nayaki, G. Mangayarkarasi

Специальная статья

Personal Authentication using Fingerprint Biometric System

  • V Prasathkumar, Mrs. V. Evelyn Brindha

Специальная статья

Bandwidth Scheduling for Content Delivery in VANET

  • Babu G , Uma Maheswari M

Специальная статья

Cluster Based Intrusion Detection System for Wireless Sensor Networks

  • Gopi K, Sivaprakash S

Специальная статья

Disperse Processin Of Presumption Top-K Inquire In Wireless Sensor Networks

  • M.P.Navaneedha, P. Matheswaran

Специальная статья

SeCom: A Novel Approach for Malware Confiscation in OS level Virtual Machines

  • R. Hema, T. VetriSelvi

Специальная статья

A support for end user-Centric SLA administration of Cloud-Hosted Databases

  • A.Vasanthapriya, Mr. P. Matheswaran, M.E

Специальная статья

Brain Gate Technology

  • Manjunatha .V

Специальная статья

An Optimal Cloud Service Selection Based on the QoS Values: A Survey

  • Sobhika, Rajagopal

Специальная статья

Privacy-Preserving Data Sharing for Dynamic Groups in the Cloud: A Survey

  • S.Mythili, M.Velmurugan

Специальная статья

An Improved Semi-Supervised Clustering Algorithm Based on Active Learning

  • S.Shalini, R.Raja

Специальная статья

Hyperspectral Image Resolution Enhancement Using Object Tagging OLHE Technique

  • R. Dhivya, S. Agustin Vijay

Специальная статья

An Improved Privacy Preserved Rule Mining for Credit Dataset with Discrimination Prevention

  • Boopathiraja K, Nithyakalyani S M.E., (Ph.D)

Специальная статья

Fingerprint Matching Incorporating Ridge Features Using Contourlet Transforms

  • M.S. Keerthana

Специальная статья

Analysis and Principles of Green UI Design for Web Portals

  • S.Vetrivel, S.Pandikumar, M.Athigopal

Специальная статья

Optimized Data Transmission from Cloud to Society by Mapreduce

  • S.P.Prasanth and P.G.Kathiravan

Специальная статья

A Fuzzy Ontology Based Automatic Video Content Retrieval

  • P.Anlet pamila suhi, S.Deepika

Специальная статья

A Novel Approach to Ranking On Data Manifold With Sink Points

  • A. Mahesh. M.E. , G.R.Sumithra

Специальная статья

An Efficient I/O Cost Model for Novel Indexing algorithms in a Joint Top K Spatial Keyword Query Processing

  • T. Bairavi, R. Priya, A. Evangelin

Специальная статья

The Brain Fingerprinting Technology

  • K. Logeshwari

Специальная статья

Camerareadycopy-ICGICT-403-Cloud Computing (Networks)

  • S. Kalaichelvi

Специальная статья

Adaptive Fuzzy Based Solution of Inverted Pendulum & Aircraft Landing Problems

  • Vijayalakshmi.J, Pavithra.R, Rudresha.M

Специальная статья

Maintaining Privacy and Secrecy in Untrusted Network with Stile

  • M. Anbu Chezhian, S.Ramalakhsmi

Специальная статья

Recognizing and Mask Removal in 3D Faces Even In Presence of Occlusions

  • M.Dhivya, P.Purushothaman

Специальная статья

Authenticating Service Request in Kernel Mode against Malicious Code

  • D. Raghu Raman, K.Rajan

Специальная статья

A Preserving Location Privacy of Mobile Network

  • P. Sakthi Priyanka and B. Raja Rajeswari, Tamilnadu, India

Специальная статья

ECG Steganography Based Privacy Protecting Of Medical Data for Telemedicine Application

