Digital Library


S.No Contents
1 Access Control and Data Aggregation in Smart Grids for Decentralized Security Framework
Authors : R. Muthuraman, Dr.A.Kumaravel, S.Thirunavukkarasu
2 Novel Routing Approaches For Wireless Ad Hoc Networks
Authors : V.J.Jehu, Dr.A.Kumaravel, S.Thirunavukkarasu
3 Alert Based Filtering System In Online Social Networks To Avoid Unwanted Contents
Authors : K.Karthick, Dr.A.Kumaravel, S.Thirunavukkarasu
4 Dynamic Resource Allocation for Cloud Computing Environment
Authors : Mr.K.N.SIVAKUMAR M.E., S.GANDHIMATHY B.TECH(IT).,
5 A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
Authors : Prof.M.MOHAMED MUSTHAFA, R.ROKIT KUMAR
6 SCALABLE KNOWLEDGE BASED AGGREGATION OF COLLECTIVE BEHAVIOR
Authors : P.SHENBAGAVALLI M.E., J.SARAVANAKUMAR B.Tech(IT).,
7 Color Based Encryption and Decryption Technique Using Armstrong Algorithm in Vehicular Cloud
Authors : Rajesh Kumar. E Dr.V.Venkatesakumar ME, Ph.D.,
8 REVIEW THE DIFFERENT TYPES OF TRANSFORMS USED IN IMAGE ENHANCEMENT
Authors : P.SHENBAGAVALLI M.E.,
9 Shielding in contrast to Flood Attacks in Disruption Tolerant Networks
Authors : VANDANA S.
10 Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High
Authors : S.M.Nandhagopal M.E., Ph.D.,
11 PREVENTING SELECTIVE JAMMING ATTACKS FOR MULTIPLE-PATH ROUTING USING PORTFOLIO SELECTION
Authors : Dr.S.M.Nandhagopal.,M.E.,Ph.D.,
12 JAMMING-RESILIENT MULTIPATH ROUTING WITH SECURITY CONSIDERATIONS
Authors : Dr.S.M.Nandhagopal.,M.E.,Ph.D.,
13 An improved reliable reactive routing enhancement for wireless sensor routing
Authors : Dr. S.M. Nandhagopal, M.E., Ph.D., A.Mohanraj., M.E (CSE)
14 VISUAL INNOVATION TOWARDS SECURE ENVIRONMENT
Authors : Dr.S.Nirmala, A.Alif Siddiqua Begum
15 APPLICATIONS OF A NOVEL GREEN ADSORBENT FOR ENVIRONMENTAL MONITORING
Authors : Kanika Solanki, Khushbhu Sharma , Mamta Soni and N. Bhojak*
16 Efficient Anonymous Transfer of Data in Wireless Networks
Authors : K.HEMALATHA, Dr.S.M.NANDHAGOPAL
17 SECURE ROUTING IN MANETs WITH KEY MANAGEMENT
Authors : M. Kavitha, T. Maheshwaran, Prof. M. Senthil Kumar
18 STUDY ON STRENGTH PROPERTIES OF CONCRETE BY PARTIALLY REPLACEMENT OF SAND BY STEEL SLAG
Authors : M.SOUNDAR RAJAN
19 PRIVACY PRESERVING DATA FORWARDING IN WIRELESS SENSOR NETWORKS
Authors : Kavya. N, Ms.B.Amutha
20 Synchronized Encrypted Database Structure Management Method for Remote Storage Environment
Authors : Ms. S.Tharani, Dr. T. Senthil Prakash, Mr. S. Prakadeswaran, M.E.,
21 USER GROUP ESTIMATION AND RECOMMENDATION MODEL FOR SOCIAL NETWORKS
Authors : Ms. S.Rabiyathul Basiriya, Dr. T. Senthil Prakash, Ms. P.Sudhaselvanayaki
22 Spatio-Temporal Query Processing on Weighted Timestamp Data Environment
Authors : Ms. P.Maheswari, Dr. T. Senthil Prakash, Ms. N. Narmatha
23 Confidential User Query Profile Construction for Personalized Web Search
Authors : Ms. P. Sudhaselvanayaki, Dr. T. Senthil Prakash, Ms. V. Karthikeyani
24 Attack Resistant User Authentication using Visual Verification Mechanism
Authors : Ms. V.Karthikeyani, Dr. T. Senthil Prakash, Ms. S. Rabiyathul Basiriya
25 Optimal Clustering with Nearest Neighbor Relationships
Authors : Ms. N. Narmatha, Dr. T. Senthil Prakash, Ms.S. Kokila
26 Privacy and Security Ensured Database Rights Management Scheme
Authors : Ms. S.Kokila, Dr. T. Senthil Prakash, Ms. P.Maheswari
27 REDUCING THE TIME DELAY OF BACKBONE NETWORKS
Authors : M. Subashinidevi, S. Castro, Prof. M. Senthil Kumar
28 PREVENTING SELECTIVE JAMMING ATTACKS FOR MULTIPLE-PATH ROUTING USING PORTFOLIO SELECTION
Authors : Hemalatha Rajan
29 DAMAGE STATES AND DAMAGE ESTIMATION METHODS OF REINFORCED CONCRETE BUILDINGS
Authors : Ravikumar Rangasamy
30 STUDY OF REINFORCED CONCRETE STRUCTURE
Authors : Ravikumar Rangasamy
31 LABORATORY INVESTIGATION OF WARM ASPHALT CHEMICAL AND ORGANIC ADDITIVES
Authors : Renugadevi Arunachalam
32 LABORATORY STUDY OF WARM MIX ASPHALT SASOBIT ADDITIVES AND CECASBASE ADDITIVES
Authors : Renugadevi Arunachalam
33 STUDY ON USE OF ELECTRO KINETICS TO ENHANCE THE DEPRIVATION OF ORGANIC IMPURITIES IN SOIL
Authors : Sivaraj.K.P
34 A METHOD OF APPLYING AN ELECTRIC FIELD TO CONTAMINATED SOIL CONTAINING DEGRADING BACTERIA
Authors : Sivaraj.K.P
35 Certain Investigations of Tunneling Effects on Structures for Development of Design Methods
Authors : P.Narasimhan
36 Analysis of Ground activities and quantity loss due to an advancing tunnel direction
Authors : P.Narasimhan
37 A STUDY OF GLOBALISATION AND ITS IMPACTS ON THE ARICULTURE IN INDIA
Authors : Anith Baylis Ebenezer
38 PARALLEL TRADE OF PATENTED PHARMACEUTICALS IN DEVELOPING COUNTRIES
Authors : Anith Baylis Ebenezer
39 An Novel Automated Optimal Resource Allocation procurement Scheme and Elliptic Curve Cryptography En
Authors : N. NAGALAKSHMI, Dr.S.RAJALAKSHMI
40 Deadline Based Task Scheduling in Cloud with Effective Provisioning Cost using LBMMC Algorithm
Authors : Ms.K.Sathya, Dr.S.Rajalakshmi
41 Data Integration of Distributed Data Using Secure Two Party Algorithm
Authors : Mr.K.Thambi Prbhakaran, Ms.P.Mallika, ME
42 Improved Secure Access Control in Cloud Using Sign Based Ciphertext-Policy Attribute-Based Encryptio
Authors : Ms.P.Vijaya, Mrs.P.MallikaME
43 SYSTEM CONFIGURATION AND SCHEDULING IN WIRELESS NETWORKS USING OPTIMIZATION DECOMPOSITION
Authors : Ms.KAVITHA.V.KAKADE, Ms.C.APARNA
44 TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA
Authors : Mrs.B.Jeeva, Dr.S.Rajalakshmi
45 AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
Authors : Mrs.K.Saranya, Dr.S.Rajalakshmi
46 RELIABLE DEADLINE-DRIVEN RESOURCE ALLOCATION FOR CLOUD SYSTEM REDUCING USER PAYMENT
Authors : Ms.V.SATHYA DEVI, M.E., (CSE), Ms.A.GOKILAVANI,M.E.,(Ph.D).,
47 Pricing Cloud Bandwidth Reservation Under Demand Uncertainty
Authors : Mr.K Karthikeyan, Dr.T.Senthil Prakash, Mr.S.Prakadeswaran, M.E.,
48 Data Redundancy and Compression Methods for a Disk-Based Network Backup System
Authors : Mr.G.S.Karmukilan, Dr.T.Senthil prakesh, Mr.J.Senthil
49 An Efficient Map Reduce Task Scheduling and Micro-Partitioning Mechanism for Optimizing Large Data A
Authors : Ms.N.Saranya, Mr.T.Yoganandh M.E.,
50 Utility based User Preference Resource Selection based Collaborative Cloud Computing (CCC)
Authors : Mrs.K.M.Thilagavathi, Mr.T.Seenivasan
51 PROVIDING SECURITY FOR NETWORK DATA STREAMS FROM ANOMALY DETECTION
Authors : Bhavani. P, M.Latha
52 Enhanced Synergetic Attraction Revelation for Mobile Ad Hoc Networks
Authors : Rakesh Kumar ER
53 Automated Technique for detecting and preventing SQL Injection in stored procedure
Authors : Mr.K.Kodeswaran, Dr.T.Senthil Prakash, Mrs.P.V.Jothikantham
54 Evaluation of Performance and Cost of an Adaptive Encryption Architecture in Cloud
Authors : P.Gowthaman, S.Thiruvenkatasamy
55 Moderate Denial-of-Service attack detection based on Distance flow and Trace back Routing
Authors : Vinish Alikkal, Dr.T.Senthil Prakash, D.Yuvraj
56 A STUDY ON QUALITY OF WORK LIFE LEADS ORGANIZATION RESILIENCE IN AUTOMOBILE INDUSTRY WITH SPECIAL RE
Authors : Dr.K Jawahar Rani, Mr.T.Chandrasekar, Ms.T.Shanmugapriya
57 Design and Analysis of a Highly Reliable and Secure Method for Authentication
Authors : Ms.S.RAGADHARSINI, M.E., (CSE), Mr.T.YOGANANDH M.E
58 A Novel Approach for Travel Package Recommendation Using Cock Tail Algorithm
Authors : Ms.R.PRIYANKA, M.E.,(CSE), Mr.T.YOGANANDH M.E.,
59 TOP K RESULT RETRIEVAL IN SEARCHING THE FILE OVER THE ENCRYPTED DATA IN CLOUD
Authors : Ms.T.Anusuyadevi, Mrs.A.Gokilavani B.Tech, ME.
