Volume 2, Problème 1 (2014)

Article spécial

Enhanced Data Transmission for Wireless Sensor Networks

  • Karthick.S, Senthil Kumar.V

Article spécial

A NEIGHBOR COVERAGE BASED ROUTING BY GOOD NODE DETECTION IN MANET’S

  • J.Priyanka Sheela, Mr.S. Sundar Raj

Article spécial

Secure Reputation Mechanism For Unstructured Peer To Peer System

  • N. Vijaya Kumar., Prof. Senthilnathan

Article spécial

Avoiding Traffic Congestion Using Position Based Routing Protocol in VANET

  • Ms. D. Jeya, Mr P. Ranjith Kumar, Mr G. Naresh kumar

Article spécial

MULTI FOCUS IMAGE FUSION USING MULTI SPECTRAL AND PAN IMAGES

  • Prabhavathi. P, Mr. Ganesh Kumar. K. (Ph.D)

Article spécial

Cancer Cell Detection Using Mathematical Morphology

  • Sivappriya T , Muthukumaran K

Article spécial

A Large Scale Analysis Of Information Re-Finding System

  • Prakash.M , Karthika.D, Sophia.J

Article spécial

Improving Service credibility in Password Authenticated Peer Services

  • Vignesh.R, Karthikeyan.C, Satheesh.K

Article spécial

TSROD: Time Synchronization By Reducing Ocean’s Delay In Underwater Wireless Networks

  • Ms.R.Vaishnavi karthika, Mr.M.N.Karuppusamy

Article spécial

Intelligent Wireless Street Lighting System

  • S. Sugapriya, Prof. A. Natarajan

Article spécial

An Enhanced Token Ring Technique for Overhead cut Detection Scheme in Distributed Mesh Networks

  • Mr.S.S.Aravinth, Mr.M.Ramkumar, Mr.S.Someswaran, Mr.K.Aravinthraj

Article spécial

Design and Detection of Covert Timing Channels and Spyware Using Warden Technique

  • C.Logasundari, V.Menaka, R.Madhubala, G.Misal

Article spécial

A New Approach For Collaborative Data Publishing Using Slicing And M-Privacy

  • Sathish.R, Silambarashi.G, Saranya.P, Santhosh Kumar.B

Article spécial

Reachability of Open Source Software

  • R.Kamalraj, R. Sujatha, P. Srisathya

Article spécial

Obtaining Optimal Software Effort Estimation Data Using Feature Subset Selection

  • Abirami.R, Sujithra.S, Sathishkumar.P, Geethanjali.N

Article spécial

Collaborative Discovery and Verification of Neighbour position in MANET

  • R.Sagunthala, P.Sharmila, M.Somasundharam

Article spécial

Seam Carving for Content Aware Video Compression

  • G. Suganya, S. Lavanya, G. Sheeba Farin, G. Karthick

Article spécial

Securing Location and trust extended authentication in mobile ad hoc network

  • Ms. Reshna Wilson A, Mr. Biju Balakrishnan

Article spécial

Human Gait Based Gender Classification Using Energy Motion Approaches

  • Ms.P.Muthumari, Mrs.D.Suganya, Mrs.S.Ellammal

Article spécial

Securable Routing And Elimination Of Adversary Attack From Manet

  • Sureka.N, Prof. S. Chandra Sekaran, M.E.

Article spécial

Location Based Mobile Secure Social Networks

  • Roshan Sanu. Y, S. Uma Rani

Article spécial

Safeguarding Scada Network by Captious State Based Filter

  • I.Karthika, Mr. M. Mohamed Musthafa

Article spécial

Improving The Performance For Failure-Aware Resource Provisioning In Cloud

  • Priyanka P, A Geetha, Biju Balakrishnan

Article spécial

Reverberation Suppression of Noisy Speech Signal

  • Subha S, V.Murugan M.E., (Ph.D).

Article spécial

Large Scale of Content Distribution Using Homomorphic Hash Function

  • Sridevi K, Senthil Nathan K

Article spécial

Profit Maximization in Cloud Computing

  • Saistha N, Senthil Nathan K

Article spécial

Low Power Consuming FFT Pipelined Processor

  • A.Soundrakumar

Article spécial

Detection of an Inflammatory Disease Based on Classification of Tissues in Brain MRI

  • R.Vidhya, Mrs.P.Rajarajeswari, Mrs.S.Ellammal

Article spécial

The Analysis of Power Transformer from Differential Protection Using Back Propagation Neural Algorithm

  • T.Raja Pandi, MKNM.Sakthi Nagaraj, N.Panneer Selvam

Article spécial

Design of Multi-region SAR Segmentation by Parametric

  • S.Narumalar, V. Madhan kumar

Article spécial

Enhancing Security in MANET Using CCRVC Scheme

  • S.Herman Jeeva, D.Saravanan, RM.Chandrasekaran

Article spécial

Enhanced Security in Manet Using Eaack To Detect Malicious Attack

  • K.Chinthanai Chelvan, I.Anbu Muthu, D.Saravanan

Article spécial

Enhancing Security in Wireless Ad-Hoc Network Using ZKP

  • M.Soniya, P.Sabarinathan, S.Visnudharsini

Article spécial

An Energy Efficient Multicast Routing Based On Genetic Algorithm for MANET

  • P.Prasanna, D.Saravanan, RM.Chandrasekaran

Article spécial

Privacy Preserving Outsourcing for Frequent Itemset Mining

  • M. Arunadevi, R. Anuradha

Article spécial

Cloud Computing Model for Large Scale System through Merkle Hash Tree

  • S.Dhivyabala, K.Gopalakrishnan

Article spécial

Time Constrained Datadestruction Using Blowfish Algorithm In Cloud

  • R.K.Vinothraja, T.Krishnakaarthik

Article spécial

A Fast Clustering Based Feature Subset Selection Using Affinity Propagation Algorithm

  • Mr. M. Senthil Kumar, Ms. V. Latha Jothi M.E

Article spécial

Post Market Drug Analysis using Irregular Pattern Mining Scheme

  • Mr. S. Prakash, Ms. S. Kanjanadevi

Article spécial

MULTI ORGANIZATION RECORD SHARING IN CLOUD COMPUTING USING ATTRIBUTEBASED ENCRYPTION

  • Mr. T. Krishnakumar, Ms. S. Kayalvili M.E.

Article spécial

Anomaly Detection on Data Streams with High Dimensional Data Environment

  • Mr. D. Gokul Prasath, Dr. R. Sivaraj, M.E, Ph.D.

