All Issues

April 2016 (Volume 21/Issue 2)/ Issues 1

S.No Paper Title No. Pages Download
1 NOVEL APPROACH OF FINDING ADVERSE DRUG REACTION IN HOSPITALIZED PATIENTS
Mr.B.Sadham Husain,Mr.S.Manikandan,Mr.N.Vishnukumar, Mr.M.Muthuraja
1-6 Click Here
2 DATA ABNORMAL DETECTION METHOD BASED ON COMPONENT ANALYSIS IN BANKING DATASETS
Mr.V.Gokul,Mr.V.Elavarasan,Mr.A.Bala Krishnan, Mr.M.Muthuraja,
7-11 Click Here
3 EFFICIENT IMPROVEMENT AND HIGH PERFORMANCE APPROACH FOR MASQUERADE DETECTION ATTACKS
R.Kanimozhi,V.Sandhiya,V.Ramya
12-16 Click Here
4 RECOMBINED FINGERPRINTS FOR PRIVACY PRESERVING IN P2P MULTIMEDIA DISTRIBUTION
Sangeetha R,Nethra S,Ms.S.Divya
17-25 Click Here
5 FULLY ANNONYMOUS ATTRIBUTE BASED ENCRYPTION FOR PRIVILEGE AND ANONYMITY ACCESS CONTRO..
Divya.L,Hema.S ,Kayalvizhi.C
26-30 Click Here
6 RETINAL IDENTIFICATION BASED PERSONAL IDENTIFICATION SYSTEM USING SIFT ALGORITHM
Nakkiran A,Kannan K,Narendran A, Ameer A and Balaji S
31-33 Click Here
7 DISTRIBUTED BROADCAST PROTOCOL IN COGNITIVE RADIO ADHOC NETWORKS
K Abimathi,L Driti,Mr.MMurugesan, Dr. SSivaSubramanian
34-39 Click Here
8 SMARTCRAWLER: NOVEL TWO STAGE APPROACH TO DISCOVER HIDDEN WEB PATTERNS
Tulasi Gayatri Devi,K. S. Aparna
40-43 Click Here
9 SECURE NET BANKING USING GRAPHICAL PASSWORD
S.Karpagam,M.Pavithra,V.Priyanka , K.Ranjitha , Dr.K.Saravanan
44-46 Click Here
10 A NOVEL CERTIFICATE AUTHENTICATION & VERIFICATION SCHEME FOR RISKAWARE IN MANET
N.Dhineshkumar,K.Manibharathi,R.Ganesh, M.Mayamoorthi
47-53 Click Here
11 ADVANCED VEHICLE THEFT SECURITY SYSTEM USING CAN TECHNOLOGY
Kamal Batcha M,Mohaideen Basha A, Asik Ahamed A, Nandakumar P and Balaji S
54-57 Click Here
12 SECLUSION SAFEGUARDING AND DATA SHIELDING LOCATION BASED QUERIES
P Panindra Kumar,C.Madhuri Yashoda
58-61 Click Here
13 OBJECT DETECTION AND PATH TRACKING USING QUADRAPOD ROBOT IN UNKNOWN ENVIRONMENT
V.S.Mahadevan,J.Dhivya,T.Monisha, J.Geetha,R.Divya
62-67 Click Here
14 A SECURE DELEGATION OF DATA ENCRYPTION USING K-MULTILINEAR DECISIONAL DIFFIE-HELLMAN ..
B.Ambika,G.Sangeetha
68-72 Click Here
15 A PRIVACY-PRESERVING ACCESS CONTROL WITH ROBUST DATA AUTHENTICITY FOR CLOUD GROUP
Gothandeshwaran T,Shanmugapriya.K
73-78 Click Here
16 AN DISTRIBUTED REPROGRAMMING PROTOCOL IN WIRELESS SENSOR NETWORKS
M.Dhanalakshmi,G.Gayathri
79-81 Click Here
17 AN RULE BASED MINING DATABASE WITH SIMILARITYON LARGE PROBABILISTIC GRAPH MATCHING
B.Kiruthiga,K.Senthilvel
82-84 Click Here
18 ANOMALY BEHAVIOR ANALYSIS FOR ELIMINATE ATTACK USING IDS IN WIRELESS NETWORKS
Poongodi.P,P.Thilagavathi
85-88 Click Here
19 CLEAN SLATE ROUTING BASED ATTACKS AVOIDANCE FOR IMPROVED LIFETIME IN WIRELESS SENSOR ..
Priya .M,Mrs.M.Kalaiselvi
89-94 Click Here
20 EFFECTIVE BLACK BOX BASED SELF ADAPTIVE CLOUD CONTROLLERS
R.Raja Monsingh,P.Manjula
99-103 Click Here

Institutional Affiliates

Indexing Affiliates

Leave a Comment