60 INVESTIGATION OF N TYPE CU2O AND SE2 LAYER PREPARATION BY LOW COST CHEMICAL METHOD
Authors : Stephen Raja John Britto
61 COMPARISON THE DEVELOPMENT OF POLYCRYSTALLINE THIN-FILM CU(IN,GA)SE2 SOLAR CELLS AND CDTE SOLAR CELL
Authors : Stephen Raja John Britto
62 Soft Clay Stabilization Using Electro Kinetic Process
Authors : A.ARUTSELVAM
63 An Improved Technique for Soft Clay Stabilization Using Electro Kinetic Process
Authors : A.ARUTSELVAM
64 Image Retrieval System by Automatic Annotation
Authors : Muhamad Saleem P, R. Senthilkumar, Dr.T.Senthil Prakash
65 Boozy Categorizing Search Engine for Best Search
Authors : A.NIVETHA, A.M.RAVISHANKKAR
66 Modeling Discriminative-Based Features with Genetic Algorithm for Human Identity and Gender Recognit
Authors : M.RAJANANDHINI, T.YOGANANTH.,M.E.,
67 QUERY-BASED FORUM POSTS EXTRACTION AND REFINEMENT
Authors : Ajmal Hussain, Prakadeswaran, Dr.T.Senthil Prakash
68 An Enhanced QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
Authors : Nanthini.S, Dr.S.Rajalakshmi
69 GREEN AND INTELLIGENT TECHNOLOGIES FOR SUSTAINABLE BUILDINGS
Authors : Rabi Ahamed. M, Govindaswamy.T
70 SUSTAINABLE BUILDINGS –POLICIES, PRACTICES AND PROMOTIONAL PROSPECTS IN INDIA
Authors : Rabi Ahamed. M, Govindaswamy.T
71 Design and Fabrication of Dual - Purpose Wheelchair for Physically Challenged Persons
Authors : Prof. A. Peramanan, K.Saravanakumar, M.Sethuram, S.Suresh
72 ENB Cluster Head Selection Algorithm for MANET
Authors : Sapna B Kulkarni, Dr.Yuvaraju B N
73 Determining and Exploring 3Dimensional Data using Value Decomposition
Authors : P.Thiyagarajan, R.Aarthi
74 WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD
Authors : M.Hariharan, Dr.S.Nandagopal
75 FINDING END TO END COMMUNICATION FOR DISCOVERY SYSTEM IN MANET USING ANONYMOUS SUPERNODE
Authors : K.Prabakar, K.Gopalakrishnan
76 ENHANCING MULTI CLOUD DATABASE STORAGE APPLICATION USING AUDITING PROTOCOL
Authors : N.Sanjeevkumar,V.Jeyageetha
77 Deduplication Avoidance Using Convergent Key Management in Cloud
Authors : P.Gokulraj, K.Kiruthika Devi
78 Captcha as Graphical Password- Based on Hard AI Problems
Authors : S.Navaneethakrishnan, P.Kumar
79 EXPERIMENTAL INVESTIGATION ON ULTRA HIGH STRENGTH CONCRETE BY USING SILICA FUME, FLY ASH AND RICE HU
Authors : Mr. KARVENDHAN A, Mr. ATTHIKUMARAN N
80 Classification Using Max-Margin and Kernel Dimensionality Reduction
Authors : Kumudhaveni.K,Maheswari.R
81 Classification Using Dempster Shafer Algorithm
Authors : S.S.Mageshwari, Kavitha.V
82 MULTI-FRAME INTEGRATION FOR TEXT RECOGNITION
Authors : Saranya.G,Nithya.k
83 TARGET TRACKING SYSTEM IN UNDERSEA WIRELESS SENSOR NETWORK WITH LANDMARK AMBIGUITY
Authors : K.P.Abinaya, R.Sudhakar
84 EXTENDED FRAMEWORK FOR DYNAMIC RESOURCE ALLOCATION USING ASJS ALGORITHM IN CLOUD COMPUTING ENVIRONME
Authors : R.Gurumoorthy,V.S.Suresh Kumar
85 IMAGE SEGMENTATION USING MULTI-LEVEL THRESHOLDING
Authors : Suganya.R,Dhivyaa.C.R
86 KEY AGGREGATE DATA STORAGE AND DATA INTEGRITY PROTECTION IN CLOUD
Authors : V.Rajkumar, D.Mohanapriya
87 AN AUTONOMOUS PEOPLE FRIENDLY INTELLIGENT TRANSPORTATION SYSTEM
Authors : N.Mathiarasi, T.Sureshkumar
88 A UNIFIED APPROACH FOR CANCER CLASSIFICATION USING STEM CELLS
Authors : R.Anbu selvi, Dr.R.Nallusamy
89 HIGH DIMENSIONAL DATA WITH SUBSPACE AND OUTLIER ANALYSIS USING MODEL BASED CLUSTERING ALGORITHM
Authors : Ms K.Abinaya, Dr.M.Vijaya kumar, M.E.Ph.D.,
90 EXTENDED FRAMEWORK FOR DYNAMIC RESOURCE ALLOCATION USING ASJS ALGORITHM IN CLOUD COMPUTING ENVIRONME
Authors : R.Gurumoorthy, V.S.Suresh Kumar
91 REMOTE DATA AUDITING SCHEME IN SECURED CLOUD STORAGE ENVIRONMENT
Authors : Sangeetha.T,Saranya.M
92 Studies on undoped and doped zinc oxide thin films grown by chemical solution dip technique for phot
Authors : Sameem M S
93 PERSONALIZED INFORMATION RETRIEVAL USING AGENT BASED APPROACH
Authors : Gayathri J, Dr. S. Kumar Chandar
94 Automatic Image Annotation and Semantic based Image Retrieval System
Authors : Ismail PK, D. Ravi, R. Subathra
95 MINIMUM TREE ROUTING WITH SECURITY IN WIRELESS SENSOR NETWORKS
Authors : J.SANTHOSH,R.VIGNESH ANAND
96 Experimental Investigation on High Performance Concrete with Partial Replacements of Fine Aggregate
Authors : V.Visnu, R.M.Karthikeyan, Dr. G. Prince Arulraj
97 ANALYSING THE PERFORMANCE OF A CLOUD SERVERS
Authors : A.JEEVA, Dr.K.SRIDHARAN
98 ROUTING ALGORITHM BASED COST MINIMIZATION FOR BIG DATA PROCESSING
Authors : D.Vinotha, Dr.Y.Baby Kalpana
99 MobiCluster Based Weighted Rendezvous Planning for Efficient Mobile-Sink Path Selection in WSN
Authors : Monisha Mohan, S.Subashini
100 Privacy Preserving And Securing Using Proxy Re-signatures
Authors : Parvathy.K.S, Shuriya.B
101 ATTRIBUTE-BASED SECURE POLICY ENCRYPTION IN AD HOC NETWORKS
Authors : M.UdayaNandhini, R.Mahadevan
102 Area-Delay-Power Efficient Carry Select Adder with Clock Sharing
Authors : Muhammad Rafeeq C, P.Gopalakrishnan, C.Thamilarasi
103 Trust Driven Workflow Scheduling By Composition of Cloud Services under Fuzzy Preferences of Users
Authors : Pavithra.M, S.K.Mahalingam
104 AN NOVEL METHOD FOR FORMALIZING GEOGRAPHIC INFORMATION SYSTEM
Authors : Dr.C.Kumar Charliepaul
105 AN IMPROVED TECHNIQUE FOR ANALYZING AND PROCESSING USER FEEDBACK COMMENTS BASED ON OPINION MINING
Authors : Dr.C.Kumar Charliepaul
106 AN OPTIMIZED METHOD FOR EEG-BASED MOBILE ROBOT CONTROL WITH ADAPTIVE BRAIN–ROBOT INTERFACE
Authors : Dr.C.Kumar Charliepaul
107 A NEW TECHNIQUE FOR FAULT RECOVERY IN WSN
Authors : Dr.C.Kumar Charliepaul
108 A DETAILED REVIEW ON DATA MINING IN FINANCE SECTOR
Authors : Dr.C.Kumar Charliepaul, G.Immanual Gnanadurai
109 COMPARISON OF K-MEAN ALGORITHM & APRIORI ALGORITHM – AN ANALYSIS
Authors : Dr.C.Kumar Charliepaul, G.Immanual Gnanadurai