  • N. Suganya,M.Marimuthu

Специальная статья

MD5: Anonymous Location-Aided Routing in Suspicious Secure MANETs

  • Manjuladevi.V, Jennie Bharathi.R

Специальная статья

Secure Sharing Of Data for Dynamic Multi Owner in Cloud Storage

  • S.Surya, V.Karuppuchamy

Специальная статья

Brain Gate Technology

  • Manjunatha .V

Специальная статья

APU - Mobility Prediction Scheme for Routing Protocols in MANET

  • Archana.S.S, P.Arulprakash M.E., (Ph.D), Priyanka.S

Специальная статья

An Elastic and Scalable Data Streaming System for Distributed Cloud

  • S.B. Daniel Barnabas M.E

Специальная статья

Authentication of Online Digitized Content Using Trapdoor Hash Function Method

  • M.Muthuselvi, P.Jeevananthini

Специальная статья

Multi Organization Records Sharing in Cloud Computing Using Attribute Based Encryption

  • ME, Department of CSE, SSM College of Engineering, Komarapalayam, Tamil Nadu, India

Специальная статья

Entity Recognition in a Web Based Join Structure

  • J.Kavitha M.Tech, A.Pasca Mary

Специальная статья

Simple Algorithm for the Magnetic Field Computation in Bobbin Coil Arrangement

  • V.Suresh, V.K.Gopperundevi, Dr.A.Abudhahir, R.Antonysamy, K.Muthukkutti

Специальная статья

Enhancing the Efficiency of Secure and Distributed Reprogramming Protocol for Wireless Sensor Network

  • Sandeepa Perumalsamy, Balaji Subramani

Специальная статья

Efficient Management Algorithm for Non- Interrupting Data Communication in Wireless Networks

  • Jeeva.R and R.Natchadalingam

Специальная статья

An Architecture to Enhance Privacy and Security in Collaborative Systems

  • Ms. G. Sathya M.E. , Mr. K. Loganathan M.E.,

Специальная статья

Protected Patients Data Centre in Cloud Computing

  • Ms.M.Shanthi, Mr. P. Ranjithkumar

Специальная статья

Vibrant Resource Allocation Algorithms using Virtual Machine in Cloud-Survey

  • B. Magesh Kumar, C. Ramesh

Специальная статья

Avoiding Overload Using Virtual Machine in Cloud Data Centre

  • Ms.S.Indumathi, Mr. P. Ranjithkumar

Специальная статья

Border Alert System for Boats Using Zigbee

  • Suresh.M, Gandhiraj.S, Saranya.T, Thenmozhi.S, Divya.M.M

Специальная статья

Highly Efficient and Intelligent Indoor and Outdoor Lighting System Using a ZigBee Network of Devices and Sensors

  • P.Dhinakar, R.Pradeepraja, R.Preethilatha, M.Barani, S.Shanmathi

Специальная статья

Implementation of 3-Tier Architecture Using C-MART

  • M.Poovizhi, S.Kalpana

Специальная статья

SPOT- E-mail Spam Zombie Detection System

  • Arathy Rajagopal, ArulPrakash.P M.E., (Ph.D.)

Специальная статья

An Efficient Approach for Emergency Message Dissemination in VANET

  • Shibu.J, Ramkumar.R, D.Gowthami, S.G.Siddharth

Специальная статья

A Performance Analysis for Manet Using Secured Algorithm

  • A.Vijayalakshmi

Специальная статья

Automated Diagnosis of Cardiac Health

  • Suganya.V

Специальная статья

Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks

  • Mrs.K.Indumathi, Mrs. M. Santhi

Специальная статья

Enhancing the High Performance Resource Allocation and Data Sharing in Cloud Computing

  • Ramya Krishnasamy and P.G.Kathiravan

Специальная статья

Efficient Cluster Based CCRVC Scheme in Manet

  • Mrs.U.Devisree, Mrs.M.santhi

Специальная статья

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

  • K.Sivakumar, P.Murugapriya

Специальная статья

Analyse the New Path Weight Using Hop By Hop Routing Mesh Networks

  • Sangeetha. C, Rajkumar. S

Специальная статья

A Trust Based Mechanism for Preventing Noncooperative Eavesdropping in WSN

  • Hemalatha.P, Mary Shyamala.L

Специальная статья

Reducing Data Redundancy Scheme in Heterogeneous Cloud Storage

  • Saranya.A, Sadhasivam.N

Специальная статья

Detection of Cheater Nodes Based On Evidences and Reports in MultiHop Wireless Networks