Article spécial

Batch Verification Scheme for Economic Cloud Storage Services

  • K. Sudha, Mr. S. Sivaraj, ME

Article spécial

Distributed Cache Model with Stability and Storage Management for MANET

  • S. Padmapriya, Mr. S. Sivaraj, ME

Article spécial

Optimal Centroid Estimation Scheme for Multi Dimensional Clustering

  • K. Lalithambigai, Mr. S. Sivaraj, ME

Article spécial

Decision Prevention Mechanism for Frequent Pattern Mining Process

  • L. Gomathi, Mr. A.T. Ravi, ME (Ph.D)

Article spécial

Privacy Ensured Domain Name Query Scheme with Attack Detection Mechanism

  • M. Dhaarani, Mr. S. Sivaraj, ME

Article spécial

Efficient Data Delivery Mechanism for Distributed Storages

  • S. Koperundevi, R. Anbarasu, ME

Article spécial

Graph Clustering and Feature Selection for High Dimensional Data

  • K. Jaganath, Mr. P. Sasikumar

Article spécial

Optimizing User Navigation with Pattern based Web Site Restructuring Scheme

  • Ms. Jissin Mary Kunjukutty, Ms. A.Priya, ME

Article spécial

Multi Image Super Resolution and Blind Deconvolution

  • Lincy Annet Abraham, R.Manimekala

Article spécial

Protecting DNS Query Communication against DDoS Attacks

  • Ms. R. Madhuranthaki, Ms. S. Umarani, M.E., (Ph.D)

Article spécial

Image Fraud Identification Using Illuminant Analysis

  • P. Kaveen, Dr. G. Singaravel Ph.D.,

Article spécial

Image Fraud Identification Using Illuminant Analysis

  • P. Kaveen, Dr. G. Singaravel Ph.D.,

Article spécial

Privacy Preservation for User Profiles In Social Networks

  • Ms. U.P. Umasree, Mr. V. Bhaskar, ME,

Article spécial

Routing Attack Discovery in WSN

  • J. Sabatini, Mrs. K. Vanitha, M.E., (Ph.D)

Article spécial

Decentralized Data Allocation with Load Balancing Mechanism

  • A. Rajalakshmi, Dr. A. M. J. Md Zubair Rahman, ME, MS, Ph.D.,

Article spécial

Mobile Sink based Data Gathering and Forwarding in WSN

  • C. Kanimozhi, Prof. M.Mohamed Musthafa, M.Tech., (Ph.D).

Article spécial

Mobile Sink based Data Gathering and Forwarding in WSN

  • C. Kanimozhi, Prof. M.Mohamed Musthafa, M.Tech., (Ph.D).,

Article spécial

Efficient Message Caching Scheme for MANET

  • S. Manju, Mrs. K. Vanitha, M.E., (Ph.D)

Article spécial

Anonymous Privacy-Preserving Routing In Location Based Dynamic Ad-Hoc Networks

  • G.Gokila, Mrs.F.Salma Rosline Mary, M.E., P.Karthikeyan, Mr.A.Suresh Babu,M.E.

Article spécial

Online Dynamic Assessment

  • Subashini.A, Aishwarya.M, Bhuvenswari.R, Manjuparkavi.R

Article spécial

Functional Testing Technique Using ODC to Identify And Predict Faults

  • K.Sivaprakash, Prof. Preethi harris

Article spécial

Human Gait Based Gender Classification Using Energy Motion Approaches

  • Ms.P.Muthumari, Mrs.D.Suganya, Mrs.S.Ellammal

Article spécial

Automated Testing For the Refactored Codes

  • K.Jeya Ganesh Kumar, Dr.M.S. Geetha Devasena

Article spécial

K-Tier Computation of Parallel Workload in Cloud

  • P.Karthikeyan, R.Sudhakar

Article spécial

Automatic Tuning Of OLSR Routing Protocol Using IWD in VANET

  • M.Gunasekar, S.J.Hinduja

Article spécial

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

  • Dr.S.Valarmathy, R.Karthiprakash, C.Poonkuzhali

Article spécial

Annotating Multiple Web Databases Using Svm

  • M.Yazhmozhi, M. Lavanya, Dr. N. Rajkumar

Article spécial

Attention Towards Selfish Nodes Over A Manet Using Arti-Q Technique

  • S.ArunKumar, Mr.A.Bharanidharan

Article spécial

A Best Vigorous Resource Allocation Autonomously In Cloud

  • S.Rameez Raja, S.Rinesh MBA.,M.E.,(Ph.D)

Article spécial

Securing Location and trust extended authentication in mobile ad hoc network

  • Ms. Reshna Wilson A, Mr. Biju Balakrishnan

Article spécial

Comparison Of Cepstral And Mel Frequency Cepstral Coefficients For Various Clean And Noisy Speech Signals

  • M.Kalamani, Dr.S.Valarmathy, C.Poonkuzhali, R.Karthiprakash

Article spécial

Feature Based Classifiation Of Lung Tissues For Lung Disease Diagnosis

  • V.Lakshmi, Ms. P.Krisnaveni, Mrs. S.Ellammal

Article spécial

Investigation of Recognition Methods in Biometrics

  • Udhayakumar.M, Sidharth.S.G, Deepak.S, Arunkumar.M

Article spécial

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

  • J.Anbu selva, P.Bharat, S.Mathiyalagan J.Anand

Article spécial

Optimization Of Energy Efficient Communication To Improve The Lifetime Of Sensor

  • S.Anbarasu, P.Balasubramani, S.Saravanakumar

Article spécial

Enhancement of secured Mobile voting based on IMEI number as Key

  • Venkatesh J, Viswaprasath KS

Article spécial

Image Fusion And Denoising Technique: Survey

  • P.Thirumurugan, Dr. S. Sasikumar, C.Sugapriya

Article spécial

A Cluster Based Group Management Using Zone Leader Allocation In Manet

  • K. Senthil Kumar, Dr. S. Sasi Kumar, Dr. C. Sugapriya

Article spécial

Dynamic Router Design For Reliable Communication In Noc

  • Mr. G.Kumaran, Ms. S.Gokila, M.E.

Article spécial

AUGMENTING THE SECURITY IN TOR

  • S.Kokilavani, G.Priyadharshini

Article spécial

A Image Forensics Analysis by Using DST, Fuzzy and Bayesian Approaches

  • D.Gokila Bharathi, G.Selvavinayagam

Article spécial

Audio Alert for Safe Driving by Smartphones

  • R.Ancy Ramya,ME, R.SwathiRamya,M.E., S.Krishnaveni,M.E

Article spécial

Reducing Routing Overhead In Manet Using Ncpr Protocol

  • Ms.Manjula.R, Mr.Santhosh.R

Article spécial

Robust Shape Representatio Using Minium Near Convex Decomposition

  • Ms.Sathya Prabha.p, Mr.Santhosh.R

Article spécial

Range Query Grouping In Spatial Networks Using Dual Distance Measurements

  • S.Udhayakumar M.E., (CSE) , D.Sureshkumar M.E., (CSE)

Article spécial

Protecting Web Service Composition From Privacy Attacks Using Dynamic Privacy Model

  • Ms.M.Sabrabeebe, Ms.C.Nancy Nightingale

Article spécial

A Bi-Objective Approach for Cloud Computing Systems

  • N.Geethanjali, M.Ramya

Article spécial

Data Hiding Using Difference Expension Method

  • YASMEEN M.G,RAJALAKSHMI G

Article spécial

An Enhanced Memory Management For An Advanced Line Buffer Based Image Processing Pipeline

  • R.Priya,S.Priyadharshini,Thanjaibharathi.