110 EFFICIENT INTEGRITY PROTECTION FOR ANDROID MOBILE
Authors : Dr.C.Kumar Charliepaul, G.Immanual Gnanadurai
111 REDUCE THE ENERGY CONSUMPTION USING POWER AWARE SCHEDULING IN GREEN COMPUTING
Authors : Dr.C.Kumar Charliepaul, Felcia Jerlin
112 DELTA ENCODING FOR DEDUPLICATION OF HYBRID CLOUDS
Authors : Dr.C.Kumar Charliepaul, Felcia Jerlin
113 AUTHENTICATING THE PERSON BY FINGER VEIN AND FINGER DORSAL USING ANFIS CLASSIFIER
Authors : Dr.C.Kumar Charliepaul
114 SECURE ROUTING AND ATTACK DETECTION IN WIRELESS AD HOC NETWORK
Authors : Dr.C.Kumar Charliepaul, K.Megala Devi
115 AN ACTIVE STORAGE FRAMEWORK BASED ON STORAGE SECURITY IN CLOUD COMPUTING
Authors : Dr.C.Kumar Charliepaul, Felcia Jerlin
116 CLASSIFICATION OF RICE PLANT LEAF DISEASES USING FEATURE MATCHING
Authors : Dr.C.Kumar Charliepaul
117 A NEW INTELLIGENT REMOTE CONTROL SYSTEM FOR HOME AUTOMATION AND REDUCE ENERGY CONSUMPTION
Authors : Dr.C.Kumar Charliepaul, K.Megala Devi
118 SECURED COMMUNICATION USING SPREAD SPECTRUM TECHNIQUES
Authors : Dr.C.Kumar Charliepaul
119 ENHANCEMENT OF LIFETIME USING DUTY CYCLE AND NETWORK CODING IN WIRELESS SENSOR NETWORKS
Authors : Dr.C.Kumar Charliepaul, G.Immanual Gnanadurai
120 ONTOLOGY BASED QUESTION ANSWERING SYSTEM
Authors : Dr.C.Kumar Charliepaul
121 PRIVACY-PRESERVING USING ACCESS CONTROL MECHANISM FOR RELATIONAL INCREMENTAL DATA
Authors : Dr.C.Kumar Charliepaul
122 OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION
Authors : Dr.C.Kumar Charliepaul
123 CONTROVERSY TREND DETECTION IN SOCIAL MEDIA
Authors : Dr.C.Kumar Charliepaul, K.Megala Devi
124 A REVIEW OF MISSING DATA HANDLING METHODS
Authors : Devi Priya R, Sivaraj R
125 Fake Biometric Detection Using Improved Features in Image and Dempster-Shafer Method
Authors : SNEHA S, Mrs. R.INDUMATHI, ME, MBA
126 THROUGHPUT-OPTIMAL CONFIGURATION OF FIXED WIRELESS MESH NETWORK IN CROSS-WAY DESIGN
Authors : T.RANJANI DEVI, Mr.PON PRAKASH.P
127 SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
Authors : S.REVATHI, B.HASEENA, M.NOORUL IZZATH
128 Designing An Efficient Real Time Summon Acuity System For Physically Drained Human
Authors : SUBA.S, Dr.MURUGESAN.M
129 Highly Secured Image Steganography Using Particle Swarm Optimization
Authors : Dr.S.Manikanda prabu, .Aswini, B,Bhuvaneswari, P.Vijayapriya, P.Suseela
130 AN EFFICIENT DYNAMIC QUERY FORM USING SQL DATABASE
Authors : Dr.G.Komarasamy, Aarthi E, Banusri S, Jansirani S
131 EFFICIENT CLONE NODE DETECTION AND ELIMINATION IN WIRELESS SENSOR NETWORKS
Authors : V.Lincy Shobika, Dr.N.Sumathi
132 Optimization of process parameters for resharpened HSS drill Using Taguchi Methods
Authors : Vishwajeet N. Rane, Prof.Ajinkya P.Edlabadkar, Prof.Prashant D.Kamble, Dr.Sharad S.Chaudhari
133 Task Assignment Policy Using Min-Max Algorithm for A Distributed Server System
Authors : N.Gokila, V.Gowdhaman
134 Web Image Re-Ranking Using Query-Specific Semantic Signatures
Authors : Prof.T.Nithya, M.Vigneshwaran, M.Suganya, M.Thiyagarajan
135 Vehicular Ad Hoc Networks Authentication Mechanism
Authors : Priyaasri.G, Ranjith Kumar.M
136 IMPROVING PROXIMITY EVALUATION FOR SMARTPHONES VIA BLUETOOTH
Authors : S.Lakshmipriya, V.Gowthaman
137 Dynamic Barrier Coverage Algorithm Using Coordinator Sensor Patrolling For Wireless Sensor
Authors : M.Arivazhagan, Mr.T.Krishnakaarthik
138 CONCEPTUAL MODEL DESIGN FOR MEASUREMENT OF PRECIPITATION USING AIR BORNE RADAR
Authors : Prof. Ajay V. Raipure, Dr. S. M. Deshmukh
139 A MULTICAST CONTROLLER FOR SECURED MULTI-MATCH PACKET CLASSIFICATION AND ROUTING
Authors : Jubinish.K , Syed Kasim Khan.S, Vishnu.V, Mr.G.Saranraj
140 MINIMAL PULSED JET FLUID APPLICATIONS
Authors : J.SUNDHAR SINGH PAUL JOSEPH, Mr.K.PONPRPAKARAN, M.Tech,
141 MULTI-MODAL PALM VEINS-FACE BIOMETRIC AUTHENTICATION
Authors : R.Karthiga, S.Saravanakumar
142 PRIVATE CLOUD FOR VIDEO STREAMING AND VIDEO SHARING
Authors : Aruna.G.R, Devika R, Gowri V, Lakshmipriya V
143 STUDY OF BEHAVIOUR OF LIGHT TRANSMITTING CONCRETE USING OPTICAL FIBRE
Authors : Sathish Kumar V, Suresh T
144 ATTRIBUTE BASED PRIVACY PRESERVING MECHANISM FOR MANET
Authors : A.Jerliln, Dr.K.Kalamani.
145 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
Authors : A.Vigneshkumar, P.Padmapriya, A.Poornima, S.Selvarani
146 SECURE DATA TRANSMISSION WITH QUALITY MEASUREMENT IN WIRELESS SENSOR NETWORKS
Authors : Kavya. N, Ms.B.Amutha
147 Privacy Preservation in Horizontally Distributed Database using Logarithmic and Exponential Techniqu
Authors : Ms. T. BHARATHI, Mr. T. SATHISH KUMAR, M.E.,
148 AN EFFICIENT ITERATIVE FRAMEWORK FOR SEMI-SUPERVISED CLUSTERING BASED BATCH SEQUENTIAL ACTIVE LEARNI
Authors : S.Savitha, Ms.M.Sakthi Meena , M.E.,
149 Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity
Authors : P. ANITHA, Dr. V.K.MANAVALASUNDHARAM., M.E., Ph.D.,
150 FLEXURAL BEHAVIOUR OF SELF COMPACTING SELF CURING CONCRETE BEAM
Authors : P.MUTHUKUMAR, K. SUGANYA DEVI
151 Minimizing Data Collection Latency in Wireless Sensor Networks Having Mobile Elements
Authors : Mrs. SANGITA R. NAIR, Mrs. P. SUGANTHI MALARVIZHI, M.E.,
152 Enhanced Hierarchical Design for Visual Cryptography- Overview
Authors : Vinish Alikkal, Dr.T.Senthil Prakash, Ajmal Hussain
153 Semi Global Matching on Mining Weakly Labeled Web Facial Images for Face Annotation
Authors : S.AARTHI, Dr. R.SIVARAJ, Dr.R.DEVIPRIYA
154 Traffic Incident Detection using Weighted Durable Quries
Authors : Mrs. K.Maheswari, Dr. R.Sivaraj, Dr.R.Devipriya, Mr.A.Rajesh
155 A SOFTWARE BASED APPROACH FOR FAKE BIOMETRIC DETECTION
Authors : R.KeerthiRaajan, Mrs.V.Lathajothi
156 IMPROVEMENT IN DETECTION OF CHICKEN EGG FERTILITY USING IMAGE PROCESSING TECHNIQUES
Authors : Ms.M.Bhuvaneshwari, Dr. L.M.Palanivelu M.S., Ph.D.,
157 MOBILE PHONE BASED ROADWAY TRANSPORT SYSTEM USING PARTICIPATORY SENSOR