  • S.Sowbakiyalakshmi, B.Sathishkumar

Специальная статья

Risk-Awareness for Manet Routing Attacks Based On D-S Theory

  • Geethanjali.B, P.Arulprakash M.E., (Ph.D), Dhanasekaran.G

Специальная статья

Trust Aware Secure Routing for Cluster-based Wireless Sensor Networks - A Comparative Study

  • P.Prittopaul, Dr.N.Shankarram

Специальная статья

Detection and Mitigation of DDOS Attacks By Circular IPS Protection Network

  • S. Shanthini Priyanka, S. Hasan Hussain

Специальная статья

Automation of URL Discovery and Flattering Mechanism in Live Forum Threads

  • T.Nagajothi, M.S.Thanabal

Специальная статья

A Hybrid BTF Approach for Temporal Query Processing In the Patented Medical Database

  • T. Yogameera, Dr.D.Shanthi Saravanan

Специальная статья

Three Step Password Scheme for Secured Data Transfer

  • M.S.Vinu, R.T.Nivetha, M. Mano Chitra, K.Priyadharsini

Специальная статья

Secure Data Sharing for Dynamic and Large Groups in the Cloud

  • M.R. Kalai Selvi

Специальная статья

Performance and Analysis of Video Streaming of Signals in Wireless Network Transmission

  • Chinnusamy.K, Abinaya Preethi.K

Специальная статья

Enhancing Map-Reduce Framework for Bigdata with Hierarchical Clustering

  • Vadive.M, Raghunath.V

Специальная статья

An Efficient Retrieval of Encrypted Data In Cloud Computing

  • N.Nandhini and P.G Kathiravan

Специальная статья

Integrating Wireless Sensor Networks into Internet Of Things For Security

  • M.Tharani, N. Senthilkumar

Специальная статья

GNSS Based Bus Monitoring And Sending SMS To The Passengers

  • A.Kannaki@VasanthaAzhagu, N.Vijayalashmy, V.Yamuna, G.Rupavani, G.Jeyalakshmy

Специальная статья

Video Enhancement Based on Piecewise Tone Mapping

  • T. Manikandan

Специальная статья

System of Quality Automation for Documents (SQAD)

  • R. Babi Saraswathi, K. Divya, A. Habeebur Rahman, D.B.HariPrakash, S.Jayanth, T.Kumar, S. Mohan Kumar

Специальная статья

An Efficient Transmission over Cooperative Groups Using Hybrid Scheme

  • K.Banupriya

Специальная статья

Design & Implementation of Nios II Processor for Low Powered Embedded Systems

  • R. BalaKumar, S. Kalimuthukumar

Специальная статья

Securing and Region Based Algorithms For Wireless Sensor Networks

  • M.M.Chithra, A.Gayathri, S. Selva Birunda

Специальная статья

ICGICT-213-Internet Based User Service-Mobile Computing Internet Based User Service

  • SiniJoy P J, Dr. T. Sheela

Специальная статья

Garment Company Automation Using the Concept Of Big Data And Open Source Software

  • M.K. Ama Gayathri Surangika, S. Ananthi, G. Anitha, M. Sivaranjani

Специальная статья

An Efficient Approach to Enhance Security for Android Applications

  • Dr.A.Gnanabaskaran, M. Dinesh Kumar, M.Dinesh, K.Latha, S.Nithya, C.Prakash6

Специальная статья

Restoring Degraded Documents by Using Neural Network - KSOM Based Hybrid Techniques

  • S.Nanthini and M.Yuvarani

Специальная статья

Nonwhite Noise Reduction In Hyperspectral Images

  • Mrs.Suryatheja.M.B, Gokilamani.R

Специальная статья

Smart-Puter Based Sectrol for Vehicles

  • R.Jeevitha, R. Prasad, L.Nishanth, D.Vignesh Kirubaharan, S.M.Boobalakumaran

Специальная статья

Cost Effective Resource Mapping Based Requisition Partitioning Through Iterated Local Search

  • R. Hema, M. Siva Kumar, R. Devi

Специальная статья

Contourlet Based Image Denoising Using New- Threshold Function

  • Sakthivel K.