Article spécial

Moving Object Detection By Background Subtraction

  • V.AISWARYA LAKSHMI, E.ANITHA, S.SELVAKUMARI.

Article spécial

Optimized Re-Ranking In Mobile Search Engine Using User Profiling

  • A.VINCY, M.KALAIYARASI, C.KALAIYARASI

Article spécial

Combined Fingerprint Minutiae Template Generation

  • Guruprakash.V, Arthur Vasanth.J

Article spécial

Securing Data Packets from Vampire Attacks in Wireless Ad-Hoc Sensor Network

  • Mr.M.Rajesh Khanna, S.Divya, Dr.A.Rengarajan

Article spécial

Improving Service Credibility in Password Authentication Peer Services

  • V. Vijayashanthi, C. Bala Saravanan

Article spécial

Performance Enhancement Using Naodv Algorithm In Manet

  • Julian.P, Smiline Arokya Pradeepa.J

Article spécial

Preventing Private Information Leakage on Social mining

  • A.Krishna Kumar , M.Suriya

Article spécial

Decentralized Approach for Balancing Load in Dynamic Cloud Environment

  • Karthick Smiline Britto.J , PrittoPaul.P

Article spécial

Congestion Based Pricing Resources Managemant In Broadband Wireless Networks

  • M.Banupriya, ME, P.Manokari.B.E (ME) , T.B.Dharmaraj,ME.,

Article spécial

Electromagnetic Coupling Microstrip Patch Antenna for Improving Wide Bandwidth and Broad Beamwidth

  • G.Karthikeyan, Dr.Meena @ jeyanthi, Ms.S.Soniya, Ms.Thangaselvi

Article spécial

VLSI Implementation of Reconfigurable Low Power Fir Filter Architecture

  • Mr.K.ANANDAN Mr.N.S.YOGAANANTH

Article spécial

Access Control Policies Of Socio Networking Websites For Multiple Profile Holders

  • B.Vijaya Kumar, G.Nirmala Devi, V.Vanaja, P.Meena

Article spécial

4 Level Authentication Security In Cloud Computing

  • P.Shenbagam, C. Namasivayam

Article spécial

Security Enhanced Service Level Agreement for Cloud Storage Services

  • E.Kiruthika, S.D.PrabuRagavendiran

Article spécial

Audio Steganography Using Least Significant Bit

  • Sudha Lakshmi N

Article spécial

A Trust Based Payment Scheme for Multihop Wireless Networks

  • S.Suganya,S.Dhivya,Y.Jenifer

Article spécial

Packet classification based on priority with shortest path algorithm

  • A.Vijayalalitha, R.Dharmaraj M.E.,(Ph.D)

Article spécial

Efficient Power Management in Wireless Communication

  • R.Saranya, Mrs.J.Meena

Article spécial

Enhancing Digital Forensic Analysis through Document Clustering

  • B.Vidhya, R.Priya Vaijayanthi

Article spécial

Novel Dynamic Fault Localization for Server side Vulnerabilities

  • C.P.Shabariram, V.Sharmila, J.Francy, R.Anandhi

Article spécial

Enhanced Packet Scheduling Scheme for Wireless Sensor Networks

  • P.Narayani, Mrs.R.Meena prakash , A.R.Devi

Article spécial

AMI Mesh Networks Based Home Energy Management System

  • G.KausalyaDevi, M.Premkumar

Article spécial

Accessing Distributed System Using Hashed Fingerprint Recognition

  • R.Mekala, S.A.Jiji Jasmine, Vinisha.D

Article spécial

Delay Based Scheduling For Cognitive Radio Networks

  • A.R.Devi R.Arun kumar S.Kannagi

Article spécial

Preventing Mobility Device Intrusion And Theft Using Biometric Fingerprint Recognition

  • Vanitha.M, Vidhya Gandhi.P, Rajkumar.M, Rajkumar.S

Article spécial

Traveling Salesman Problem Solved Using Bio Inspired Algorithms (ABC)

  • S. Saranya, R. Priya Vaijayanthi

Article spécial

Detection of Text with Connected Component Clustering

  • B.Nishanthi, S. Shahul Hammed

Article spécial

Hybrid Location Based Forward Routing in Manet’s

  • Arjun sankar.J, Ramar.C.K, Venkatesan.N

Article spécial

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks

  • M.Sudha, J.Sundararajan, M.Maheswari

Article spécial

Detection of Cancer Using Biclustering

  • Sayana Sunny, M.Pratheba

Article spécial

Accident Detection Using Android Smart Phone

  • P.Kaladevi, T.Kokila, S.Narmatha, V.Janani

Article spécial

Implements The Spatial Inverted Indexes To Perform Quick Search

  • Sophiya.K, Sounderrajan.T

Article spécial

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

  • K.Sangamithra, S.Tamilselvan

Article spécial

Detection and Segmentation of Brain Tumors using AdaBoost SVM

  • Nithyapriya.G, Sasikumar.C

Article spécial

Sensory Data Collection Using Rendezvous Nodes

  • N.Lokesh, D.Gokilapriya

Article spécial

An Efficient Location Based Routing for Mobile Adhoc Networks

  • S.Saranya, D.Gokilapriya, M.Maheswari

Article spécial

A Model of Textual Emotion Mining From Text Document

  • S.Sujitha, S.Selvi

Article spécial

Modified Difference-Histogram based Reversible Data Hiding Scheme

  • E.Gayathri, Dr.K.A.Palaniswamy

Article spécial

Optimization of Bit Rate in Medical Image Compression

  • Dr.J.Subash Chandra Bose, Mrs.Yamini.J, P.Pushparaj, P.Naveenkumar, Arunkumar.M, J.Vinothkumar

Article spécial

Detecting Anomalies by Online Techniques Using Spam Detection

  • R. Dharani M.E (CSE) , S. Subashini M.Tech (IT) AP/CSE

Article spécial

Packet Classification Using Standard Access Control List

  • S.Mythrei, R.Dharmaraj

Article spécial

A Study on Wireless Sensor Networks Localization

  • Poonkodi.K, Vinodhini.B, Karthik.S

Article spécial

Energy Efficient E-BMA Protocol for Wireless Sensor Networks

  • M.Manivannan, R. Palanikumar. M.Tech,

Article spécial

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System

  • Bala Kumari P, Bercelin Rose Mary W and Devi Mareeswari M

Article spécial

Provide Integrity for Spatial Data Outsourcing

  • SivaSakthi S, Bini Tofflin R, Roslinmary M

Article spécial

Fingerprint Privacy Preservation by Minutiae and Orientation

  • Bercelin Rose Mary.W, Subbulakshmi.N, Bala Kumari.P

Article spécial

Strength of Evolving Agent Population in MAS

  • M. Eniya, M. Vinothkumar M.E.,(Ph.D)