Authors : K.SEDHURAMAN, Mrs .R.KAVITHA M.SC., M.PHIL., M.E.,
158 ENSURE DATA TRANSMISSION IN MOBILE AD-HOC NETWORKS
Authors : M. Kavitha, T. Maheshwaran, Prof. M. Senthil Kumar
159 INCREASING THE LIFE SPAN OF BACKBONE NETWORKS
Authors : M. Subashinidevi, S. Castro, Prof. M. Senthil Kumar
160 A CAPABLE RESOURCE SHARING FOR CLOUD COMPUTING BASED ON DYNAMIC SCHEDULING PRIORITY ALGORITHM
Authors : Ms. S. Sriemimapriya, Ms. S.Kayalvili
161 MULTIKEYWORD RANKED SEARCH OVER CLOUD DATA
Authors : T.Nagamani, J.Vaishali, D.Nivedha
162 Modeling of Laser Based Direct Metal Deposition Process
Authors : Jayanth N, Prof.Ravi K R
163 HOP BY HOP AUTHENTICATION FOR SOURCE INTERMEDIATE NODE PRIVACY PROTECTION IN NETWORK
Authors : NAJEEM DHEEN.A, Dr.S.UMA, THIYAGARAJAN.A, SUBIN.P.S
164 Multivariate Correlation Analysis based detection of DOS with Tracebacking
Authors : Jasheeda.P, T.K.P.Rajagopal, R.Subathra
165 On Demand Wireless Network Creation And Management
Authors : Faisal E, R.Subathra, T.K.P Rajagopal
166 HUI Miner Algorithms for Transactional Databases
Authors : Ms. Arya P, Mr. D. Ravi, Mrs. R. Subathra
167 INFERENCE AWARE DISTRIBUTED ROUTING PROTOCOL USING OUTAGE PROBABILITY
Authors : V.Nithya Kalyani, Prof.Shuriya B
168 IP BASED DATA EXCHANGE USING CENT OS
Authors : Mr.P.Arun Prakash, Ms.S.Kayalvili
169 Efficient Transfer of Data in Wireless Networks using ALERT Routing Algorithm
Authors : K.HEMALATHA, Dr.S.M.NANDHAGOPAL
170 EXTRACTION AND SUMMARIZATION OF RELEVANT FORUM POSTS
Authors : Aboobacker Sidheeq. M, T.K.P. Rajagopal
171 AGING-AWARE RELIABLE MULTIPLIER DESIGN WITH ADAPTIVE HOLD LOGIC
Authors : V. SATHEESH KUMAR, G. BHAVANI
172 An Efficient DDoS Attack Detection Technique using Trace Back Approach
Authors : Ragendhu.T.R., (M.E), Mrs.S.Subashini., M.E., (Ph.D).,
173 A Novel Approach to Denial-of-Service Attack Detection with Tracebacking
Authors : Jasheeda P, Faisal E, T.K.P.Rajagopal
174 RETINAL HAEMORRHAGE DETECTION USING SPLAT FEATURE AND HYBRID IN FUNDUS IMAGES
Authors : Shalini.R, Dr. Y.Baby Kalpana
175 MODELING THE PARAMETRIC CONSTRUCTION PROJECT COST ESTIMATE USING BOOTSTRAP AND REGRESSION TECHNIQUE
Authors : Ms.Saira Varghese, Dr. S.Kanchana
176 SECURE KEY MANAGEMENT SYSTEM FOR DATA STORED IN CLOUD
Authors : Sayoojya Abraham, S.K Mouleeswaran
177 IMPORTANCE OF 4D IN BIM FOR AN EFFECTIVE CONSTRUCTION PLANNING
Authors : Mr. Vineeth Raphael, ]Mrs. Jenifer Priyanka
178 Extended Visual cryptography Scheme
Authors : Mrs.Nidhina.K, Mr.P.Manikandan
179 A STUDY ON FACTORS AFFECTING DESIGN-CONSTRUCTION INTERFACE
Authors : MAGI THOMAS, R.M JENIFER PRIYANKA
180 MULTIMODAL BIOMETRICS BY INTEGRATING FINGERPRINT AND PALMPRINT FOR SECURITY
Authors : Muhammad Saleem P, Dr.T.Senthil Prakash, Ismail PK
181 A FUZZY RULE BASED APPROACH FOR IMAGE ZOOMING IN SINGLE FRAME SUPER RESOLUTION
Authors : Mrs. S.KAVYA, Mr.S.Rajesh M.E., (Ph.D).,
182 ASSESSMENT OF SAFETY PRACTICES IN CONSTRUCTION INDUSTRY
Authors : ASHLY BABU
183 A STUDY ON QUANTIFICATION OF DELAY FACTORS IN CONSTRUCTION INDUSTRY (KERALA REGION)
Authors : GREESHMA B SURESH, Dr. S. KANCHANA
184 QUERY WEIGHTING WITH TW K MEANS CLUSTERING AND MIND MAP PROCESS FOR WEB DATA
Authors : Prasidh.M.A, Mr. B. Ramesh Kumar
185 SURVEY ON AUTOMATIC CLUSTERING BASED UPDATION OF USER BEHAVIORAL PROFILES FOR PERSONALIZED SEARCH RE
Authors : S.Sadesh, Dr.R.C.Suganthe
186 THE BEHAVIOR OF POWER TRANSFORMER DUE TO AC CONNECTION IN NO – LOAD CONDITIONS
Authors : Marjola PUKA, Astrit BARDHI
187 ANALYSIS OF FINANCIAL MANAGEMENT AND WORKING CAPITAL BY USING DIFFERENT ANALYSIS RATIO
Authors : Repalle Vinod
188 Evaluation of working capital management on profitability of Indian automobile Indian industries
Authors : Repalle Vinod
189 DDoS Attack Detection By using Traffic Flow Analysis for Streaming Data
Authors : V.S.Suresh kumar, Dr.M.Vijayakumar
190 CHF Tests and Preliminary Analytical Study of IVR-ERVC for APR1400
Authors : Y. J.CHOI, T.H. HONG, S.W. LEE, H.T. KIM
191 REMOTE HEALTH MONITORING USING INTERNET OF THINGS (IOT)
Authors : Prabhakaran R, Jili K P
192 NOVEL TRENDS ON UNIDIRECTIONAL AC–DC BOOST CONVERTERS USING FUZZY LOGICS FOR POWER QUALITY MITIGAT
Authors : S.Arunraj
193 SOUND SIGNATURE IN GRAPHICAL PASSWORD AUTHENTICATION
Authors : T.PONPRASANNA, P.GIRIJA
194 A SECURE DATA SELF-DESTRUCTING SCHEME IN CLOUD COMPUTING
Authors : D.PRABAKARAN, T.MAHESHWARAN
195 DYNAMIC SERVICES OF CLUSTERING MECHANISM USING LEACH PROTOCOL IN MANET
Authors : M.Suganya, K.Haripriya
196 MULTI-KEYWORD RANKED SEARCH IN CLOUD COMPUTING WITHOUT BURDEN OF NETWORK BANDWIDTH
Authors : P.LOGESH, Mr.M.ARUNKUMAR M.E.,Dr.S.RAJALAKSHMI Ph.D.,
197 PROTECTED BILLING SCHEME FOR MOBILE COMMUNICATIONS
Authors : INDUMATHI.P, Dr.S.RAJALAKSHMI M.E., Ph.D.,
198 OSN USER’S SHARED PRIVACY SECURITY THROUGH ONLINE SOCIAL NETWORKS
Authors : NIVETHINI M, Dr.S.RAJALAKSHMI M.E., Ph.D.,
199 EFFICIENT RESOURCE ALLOCATIONS FOR SPECTRUM LEASING IN COGNITIVE RADIO NETWORKS
Authors : B.RAMESH (M.E), Mr.S.SARAVANAKUMAR, M.E., Dr.S.RAJALAKSHMI Ph.D.,
200 A TRUST SCHEME FOR SERVICE OPERATOR CLOUD SERVICES
Authors : Ms.PARIMALAM. V, Ms.ANITHA.R, Dr. RAJALAKSHMI.S
201 FINE-GRAIN INCREMENTAL PROCESSING OF MAPREDUCE AND MINING IN BIG DATA ENVIRONMENT
Authors : S.SURESH KUMAR, Mr.A.M.RAVISHANKKAR M.E., Dr.S.RAJALAKSHMI Ph.D.,
202 PRE-DEPLOYMENT SCENARIO TO PREVENT DISTRIBUTED COVERAGE HOLE OCCURANCE IN WIRELESS SENSOR NETWORKS
Authors : VANITHA.N, Mrs.MALLIKA.P, DR.RAJALAKSHMI
203 MULTIMODEL BIOMETRIC TEMPLATES LEVEL FUSION ALGORITHM FOR BIOCRYPTO SECURE SYSTEM
Authors : Ms.MONICA.RA, Ms.ANITHA, Dr.RAJALAKSHMI
204 ENERGY EFFICIENT ROUTING TO ENHANCE NETWORK LIFETIME IN WIRELESS SENSOR NETWORK
Authors : T.AMSAVENI(M.E), Miss.P.MALLIGA M.E., Dr.S.RAJALAKSHMI Ph.D.
