1 |
TECHO-ECONOMIC SIMULATION AND OPTIMIZATION OF 4.5KW WIND/SOLAR MICRO-GENERATION SYSTE..
Kannan Jegathala Krishnan,Velumani Rajan,Balasubramani Mohan, Akhtar Kalam, Aladin Zayegh
|
1-19 |
|
2 |
A STIMULUS STRUCTURE FOR CELLULAR TRAFFIC OFFLOADING
Malaneelam Bhaskar,Shaik Sarfaraz Ahamed ,D.Anithamma
|
20-24 |
|
3 |
AUTOMATIC DETECTION OF SQUATS IN RAILWAY INFRASTRUCTURE
Nayudu Sreenivasulu,Jenna Hanumanth
|
25-28 |
|
4 |
ENCRYPTION-BASED ACCESS CONTROL WITH EFFICIENT REVOCATION
V.Jayaramulu Naik,M.Eranna
|
29-32 |
|
5 |
LOCKING AND UNLOCKING OF THEFT VEHICLES USING CAN
Chakali Ramu,Y.Raghuram Prasad
|
33-36 |
|
6 |
IMPROVING PERFORMANCE OF QUERIES ON STRING USING STRING GENERATION
V.Geetha,M.Srujan Kumar Reddy
|
37-39 |
|
7 |
RECOMMENDATION ON EFFICIENT DATA EXTRACTION AND ALIGNMENT USING PAIRWISE ALIGNMENT
Shilpa Pote,Dr. D.R. Ingle
|
40-44 |
|
8 |
EFFICIENT KEYWORD SEARCH AND ROBUST IDENTIFICATION OF DATA USING SQL IN DATABASES
R.Gayathri ,C.Senthilraja,K.Sumathi
|
48-52 |
|
9 |
DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS
Mrs.D.Anantha Nayaki,Mrs.K.K.Kavitha,Mrs.D.Banupriya
|
53-59 |
|
10 |
DISTRIBUTED PROCESSING OF PROBABILISTIC TOP-K QUERIES IN TWO-TIER AND TREE STRUCTURED..
Mrs.D.Anantha Nayaki,Mrs.K.K.Kavitha,Mrs.A.Menaka
|
60-65 |
|
11 |
TRANSMISSION-EFFICIENT CLUSTERING METHOD FOR WIRELESS SENSOR NETWORKS USING COMPRESSI..
S.Amsavalli,C.Senthilraja,S.Mythili
|
66-69 |
|
12 |
IMPLEMENTING A NEW SECURITY PARADIGM USING CAPTCHA AND GRAPHICAL PASSWORD SCHEMA
M.N.Bhaskar,V.Madhuri,H.Tejeswini
|
70-73 |
|
13 |
REMOTE FILE STORAGE SYSTEM
P. Reshma
|
74-76 |
|
14 |
DISCOVERING EMERGING TOPICS IN SOCIAL STREAMS VIA LINK-ANOMALY DETECTION
K.Annakkili,C.Senthil raja
|
77-80 |
|
15 |
CONTINUOUS FREQUENT DATASET FOR MINING HIGH UTILITY TRANSACTIONAL DATABASE
S.Mahalakshmi,C.Senthil raja
|
81-83 |
|
16 |
MULTI-DIMENSIONAL SUMMARIZATION OF EVALUATIVE PRODUCT RANKING
Mrs.C.Selvi,Mrs.D.M.Chithra
|
84-89 |
|
17 |
SCALABLE EFFECTIVE APPLICATIONS FOR DATAMINING
Mrs. N.Chandra,Mrs.Dr. M.Manimekalai
|
90-95 |
|
18 |
AN OVERLAY-BASED DATA MINING ARCHITECTURE TOLERANT TO PHYSICAL NETWORK DISRUPTIONS
S.Sumathi,C.Senthilraja
|
96-100 |
|
19 |
KNOWLEDGE FUSION FOR PROBABILISTIC GENERATIVE CLASSIFIERS WITH DATA MINING APPLICATIONS
Ms.E.Poongodi,C.Senthil raja
|
101-105 |
|
20 |
TRUSTED DB: A TRUSTED HARDWARE BASED DATABASE WITH PRIVACY AND DATA CONFIDENTIALITY
K.Sangeetha,C.Senthilraja
|
106-110 |
|