Article spécial

Multiple Class Identification and Categorization with Nuggets on Health Care Data

  • P. Jamuna, G, Mohana Prabha, M.E, (Ph.D)

Article spécial

Retrieval of Encrypted cloud data using multikeyword

  • C.Rajeshkumar, Dr.K.Rubasoundar

Article spécial

On-Demand Routing in Mobile Ad Hoc Network

  • Buvana.P, Arun Sebastian, Deepika.K.S, Keerthivasan.S

Article spécial

Detecting DDOS Attacks by Circular Protection Network

  • Yamini B, Chithra Devi R

Article spécial

Cluster Based Certificate Revocation and CBRP in Manet

  • Mathan.S, S.Shahul Hammed

Article spécial

A Framework Outline for Word Catalog Based Model in Cloud

  • Mr.C.Sivakumar, Mr.M.Arulprakash M.Tech

Article spécial

Establishing Adversary Resistant Communication in Wireless Network

  • Sona G, Annapandi P, Addlin Shinney

Article spécial

Optimization of Content Downloading Using Dynamic Cache Memory

  • Ms.A.Gayathri, Ms.M.M.Chithra, Ms.R.Jeyashree, Mr.A.Premkumar

Article spécial

Hand Gesture Recognition using MACD

  • Geethu Prakasan, Bimal Bose B.S

Article spécial

A Technique to Prevent Dynamic Unsafe Component Loadings

  • M.Malathi, Mrs.P.Sumathi, M.E., Dr.S.Chitra M.E., Ph.D

Article spécial

Content Based Analysis Improves Audiovisual Archieve Retrieval

  • Muthusankar.D, Kalaiselvi.M, Karthik.M, Mahendravarma.A

Article spécial

Mobile Virus Prevention Techniques: A Survey Perspective

  • R.Dhaya, M.Poongodi

Article spécial

High Throughput, Low Area, Low Power Distributed Arithmetic Formulation for Adaptive Filter

  • G.Selvapriya, M.Mano, K.RekhaSwathiSri, Mr S.Karthick

Article spécial

Robust Cloud Resource Provision

  • M.Sharmila Banu

Article spécial

An Analysis of Unwanted Messages Filtering Methods from OSN User Walls

  • Mr. K.Arulmurugan, Mr.P.Ranjithkumar

Article spécial

Simulation on Cyber War in Cloud Computing

  • Arul Selvam. P, Jeevanantham. G

Article spécial

Unstructured Data into Intelligent Information Analysis and Evaluation

  • Dr.S.Chitra M.E, Ph.D, Mrs.N.Shunmuga Karpagam M.E, Mr.K.Venkataramanan

Article spécial

Design of Double Tail Comparator for High Speed ADC

  • S.Sivasathya, T.Manikandan

Article spécial

Improving Word Similarity Using PPMIC with Estimates of Word Polysemy

  • Nagajothi P, Hemalatha L, Kumari K, Jeevarathinam S

Article spécial

Acknowledgment-Based Secure Authentication Method for Manet

  • Dr.J.Subash Chandra Bose, U.Akila Devi, M.Prasanalaxmi, K.Malathi, K.P.Vinodhini, S.Saranya

Article spécial

An Anonymous Authentication and Secure Communication Protocol in Ad-hoc Networks

  • D. Pavun Kumar, Mr S.Sundar Raj M.Tech

Article spécial

Security Using Anonymization and Slicing

  • Mr.K.Manikanda Prabhu

Article spécial

Implementation of Pick and Place Operation, Battery Backup and Zone Control in Automated Guided Vehicle

  • Saravana Sundar.T, R.C.Vignesh, G.Moorthi, Nivedhan.M

Article spécial

Clustering of Data with Mixed Attributes based on Unified Similarity Metric

  • M.Soundaryadevi, Dr.L.S.Jayashree

Article spécial

Balancing the Load to Reduce Network Traffic in Private Cloud

  • A.Shenbaga Bharatha Priya, J.Ganesh

Article spécial

Measure of Implicit Relationship between Words by Network Count

  • Keerthana.S.M, V.Rajakumareswaran

Article spécial

Robust Rate control for Video Streaming in Heterogeneous Environment

  • B. Nandhini, S. VinothKumar M.E.,

Article spécial

Low Power Multi Bit Flip Flops Design for VLSI Circuits

  • L.Ange Prabha, S.Joy

Article spécial

Image Mining: frameworks and techniques

  • Madhumathi.k, Dr.Antony Selvadoss Thanamani

Article spécial

A Relevant Clustering Algorithm for High- Dimensional Data

  • Bini Tofflin.R1, Kamala Malar.M2, Sivasakthi.S3

Article spécial

Improved Client Data Security with Aggregated Query Using CDAMA

  • Ms.S.Kanimozhi, Mrs.K.Makanyadevi

Article spécial

Secured Routing For Manet Using Friend Based Adhoc Routing (FAR)

  • Ms.K.Deepa, Mrs.V.Durgadevi

Article spécial

Design of Hybrid Multicasting Network for Authentication

  • R.Vidhyalakshmi, P.Sankardayal, G.Sankareeswari

Article spécial

Sum Query Evaluation over Uncertain Data

  • Roslinmary M, Saravana Kumar T and Addlin Shinney R

Article spécial

Privacy Preserved Data Scheduling For Cloud Data Services

  • Mr.R.Sathish, Mr.T.Sathishkumar M.C.A., M.E.,

Article spécial

An Effective Approach for Detecting and Preventing Sqlinjection Attacks

  • M. Roslinmary, S. Sivasakthi, A. Shenbaga Bharatha Priya

Article spécial

An Effective Approach for Detecting and Preventing Sqlinjection Attacks

  • M. Roslinmary, S. Sivasakthi, A. Shenbaga Bharatha Priya

Article spécial

Privacy Preserving Public Auditing for Data in Cloud Storage

  • M.Priya, E. Anitha, V.Murugalakshmi

Article spécial

Combined Cluster Based Ranking for Web Document Using Semantic Similarity

  • V.Anthoni sahaya balan, S.Singaravelan.M.E.