205 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Authors : A.P.MOHANA PRIYAA, Mrs.A.GOKILAVANI M.E., Dr.S.RAJALAKSHMI Ph.D.,
206 SECURE BORDER GATEWAY PROTOCOL USING TIGER ATTACKS
Authors : P.GIRIJA, G.SARANYA, S.KOUSALYA
207 ANOMALOUS PAYLOAD-BASED WORM DETECTION AND SIGNATURE GENERATION USING KIDS
Authors : P.GIRIJA, A.MOHANRAJ, T.MAHESHWARAN
208 OPTIMAL GRAPH IMAGE SEGMENTATION AND TUMOR DETECTION FOR MRI IMAGES
Authors : C. Jamuna, J.Revathi, G.Darsana
209 A SURVEY - BASED ON METHODS AND TECHNIQUES OF DATA MINING
Authors : A.Vishnu Priya, Dr.K.Krishnaswari
210 Hybridizing Tabu Search with Ant Colony Optimization for Solving Job Shop Scheduling Problems
Authors : Prof.C.Sivaprakasam, Dr.V.P.Eswaramoorthy
211 SMART POWER MANAGEMENT INTELLIGENT BUILDING USING WSN
Authors : A. Jerome Christhudass M.E., T. Karthik
212 EFFICIENT AND DYNAMIC TOPOLOGY IN DELAY TOLERANT NETWORKS
Authors : G.PARTHIPAN, Mr.A.M RAVISHANKKAR M.E., Dr.S.RAJALAKSHMI Ph.D.,
213 Cold Forging of Steel: Prerequisite Optimizations and Process Study
Authors : Shashwat Tripathi
214 DATA MINING TECHNIQUES FOR EFFICIENT INTRUSION DETECTION SYSTEM: A SURVEY
Authors : J.S. SHANTHINI, Dr. S. RAJALAKSHMI Ph.D
215 REAL-TIME CITY-SCALE TAXI RIDESHARING
Authors : Mr.Harshad.P.A, Mr.S.SARAVANAKUMAR, Dr.RAJALAKSHMI.S
216 A Survey on Sentiment Analysis for Web-Based Data Using Various Machine Learning Techniques
Authors : Mrs.T.SARANIYA, ME-CSE, Ms.S.RAJESHWARI M.E, Dr.S.RAJALAKSHMI., Ph.D.,
217 Elastic Perfectly Plastic Behavior modeling by a Meshless Method
Authors : Khadija KHAMMARI, Hicham FIHRI FASSI
218 SEGMENTATION BASED IMAGE AUTHENTICATION FOR IMAGE FORGERY CLASSIFICATION AND LOCALIZATION
Authors : MANIMEGALAI.A, A.GOKILAVANI, DR.RAJALAKSHMI
219 BASICS SEQUENTIAL ALGORITHMIC SCHEME CLUSTERING BY EXPLORING INTER AND INTRA TASK CO-RELATIONS
Authors : M.Parthiban, P.Damodharan
220 FUZZY LOGIC CLASSIFICATION OVER SEMANTICALLY SECURED ENCRYPTED DATA
Authors : V.Mohanapriyanka, N.Suguna
221 EFFICIENT NEAREST NEIGHBOR GROUP QUERY OPTIMIZATION
Authors : PG.Ananthanarayanan, P.Damodharan
222 Experimental Study of Polypropylene Fibre Concrete
Authors : Dr. G. Elangovan
223 EXPERIMENTAL STUDY OF CONCRETE BY PARTIAL REPLACEMENT OF CEMENT WITH GRANITE DUST POWDER
Authors : Dr. G. Elangovan
224 Experimental Study of Steel Fiber Reinforced Concrete
Authors : Dr. G. Elangovan
225 Experimental Testing On Concrete by Partial Replacement of Cement Using Sugarcane Ash
Authors : Dr. G. Elangovan
226 Experimental Study on Light Weight Concrete by Partial Replacement of Fine Aggregate Using Fly Ash and Adding Thermocol
Authors : Dr. G. Elangovan
227 RP-HPLC Method development and validation for the Simultaneous Estimation of Metformin and Empagliflozine in Tablet Dosage Form
Authors : Shaik Mahammad Noorulla, Sadath Ali
228 RP-HPLC Method development and validation for the Simultaneous Estimation of Ceftazidime and Avibactum intravenous infusion
Authors : Shaik Mahammad Noorulla, Sadath Ali
229 LEVEL SET OF INTUITIONTISTIC FUZZY SUBHEMIRINGS OF A HEMIRING
Authors : N. ANITHA
230 INTUITIONTISTIC Q-FUZZY SUBHEMIRINGS OF A HEMIRING
Authors : N. ANITHA
231 PERFORMANCE ANALYSIS OF Z-SOURCE INVERTER FED INDUCTION MOTOR DRIVE USING FUZZY LOGIC CONTROLLER
Authors : C.Pitchai, P.A.Prassath
232 FUZZY AND ANT COLONY OPTIMIZATION BASED HYBRID SOLUTION STRATEGY FOR OPTIMAL DESIGN OF INDUCTION MOTOR
Authors : C.Pitchai, P.A.Prassath
233 xss
Authors : xss
234 SELF RE-CONFIGURATION OF FAILED PATH USING A-MAODV PROTOCOL IN MANETS
Authors : Surbuthene.A, Selvaraj.R, Prabhu.T, Manooj Kumaar S.B
235 Depth based Routing Techniques for Energy Efficiency in Mobile Wireless Sensor Networks
Authors : S.Selvarani M.E (PhD), R.Shenbagavalli, M.E., V.Saranya., B.E.,M.Tech., P.N.Periyasamy., B.E., M.Tech.,
236 TRANSFORMER LESS H6-BRIDGE CASCADED STATCOM WITH STAR CONFIGURATION FOR REAL AND REACTIVE POWER COMPENSATION
Authors : A.Elakkiya, E.Shyamaladevi
237 POWER MANAGEMENT USING WSN
Authors : A. Jerome Christhudass M.E., T. Karthik,
238 NOVEL APPROACH FOR DATA INTEGRITY MAINTENANCE WITH USER REVOCATION SYSTEM IN CLOUD
Authors : Dr. S. AYYASAMY B.E., M.E.,Ph.D., G.KIRUTHIKA
239 PRIVACY PRESERVING MINING ASSOCIATION RULE FROM OUTSOURCED TRANSACTION
Authors : MOHANRAJ GOVINDARAJ, SARITHA KARTHIK
240 Threshold Based Energy Efficient Data Transmission in Wireless Sensor Network
Authors : MOHANRAJ GOVINDARAJ, SARITHA KARTHIK
241 Experimentation and prediction of CNC Turning Process Parameters on AL6069 Using response surface methodology
Authors : R.Clinktan, Selva Ganesh Kumar, N.Muthu Prakash, N.Zeelan Basha
242 RELEVANCE OF MOBILE DEVICES TO IMPROVE EDUCATIONAL OUTCOMES IN HIGHER EDUCATION SECTOR
Authors : Biju Aliyas, Dr S. Kumar Chandar
243 A REVIEW ON MACHINING PARAMETERS INFLUENCING THE RESPONSES ON CNC: AN OPTIMIZATION TECHNIQUE
Authors : Selva Ganesh Kumar, Tadesse Beyene, N.Zeelan Basha
244 EARTHQUAKE ANALYSIS SYSTEM IN TWITTER NETWORK
Authors : L.S.Maheswari, Dr.A.V.Senthil Kumar MCA.,M.Phil.,PGDCA.,Ph.D.,
245 INTEGRATED BUILDING AUTOMATION SYSTEM IN A HOME
Authors : MOHD MAHMOOD
246 A Study on Effect of Crystalline Dolomite Silica as a Partial Replacement of Cement
Authors : J. Aswani, M. Indira, T.M. Jeyashree
247 Investigation and Prognosis on Technology Integration and Innovation through Internet of Things
Authors : Revathi. T. K, Anand K
248 Study on Predictive Analytics for Predicting Human Productivity of an Organization Based on Employees’ Performance
Authors : Katrhick J, Rubia Ahmed, Niranjani R, Pavan Kumar D
249 Characterisation of Magnetorheological Fluids and Its Application in Semi-active Vibration Control System in Automobiles
Authors : Naveen Sankar G M, Sujith S Thekkummuri, Mohammed Aslam M, Azeem Hafiz P A
250 Service Quality Assessment of e-Procurement in Kerala PSU’s
Authors : Samuel B.T Raj, Anshadh.A, Manikantan.R.Nair, Althaf
251 Analytical Determination of the Performance Parameters of CompressedAir vehicle
Authors : Abhijith.R, Sivaprakash.SC, Akhil.BS, Arun.S
252 Impact of Barriers on Eco-efficiency in Kerala Automobiles Limited using Partial Least Squares Modelling Technique
Authors : Naveen Sankar G M, Anshadh A, Manikantan R Nair, Azeem Hafiz P A
253 Ranking of Elements Influencing Aircraft AccidentsUsing Interpretive Structural Modelling
Authors : Nandhu M Soman, Mohammed Fahad, Naveen Sankar G M, Manikantan R Nair
254 A Study of Current Engineering Education System Under Kerala Technological University Using Six Sigma Method
Authors : Abhijith.R, Sivaprakash.SC, Akhil.BS, Anshadh.A
255 Intelligent water drop algorithm for load balancing in cloud computing
