Archive

December 2015 (Volume 19/Issue 1)/ Issues 1

S.No Paper Title No. Pages Download
1 SECURING PRIVACY ASSISTANCE FOR PROTECTING LOCATION BASED QUERIES USING ENHANCED SYMM..
M. Indhumathi,B. Sakthivel
1-6 Click Here
2 EFFICIENT NOVEL TECHNIQUE FOR AUTHENTICATION IN MOBILE AND PREVALENT COMPUTING
B.Krishnaveni,K.Katyayani
7-10 Click Here
3 EFFICIENT EXECUTION OF PERL SCRIPTS ON HADOOP CLUSTER
Raghavendra Ajeagaonkar,Prashant Bangar,Karmjeet Saroj, Saurabh Mali, Dr. Prashant Kumbharkar
11-15 Click Here
4 IMPLEMENTATION OF HIGH SPEED MULTIPLIER USING VEDIC MATHEMATICS
N.Bhargav Reddy,K. Wasimakram
16-22 Click Here
5 LARGE-SCALE DATA PROCESSING PLATFORM BASED ON A PEER-TO-PEER PLATFORM
G. Madhavi,M.N.Bhaskhar
23-25 Click Here
6 FINDING THE SHORTEST WAY IN LIVE TRAFFIC RANGE
M.N.Raghavendra,Malaneelam Bhaskar,D.Anithamma
26-30 Click Here
7 A NOVEL ARCHITECTURE TO EXECUTE SIMULTANEOUS AND CONCURRENT OPERATION ON ENCRYPTED CL..
G. Padma
31-34 Click Here
8 A PRIVACY-PRESERVING ACCESS CONTROL WITH ROBUST DATA AUTHENTICITY FOR CLOUD GROUP
P. Sathya,S.Gopinath,Dr. P. Kuppusamy
35-40 Click Here
9 SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING
S.Poongodi,P.Murugan,Dr.P.Kuppusamy
41-43 Click Here
10 A STUDY ON MAC PROTOCOLS FOR WIRELESS AD HOC NETWORK
S.Mythili,Dr.N.Rajendran
44-48 Click Here
11 EFFICIENT RANKING ON ENTITY GRAPHS WITH PERSONALIZED RELATIONSHIPS
Polepalli Venkatesh,Dr.M.V.Siva Prasad,P.Sandeep
49-54 Click Here
12 IMAGE ENCRYPTION AND RETRIEVAL IN CHAOTIC MAP BASED IMAGE SECURITY WITH TAMPER DETECTION
Vimali G,Prof.M. Senbagavalli
55-58 Click Here
13 DETECTING MALICIOUS PACKET DROPPING IN WIRELESS AD HOC NETWORKS BY USING HOMOMORPHIC ..
Mekala Rajesh,Nirmala Bai. K.S
59-63 Click Here
14 ALERT AGGREGATION BASED PATTERN CLASSIFIER FOR EFFECTIVE NETWORK INTRUSION DETECTION ..
D. Ramakanth,S. Kusuma
64-68 Click Here
15 IMPROVING THE LOADABILITY LIMITS OF POWER SYSTEM USING FACTS DEVICE PLACED AT AN OPTI..
Mrs.A.Saranya,Mr.M.Ramesh,Mr.D.Rajkumar
69-73 Click Here
16 A SURVEY ON VM CONSOLIDATION FOR ENERGY EFFICIENT GREEN CLOUD COMPUTING
Hemanandhini.I.G,Ranjani.C
74-79 Click Here
17 A SURVEY ON DATA REDUCTION TECHNIQUES FOR EFFICIENT BUG TRIAGE PROCESS
Shanthipriya.D,Deepa.K
80-82 Click Here
18 A SURVEY ON MICROCONTROLLER BASED INTELLIGENT IRRIGATION SYSTEM
R. Kowsalya,M. Karthigha
83-86 Click Here
19 FINDING ISOLATED REPAIRING POINT USING WIRELESS SENSOR NETWORKS FOR STRUCTURAL HEALTH..
Meenakshi Dhanalakshmi.M,Karthigha.M
87-91 Click Here
20 A SURVEY ON TECHNIQUES AVAILABLE IN BANK SECURITY
Sandhiya Ravikumar,Jeyapriya Arthanareeswaran
92-94 Click Here

Institutional Affiliates

Indexing Affiliates