Article spécial

Restructure Search Results for Efficient Web Search

  • Addlin Shinney R, Saravana Kumar T and Roslinmary M

Article spécial

SECUDROID - A Secured Authentication in Android Phones Using 3D Password

  • Ms. Chandra Prabha K M.E. Ph.D., Mohamed Nowfel E S, Jr., Gowtham V, Dhinakaran V

Article spécial

Ranking the Relationship on Wikipedia through Strength Determination

  • S.P.Angaiyarkanny, G.Sharmila

Article spécial

Dynamic Resource Allocation Using Nephele Framework in Cloud

  • Anand Prabu P, Dhanasekar P, Sairamprabhu S G

Article spécial

ADA: Data Aggregation Scheme for Dynamic Application Using PBDR in Wireless Sensor Networks

  • B.Mahalakshmi (ME., CSE) , R.Rajavignesh ME.,

Article spécial

Optimum Service Interval and Service Period: MBR in Wireless Networks

  • Ms. K.Tamilarasi, Mrs. R.Bharathi

Article spécial

Semantic Analysis based Dirichlet Clustering Scheme for Text Documents

  • C.Selvarathi, M.E, K.Karthika

Article spécial

An Enhancement in Data Collection

  • R.Sangeetha, V.Seethalaksmi

Article spécial

Balancing privacy and Utility in Defect Prediction by Privatization Algorithm

  • Dr.S.Chitra, P.Sumathi, T.Kanchana

Article spécial

Balancing privacy and Utility in Defect Prediction by Privatization Algorithm

  • Dr.S.Chitra, P.Sumathi, T.Kanchana

Article spécial

Query Services in Cost Efficient Cloud Using Query Analysis

  • VanthanaPriya.J, ArunKumar.B

Article spécial

Applications of Security System

  • G.Ramachandran, Jayanthi S, E.Ravishankar, P.Balaji, S.SivaPrakash

Article spécial

Reversible Gate Based Testable Sequential Circuits

  • K.Rekha swathi sri, M.Mano, G.Selvapriya

Article spécial

Improving Scalability of R-Dictionary Using Keyword Based Approach

  • G.Kokila, Dr.R.Rajasekaran

Article spécial

Detection and Localization of Multiple Spoofing Attackers in Wireless Network

  • Mekala R, Arul V, Keerthana B, Sobana J

Article spécial

An Overview of Knowledge Discovery Database and Data mining Techniques

  • Priyadharsini.C, Dr. Antony Selvadoss Thanamani

Article spécial

Virtual Shopping Application for Android Devices Using Virtual Reality

  • Dr.J.Subashchandra Bose, Yuvaraj.S, Siva.R, Sabarisan.K, Kannan.P, Santhosh Kumar.S.M

Article spécial

Modified K-Means Algorithm for Initial Centroid Detection

  • D. Sharmila Rani, V.T.Shenbagamuthu

Article spécial

TPA Based Batch Auditing Mechanism for Commercial Clouds

  • Mr.R.Sathyaraj, Dr.V.K.Manavala Sundaram M.E., Ph.D.,

Article spécial

Design of 2/3 prescalerLow Power Flexible Multiband Divider

  • R.Naveenkumar, V.A.Saravanan

Article spécial

Enhance Privacy Preserving In Location Based Service

  • Karthik R, Anguraj S

Article spécial

Security for Smart Distribution Grid By Using Wireless Communication

  • S.K.Saranya, Dr.R.Karthikeyan

Article spécial

Invariant Based Integration of Web Service Interface Testing

  • V.Alanthuraiyan1, E.Kruthika2, R.Devisri3

Article spécial

Low Cost (PUF) Physical Unclonable Function Using Secured Clock Network

  • Muthumeenakshi.N, Rajaprabha.R

Article spécial

Attribute Based Encryption with Privacy Protection in Clouds

  • Geetanjali. M, Saravanan. N

Article spécial

Establishing SSH Connection and Interfacing GSM/GPRS Functionality with Raspberry PI

  • Mrs.P.Suvitha Vani, Miss.Nithyappriya.G

Article spécial

An Efficient Algorithm to Mitigate Packet Drop Attack in AODV Protocol

  • Arunprasath.M, Mr.M.Mohana Sundharam

Article spécial

Face Verification across Ages Using Self Organizing Map

  • B.Mahalakshmi, K.Duraiswamy, P.Gnanasuganya, P.Aruldhevi, R.Sundarapandiyan

Article spécial

Design of Dipole Antenna Using Mom

  • K.Priyadharshini, Mrs.G.Brenie Sekar

Article spécial

Vehicle Detection Using Gabor Filter

  • B.Sahayapriya, S.Sivakumar

Article spécial

Content Based Image Retrieval System-an Evaluation

  • N.Shanmugapriya, R.Nallusamy

Article spécial

A Clustering Mechanism for Energy Efficient Routing Path

  • Nangai Abinaya S, Sudha R

Article spécial

Key Generation for Outsourced Storages in Clouds

  • Sandeep.S, Vijayakumar.P, Anand.V

Article spécial

Smart Energy Meter with Instant Billing and Payment

  • R. Dhananjayan, E. Shanthi

Article spécial

Car Authentication and Accident Intimation System Using GPS and GSM

  • R.Monisha, Jessen Joseph Leo, B.T.Tharani Sri Sakthi

Article spécial

Efficient Optimization of Sparql Basic Graph Pattern

  • Ms.M.Manju, Mrs. R Gomathi

Article spécial

Dynamic Key Management System for improving security in Three-Tier environment

  • P.Kabil dev, II - ME (CSE) , O.M. Soundara Rajan

Article spécial

Preserving Data Integrity in Cloud Storage

  • Jegadeesan.K, Sivakumar.K

Article spécial

Green Computing For System Efficiency and Optimization

  • L.Dhanam, Sumathi Sivaraj, R. Vanathi

Article spécial

Using Interleaving Techniques with FEC Mechanisms to Deal with Burst Errors

  • M.SangeethaPriya, C.Devipriya, Dr. N.Saravana selvam

Article spécial

Copy Frame Detection in Video by Using Data Mining Techniques

  • K.Girija, R.Maheswaran, P.Sabarinathan

Article spécial

Lossless Compression and Efficient Reconstruction of Colour Medical Images

  • M.Suganya, A.Ramachandran, D.Venugopal, A.Sivanantha Raja

Article spécial

Time Constrained Data Destruction in Cloud

  • S. Christina Suganthi Monica, M.Subasini

Article spécial

GeoZigBee: A Wireless GPS Wristwatch Tracking Solution

  • Sathish kumar.R, Vengadapathiraj.M

Article spécial

Digitalised Secure Information Channel Maintenance in Distributed Broking System

  • A. Uma Maheswari, Mrs.V.Muthamilselvi

Article spécial

Integrating Colors, Shapes and Motions Using Active Contour Based Visual Tracking