Специальная статья

Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT

  • S. Gobinath, S. Saravanan

Специальная статья

Time Constrained Data Destruction in Cloud

  • M.Nandhini, S.Jenila

Специальная статья

Biometric Fingerprint Verification System Based on BFS using Ridge Features

  • S.Revathi, T.Naveena

Специальная статья

Optimal Top-K Queries Computing: Sampling and Energetic Development Approach

  • Marthe Ranjani A, Mrs.Ananthi M

Специальная статья

An Iterative Approach to Record Deduplication

  • M. Roshini Karunya, S. Lalitha, B.Tech., M.E.,

Специальная статья

Developing Intonation Pattern for Tamil Text To Speech Synthesis System

  • K.C.Rajeswari, G. Karthick Prabu

Специальная статья

Encryption of Cryptographic key technique by crossover of Iris and Face Biometric key

  • Gokulakumar.A.S, Venkataraghavan.C, Kavya priya.S, Suganya.T

Специальная статья

An Efficient Approach for Requirement Traceability Integrated With Software Repository

  • P.M.G.Jegathambal, N.Balaji

Специальная статья

Energy Histogram for Image Retrieval using Relevance Feedback

  • Subashini.M, Narayanan.R.C, Dr.K.Krishnamoorthy

Специальная статья

Detecting Threads in Secure Communication using RCEE

  • T.Mathupriya

Специальная статья

Power Optimization in FPGA through Controller Device

  • V.Pavithra, T.Suganya, V.Suganya

Специальная статья

Elliptic Curve Cryptography in Cloud Architectures With Lower Latency

  • R.Balaji, N. Karthick Gowtham

Специальная статья

Enhanced Routing in Mobile Adhoc Network against Denial of Service Attack

  • V.R.Nisha, S.Rajeswari

Специальная статья

Grid Computing: A solution to processing time and power issues

  • Ms. B. Sornalatha

Специальная статья

Voice Recognition Robot for Visually Impaired People

  • M. Joshuva Regan, S.R.Barkunan

Специальная статья

Efficient Single Sign on Scheme for Distributed Networks

  • N. Rubiya (M.E-CSE), M. Arulprakash M.TECH.

Специальная статья

Improve the QoS of Networks Using Advanced Hybrid Routing in WSN

  • A.S. Jennathul Firthouse, S. Sasikumar

Специальная статья

Detection of Digital Image Forgeries by Illuminant Color Estimation and Classification

  • S. Rajapriya, S. Nima Judith Vinmathi

Специальная статья

Parallel AES Encryption Engines for Many-Core Processor Arrays

  • H. Naveen, M. Ramesh

Специальная статья

Cryptography Based Data Aggregation Scheme for Data Integrity Analysis in Wireless Sensor Networks

  • R. Kaleeswari, M.N.Karuppusamy

Специальная статья

Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes

  • P. Kalai Mani, V. Vishnu Prasath

Специальная статья

A Scheme for Detection of License Number Plate by the Application of Genetic Algorithms

  • A.M. Gowshalya Shri (M.E-CSE) , M. Arulprakash M.Tech.,

Специальная статья

MEMS Accelerometer based Digital Pen Recognition using Neural Networks

  • A. Geetha Vinothini, V. Vishnu Prasath

Специальная статья

Mitigating Malicious Activities by Providing New Acknowledgment Approach

  • G. S. Devi Lakshmi, J. Rajasekaran

Специальная статья

An Adaptive Contrast Enhancement of Colored Foggy Images

  • S.Mohanram, T. Joyce Selva Hephzibah, Aarthi.B, Sakthivel.P

Специальная статья

Reduction of Delay and Power by Using MLDD Technique in Error Correction

  • S.Abinaya, Mr.M.Yuvaraja

Специальная статья

A Novel Architecture of SRAM Cell Using Single Bit-Line

  • G.Kalaiarasi, V.Indhumaraghathavalli, A.Manoranjitham, P.Narmatha

Специальная статья

Implementation of E2AODV Protocol for Load Balancing In Cluster Ad-Hoc Network

  • A.S.Narmadha, C.Vasanthapriya, D.Sangeetha

Специальная статья

Activity Recognition from Video in Day or Night Using Fuzzy Clustering Techniques

