Volume 3, Problème 1 (2015)

article de recherche

Secure Data Storage using Decentralized Access Control with Anonymous Authentication Using Cloud

  • Mr.G.Lenin, Ms.B.Vanitha, Mrs.C.K.Vijayalakshmi

article de recherche

Log Linear Model for String Transformation Using Large Data Sets

  • Mr.G.Lenin, Ms.B.Vanitha, Mrs.C.K.Vijayalakshmi

article de recherche

A Progressive Approach to Enhance Lifetime for Barrier Coverage in Wireless Sensor Network

  • C N Abhilash, A S Chandan, S H Manjula, K R Venugopal, L M Patnaik

article de recherche

Literature Survey on Mobile Q&A System in the Cloud Based Environment

  • D.Aravind Gosh, Dr.C.Nalini

article de recherche

Cloud Computing:Ultimate Home of All Computing Resources

  • Manaswini Pradhan

article de recherche

Scanning Severe Motion Blur Level in Barcode Images Using Image Blur Estimation Scheme

  • S.Raguvaran, A.Ragavi, D.Sasikala, A.Mayuri

article de recherche

WBC Segmentation Using Morphological Operation and SMMT Operator - A Review

  • Belekar S. J , Dr. Chougule .S .R

article de recherche

Recognition of Novel Variance Parameters Using Taguchi Loss Function in MANET

  • Dheeraj Rawat, Prof. Nitesh Gupta, Prof. Sini Shibu

article de recherche

Neuro Fuzzy Classifier for Image Retrieval

  • S.Asha, S.Ramya, M.Sarulatha, M.Prakasham, P.Priyanka

article de recherche

Facial Expression and Visual Speech Based Person Authentication Using Local Binary Pattern Histogram

  • S. Saravanan, S. Palanivel, M. Balasubramanian

article de recherche

A Review on Model Based Neuromuscular Blockade Control System with Injector

  • Dr. S.M. Deshmukh, Prof. A.S. Patharkar, Roshan M. Bodile

article de recherche

An Investigation on Gesture Analysis and Geometric Features Extraction

  • Noor Adnan Ibraheem, Mokhtar Mohammed Hasan, RafiqulZaman Khan

article de recherche

A Literature Review on Variation in Text and Different methods for Text Detection in Images and Videos

  • Prof. N.N. Khalsa, Prof. S.G. Kavitkar, Nagendra.G. Kushwaha

article de recherche

Implementation of a Wireless Gesture Controlled Robotic Arm

  • Saurabh A. Khajone, Dr. S. W. Mohod, V.M. Harne

article de recherche

Periocular and Iris Feature Encoding - A Survey

  • Vibha S Rao, P Ramesh Naidu

article de recherche

Different Syntactic Methods and Clustering For Web Service Integration

  • Different Syntactic Methods and Clustering For Web Service Integration

article de recherche

Smart Phone Controlled Robot Using ATMEGA328 Microcontroller

  • Aniket R. Yeole, Sapana M. Bramhankar, Monali D. Wani, Mukesh P. Mahajan

article de recherche

A Novel Collective Neighbor Clustering in High Dimensional Data

  • Sudha.N, Sneka Arulraj

article de recherche

Generic Lossless Visible Watermarking: A Review

  • Mrunali U. Bhaisare, Prof. V.R.Raut

article de recherche

An Overview of Content Recommendation Methods

  • Neethu Raj , Suja Rani M S

article de recherche

A Literature Review on Different models for Human and Vehicle Tracking

  • Prof. A.P. Bodkhe, Prof. S.A. Nirmal, Snehal A. Thakre

article de recherche

Building a Tool to Extract Data from Users and Potential Users of E-Government

  • Asma A. Alhashmi, Dr. Abdulbasit Darem, Dr. Suresha

article de recherche

Building a tool to extract data from users and potential users of e-government

  • Asma A. Alhashmi, Dr. Abdulbasit Darem, Dr. Suresha

article de recherche

Randomly Directed Exploration Protocol for Clone Detection in Wireless Sensor Networks

  • P.Hima Bindu, T. Venkata Naga Jayudu

article de recherche

Adaptive Intelligent Traffic Control System using PLC

  • S .V. Viraktamath, Priyamvada Holkar, Priyanka V. Narayankar, Jayashri Pujari

article de recherche

Application of Genetic Algorithm in Communication Network Security

  • SomalinaChowdhury, Sisir Kumar Das, Annapurna Das

article de recherche

Empirical Study of Motion Planning in Robotic Control Model

  • Nisha P. Zode, Ujwal A. Lanjewar, Bhaskar Y. Kathane

article de recherche

Bioinformatics Based Analysis of Microarrays in Human Bipolar Disorder

  • Rama Adiga , Rithika Adiga

article de recherche

Safety Platform of Traffic in Cloud Computing Environment

  • Chetan.R , Ranjith .J , Umesh.M, Usha N

article de recherche

Future Trends of Cloud Computing Security: An Extensive Investigation

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Certain Investigations on Evolution of Approaches for Cloud Computing Security

