1 |
A Novel Approach in Green Cloud Computing
G. Kavitha,C.Sasikumar
|
1-6 |
|
2 |
An Efficient Relevance Feedback Technique for an Automatic Image Annotation
G. Kavitha,C.Sasikumar
|
7-8 |
|
3 |
Automatic and Robust Multiple Face Detection with Zippy in Real Time
C.Prathap, J.Prema,R.Agasthia
|
9-14 |
|
4 |
Automatic Disabling of Cell phones at Prohibited Areas
K.R.Dhanabalan,R.Karthick,K.Mohanraj
|
15-17 |
|
5 |
Detecting DDoS Attack by Monitoring Outgoing Messages
G.Kavitha,S.Yuvaraj
|
18-21 |
|
6 |
Edge Detection for Retinal Image Using Superimposing Concept and Curvelet Transform
G.Kavitha,C.Sasikumar
|
22-25 |
|
7 |
Hierarchical Oriented Predictions for Resolution Scalable Lossless and Near-Lossless ..
G. Kavitha,C.Sasikumar
|
26-29 |
|
8 |
Image and Improve Its Resolution Using Digital Image Processing
G. Kavitha,C.Sasikumar
|
30-32 |
|
9 |
Improved Detection of Lung Nodule Overlapping with Ribs by using Virtual Dual Energy ..
G.Maria Dhayana Latha
|
33-39 |
|
10 |
Secure Multicast Key Distribution Systems In Large Dynamic Groups
R.Venkatesan,G.Saravanan,J.Santhosh kumar
|
40-42 |
|
11 |
Secure Spread Spectrum Technique for Data Hiding using Image watermarking
G. Kavitha,C.Sasikumar
|
43-47 |
|
12 |
Data Mining Approaches to Analyze Road Traffic Accident Data
Dr. T. Anuradha
|
48-50 |
|