  • P. Kiruthika, J.Sathya priya, S.P. Prakash

Article spécial

Dynamic Architecture for Scalable and Proficient Group Key Management

  • G M Mythili, N M Saravana Kumar

Article spécial

To Enhance the Lifetime of WSN Network using PSO

  • K.SyedAliFathima, T.Sumitha

Article spécial

Service and Data Security for Multi Cloud Environment

  • Rajkumar B, Balamurugan K

Article spécial

Power Quality Improvement using Hysteresis Voltage Control of DVR

  • J Sivasankari, U.Shyamala, M.Vigneshwaran

Article spécial

Single Query Optimization of SPARQL Using Ant Colony Optimization

  • Ms.P R Rupashini, Mrs. R Gomathi

Article spécial

Practical Approach for Achieving Minimum Data Sets Storage Cost In Cloud

  • M.Sasikumar, R.Sindhuja, R.Santhosh

Article spécial

A Survey on Wireless Sensor Network Security

  • S. Mohan, S. Grace Diana. S. Ramya

Article spécial

Determination of LMP for Congestion Management in Electricity Market

  • K.Kamal dass, P.Kanakaraj, M.Prabavathi

Article spécial

Providing High Security in User for Vehicular Ad- Hoc Network

  • S.Manoranjitha, M.Vasanthi

Article spécial

A Semantic Model for Concept Based Clustering

  • S.Saranya, S.Logeswari

Article spécial

Preventing DNS Queries Against DDOS Attack

  • P.Soniya, Mrs.S.Rajeswari

Article spécial

ICGICT Allocation of DG for IEEE 33 Bus Systems

  • S.Ishwarya, P.R.Surya

Article spécial

RFID Based Smart Grid with Power Factor Maintenance in Load Side

  • B.Rajesh Kumar,G.kiruthika

Article spécial

Presence Server For Mobile Ubiquity Services In Presence Cloud

  • D. Dhiravida Vasantha Nayaki, G. Mangayarkarasi

Article spécial

Personal Authentication using Fingerprint Biometric System

  • V Prasathkumar, Mrs. V. Evelyn Brindha

Article spécial

Bandwidth Scheduling for Content Delivery in VANET

  • Babu G , Uma Maheswari M

Article spécial

A support for end user-Centric SLA administration of Cloud-Hosted Databases

  • A.Vasanthapriya, Mr. P. Matheswaran, M.E

Article spécial

Brain Gate Technology

  • Manjunatha .V

Article spécial

An Improved Privacy Preserved Rule Mining for Credit Dataset with Discrimination Prevention

  • Boopathiraja K, Nithyakalyani S M.E., (Ph.D)

Article spécial

Analysis and Principles of Green UI Design for Web Portals

  • S.Vetrivel, S.Pandikumar, M.Athigopal

Article spécial

Optimized Data Transmission from Cloud to Society by Mapreduce

  • S.P.Prasanth and P.G.Kathiravan

Article spécial

A Fuzzy Ontology Based Automatic Video Content Retrieval

  • P.Anlet pamila suhi, S.Deepika

Article spécial

A Novel Approach to Ranking On Data Manifold With Sink Points

  • A. Mahesh. M.E. , G.R.Sumithra

Article spécial

The Brain Fingerprinting Technology

  • K. Logeshwari

Article spécial

Adaptive Fuzzy Based Solution of Inverted Pendulum & Aircraft Landing Problems

  • Vijayalakshmi.J, Pavithra.R, Rudresha.M

Article spécial

Maintaining Privacy and Secrecy in Untrusted Network with Stile

  • M. Anbu Chezhian, S.Ramalakhsmi

Article spécial

A Preserving Location Privacy of Mobile Network

  • P. Sakthi Priyanka and B. Raja Rajeswari, Tamilnadu, India

Article spécial

MD5: Anonymous Location-Aided Routing in Suspicious Secure MANETs

  • Manjuladevi.V, Jennie Bharathi.R

Article spécial

Brain Gate Technology

  • Manjunatha .V

Article spécial

APU - Mobility Prediction Scheme for Routing Protocols in MANET

  • Archana.S.S, P.Arulprakash M.E., (Ph.D), Priyanka.S

Article spécial

Multi Organization Records Sharing in Cloud Computing Using Attribute Based Encryption

  • ME, Department of CSE, SSM College of Engineering, Komarapalayam, Tamil Nadu, India

Article spécial

Entity Recognition in a Web Based Join Structure

  • J.Kavitha M.Tech, A.Pasca Mary

Article spécial

Simple Algorithm for the Magnetic Field Computation in Bobbin Coil Arrangement

  • V.Suresh, V.K.Gopperundevi, Dr.A.Abudhahir, R.Antonysamy, K.Muthukkutti

Article spécial

An Architecture to Enhance Privacy and Security in Collaborative Systems

  • Ms. G. Sathya M.E. , Mr. K. Loganathan M.E.,

Article spécial

Protected Patients Data Centre in Cloud Computing

  • Ms.M.Shanthi, Mr. P. Ranjithkumar

Article spécial

Avoiding Overload Using Virtual Machine in Cloud Data Centre

  • Ms.S.Indumathi, Mr. P. Ranjithkumar

Article spécial

Border Alert System for Boats Using Zigbee

  • Suresh.M, Gandhiraj.S, Saranya.T, Thenmozhi.S, Divya.M.M

Article spécial

Highly Efficient and Intelligent Indoor and Outdoor Lighting System Using a ZigBee Network of Devices and Sensors

  • P.Dhinakar, R.Pradeepraja, R.Preethilatha, M.Barani, S.Shanmathi

Article spécial

Implementation of 3-Tier Architecture Using C-MART

  • M.Poovizhi, S.Kalpana

Article spécial

SPOT- E-mail Spam Zombie Detection System

  • Arathy Rajagopal, ArulPrakash.P M.E., (Ph.D.)

Article spécial

An Efficient Approach for Emergency Message Dissemination in VANET

  • Shibu.J, Ramkumar.R, D.Gowthami, S.G.Siddharth

Article spécial

Automated Diagnosis of Cardiac Health

  • Suganya.V

Article spécial

Efficient Cluster Based CCRVC Scheme in Manet

  • Mrs.U.Devisree, Mrs.M.santhi

Article spécial

Reducing Data Redundancy Scheme in Heterogeneous Cloud Storage

  • Saranya.A, Sadhasivam.N

Article spécial

Risk-Awareness for Manet Routing Attacks Based On D-S Theory

  • Geethanjali.B, P.Arulprakash M.E., (Ph.D), Dhanasekaran.G

Article spécial

Detection and Mitigation of DDOS Attacks By Circular IPS Protection Network

  • S. Shanthini Priyanka, S. Hasan Hussain

Article spécial

Three Step Password Scheme for Secured Data Transfer

  • M.S.Vinu, R.T.Nivetha, M. Mano Chitra, K.Priyadharsini

Article spécial

An Efficient Retrieval of Encrypted Data In Cloud Computing

  • N.Nandhini and P.G Kathiravan

Article spécial

GNSS Based Bus Monitoring And Sending SMS To The Passengers

  • A.Kannaki@VasanthaAzhagu, N.Vijayalashmy, V.Yamuna, G.Rupavani, G.Jeyalakshmy

Article spécial

System of Quality Automation for Documents (SQAD)

