S.No |
Contents |
1 |
Hybrid Optimization Based On Genetic Routing And Scheduling Scheme With Robust Transmission In Wireless Networks
Authors : Arsha Reji
|
2 |
Dynamic data chinking and sample partition for bigdata analysis using RSP and compression algorithm
Authors : A.ARUL JOTHI
|
3 |
Session-Key Establishment and Authentication in a Smart Home Network using Public Key Cryptography
Authors : Goodwin P
|
4 |
Multi-Indexing Scheme for Cloud Storage System Using U2-HCN
Authors : S.Gunaselvi
|
5 |
Road Traffic Management System in Hilly Region
Authors : M. Srinevasan, M.Dharani,P.Gokulnath, K.Harish,C.Harishankar
|
6 |
A SYSTEMATIC STUDY OF FORECASTING RAINFALL USING DIFFERENT METHODOLOGIES
Authors : N.Hema, K.Harinisree
|
7 |
Machine Learning Based Malicious Urls Detection
Authors : S. Jessy Merline
|
8 |
A Fraud Detection System In Credit Cards Through Map-Reduce
Authors : S. Jiveen
|
9 |
VOICE AND HAND GESTURE BASED VLC PLAYER MANIPULATION FOR DISABLED PEOPLE
Authors : Dr. N. Priya, M.Keerthana
|
10 |
Recognizing User Portrait for Fraudulent Identification On Online Social Networks
Authors : R.Keerthika
|
11 |
Protection Engine for Examining Distributed Denial of Service Attack in Computer Networks
Authors : R.Lakshmi
|
12 |
GPS BASED TUTORING APP FOR STUDENTS IN HIGHER EDUCATION INSTITUTION’S ENTRY EXAM PREPARATION
Authors : Dr. N. Priya, Ramya Abirami .V
|
13 |
Selecting Optimum Cloud Availability Zones By Learning User Satisfaction Levels
Authors : Shanu Ep
|
14 |
COMPARATIVE STUDY OF AI BASED ON ITS CAPABILITIES
Authors : Sharon, S. Mahalakshmi, D. Deeba, V. Anjali
|
15 |
Cloud Data Security Using Backtracking Algorithm and ASCII Stenography
Authors : Sreelakshmi P
|
16 |
AUTOMATIC GAS LEAKAGE DETECTION AND MANAGEMENT
Authors : D.Arulanantham, P.Divahar, E.Sanjana, V.G.Varshini, K.Vasantha Kumar
|
17 |
MACHINE LEARNING
Authors : M.Vengadanathan , M.Santhiya mani
|
18 |
Intelligent Transportation And Control Systems Using Data Mining And Machine Learning Techniques: A Comprehensive Study
Authors : Annmariya Binu
|
19 |
Dynamic Identity –Based Deterministic Multi – Copy Information Custody In Multi – Cloud Repository
Authors : Elizabeth Charls
|
20 |
Kgram-Based Composite Secret Sign Search over Encrypted Cloud Information
Authors : M.Akilandeswari
|