All Issues

February 2015 (Volume 12/Issue 4)/ Issues 4

S.No Paper Title No. Pages Download
1 A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH ..
K.M.Ruba Malini,R.Lakshmi
115-120 Click Here
2 SECURED COMMUNICATION USING JPEG COMPRESSIONOF STEGANOGRAPHY
Akila N,M. Padmaa
121-123 Click Here
3 COMPARATIVE ANALYSIS OF BLOCK MATCHING ALGORITHMS FOR VIDEO COMPRESSION
S.Sowmyayani,P.Arockia Jansi Rani
124-131 Click Here
4 Performance Evaluation Of Co-Located Data Exhaustive Application In Virtualized Envir..
L.Menaka,V.M.Suresh
132-135 Click Here
5 An Innovative Data Gathering Protocol In Heterogeneous Wireless Sensor Networks With ..
A.Dharani,N.Murali
136-139 Click Here
6 Identifying Shortest Path in Duty Cycled Wireless Sensor Networks
K.Surya,M.Jeyaselvi ,P.S.K. Patra
140-145 Click Here
7 A Novel Approach for Protecting Information Accumulation in Occurrence of Collusion ..
B.Sahana,N.Murali
146-149 Click Here
8 A RELIABLE BROADCASTING SCHEME FOR VANET’s
M.SENTHIL,M.NESHA,J.MUTHULAKSHMY, S.MONICA
150-154 Click Here
9 A Hybrid Approach for Improving the Connectivity of Ad Hoc Cognitive Radio Networks
S.Shirly,Dr.R.Ravi,Y.Sheela
155-158 Click Here
10 EFFICIENT PACKET DELIVERY USING CONGESTION ADAPTIVE ROUTING PROTOCOL IN WIRELESS SENS..
M. SENTHIL,S.NIVEDHA,K. SIDDHARTH
159-163 Click Here
11 SURVEY ON E-LEARNING: COMPARISON OF TECHNIQUES AND ALGORITHMS
V. VIJAYALAKSHMI,I. SHAMILI,K. KAARGUZHALI
164-168 Click Here
12 A Novel Geographic Routing Algorithm against Connectivity Holes Wireless Sensor Networks
R.Pon Rohini,Dr.R.Ravi,S.U.Sowmiya
169-171 Click Here
13 PREDICTION OF OUTLIERS USING SDNML CHANGE POINT DETECTION IN SOCIAL STREAMS
V.Ramya,M.Chinnadurai
172-175 Click Here
14 A LLC RESONANT CONVERTER WITH ZERO CROSSING NOISE FILTER
M. Mohamed Razeeth,K. Kasirajan
176-181 Click Here
15 AUTOMATIC FACE DETECTION USING COLOR BASED SEGMENTATION AND MORPHOLOGICAL OPERATION
B.Pavalaraj,K.Azarudeen
182-187 Click Here
16 IDENTIFICATION OF HARMONICS IN INVERTER USING WAVELET TRANSFORM
R. Muthu Raja Lakshmi,A. Edwin Isaac Raj
188-192 Click Here
17 Identifying Users from an Anonymous Social Network
Abinaya.B,Dr.Amitha .T
193-195 Click Here
18 Dekey Using Improved Ramp Secret Sharing Scheme for Secure Deduplication
SRI LAXMI PREETHI.B,DR.T.Amitha
196-200 Click Here
19 HIERARCHICAL ACCUMULATIVE CLUSTERING ALGORITHM FOR HIGH DIMENSIONAL DATA
K.KAARGUZHALI,K.SARGUNAVATHY,C.JAYANAVITHRAA
201-203 Click Here
20 SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK
P.M.Shareefa Jareena ,T.Samraj Lawrence ,V.Perathu Selvi
204-208 Click Here

Institutional Affiliates

Indexing Affiliates

Leave a Comment