  • T.Udhayakumar, S.Anandha Saravanan

Специальная статья

Sybil Attack Detection in Urban Vehicular Networks

  • R.Perumal, K.P.Sridhar

Специальная статья

Performance Analysis Of Time Hopping Ultra Wideband Communication System

  • Mr.R.Kiruthika, Mr.K.Ramprakash

Специальная статья

TAKE DIVERSION Driving Directions with Taxi Drivers Intelligence

  • Dr.J.Subashchandra Bose, S.Mohan Raj, Karthikeyan.T, Devaneyan.P, Kannan.M, Dharanikumar.S

Специальная статья

Back-Bone Assisted Hop Greedy Routing in Vanets

  • Ms.Priyanka.G, Mr.Sundareswari.K

Специальная статья

Payment Scheme for Identifying Cheating Reports in Multihop Wireless Networks

  • Ms.T.Thenmozhi, Mr.Arunkumar

Специальная статья

A Survey on Cloud Storage

  • Swathi.C, Vishnupriya. S, Rajeshkumar.R

Специальная статья

Improvisation of Fault Classification and Detection

  • Thilagavathi R, Anitha Raj B, Gajalakshmi N

Специальная статья

Survey of Various Techniques to Provide Multilevel Trust in Privacy Preserving Data Mining

  • R.Mynavathi, N.Sowmiya, D.Vanitha

Специальная статья

Multi-Sensor Railway Track Geometry Surveying System

  • Sureshkumar.R, Marimuthu.M, S. Rajeshwari

Специальная статья

A Modified Bec Logic Design of High Speed Csla For Low Power And Area Efficient Applications

  • D.Kumaresan, D.Jeyamani M.E, V.Vishnuprasath M.E

Специальная статья

Decentralised Access Control with Aggregate Key Encyryption For Data Stored In Cloud

  • Mr. Ashwin Chandra C, Ms. Dharani S

Специальная статья

Ocular Artifacts Reduction in EEG Using DWT And ANC For Portable Applications

  • R.Hemakumar, G.Banumathy

Специальная статья

Usability Matrix On Dynamic Datasets For Cloud Storage Solution Framework

  • Ms.S.Dharani, Ms.S.Shanthi

Специальная статья

Multipath Routing for Redundancy Management in Mobile Ad-hoc Networks

  • A. Thillipan, S. Dinesh Kumar

Специальная статья

Multiuser MIMO in LTE Advanced

  • K. Dhivya, P.Perumal

Специальная статья

HealthCare Monitoring Solution with Decryption Outsourcing by Parallel Computing in Cloud

  • Mr.K.Ganesan, Mr.C.Vijayakumaran

Специальная статья

Palmprint Recognition Using Adaptive Histogram Equalization and Discrete Curvelet Transform

  • Gopisivaraman.P, Udhayakumar.G

Специальная статья

Threshold Technique for Mobile Ad-Hoc Networks Using Secured Revocation Check

  • D.C. John Thangaraj, R.Tamilarasi

Специальная статья

Personalized Mobile search engine with GPCA Algorithm

  • K. Murugan, S. Suma

Специальная статья

Optimization based on PSO-ANFIS in Water bath Temperature System

  • K.S.Naveenkumar, Dr.S.Visalakshi

Специальная статья

A Weighted OFDM Signal Scheme for Peak To Average Power Ratio Reduction Of OFDM Signals