Authors : Shibina T, Lijina S.S
256 EMBEDDED BASED VEHICLE SAFETY SYSTEM USING GSM TECHNOLOGY
Authors : R. Karthiga S.Dhivya, M.Cynthia, M.Anitha
257 The Enhancement of De-linearizing in Image Fidelity
Authors : S. Ponmozhi, S.Rachel Rebekah, L.Johnsy Cyrilla Virgin, N. Kasthuri,M.E.,
258 ANALYSIS AND MEASUREMENT OF ELECTRICITY READING BY USING GSM MODEM
Authors : K. ARUN KUMAR, S. NIVEDHA
259 DATA LOGGING SYSTEM FOR VEHICLE
Authors : R.Karthiga, S.Gowtham, A.Dinesh, Gnanasekaran.B
260 TRUSTED CLOUD ARCHITECTURE: BEYOND SECURITY MODEL
Authors : S. Lalithambikai ,K.Savitha
261 PROCESSING IMPROVEMENT OF MAPREDUCE FOR MINING PROCESS IN BIG DATA
Authors : S. Latha, C. Gayathri, S.Suresh
262 STUDY OF ALGORITHMS FOR SECURING DATA STORED IN CLOUD
Authors : K. Vidhya M.E., (PhD), V. Monika, S.S. Subasri, R.Sukanya
263 CROP YIELD PREDICTION
Authors : K.R.Sri Preethaa M.E., S.Nishanthini, D.Santhiya, K.Vani Shree
264 FRAUD RANKING DETECTION IN E-COMMERCE APPLICATION USING OPINION MINING
Authors : Sugirtha.H, Jency John, Yuvaraj.N,
265 Effect of Leadership on Total Quality Management Practices among Schools
Authors : Jomon Joseph, Dr. Jyothi Kumar
266 A NOVEL MERKLE SKYLINE R-TREE AUTHENTICATED SUBGRAPH SIMILARITY SEARCH FOR SKYLINE QURIES
Authors : Vairavan.R, Mrs.M.Moohambikai M.E.,
267 IMPROVE ENERGY EFFICIENCY USING MULTIPLE MOBILE SINK ROUTING AND DYNAMIC CLUSTER HEAD SELECTION FOR WSN
Authors : N. Jeenath Shafana, G. Aravind Swaminathan, V.PerathuSelvi, C.Vinola
268 DEVELOPING A MATHEMATICAL MODEL FOR PREDICTION OF ALUMUNIUM 3003 ALLOY USING RESPONSE SURFACE METHODOLOGY-AN OPTIMIZATION TECHNIQUE
Authors : N. Sadanandam, S.Pradeepkumar, R.Venkatramanan, R.Renugadevi
269 OPTIMIZATION AND PREDICTION OF ALUMUNIUM 3003 ALLOY USING GENETIC ALGORITHM
Authors : N.Muthuprakash, V.Sivaprakash, R.Venkatramanan, V.Rajkumar
270 Modeling and Optimization of Spark EDM Process on MONEL400 by Genetic Algorithm
Authors : Lakshmanan P, Mariabritto S, Logesh M, Mohanraj c
271 Parametric Optimization of Spark EDM on Aluminum 6063 and by Genetic Algorithm
Authors : Karthick B, Sakthivel M, Venkatesan S, Antony Noel A, Ram Suri P
272 LEAN PRODUCTION SYSTEM AND TOTAL PRODUCTIVE MAINTENANCE - A STRATEGIC APPROACH
Authors : Babu R, Robinson Smart D.S, Zeelan Basha N, Mahesh G, Eric David Praveen J
273 DESIGN AND FABRICATION OF HYDRAULIC MULTI EXTRACTOR
Authors : M.Dhineswaran, T.Nateshasundharan, N.Muthu prakash, R.Venkatramanan
274 Survey on Authentication Methods and Weight Based Optimized Routing In Mobile Cloud Computing
Authors : Ananthanagu U, Namrata Pattanshetti, Prerana G Joshi, Snigdha Kesh
275 OPTIMIZATION OF CNC TURNING PROCESS PARAMETERS ON ALUMINIUM 6063 USING RESPONSE SURFACE METHODOLOGY
Authors : N.Muthu prakash, M.Dhineswaran, T.Nateshasundharan, R.Venkatramanan
276 CLUSTER BASED LOAD BALANCING AND INTRUSION DETECTION SYSTEM FOR MANET USING PANEL PROTOCOL
Authors : A.Saroja, R.Roopa
277 AN INLINE HIGH PERFORMANCE DEDUPLICATION SYSTEM WITH SECURE AUTHORIZATION IN CLOUD STORAGE
Authors : AMRUTHA OC, NAVYA RAMESH PP
278 A NOVEL APPROACH FOR SECURED DATA MAINTENANCE IN CLOUD STORAGE
Authors : Ms. S.Jeevitha, Mr.M.Rajesh, Dr. T. Senthil Prakash
279 MULTIKEYWORD RANKED SEARCH SCHEME WITH DECENTRALIZED ACCESS CONTROL OVER ENCRYPTED MOBILE CLOUD DATA THROUGH BLIND STORAGE
Authors : JITHIKA.M, RIJIN I.K
280 COMD: Computation Offloading for Mobile Devices
Authors : Rashmila GV, Navya EK
281 HEART DISEASE FORECASTING SYSTEM USING K-MEAN CLUSTERING ALGORITHM WITH PSO AND OTHER DATA MINING METHO
Authors : Shilna S, Navya EK
282 DATA PROTECTION IN CLOUD FEDERATIONS
Authors : Shruthi P, Indulekha K
283 SECURE E-PAYMENT USING LSD BASED STEGNOGRAPHY AND VISUAL CRYPTORAPHY
Authors : SREYA PRAKASH, RIJIN I K
284 RECOMMENDED SENSITIVE LOCATIONS IN TEMPORARY NETWORK USING MATRIX CALCULATION
Authors : Ms. K.SriSathiya, Mr.S.Senthilnathan, Dr. T. Senthil Prakash
285 DUPLICATE REMOVER
Authors : Vaishakhi V K, Neethu.T.Regi
286 IMPROVING ROBUSTNESS FOR IMAGE WATERMARKING USING HISTOGRAM SHAPED METHOD AND LIFTING WAVELET TRANSFORM
Authors : M. Sooriya Prabha, M.Nisha
287 Post Mining based Pattern Filtering Scheme with Attribute Association
Authors : Ms. N.M. Indumathi, Ms. C. Nithya
288 PRIVACY ENSURED BIG DATA ANALYSIS UNDER CLOUDS
Authors : Mr. C.P. Abdul Jabbar, Dr. T. Senthil Prakash, Mr. R. Senthilkumar, Mr. Manuel George
289 DYNAMIC DATA CLUSTERING UNDER DISTRIBUTED ENVIRONMENT
Authors : Ms. N. Anusha, Dr. T. Senthil Prakash, Mrs. P.V. Jothi Kantham, Mr. N. Vipin Raj
290 A Survey on Data Dissemination Schemes under VANET
Authors : Ms. P.M. Manochitra, Dr. T. Senthil Prakash, Mrs. P.V.Jothi Kantham, Ms. K.V. Nithya Sundari,
291 SECURE ROUTING AND DATA VERIFICATION UNDER WIRELESS SENSOR NETWORKS
Authors : Mr. Manuel George, Dr. T. Senthil Prakash, Mr. M. Rajesh, Mr. C.P. Abdul Jabbar
292 Sparse Deep Learning Framework for Disease Analysis
Authors : Ms. K. Remya , Dr. T. Senthil Prakash, Mr. S. Ramesh, Ms.P.C. Saritha
293 DISCOVERING SEQUENTIAL RULES FOR WEB USAGE ANALYSIS
Authors : Ms. P.C. Saritha, Dr. T. Senthil Prakash, Mr. M. Rajesh, Ms. K. Remya
294 IMAGE DATA HIDING SCHEME WITH OPTIMAL DATA RECOVERY FEATURES
Authors : Mr. N. Vipin Raj, Dr. T. Senthil Prakash, Mr. R. Senthilkumar, Ms. N. Anusha
295 IMPROVE VOID ROUTING COORDINATE FOR WIRELESS SENSOR NETWORKS USING QUALITY OF SERVICES
Authors : G.RAMYAJAYANTHI, R.MOHANASUNDARAM M.E.,
296 KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications
Authors : S.Priya, A.T.Ravi
297 INTEGRATING THE K-OUT-OF-N COMPUTING FRAMEWORK FOR ENERGY EFFICIENT AND FAULT TOLERANT IN MOBI-CLOUD
Authors : P.Sugeertha, P.Umarani,
298 Privacy-Preserving Public Auditing for Multiple Cloud Service Providers
Authors : S.Indhumathi, K.Mahalakshmi
299 Enhanced and Energy Efficient Ring Routing Protocol for WSN with Cluster Head and Mobile Sink Node
Authors : K.Kayalvizhi, P.Umarani
300 RIGHT-PROTECTED DATA PUBLISHING WITH PROVABLE DISTANCE-BASED MINING
Authors : K.Manikam, A.T.Ravi
301 Monitoring and Prevention of Stealthy Denial of Service Strategy in Cloud Computing
Authors : S.Priyanka, S.Vimalananthi
302 Secure Image Encryption Algorithm Based on Genetic Operators
Authors : B.Nagarajan, P.Manju
303 Privacy Policy Inference of User-Uploaded Contents on Social Networking Sites With Parental Control
Authors : S.Vinothkumar, S.Vimalananthi
304 STUDY ON VARIOUS TECHNIQUES OF TEXT MINING
Authors : M.Arvindhan, S.Prasanna
305 TIME-DELAYED BROADCASTING FOR DEFEATING INSIDE JAMMERS
Authors : Sooraj K Mohan, P Mallika, Dr.S.Rajalakshmi
306 GD CLUSTER: A GENERAL DECENTRALIZED CLUSTERING ALGORITHM
