Archive

April 2018 (Volume 25/Issue 4)/ Issues 4

S.No Paper Title No. Pages Download
1 ENHANCED PRIVACY PRESERVING MODEL FOR TRUSTED BASED DATABASE SYSTEMS
R. Mohana Priya,G. Indhumathi,K. Bhuvaneshwari
1-4 Click Here
2 ENHANCED GEOGRAPHIC BASED ROUTING PROTOCOLS FOR UNDERWATER SENSOR NETWORKS
P. Deepika,K. Sumalatha
5-9 Click Here
3 PREVENTION OF EAVESDROPPER ATTACKS USING DECORRELATION PATTERNS IN WIRELESS SENSOR NE..
E. Sivaranjani ,R. Angelin Preethi
10-14 Click Here
4 DEVELOPING AN EFFICIENT KEYWORD SEARCH MODEL FOR CIPHERED CLOUD DATA
K. Mahalakshmi,A. Lavanya
15-20 Click Here
5 LOCATION FORECASTING FROM CHECK-IN DATA OF LOCATION BASED SOCIAL NETWORKS
R. Karthiga,R. Angelin Preethi
21-25 Click Here
6 PRIVACY PRESERVED MEDICAL DATA SHARING MODELS FOR CLOUD SYSTEMS
K. Abirami,S. Yogalakshmi
26-30 Click Here
7 MINIMIZATION OF INFLUENTIAL NODE TRACKING IN DYNAMIC SOCIAL NETWORKS
K. Nishanthi,S. Yogalakshmi
31-35 Click Here
8 Operating bandwidth enhancement of fractal defected ground structure Microstrip antenna
M.Poovarasi ,K.Sivadhani, S.vinothini,J.Venkatachalapathi
36-39 Click Here
9 IDENTITY BASED ENCRYPTION SCHEME IN CROWDSENSING BASED ROAD MONITORING
Nivedha.A,Prashika .M,Preethi.R and Indra . G
40-44 Click Here
10 WLS Filter Based Color Transfer in Fabric Images
N.D. Ramesh,Dr.T.Thirurumurugan,R.Rajasekar
45-53 Click Here
11 Implementation of Continuous and Transparent User Identity Verification for Secure In..
Pruthvi M P, Tharunya B,Vinutha J S, Varsha Varadarajan,Prathibha B S
54-56 Click Here
12 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
T. Sree Lakshmi,Sunku Umamahaheswari
57-61 Click Here
13 An Efficient Top-K Query Processing in MANETS on Malicious Node Identification
A.Mahendra,K..R. Harinath,M.Shalima Sulthana
62-66 Click Here
14 AUGMENTED COMPETITOR MINING WITH C-MINER ALGORITHM BASED ON PRODUCT REVIEWS
Gokkul V.S ,Angel Pemala G
67-71 Click Here
15 ENHANCED DATA ARCHIVAL AND RETRIEVAL SYSTEM USING REED SOLOMON CODING
G.Brajith kumar ,V.Karthi
72-76 Click Here
16 STATISTICS EXTRACTION IN MALICIOUS SITUATIONS
Kerenaph .A,M.Rajanandhini,Prof.K.Chandhraprabha
77-81 Click Here
17 AUGMENTING THE THROUGHPUT OPTIMALITY PERFORMANCE OF DYNAMIC BACK PRESSURE ALGORITHM
T.Thamaraiselvi,P.Revathi,Prof.K.Chandhraprabha
82-85 Click Here
18 Human Brain Tumor Classification Using Genetic Algorithm Approach
E. S Benelin John,Ravikumar
86-89 Click Here
19 CYBERBULLYING DETECTION BASED ON SEMANTIC-ENHANCED MARGINALIZED STACKED DENOISING AUT..
Sparsha R,Sushma M Balg, Amulya Anand,Sushma K B , B B Neelkantappa
90-94 Click Here
20 Modified Efficient Geographic Multicasting Protocol in MANET
B.J.Praveena,P.Saiteja, G.Karthik,K.Sreekar
95-100 Click Here

Institutional Affiliates

Indexing Affiliates