  • C.Kayalvizhi, C.Paranitharan

Специальная статья

Unitary Differential Space Time Frequency Codes For MB-OFDM Uwb Wireless Communications

  • E.Senthamilpaavai, K.Shalini

Специальная статья

Multirate Multicarrier CDMA via Orthogonal Codes for Wireless Mobile Communication

  • B.Atchaya, J.Sudharsan, A.Thillipan

Специальная статья

Improving Security of Single Sign-On Mechanism for Distributed Service Enviornment

  • Ragendu .T.B, Dr. R. Manimegalai

Специальная статья

Secure & Energy-Efficient Intrusion Detection in WSN

  • B. Kalidass, V. Ramasamy

Специальная статья

An Improved CBIR Method Using Color and Texture Properties with Relevance Feedback

  • MS. R. Janani, Sebhakumar.P

Специальная статья

Web Database Search Result Annotation

  • M.Manivasakam, N.Yuvraj

Специальная статья

Mitigating Superfluous Flooding of Control Packets MANET

  • B.Shanmugha Priya

Специальная статья

RCAETP: Reliable and Congestion Aware Event Transmission Protocol in a Wireless Sensor Network

  • Sreejish Soman, A.Kaleeswaran

Специальная статья

Effective Image Resizing By Combining Scaling, Seam Carving and Canny Edge Detector

  • S.K. Kavinmuhil, Dr. R. Manimegalai

Специальная статья

Clustering Enormous and Uncertain Data Steam

  • A.Ashok kumar, Dr.P.Vivekanandan

Специальная статья

Taint Flow Analysis for the Detection of Buffer Overflow Attacks

  • Abu Imran K

исследовательская статья

Security for Green Communication in Heterogeneous Wireless Networks

  • Elamathi.N, Dr.S.Jayashri

исследовательская статья

A Comparative Analysis of Various Representations of Human Action Recognition in a Video

  • Akila.K , Chitrakala.S

исследовательская статья

Performance analysis of Absolute Deviation Filter for Removal of Impulse Noise

  • G.Bindu, M.Upendra , B.Venkatesh, G.Gowreeswari , K.T.P.S.Kumar

исследовательская статья

Comparative Analysis of Different Feature Extraction and Classifier Techniques for Speaker Identification Systems: A Review

  • Jeet Kumar, Om Prakash Prabhakar , Navneet Kumar Sahu

исследовательская статья

A Comparative Study of Frequent Pattern Recognization Techniques from Stream Data

  • F.M.Christian, N.C.Chauhan, N.B.Prajapati

исследовательская статья

Region of Interest Based Image Compression

  • PratikChavada, Narendra Patel, KanuPatel

исследовательская статья

Development of Fuzzy based categorical Text Clustering Algorithm for Information Retrieval

  • S.M. Jagatheesan, V. Thiagarasu

исследовательская статья

Image Sharing in Clouds based on N-Server Forward Re-encryption System

  • S.Ephina Thendral , S.Indra Priyadharshini

исследовательская статья

Modeling of UPFC Using Model Predictive Control and Bacterial Foraging Algorithm

  • Mr.B.Gopinath, Ms.N.Vinothini, Dr.S.Suresh kumar

исследовательская статья

Discovering Multi-Level Association Rules using Fuzzy Hierarchies

  • Usha Rani, R. Vijaya Prakash, A. Govardhan

исследовательская статья

Design of an Efficient Low power Shift Register using Double Edge Triggered Flip-flop

  • Renganayaki G , Jeyakumar.V

исследовательская статья

A Secure Framework for Protection of Social Networks from Information Stealing Attacks

  • Dr. M.BalaGanesh Mrs.V.Sathya S.Vinoth Kumar

исследовательская статья

Real Time Face Tracking By Using Naïve Bayes Classifier

  • Krishna Priya Arni , Satish Ammuloju, Jagan Mohan Vithalachari Gollapalli, Dinesh Bhogapurapu Shaik Azeez