Authors : Sreejith P S, T.Sreenivasan, Dr.S.Rajalakshmi
307 PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE
Authors : Muhammed Mansoor P.M, T.SEENIVASAN, S.RAJALAKSHMI
308 A SEMANTIC-BASED FRIEND RECOMMENDATION SYSTEM FOR SOCIAL NETWORKS
Authors : P. KALAIYARASI, M. S. ARUN KUMAR,
309 CONTROL CLOUD DATA ACCESS PRIVILEGE USING ATTRIBUTE-BASED ENCRYPTION
Authors : Ms.Meenakshi, D. Kiruthika
310 Patient Self-Controllable HealthCare System Using Cloud Computing
Authors : Nithya devi.R, Dr. G. Kirubhakar
311 Effective Wireless Ad-hoc routing communication using APU
Authors : Kavitha.S, K.Loheswaran
312 AN EFFICIENT FEATURE DISCOVERY AND TERM CLASSIFICATION USING SVM ALGORITHM
Authors : Nisha Ranjani.S, Karthikeyan.K
313 Threshold Based Energy Efficient Data Transmission inWireless Sensor Network
Authors : M.Sasikala Devi
314 An Efficient Keyword Searching Based On Hierarchical Index By Using Cluster Management
Authors : DITTU T.CHRISTYANA, K.LOHESWARAN
315 QUERYING DATA IN WEB DATABASE USING AGGREGATE ESTIMATION WITH E-LEFT DEEP TREE ALGORITHM
Authors : D.suganthi, S.VIMALANANTHI
316 IMPROVING SELECTIVE CSP FRAMEWORK FOR CLOUD SERVICE USING MULTIFACTORY ANALYSIS MODEL
Authors : A.Revathi, K.Mahalakshmi
317 PRIVACY PRESERVING WITH ANONYMOUS AUTHENTICATION FOR CLOUD COMPUTING ENVIRONMENT
Authors : S.Thiyagarajan, D.NAMACHIVAYAM
318 A PUBLIC KEY CRYPTO SYSTEM AND SOME WHAT ENCRYPTION USING PALLIER ALGORITHM
Authors : S.Suriyaa, V.Ramya
319 Improve Cooperative Load Balancing And Dynamic Channel Allocation For Routing with Cluster Based Moblie Ad hoc Network
Authors : K.Sathiya priya, R.Mohana Sundaram M.E
320 DISCOVERING FREQUENT ITEM SET USING CONFABULATION-INSPIRED ASSOCIATION RULE MINING
Authors : T. Malathi, Dr. T. Senthil Prakash, P.V. Jothi Kantham
321 Enhancement of Storage Security and Privacy for Big Data Process using Hybrid Cloud Process
Authors : P. PRAVEEN KUMAR, J. GOKUL RAJ
322 EFFICIENT JAMMING AWARE TRAFFIC DISTRIBUTION FOR MULTIPLE PATH ROUTING USING PORTFOLIO SELECTION
Authors : B. SATHIYAPRIYA, K.ASHOK KUMAR, M. SAKTHIVEL
323 Privacy Ensured Information Leakage Control Framework for Cloud Service Providers
Authors : K. Arun, Dr. T. Senthil Prakash,S. Senthilnathan
324 STUDENTS PREFERENCE TOWARDS FEATURES OF KURTIS WITH SPECIAL REFERENCE TO BANGALORE CITY
Authors : Dr.S.LakshmiManokari, M.Prathiba
325 A NAVAL APPROACH ON PROJECT RISK MANAGEMENT
Authors : JABIR ERANTHODI, N.THIRUGNANASAMBANTHAM
326 SYNERGISTIC EFFECTS IN TERNARY BLENDED CEMENTITIOUS SYSTEM CONTAINING FLY ASH AND SILICA FUME
Authors : JASIR THACHAPARAMBIL, THIRUGNANASAMBANTHAM
327 RANKING OF DELAY FACTORS IN THE INDIAN BUILDING CONSTRUCTION
Authors : ANEES M.K, S.SABARINATHAN
328 Energy Efficient Data Collection in Resource Constraint Wireless Sensor Networks
Authors : Dr.N.Chitra Devi, R.Vadivel, A.Ramesh
329 A Novel Cancer Gene Search Model and Classification Using GPSO-BPNN
Authors : F.Leenavinmalar, Dr.A.Kumarkombaiya
330 An Assessment on Economic Adulteration of Food Products; Case of Dessie Town, Ethiopia
Authors : Yohannis Gebremariam Hailie
331 Assessment on Inventory Management with special reference to Ethio Telecom Dessie, Ethiopia
Authors : Mr. Mengistu Guliti Buba
332 PRIVACY PRESERVED FREQUENT ITEMSET MINING FOR SERVICE RECOMMENDATIONS UNDER CLOUDS
Authors : Leelavathi. G, Mohana Priya. C
333 Security Ensured Big Data Mining with Public Cloud Services
Authors : S. Muruganandham and S. Deepa
334 LITERATURE REVIEW OF EXTRACTING ENERGY IN GRID CONNECTED PHOTOVOLTAIC SYSTEMS
Authors : G.TRUEMAN SAVIO AMALRAJ, Dr.P.THANGARAJ.,M.E.,Ph.D.,
335 LITERATURE REVIEW OF POWER GENERATION USING Z SOURCE INVERTERS FOR PHOTOVOLTAIC MODULES
Authors : G.TRUEMAN SAVIO AMALRAJ, Dr.P.THANGARAJ.,M.E.,Ph.D.,
336 A Multiple Determination Support for Web Application Clusters to Hybrid Clouds
Authors : P. Kaladevi, Dr. P. Sumitra
337 Integrated Forwarder and Data Selection Scheme for Security Ensured Vehicular Communication
Authors : M. Karthika, N. Kowsalya
338 Cluster based Anonymization and Knowledge Discovery on Big Data under Clouds
Authors : Dr. P. Sumitra, R. Krishnaveni
339 Hierarchical Data Gathering with Network Area Verification Scheme for WSN
Authors : Dr. P. Sumitra, P. Ponkavitha
340 Attack Resistant Multimedia Data Sharing under Distributed Networks
Authors : C. THEEBENDRA, S. PREMA
341 Protecting Data and Query against Differential Attacks in Outsourced Cloud Search
Authors : Dr.T.Ramaprabha, S.Priya
342 Sensor Data Processing in Outsourced Cloud Resources
Authors : K. S. Saravanan.,MCA., MPhil., S.Karthika.
343 Antimicrobial Activity of Chilly and Ginger Extracts against Food Borne Pathogens E.coli, S.tyhimurium, S.aureus and L.monocytogens
Authors : Bharath M R,Dr. M. A. Azeem,Sheerin Basha,Keerthan H V
344 The Effect of Human Resource Management Practices on Corporate Restructuring: A Study of IT Company in India
Authors : Dr.S.Arun Kumar, J.Jose Prabhu
345 Resource Allocation for Web Applications under Integrated Cloud Architecture
Authors : C. Deepika, MPhil., Research Scholar, Dr. N. Chandrakala, MSc., MPhil., PhD.,
346 Cooperative Channel Assignment with Dynamic Cluster Management Scheme under MANET
Authors : V. Harini, MPhil., Research Scholar, P. Ragupathi, MSc., MPhil.,
347 Multi Layered Data Communication Framework for WSN
Authors : G. Menaka, MPhil., Research Scholar, M.M. Kavitha MSc., MPhil.,
348 Cloud Service Discovery and MapReduce Framework for Healthcare Data Classification
Authors : R. Saranya, MPhil., Research Scholar, Dr. N. Chandrakala, MSc., MPhil., PhD.,
349 Document Hierarchical Model Construction and Indexing Approach for Textual Data Mining
Authors : J. Sharmila Ananthi, MPhil., Research Scholar, R. Sasiregha, MSc., MPhil,
350 Security and Traffic Constrained Routing Protocol for VANET
Authors : S. Suruthi, MPhil., Research Scholar,P. Ragupathi, MSc., MPhil.,
351 Categorization of Sequential Data using Associative Classifiers
Authors : R. Meenakshi, J.S. Subhashini
352 Temporal Data Clustering Framework with Optimal Distance Measures
Authors : G. Sakthivel, J.S. Subhashini
353 IMPACT OF LEADERSHIP STYLES ON EMPLOYEE ORGANIZATIONAL COMMITMENT IN PRIVATE HIGHER INSTITUTIONS AT DESSIE CITY ADMINISTRATION
Authors : Dr.Manju Shree, Yohannis Gebremariam Hailie
354 DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING USING ABE
Authors : R. Balachandran, V.Ganesh Karthikeyan, Dr.N.Chitra Devi
355 SECURE BROADCASTING INFORMATION WITHIN JAMMING WIRELESS NETWORK
Authors : V.Vaishnavee, S. Saravanakumar, Dr.N.Chitra Devi
356 LOW POWER ENERGY EFFICIENT FILPFLOP DESIGN USING THRESHOLD LOGIC
Authors : K.Thulasimani, M.Hemalatha, P.Divya
