All Issues

July 2014 (Volume 9 / Issue 1)/ Issues 1

S.No Paper Title No. Pages Download
1 By Using Effective Mechanism for Detection and Prevention of Routing Attacks in Mobi..
K. Meghana,K. Manohar
1-4 Click Here
2 Secure Data Aggregation in Wireless Sensor Networks
G.R.BhargaviRani,K.Srilakshmi
5-8 Click Here
3 An Approach of Fast Clustering On High Dimensional Data for Efficiency and Effectiveness
P. Naveen Kumar
9-17 Click Here
4 Fair Resource Allocation in Cloud Using Virtual Machines
A.Nandishwar
18-25 Click Here
5 A Range of queries in adaptive forms using document cluster with KNN algorithm
L.Kavitha,H.Lookman Sithic
25-28 Click Here
6 An Improving Performance in Complex Data of Filter Method Using Feature Subset Selec..
N.Divya,V.Vijayadeepa
29-33 Click Here
7 Combined Tracking Technologies Using Data Mining With Markov- Chain Process
R.Priyanga,M.Geetha
34-38 Click Here
8 Customized Web User Search Using Feedback Sessions
C.Gopalakrishnan,V.Vijayadeepa
39-41 Click Here
9 Data Mining Analysis Using Query Formulation In Aggregated Distributed Database
M.Deepika,V.Vijayadeepa
42-46 Click Here
10 Discovery Of Association Rules With Secure Mining In Horizontally Distributed Databases
K.Gogulapriya,V.Vijayadeepa
47-52 Click Here
11 A Distributed Handling Mobility Handover in Collaborative Spatially With Classifies ..
R. Suguna,S. Kumaravel
53-55 Click Here
12 A Image Denoising Selective Wavelet Transform Shrinkage Algorithm Using Threshold Method
A.Neenaa,M.Sumathi
56-60 Click Here
13 Access Control with Authentication privacy and Intrusion Detection to Secure Data in..
A.R.Nithya,C.Renuga
61-63 Click Here
14 Cluster Interfaced Objective Function in clustering-based feature selection algorith..
B.Suganya,M.Pachiyammal
64-66 Click Here
15 Distributed System Invoke the Cloud Computing in Web Services using Caching
A.SADAMHUSSAIN,M.Sumathi
67-68 Click Here
16 Mitigating Vampire Attack in Wireless Ad-Hoc Sensor Networks of Draining Life Using ..
K.Divya Priya,V.Vijayalakshmi
69-72 Click Here
17 Security and Privacy Challenges Mona in Cloud Computing Using Signature Generation
G. Mahalakshmi,S. Kumaravel
73-77 Click Here
18 Personalizing Web Directories with Community Discovery Algorithm
Sriram K.P,Joel Robinson
78-82 Click Here
19 Energy Efficient and Secure, Trusted framework for Wireless Sensor Networks
Sriramula SriPujitha,SubbaRao.k
83-86 Click Here

Institutional Affiliates

Indexing Affiliates

Leave a Comment