исследовательская статья

A Secure Distributed Peer To Peer Systems

  • H.Shaheen , M.Baskaran

исследовательская статья

A Review on Processing Big Data

  • Dr. Shoban Babu Sriramoju

исследовательская статья

PERFORMANCE ANALYSIS OF MULTICARRIER CDMA SYSTEMS

  • Pavani Sumala, R.Prasanth , R.A.S.Bharadwaj , Shaik Azeez,V.Nancharaiah

исследовательская статья

Secure Paper Distribution on Cloud Using Reencryption

  • Prof.A.G.Nadaph1,Amol Dashwant2, Dipali Bhivare3, Shrikrishn Badade4, Pratik Jadhav5

исследовательская статья

Data mining: Techniques for Enhancing Customer Relationship Management in Banking and Retail Industries

  • P Salman Raju, Dr V Rama Bai, G Krishna Chaitanya

исследовательская статья

Fractal Image Steganography Using Non Linear Model

  • G.Suryakala Eswari , N.Leelavathy, U.Sandhya Rani

исследовательская статья

A Survey on the Solutions for the Problems of Denial of sleep Attacks

  • RamandeepKaur, Vinodsharma

исследовательская статья

Multi-slots Reconfigurable Microstrip Antenna with Capacitive Loading Technique

  • Chandrappa D N, Ambresh P A, Vani R M, P V Hunagund

исследовательская статья

An Alternative Technique to Perform Surgeriesin Hospital by Surgical Diathermy

  • S.S.Shende, P.B.Dahikar, MJ.Hedau, K.Y. Rokde

исследовательская статья

Scalable Management Strategies using Mobile Agents in Optical Transport Network

  • Anish Saini & Dr. Atul Mishra

исследовательская статья

Study of Compute Application Resources Sharing for Android with Cloud Computing

  • R.Murugan

исследовательская статья

Reversible Data Hiding using Visual Cryptography: A Review

  • Assistant Professor, Dept of MCA, Shri Ramdeobaba College of Engg. and Mgmt., Nagpur, India

исследовательская статья

Health Monitoring Systems for Antiquated Peoples-A Survey

  • Pandimurugan , Mathavi parvathi , Dr.Paul rodrigues

исследовательская статья

A Study on Web Services Performance Measurements and Its Techniques

  • Mathavi parvathi, Pandimurugan, Dr.Paul rodrigues

исследовательская статья

Automatic Defect Detection Algorithm for Woven Fabric using Artificial Neural Network Techniques

  • Dr. G. M. Nasira , P.Banumathi

исследовательская статья

Mining Big Sources using Efficient Data Mining Algorithms

  • Shoban Babu Sriramoju

исследовательская статья

Performance Evaluation of Conventional Controller for Positive Output Re Lift LUO Converter

  • Sivakumar.A, Ajin Sekhar.S.C, Ronal Marian.A ,Sasikumar.M

исследовательская статья

Sentiment Analysis Using Support Vector Machine

  • Ms. Gaurangi Patil, Ms. Varsha Galande, Mr. Vedant Kekan, Ms. Kalpana Dange

исследовательская статья

Implementation of Link Layer of USB 3.1

  • Durgesh Kumar Sahu, Prof. Shweta Singh, Asst. Prof. Nitin Meena

исследовательская статья

Review on Data Mining Techniques for Intrusion Detection System

  • Sandeep D, M. S. Chaudhari

исследовательская статья

Estimation of Software Quality using Object Oriented Design Metrics

  • Ritu Chauhan, Rahul Singh , Ashish Saraswat, Anwar Husain Joya, Vinit Kumar Gunjan

исследовательская статья

Multi-Objective Reactive Power Compensation Using Evolutionary Programming and Particle Swarm Optimization

