All Issues

April 2016 (Volume 21/Issue 3) Special Issue/ Issues 1

S.No Paper Title No. Pages Download
1 CONTROL AND MONITORING OF WIRELESS LOAD USING IVRS BY DTMF
Mrs.P.Jegadeeshwari,Miss.S.Seema
209-212 Click Here
2 IMPLEMENTATION OF SENSOR INTERFACE FOR CHEMICAL INDUSTRY USING IoT
Mr. P . Prabakaran,C . Lavanya
213-216 Click Here
3 IMPLEMENTATION AND EVALUATION OF E-LEARNING WITH IMPROVED TEXT SEARCH
Vinothini ,Harshini
217-219 Click Here
4 LOCATION BASED WEB SERVICE RECOMMENDATION AND OPTIMIZED WEB SERVICES
P.Priyanka,Arokiaraj Christian St.Hubert,P.Syed Ali Asha Banu, A.Suganya
220-222 Click Here
5 AVOIDANCE OF INDOOR JAMMERS USING INSTANCE BELATED DIFFUSION
C.Saravanan,Mrs.S.Dhanalakshmi
223-228 Click Here
6 IMPLEMENTATION OF PLC BASED FOOD PACKAGING MACHINE
Miss.B.Nantheni Devi,Mrs.D.Kanimozhi
229-232 Click Here
7 DATA SECURITY IN THE CLOUD ENVIRONMENT FOR THE EFFICIENT SHARING OF DATA
D.Priyadarshini,U.Sakthi
240-241 Click Here
8 QUALITY OF EXPERIENCE (QoE) Vs QUALITY OF SERVICE (QoS) FOR SERVICE SELECTION
A.Reeta Mary,R.Babu,D.Vennila, S.Selvi
242-245 Click Here
9 ENHANCED DYNAMIC SECURE GROUP SHARING FRAMEWORK IN PUBLIC CLOUD WITH INTEGRITY AUDITING
R.Sivasankari
246-253 Click Here
10 DESIGNING A PROTOCOL CONVERTER TO CONVERT LEGACY TO IP IN ATC SYSTEM
Monica. I,Asa TN,Jesila Rathnaprin, Yazhini. D
254-257 Click Here
11 AN INTELLIGENT BOUNDARY ALERT SYSTEM (IBAS)
Monica. I,Flora Nelson,Tincymol
258-260 Click Here
12 DETECTION AND PREVENTION OF THE MALICIOUS PACKET DROPPING USING BLOW FISH ALGORITHM ..
P.N.KARTHICK,R.BAMALAKSHMI
261-270 Click Here
13 VAMPIRE POWER REDUCTION USING MICROCONTROLLER
G.CHARANYA DEVI,G.SUGANYA,S.SAVITHA,N.KANCHANA
276-278 Click Here
14 A SURVEY ON COLLABORATIVE OBJECT TRACKING AND VIDEO FORMATION APPROACH
X. Welington roy,R. Saravanan
279-284 Click Here
15 DETECTION AND EXTRACTION OF MICROANEURYSM AND CHRONIC DISEASE IN RETINA
S.Aruloli,R.Hemalatha
285-288 Click Here
16 Monitoring Signal-Quality and Identify the Myocardial Infarction in the Electrocardiogram
R. Divya Priyadharshini,K. Vijayalakshimi
289-293 Click Here
17 CAPTCHA AS GRAPHICAL PASSWORD-A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS
Mrs.E.ChandraLekha,P.Deepalakshmi,J.Pavithra
294-298 Click Here
18 A Clustering Mechanism of Secure Data Gathering Using AES Algorithm In WSN with Energ..
Nirmala Devi.E.A,Balaji.k
299-306 Click Here
19 A COUNTER-MEASURE OF SERVICE ATTACK THROUGH SOFTWARE PUZZLE
Dr.R.D.Samuel,S.Karthika,S.Sandhiya
307-312 Click Here
20 Multiserver Deployment with Migration of Virtual Resources for Effective Resource All..
C.K.Shruthi,Dr.C.Viswanathan
313-317 Click Here

Institutional Affiliates

Indexing Affiliates

Leave a Comment