  • R. Babi Saraswathi, K. Divya, A. Habeebur Rahman, D.B.HariPrakash, S.Jayanth, T.Kumar, S. Mohan Kumar

Article spécial

Securing and Region Based Algorithms For Wireless Sensor Networks

  • M.M.Chithra, A.Gayathri, S. Selva Birunda

Article spécial

Garment Company Automation Using the Concept Of Big Data And Open Source Software

  • M.K. Ama Gayathri Surangika, S. Ananthi, G. Anitha, M. Sivaranjani

Article spécial

An Efficient Approach to Enhance Security for Android Applications

  • Dr.A.Gnanabaskaran, M. Dinesh Kumar, M.Dinesh, K.Latha, S.Nithya, C.Prakash6

Article spécial

Nonwhite Noise Reduction In Hyperspectral Images

  • Mrs.Suryatheja.M.B, Gokilamani.R

Article spécial

Smart-Puter Based Sectrol for Vehicles

  • R.Jeevitha, R. Prasad, L.Nishanth, D.Vignesh Kirubaharan, S.M.Boobalakumaran

Article spécial

Time Constrained Data Destruction in Cloud

  • M.Nandhini, S.Jenila

Article spécial

An Iterative Approach to Record Deduplication

  • M. Roshini Karunya, S. Lalitha, B.Tech., M.E.,

Article spécial

Developing Intonation Pattern for Tamil Text To Speech Synthesis System

  • K.C.Rajeswari, G. Karthick Prabu

Article spécial

Encryption of Cryptographic key technique by crossover of Iris and Face Biometric key

  • Gokulakumar.A.S, Venkataraghavan.C, Kavya priya.S, Suganya.T

Article spécial

Energy Histogram for Image Retrieval using Relevance Feedback

  • Subashini.M, Narayanan.R.C, Dr.K.Krishnamoorthy

Article spécial

Power Optimization in FPGA through Controller Device

  • V.Pavithra, T.Suganya, V.Suganya

Article spécial

Elliptic Curve Cryptography in Cloud Architectures With Lower Latency

  • R.Balaji, N. Karthick Gowtham

Article spécial

Voice Recognition Robot for Visually Impaired People

  • M. Joshuva Regan, S.R.Barkunan

Article spécial

Efficient Single Sign on Scheme for Distributed Networks

  • N. Rubiya (M.E-CSE), M. Arulprakash M.TECH.

Article spécial

Improve the QoS of Networks Using Advanced Hybrid Routing in WSN

  • A.S. Jennathul Firthouse, S. Sasikumar

Article spécial

A Scheme for Detection of License Number Plate by the Application of Genetic Algorithms

  • A.M. Gowshalya Shri (M.E-CSE) , M. Arulprakash M.Tech.,

Article spécial

MEMS Accelerometer based Digital Pen Recognition using Neural Networks

  • A. Geetha Vinothini, V. Vishnu Prasath

Article spécial

Mitigating Malicious Activities by Providing New Acknowledgment Approach

  • G. S. Devi Lakshmi, J. Rajasekaran

Article spécial

An Adaptive Contrast Enhancement of Colored Foggy Images

  • S.Mohanram, T. Joyce Selva Hephzibah, Aarthi.B, Sakthivel.P

Article spécial

A Novel Architecture of SRAM Cell Using Single Bit-Line

  • G.Kalaiarasi, V.Indhumaraghathavalli, A.Manoranjitham, P.Narmatha

Article spécial

Implementation of E2AODV Protocol for Load Balancing In Cluster Ad-Hoc Network

  • A.S.Narmadha, C.Vasanthapriya, D.Sangeetha

Article spécial

Sybil Attack Detection in Urban Vehicular Networks

  • R.Perumal, K.P.Sridhar

Article spécial

Performance Analysis Of Time Hopping Ultra Wideband Communication System

  • Mr.R.Kiruthika, Mr.K.Ramprakash

Article spécial

TAKE DIVERSION Driving Directions with Taxi Drivers Intelligence

  • Dr.J.Subashchandra Bose, S.Mohan Raj, Karthikeyan.T, Devaneyan.P, Kannan.M, Dharanikumar.S

Article spécial

Back-Bone Assisted Hop Greedy Routing in Vanets

  • Ms.Priyanka.G, Mr.Sundareswari.K

Article spécial

A Survey on Cloud Storage

  • Swathi.C, Vishnupriya. S, Rajeshkumar.R

Article spécial

Improvisation of Fault Classification and Detection

  • Thilagavathi R, Anitha Raj B, Gajalakshmi N

Article spécial

Multi-Sensor Railway Track Geometry Surveying System

  • Sureshkumar.R, Marimuthu.M, S. Rajeshwari

Article spécial

A Modified Bec Logic Design of High Speed Csla For Low Power And Area Efficient Applications

  • D.Kumaresan, D.Jeyamani M.E, V.Vishnuprasath M.E

Article spécial

Multipath Routing for Redundancy Management in Mobile Ad-hoc Networks

  • A. Thillipan, S. Dinesh Kumar

Article spécial

Multiuser MIMO in LTE Advanced

  • K. Dhivya, P.Perumal

Article spécial

Threshold Technique for Mobile Ad-Hoc Networks Using Secured Revocation Check

  • D.C. John Thangaraj, R.Tamilarasi

Article spécial

Personalized Mobile search engine with GPCA Algorithm

  • K. Murugan, S. Suma

Article spécial

Optimization based on PSO-ANFIS in Water bath Temperature System

  • K.S.Naveenkumar, Dr.S.Visalakshi

Article spécial

Secure & Energy-Efficient Intrusion Detection in WSN

  • B. Kalidass, V. Ramasamy

Article spécial

Web Database Search Result Annotation

  • M.Manivasakam, N.Yuvraj

Article spécial

Clustering Enormous and Uncertain Data Steam

  • A.Ashok kumar, Dr.P.Vivekanandan

article de recherche

Security for Green Communication in Heterogeneous Wireless Networks

  • Elamathi.N, Dr.S.Jayashri

article de recherche

Performance analysis of Absolute Deviation Filter for Removal of Impulse Noise

  • G.Bindu, M.Upendra , B.Venkatesh, G.Gowreeswari , K.T.P.S.Kumar

article de recherche

A Comparative Study of Frequent Pattern Recognization Techniques from Stream Data

  • F.M.Christian, N.C.Chauhan, N.B.Prajapati

article de recherche

Region of Interest Based Image Compression

  • PratikChavada, Narendra Patel, KanuPatel

article de recherche

Image Sharing in Clouds based on N-Server Forward Re-encryption System

  • S.Ephina Thendral , S.Indra Priyadharshini

article de recherche

Modeling of UPFC Using Model Predictive Control and Bacterial Foraging Algorithm

  • Mr.B.Gopinath, Ms.N.Vinothini, Dr.S.Suresh kumar

article de recherche

Discovering Multi-Level Association Rules using Fuzzy Hierarchies

  • Usha Rani, R. Vijaya Prakash, A. Govardhan

article de recherche

A Secure Framework for Protection of Social Networks from Information Stealing Attacks