  • J. Madhavan, K.R. Venkatesan

исследовательская статья

Spam Filtering in Online Social Networks Using Machine Learning Technique

  • T.Suganya, T.Hemalatha

исследовательская статья

A Behavioral Comparison of LAR with AODV And DSR Routing Protocols

  • Romisha Arora, Noor Fatima Rizvi

исследовательская статья

Automated Survey Analysis System

  • Prof. Arti Bhore, Mr V.V. Mane, Mr S.B. Poul,Mr V.G. Patil4,Mr S.S. Patil

исследовательская статья

Dimensional Analysis of GaAs Based Double Barrier Resonant Tunnelling Diode

  • Vivek Sharma, Raminder Preet Pal Singh

исследовательская статья

Flat Back Index Generation for E-Books: A Tri-gram Approach

  • Saket Soni, Raj Kumar Singh, Sarang Pitale

исследовательская статья

LBMP: A Logarithm-Barrier-Based Multipath Protocol for Internet Traffic Management

  • S.Thirunavukkarasu, Dr.K.P.Kaliyamurthie

исследовательская статья

Development of DAVE 3D Android Gaming Application

  • Abdul Aleem Shaikh, Karm Raj, Rajat Bhandari,Prof.Anup H. Raut

исследовательская статья

OPTIMIZED VIDEO STREAMING USING MIXED BAYESIAN OPTIMIZATION TECHNIQUE IN P2P VIDEO ON DEMAND

  • D Sugandhi Mariyal, R Thangamani

исследовательская статья

Improved Correlation Preserved Indexing For Text Mining

  • Vinnarasi Tharania. I,M.Kanchana, V.Kavitha

исследовательская статья

Biological Early Detection of Nasal Dermoid Cyst Using CT/ MRI Scan - A Review

  • Neeraj Singla, Sugandha Sharma

исследовательская статья

An Obfuscation-Based Approach For Protecting Location Privacy

  • S.Thirunavukkarasu, Dr.K.P.Kaliyamurthie

исследовательская статья

Android Application for Doctor‟s Appointment

  • Prof. S. B. Choudhari, Chaitanya Kusurkar, Rucha Sonje, Parag Mahajan, Joanna Vaz

исследовательская статья

A Novel Approach for Breast Cancer Detection using Data Mining Techniques

  • Vikas Chaurasia, Saurabh Pal

исследовательская статья

A Fast Method of Hands-Free Design Technique For Adaptive Mobile Communications Systems

  • S.Mohanram B.Aarthi C.Silambarasan T.Joyce Selva Hephzibah

исследовательская статья

Review on Conversion of Various Block Sizes in Compressed Domain using DCT

  • Vaishali Choudhary, Ketki Bhakare ,Swati Dhopte

исследовательская статья

Collaborative Filtering Based On Search Engine Logs

  • DR.A.Muthu kumaravel, Mr. Kannan Subramanian

исследовательская статья

A Quantitative Analysis of NHPP Based Software Reliability Growth Models

  • Bijoyeta Roy, Santanu Kr. Misra, Aradhana Basak, Aparupa Roy, Deyasini Hazra

исследовательская статья

Study on Cloud Computing Model and its Benefits, Challenges

  • K.Kavitha

исследовательская статья

A Survey for Automatic Detection of Non- Proliferative Diabetic Retinopathy

  • M.Tamilarasi, Dr.K.Duraiswamy

исследовательская статья

Advanced Persistent Threats & Recent High Profile Cyber Threat Encounters

  • Vaishali S Raj, Dr. R. Manicka Chezhian, M.Mrithulashri

исследовательская статья

New EaaS Cloud Service Model Implementation for Smart Education

  • Dr.JaeChul Oh, HoJun Kim,Dr.Hyun Sim

исследовательская статья

A Light-weight Data Replication for Cloud Data Centers Environment

  • Mohamed-K HUSSEIN, Mohamed-H MOUSA

исследовательская статья

Robot Application of a Brain Computer Interface To Staubli Tx40 Robots - Early Stages

  • T.Shanmugapriya, S.Senthilkumar

Индексировано в

Индекс Коперника
Академические ключи
CiteFactor
Космос ЕСЛИ
РефСик
Университет Хамдарда
Всемирный каталог научных журналов
Импакт-фактор Международного инновационного журнала (IIJIF)
Международный институт организованных исследований (I2OR)
Cosmos

Посмотреть больше