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Strategies Developed for Effective Discovery of Dependencies: A State-of-the-Art Survey

  • R.Santhya, S.Latha, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Further More Investigations on Evolution of Approaches for Cloud Security

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Detailed Investigation on Strategies Developed for Effective Discovery of Matching Dependencies

  • R.Santhya, S.Latha, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Further Investigations on Methods Developed for Preserving Privacy of Computational Grids

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

article de recherche

A Survey on Decentralized Access Control Strategies for Data Stored in Clouds

  • J.Ganeshkumar, N.Rajesh, J.Elavarasan, Prof.M.Sarmila, Prof.S.Balamurugan

article de recherche

Survey on Security on Cloud Computing by Trusted Computer Strategy

  • K.Deepika, N.Naveen Prasad, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Further Investigations on Strategies Developed for Efficient Discovery of Matching Dependencies

  • R.Santhya, S.Latha, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Further Investigations on Evolution of Approaches Developed For Database Security

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Certain Investigations on Anonymous Authentication Mechanisms for Data Stored in Clouds

  • J.Ganeshkumar, N.Rajesh, J.Elavarasan, Prof.M.Sarmila, Prof.S.Balamurugan

article de recherche

Evolution of Cloud Computing: A State-ofthe- Art Survey

  • K.Deepika, N.Naveen Prasad, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Certain Investigations on Methods Developed for Efficient Discovery of Matching Dependencies

  • R.Santhya, S.Latha, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Investigations on Evolution of Approaches Developed for Data Privacy

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Security in Cloud Computing using Cryptographic Algorithms

  • Shakeeba S. Khan, Prof.R.R. Tuteja

article de recherche

A New Cloud Paradigm: Data Protection as a Service (DPASS)

  • KholeSagar R. ,Walunj Ajit S.,Gulave Rahul K.,Nikam Umesh P.

article de recherche

Performance Evaluation of Dynamic Networks Using EQOS Protocol

  • C.Chandralekha, L.Priyadharshini

article de recherche

A User’s Feedback Relevant Dynamic Query Forms for Database Queries

  • Neenu Anna Philip, S.S Jaya, Pradeep G

article de recherche

An Enriched Privacy Protection in Personalized Web Search

  • Boney cherian, E.Hari Prasath, Rahul P

article de recherche

A Survey on Feature Based Image Retrieval Using Classification and Relevance Feedback Techniques

  • Keyuri M. Zinzuvadia, Prof. Bhavesh A. Tanawala, Prof. Keyur N.Brahmbhatt

article de recherche

Sequence Flow Modelling for Efficient Protection of Personal Health Records (PHRs) in Cloud

  • V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa

article de recherche

A Novel Activity Flow Model for Effective Protection of Electronic Health Records (EHRs) in Cloud

  • V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Data Flow Modelling for Effective Protection of Electronic Health Records (EHRs) in Cloud

  • V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa

article de recherche

Enhancing the Search Result for User Query Using Iterative User Feedback

  • PriyaSurana, PrashantJamdade, TejasNandedkar, Akshay S. Ghadge, NirbhayBobde

article de recherche

Web Vulnerabilities Caused By Social Media Web Service Integration

  • Jasmeet Kaur, Neha Singh

article de recherche

Review on Steganography and BPCS Technology in Steganography for Increasing Data Embedding Capacity

  • Chintan Jain, VivekParate, Ajay Dhamanikar, Rakesh Badgujar

article de recherche

A Survey on Feature Extraction Techniques

  • N. Elavarasan, Dr. K.Mani

article de recherche

War Field Robot Controlled By Android Phone

  • Prof. Jagdish Patel, Akshay Malik, Vrushali Thakare, Rahul Rajput

article de recherche

Application of Data Mining and CRM in Banking Sector Medical Insurance

  • Pratik Biswas, ParthaSarathi Bishnu

article de recherche

Secured and Robust Dual Image Steganography: A Survey

  • Hemang A. Prajapati, Dr. Nehal G. Chitaliya

article de recherche

Obstacle Avoidance Using Stereo Vision: A Survey

  • Pritesh S. Sharma, Dr. Nehal G. Chitaliya

article de recherche

A Complete Gain Knowledge on Cloud Computing

  • Dr.Kathir.Viswalingam, Mr.G.Ayyappan

article de recherche

An Efficient AODV-Based Algorithm for Small Area MANETS

  • Jai Prakash Kumawat, Prakriti Trivedi

article de recherche

Improved Protection Using Self-Recognized Image

  • Sanchit Shrikant Mahajan, Prof. Pratima Bhati