S.No. |
Title and Authors of Paper |
Page.No. |
1 |
A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs
Vijaya Lekshmi. S.V, E.P.Prakash |
246-250 |
2 |
RFID Technology in Bank Services
Sana Azari, Somayyeh Jafarali Jassbi, Midia Reshadi |
251-255 |
3 |
Click Based Authentication For Accessing Web Accounts
Rohit Urade, Roshan Kumar, Dinesh Gawande, Sejal Jawade, Ashwini Awchat |
256-259 |
4 |
Identification of Phishing Web Pages and Target Detection
Purnima Singh, Manoj D. Patil |
260-263 |
5 |
Combine Study of Transmission Line Fault Detection Techniques
Rucha V. Deshmukh, A.Prof. M. R. Salodkar |
264-267 |
6 |
Investigating Interesting Rules Using Association Mining for Educational Data
Dr.Vijayalakshmi M N,S.Anupama Kumar,Kavyashree BN |
268-271 |
7 |
Load Balancing Algorithms in Cloud Computing Environment – A Methodical Comparison
J. Uma, V. Ramasamy, A. Kaleeswaran |
272-275 |
8 |
An Efficient Mining Model For Enhancing Text Classification Using k-NN
T.SIVAKUMAR,A.KALEESWARAN |
276-284 |
9 |
The New Era of Transmission and Communication Technology : Li-Fi (Light Fidelity)LED & TED Based Approach
Ravi Prakash, Prachi Agarwal |
285-290 |
10 |
Improved Particle Swarm Optimization for Wireless Intelligent Surveillance Path Planning using Wireless Sensor Network
Mr. R.Baskarane, Mr. T. Sendhil kumar, Mr. A.Parthiban |
291-296 |
11 |
A Survey on Greedy Routing Using Clustering Approach in VANET
Karupparaya yuvaraja.S, K.Aravindhan |
297-300 |
12 |
A NOVEL APPROACH FOR DESIGNING A D-FLIP FLOP USING MTCMOS TECHNIQUE FOR REDUCING POWER CONSUMPTION
Megala. C. D,Venkatesan .K |
301-306 |
13 |
A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps
Subhajit Bhattacharyya, Nisarga Chand, Subham Chakraborty |
307-312 |
14 |
Cloud Computing an Era in the World
V. Vijayalakshmi, S. Thamizharasan, P. Mahalakshmi |
313-319 |
15 |
Double-phase Microaggregation for Protecting Bio-medical Data in Mobile Health
S. Saranya, M. Madan mohan, X. Rexeena |
320-323 |
16 |
Risk Assessment for Diabetes Mellitus using Association Rule Mining
X.Rexeena, B.Suganya Devi, S.Saranya |
324-328 |
17 |
Enhancement of a Novel Secure Dependable Data Storage & