Search Paper

S.No Paper Title No. Pages Download
1 Resource Allocation for OFDM Systems Based On Sub-Carrier Pairing
M. Siamala Devy
20-26 Click Here
2 A Stride towards Developing Efficient Approaches for Data Clustering Based on Ev..
P.Senthilkumar , N.Suthanthira Vanitha
27-32 Click Here
3 A Novel Approach in Green Cloud Computing
G. Kavitha , C.Sasikumar
1-6 Click Here
4 An Efficient Relevance Feedback Technique for an Automatic Image Annotation
G. Kavitha , C.Sasikumar
7-8 Click Here
5 Automatic and Robust Multiple Face Detection with Zippy in Real Time
C.Prathap , J.Prema , R.Agasthia
9-14 Click Here
6 Automatic Disabling of Cell phones at Prohibited Areas
K.R.Dhanabalan , R.Karthick , K.Mohanraj
15-17 Click Here
7 Detecting DDoS Attack by Monitoring Outgoing Messages
G.Kavitha , S.Yuvaraj
18-21 Click Here
8 Edge Detection for Retinal Image Using Superimposing Concept and Curvelet Transform
G.Kavitha , C.Sasikumar
22-25 Click Here
9 Hierarchical Oriented Predictions for Resolution Scalable Lossless and Near-Loss..
G. Kavitha , C.Sasikumar
26-29 Click Here
10 Image and Improve Its Resolution Using Digital Image Processing
G. Kavitha , C.Sasikumar
30-32 Click Here
11 Improved Detection of Lung Nodule Overlapping with Ribs by using Virtual Dual En..
G.Maria Dhayana Latha
33-39 Click Here
12 Secure Multicast Key Distribution Systems In Large Dynamic Groups
R.Venkatesan , G.Saravanan , J.Santhosh kumar
40-42 Click Here
13 Secure Spread Spectrum Technique for Data Hiding using Image watermarking
G. Kavitha , C.Sasikumar
43-47 Click Here
14 A Novel Automated Methodology for Spam Detection in Facebook
S. Chidambaranath
1-4 Click Here
15 Reliable Mechanisms for Scheduling Using Ant Colony Optimization
R.Muralidharan , S.Thirunirai Sendhil
5-11 Click Here
16 Secure Multicast Key Distribution Systems In Large Dynamic Groups
R.Venkatesan , G.Saravanan , J.Santhosh kumar
12-14 Click Here
17 Averting Jamming Attacks in WSN by Using New Approach
Mohamed Munawar , Backiyalakshmi
1-6 Click Here
18 Efficient and Secure Signature Protection Scheme with Gray Level Feature Verific..
Pradeep , Bharathi
7-10 Click Here
19 Flexible Pricing Scheme for a Cloud Cache
Dhruvil Gandhi
11-14 Click Here
Lilly pradeepa , Sugasini , R.Prakash
1-6 Click Here