Archive

March 2016 (Volume 20/Issue 3)/ Issues 1

S.No Paper Title No. Pages Download
1 DIFFUSION-PROFICIENT CLUSTERING METHOD USING COMPRESSIVE SENSING IN WIRELESS SENSOR N..
Sakey Siva Kumar,M.Harathi,S.G.Nawaz
1-4 Click Here
2 ANALYSIS OF BIG DATA TRENDS AND FUTURE DIRECTIONS: A REVIEW
Dr. S. Manimekalai,A Santhi
5-8 Click Here
3 INVESTIGATING PRIVACY PRESERVATION ISSUES IN DATA MINING
Dr. S. Manimekalai,M Ranjani
9-12 Click Here
4 AUTHENTICATION PROTOCOL FOR SECURITY BASED ON CAPTCHA AS COUNTERSIGN ON HARD AI PROBLEMS
Saranya. S,Infantina A,Jabez J
13-15 Click Here
5 A NOVEL ALGORITHM FOR DYNAMIC RESOURCE PROVISIONING POLICIES IN N-TIER WEB APPLICATIONS
P. Anandajayam,K. Swedha
16-22 Click Here
6 A SPECTRAL CLUSTERING APPROACH TO IDENTIFYING CUTS IN WIRELESS SENSOR NETWORKS
Vidhya Ramu,Neha Mariam Joseph
23-26 Click Here
7 DESIGN AND ANALYSIS OF EFFICIENT RECONFIGURABLE FIR FILTER USING CONSTANT MULTIPLIER ..
Anni Benitta.M,Felcy Jeba Malar.M
27-30 Click Here
8 EFFECTIVE DATA SKEW MITIGATION
S.Thilagavathi,G.Vidhya,R.Sowmya
31-34 Click Here
9 TRACING HACKER IP AND LOCATION IN SECURED NETWORK USING IP TRACE ALGORITHM
Mary anni jegila.A,shanuba.S,D. kaavya
35-40 Click Here
10 AN EFFICIENT DISTRIBUTED TRUST MODEL FOR SECURE TRANSMISSION IN WIRELESS SENSOR NETWORK
S.Shashank,R. Precila
41-47 Click Here
11 ENHANCED DYNAMIC DISTORTION-RESISTANT & LEAKAGE DETECTION WITH COLLUSIVE PIRACY PREVE..
S.Nirenjena,S. Prasanna Kumar
48-53 Click Here
12 ENHANCED NEARNESS AND TRUST BASED ELASTIC DATA SHARING ON PEER-TO-PEER FILE SHARING SYSTEM
K.Deepapriya,J. Nulyn Punitha
54-58 Click Here
13 ALCOHOL ADDICTION CONTROL SYSTEM USING AADHAAR CARD
M.Chandru,S.Vijayalakshmi
59-61 Click Here
14 AN ADAPTIVE FEATURE BASED STEREO MATCHING
R.Lavanya,S.Nirenjena
62-65 Click Here
15 TOP-K KEYWORD QUERIES MENDED FOR NOVEL MAPPING ON XML DATA
K.Pushparaj ,J.Nulyn Punitha
66-71 Click Here
16 MOBILE APP’S SECURITY MEASURE USING CFC
S.P.Neeraja,Mrs.P.Kanimozhi
72-75 Click Here
17 INTENSIFIED FINGERPRINTS USING BLOWFISH TECHNIQUE IN DISTRIBUTED SYSTEMS
M.Elakkiya,P.Manju Bala
76-80 Click Here
18 ENHANCED LEAKAGE RESILIENCY BASED SECURE DATA TRANSMISSION USING KEY ALLOCATION SCHEM..
M.O.Ramkumar,G.Padhmavathi
81-85 Click Here
19 SIMILARITY SEARCH USING MRDTW (MAP REDUCE DYNAMIC TIME WARPING) IN HADOOP
S.Naveen,M. Pajany
86-89 Click Here
20 ENHANCED SECURE MD5 AND CRYPTOGRAPHIC PUZZLE HIDING SCHEME TO DEFEND DENIAL-OF SERVIC..
V.Abirami,P.Manju Bala
90-96 Click Here

Institutional Affiliates

Indexing Affiliates