1 |
ENHANCED PRIVACY PRESERVING MODEL FOR TRUSTED BASED DATABASE SYSTEMS
R. Mohana Priya,G. Indhumathi,K. Bhuvaneshwari
|
1-4 |
|
2 |
ENHANCED GEOGRAPHIC BASED ROUTING PROTOCOLS FOR UNDERWATER SENSOR NETWORKS
P. Deepika,K. Sumalatha
|
5-9 |
|
3 |
PREVENTION OF EAVESDROPPER ATTACKS USING DECORRELATION PATTERNS IN WIRELESS SENSOR NE..
E. Sivaranjani ,R. Angelin Preethi
|
10-14 |
|
4 |
DEVELOPING AN EFFICIENT KEYWORD SEARCH MODEL FOR CIPHERED CLOUD DATA
K. Mahalakshmi,A. Lavanya
|
15-20 |
|
5 |
LOCATION FORECASTING FROM CHECK-IN DATA OF LOCATION BASED SOCIAL NETWORKS
R. Karthiga,R. Angelin Preethi
|
21-25 |
|
6 |
PRIVACY PRESERVED MEDICAL DATA SHARING MODELS FOR CLOUD SYSTEMS
K. Abirami,S. Yogalakshmi
|
26-30 |
|
7 |
MINIMIZATION OF INFLUENTIAL NODE TRACKING IN DYNAMIC SOCIAL NETWORKS
K. Nishanthi,S. Yogalakshmi
|
31-35 |
|
8 |
Operating bandwidth enhancement of fractal defected ground structure Microstrip antenna
M.Poovarasi ,K.Sivadhani, S.vinothini,J.Venkatachalapathi
|
36-39 |
|
9 |
IDENTITY BASED ENCRYPTION SCHEME IN CROWDSENSING BASED ROAD MONITORING
Nivedha.A,Prashika .M,Preethi.R and Indra . G
|
40-44 |
|
10 |
WLS Filter Based Color Transfer in Fabric Images
N.D. Ramesh,Dr.T.Thirurumurugan,R.Rajasekar
|
45-53 |
|
11 |
Implementation of Continuous and Transparent User Identity Verification for Secure In..
Pruthvi M P, Tharunya B,Vinutha J S, Varsha Varadarajan,Prathibha B S
|
54-56 |
|
12 |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
T. Sree Lakshmi,Sunku Umamahaheswari
|
57-61 |
|
13 |
An Efficient Top-K Query Processing in MANETS on Malicious Node Identification
A.Mahendra,K..R. Harinath,M.Shalima Sulthana
|
62-66 |
|
14 |
AUGMENTED COMPETITOR MINING WITH C-MINER ALGORITHM BASED ON PRODUCT REVIEWS
Gokkul V.S ,Angel Pemala G
|
67-71 |
|
15 |
ENHANCED DATA ARCHIVAL AND RETRIEVAL SYSTEM USING REED SOLOMON CODING
G.Brajith kumar ,V.Karthi
|
72-76 |
|
16 |
STATISTICS EXTRACTION IN MALICIOUS SITUATIONS
Kerenaph .A,M.Rajanandhini,Prof.K.Chandhraprabha
|
77-81 |
|
17 |
AUGMENTING THE THROUGHPUT OPTIMALITY PERFORMANCE OF DYNAMIC BACK PRESSURE ALGORITHM
T.Thamaraiselvi,P.Revathi,Prof.K.Chandhraprabha
|
82-85 |
|
18 |
Human Brain Tumor Classification Using Genetic Algorithm Approach
E. S Benelin John,Ravikumar
|
86-89 |
|
19 |
CYBERBULLYING DETECTION BASED ON SEMANTIC-ENHANCED MARGINALIZED STACKED DENOISING AUT..
Sparsha R,Sushma M Balg, Amulya Anand,Sushma K B , B B Neelkantappa
|
90-94 |
|
20 |
Modified Efficient Geographic Multicasting Protocol in MANET
B.J.Praveena,P.Saiteja, G.Karthik,K.Sreekar
|
95-100 |
|