  • Dr. M.BalaGanesh Mrs.V.Sathya S.Vinoth Kumar

article de recherche

Real Time Face Tracking By Using Naïve Bayes Classifier

  • Krishna Priya Arni , Satish Ammuloju, Jagan Mohan Vithalachari Gollapalli, Dinesh Bhogapurapu Shaik Azeez

article de recherche

A Secure Distributed Peer To Peer Systems

  • H.Shaheen , M.Baskaran

article de recherche

A Review on Processing Big Data

  • Dr. Shoban Babu Sriramoju

article de recherche

PERFORMANCE ANALYSIS OF MULTICARRIER CDMA SYSTEMS

  • Pavani Sumala, R.Prasanth , R.A.S.Bharadwaj , Shaik Azeez,V.Nancharaiah

article de recherche

Secure Paper Distribution on Cloud Using Reencryption

  • Prof.A.G.Nadaph1,Amol Dashwant2, Dipali Bhivare3, Shrikrishn Badade4, Pratik Jadhav5

article de recherche

Data mining: Techniques for Enhancing Customer Relationship Management in Banking and Retail Industries

  • P Salman Raju, Dr V Rama Bai, G Krishna Chaitanya

article de recherche

Fractal Image Steganography Using Non Linear Model

  • G.Suryakala Eswari , N.Leelavathy, U.Sandhya Rani

article de recherche

A Survey on the Solutions for the Problems of Denial of sleep Attacks

  • RamandeepKaur, Vinodsharma

article de recherche

Multi-slots Reconfigurable Microstrip Antenna with Capacitive Loading Technique

  • Chandrappa D N, Ambresh P A, Vani R M, P V Hunagund

article de recherche

An Alternative Technique to Perform Surgeriesin Hospital by Surgical Diathermy

  • S.S.Shende, P.B.Dahikar, MJ.Hedau, K.Y. Rokde

article de recherche

Reversible Data Hiding using Visual Cryptography: A Review

  • Assistant Professor, Dept of MCA, Shri Ramdeobaba College of Engg. and Mgmt., Nagpur, India

article de recherche

Health Monitoring Systems for Antiquated Peoples-A Survey

  • Pandimurugan , Mathavi parvathi , Dr.Paul rodrigues

article de recherche

A Study on Web Services Performance Measurements and Its Techniques

  • Mathavi parvathi, Pandimurugan, Dr.Paul rodrigues

article de recherche

Mining Big Sources using Efficient Data Mining Algorithms

  • Shoban Babu Sriramoju

article de recherche

Performance Evaluation of Conventional Controller for Positive Output Re Lift LUO Converter

  • Sivakumar.A, Ajin Sekhar.S.C, Ronal Marian.A ,Sasikumar.M

article de recherche

Sentiment Analysis Using Support Vector Machine

  • Ms. Gaurangi Patil, Ms. Varsha Galande, Mr. Vedant Kekan, Ms. Kalpana Dange

article de recherche

Implementation of Link Layer of USB 3.1

  • Durgesh Kumar Sahu, Prof. Shweta Singh, Asst. Prof. Nitin Meena

article de recherche

Review on Data Mining Techniques for Intrusion Detection System

  • Sandeep D, M. S. Chaudhari

article de recherche

Estimation of Software Quality using Object Oriented Design Metrics

  • Ritu Chauhan, Rahul Singh , Ashish Saraswat, Anwar Husain Joya, Vinit Kumar Gunjan

article de recherche

A Behavioral Comparison of LAR with AODV And DSR Routing Protocols

  • Romisha Arora, Noor Fatima Rizvi

article de recherche

Automated Survey Analysis System

  • Prof. Arti Bhore, Mr V.V. Mane, Mr S.B. Poul,Mr V.G. Patil4,Mr S.S. Patil

article de recherche

Dimensional Analysis of GaAs Based Double Barrier Resonant Tunnelling Diode

  • Vivek Sharma, Raminder Preet Pal Singh

article de recherche

Flat Back Index Generation for E-Books: A Tri-gram Approach

  • Saket Soni, Raj Kumar Singh, Sarang Pitale

article de recherche

LBMP: A Logarithm-Barrier-Based Multipath Protocol for Internet Traffic Management

  • S.Thirunavukkarasu, Dr.K.P.Kaliyamurthie

article de recherche

Development of DAVE 3D Android Gaming Application

  • Abdul Aleem Shaikh, Karm Raj, Rajat Bhandari,Prof.Anup H. Raut

article de recherche

Improved Correlation Preserved Indexing For Text Mining

  • Vinnarasi Tharania. I,M.Kanchana, V.Kavitha

article de recherche

Biological Early Detection of Nasal Dermoid Cyst Using CT/ MRI Scan - A Review

  • Neeraj Singla, Sugandha Sharma

article de recherche

An Obfuscation-Based Approach For Protecting Location Privacy

  • S.Thirunavukkarasu, Dr.K.P.Kaliyamurthie

article de recherche

Android Application for Doctor‟s Appointment

  • Prof. S. B. Choudhari, Chaitanya Kusurkar, Rucha Sonje, Parag Mahajan, Joanna Vaz

article de recherche

A Novel Approach for Breast Cancer Detection using Data Mining Techniques

  • Vikas Chaurasia, Saurabh Pal

article de recherche

A Fast Method of Hands-Free Design Technique For Adaptive Mobile Communications Systems

  • S.Mohanram B.Aarthi C.Silambarasan T.Joyce Selva Hephzibah

article de recherche

Review on Conversion of Various Block Sizes in Compressed Domain using DCT

  • Vaishali Choudhary, Ketki Bhakare ,Swati Dhopte

article de recherche

Collaborative Filtering Based On Search Engine Logs

  • DR.A.Muthu kumaravel, Mr. Kannan Subramanian

article de recherche

A Quantitative Analysis of NHPP Based Software Reliability Growth Models

  • Bijoyeta Roy, Santanu Kr. Misra, Aradhana Basak, Aparupa Roy, Deyasini Hazra

article de recherche

A Survey for Automatic Detection of Non- Proliferative Diabetic Retinopathy

  • M.Tamilarasi, Dr.K.Duraiswamy

article de recherche

Advanced Persistent Threats & Recent High Profile Cyber Threat Encounters

  • Vaishali S Raj, Dr. R. Manicka Chezhian, M.Mrithulashri

article de recherche

New EaaS Cloud Service Model Implementation for Smart Education

  • Dr.JaeChul Oh, HoJun Kim,Dr.Hyun Sim

article de recherche

A Light-weight Data Replication for Cloud Data Centers Environment

  • Mohamed-K HUSSEIN, Mohamed-H MOUSA