357 A Systematic Approach for Analyzing the Patient’s Future Diseases Using Incremental Semi Supervised Clustering
Authors : R.ANITHA, M.R.RAMYA
358 A STUDY OF FLOW FIELD MEASUREMENTS OF RADIAL GAB WITH DIFFERENT RPM BY USING COMPUTATIONAL FLUID DYNAMICS
Authors : S.Senthilkumar, Dr.Ankur Awashthi
359 STUDY OF FLOW FIELD CHARACTERISTICS OF SLURRY IMPELLERS BY USING COMPUTATIONAL FLUID DYNAMICS
Authors : S.Senthilkumar, Dr.Ankur Awashthi
360 EFFICIENT NODE AUTHENTICATION USING INSENS PROTOCOL FOR MANET NETWORK
Authors : Priyanka.M, P.Chandrasekar
361 TRACKING OF MOBILE DEVICES IN WIRELESS SENSOR NETWORK USING CLUSTER PROTOCOL
Authors : P.Selvam, Mr. Kannan– M.E (Ph.D),
362 Criticality Scores and Optimized Support Vector Machine for Cancer Risk Assessment
Authors : C.Nithya, S.N.SANTHALAKSHMI
363 Distributed Graph Query Management using Semantic Cluster based Graph Pattern Views
Authors : P.Revathi, C. Thangamani
364 FINDING PRIVACY CONFLICTS IN ONLINE SOCIAL NETWORK SERVICES
Authors : LATHA.S, GAYATHRI.C
365 FACTORS AFFECTING LABOUR PRODUCTIVITY IN CONSTRUCTION SITE
Authors : S.KAVEEN, BHUVANESHWARI.T, KALAISELVAN.P, NAVIN.M, SATHYA.R
366 SEGMENTATION OF HIGHER SPATIAL RESOLUTION REMOTE SENSING DATA
Authors : N.Muthusamy, Dr.M.Ramalingam
367 5G BASED MIMO CELLULAR NETWORKS WITH RETRANSMISSIONS USING SWARM INTELLIGENCE ALGORITHM
Authors : Anitha.K, Chitralekha.T
368 DIGITAL WATERMARKING USING LAB VIEW USING DCT ALGORITHM
Authors : R.Bharathi,D.Jeyakumari
369 Hybrid Data Transmission Framework with Prediction based Channel Assignment under Cognitive Radio based Vehicular Ad-Hoc Network
Authors : S.Jeevitha, S.Sampath
370 FEE COLLECTION SYSTEM USING OPTIMAL HUMAN AUTOMATION INTERACTION MODAL
Authors : S.Aishwarya,T.C. Ezhil Selvan,M. Kirubha
371 RSM based GA for Turning Process Parameters optimization on ALUMINIUM 8082
Authors : N. Sadanandam, A.R.Ragu,N.Muthu prakash,S.Sugumar
372 EXPERIMENTAL INVESTIGATION OF PERFORMANCE CHARACTERISTICS OF RADIATOR
Authors : S.Sugumar, A.R.Ragu,R.Sadish kumar, N.Muthuprakash
373 IMPLEMENTATION OF SUBTHRESHOLD ADIABATIC LOGIC FOR ULTRA LOW-POWER APPLICATION
Authors : M. Priyanka,P. Chandrasekar
374 ANALYZING THE EFFECT OF DYNAMIC LOADS ON ECONOMIC DISPATCH IN THE PRESENCE OF INTERLINE POWER FLOW CONTROLLER USING MODIFIED BAT ALGORITHM
Authors : D.Jayanthi, Prof. K. Thangarajan, Dr. S. S. Sivaraju
375 MULTI-KEYWORD RANKED SEARCH IN CLOUD COMPUTING WITHOUT BURDEN OF NETWORK BANDWIDTH
Authors : Mrs.Janani, Mr.C.Nandhakumar
376 Analysis of Tool Geometry on Cutting Tool during Turning of EN 24 Mild Steel
Authors : G.Paulraj, P.Viswabharathy, M.Vadivel, A.Vairamuthu
377 IOT BASED HEALTH CARE SERVICES USING IMEDBOX
Authors : R .Aarthi, B.Mythili, S.Sangeetha,Dr.S.Selva brunda,Ms.K.Kalaivani,
378 ENERGY EFFICIENT AND CLUSTER BASED DATA AGGREGATION USING ESTAR METHODOLOGY FOR WIRELESS SENSOR NETWORK
Authors : P.Selvam, Mr. Kannan
379 BIG DATA INFORMATION MANAGEMENT OF SMART GRID USING SECURE CLOUD COMPUTING
Authors : RATHIKA.J, Dr. M. SORANAMAGESWARI,
380 Design and characteristic analysis of micro strip fastener filter using emGine Environment
Authors : N Surendar, R Suresh, A Tamilraja, S Vignesh kumar R Dhayabharani
381 Women and Retirement Planning
Authors : Thanvi Sebastian, Prof. Middi Appala Raju, Rojes V Coalbe
382 TWO STAGE FRAME WORK FOR MEDICAL IMAGE AND MESSAGE PROTECTION SYSTEM
Authors : P.Bhakyalakshmi, R.Malathy, N.Sandhiya, Dr.S.Rajalakshmi, E.GokilaNivetha
383 STRENGTH STUDIES ON POLYPROPYLENE FIBER REINFORCED NO-FINE CONCRETE PAVEMENTS
Authors : S.Elavarasan, K.Preetha, S.Priya, K.Ramkumar, N.Revathi
384 STRENGTH STUDIES ON POLYPROPYLENE FIBER REINFORCED NO-FINE CONCRETE PAVEMENTS
Authors : S.Elavarasan, K.Preetha, S.Priya, K.Ramkumar, N.Revathi
385 Experimentation and Prediction of surface roughness in CNC turning process with Reference to machining parameters using response surface methodology and genetic algorithm
Authors : Sharun Sylvester B, Manikandan R, Mathivelpandiyan M, Mayura priyan P, Pradeep kumar M
386 Enhancing surface finish by optimization of CNC machining parameters on AA 2024 using response surface methodology
Authors : SUJITH KUMAR.R.K, UMMAL SALMAAN.N, BALA KARTHICK.K.S, LEO DANIEL, KASTHOORI.V, ARAVIND.J
387 PERFORMANCE EVALUATION OF SURFACE ROUGHNESS OF FABRICATED VALVE CLOSER USING PRESSURE DIE CASTING PROCESS
Authors : L.N.SURESH KUMAR, R.RAGHUPATHY, M.SATHYAMOORTHY, K.SIVAPRIYADHARAN, N.SHRINIVASH NAGARAJAN
388 AN EXPERIMENTAL INVESTIGATION ON GRINDING SAND STONE INTO FINE AGGREGATE
Authors : S.KAVEEN M.E1., R.RAMASATHYA.ME2, V.ESWARAN3, M.JAYABASKER4, M.RAMESH5, M.VINEETH6.
389 PATTERN ANALYSIS IN DIMENTIONALITY REDUCTION
Authors : Anushiya M, Ismail Khan V, Nandini S, Saravana Kumar S
390 Enhancement of surface finish on oil hardened non shrinkage (OHNS) steel using Spark EDM –An Taguchi and Genetic algorithm approach
Authors : Sharon Sylvester. B, Kiran Kumar.K, Manikandan.R, Pradeep kumar.M, Mathivelpandiyan.M
391 ENHANCED MIMO 5G CELLULAR NETWORKS WITH RETRANSMISSION SIGNAL USING SLEEP AND WAKEUP TECHNIQUE
Authors : K.Anitha, T.Chitralekha– M.E (Ph.D)
392 Fine-Grained Media Data Delivery Framework with Piracy Discovery and Prevention Scheme
Authors : V. Logapriya, S.Sampath
393 CHARACTERISTICS OF SLIDING WEAR BEHAVIOR OF HYBRID METAL MATRIX MATERIAL UNDER HEAT TREATMENT-STIR CASTING METHOD
Authors : SELVA GANESH KUMAR, TADESSE BEYENE, ROBSAN ABEBE, CLINKTAN R
394 DECISION SUPPORT SYSTEM TO ENABLE SMART FARMING
Authors : P.Logapriya, S.R.Ramya, P.Vasanthaseelan
395 A Systematic Approach for Analyzing the Patient’s Future Diseases Using Incremental Semi Supervised Clustering
Authors : A.M.RAVISHANKAR, Ms.M.R.RAMYA
396 A STRATEGIC METHOD FOR ENERGY CONSUMPTION IN VIRTUAL MACHINES ACROSS THE CLOUD
Authors : B.Sindhuja, Dr.D.Sumathi, C.Karthik
397 MINIMIZATION OF COST FOR PROVIDING WFAS IN CLOUD
Authors : Minu.R.Nair, Sivaprakash.P, Manoj.B.Raj
398 Privacy Preserving Secured Mining of Heterogeneous Data with Attack Prohibition System
Authors : S.Sindhu Biravi, M.Kalaiselvi
399 Keyword Based Search and Secured Data Storage in Cloud using Hashing and BTA Techniques
Authors : R. Amsaleka, M .Saratha, P. Periyasamy
400 EFFICIENT DETECTION AND PREVENTION OF DATA LEAKEAGE IN DTE AND DCE
Authors : A.N.VINODHINI, Dr.S.AYYASAMY
401 DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING USING ATTRIBUTE BASED ENCRYPTION ALGORITHMS
Authors : R. Balachandran, V. Ganesh Karthikeyan, Dr.N.Chitra Devi
402 SECURE BROADCASTING INFORMATION WITHIN PACKET DELIVERY RATIO ALGORITHM
Authors : V.Vaishnavee, S.Saravanakumar, Dr.N.Chithra devi
Back to Top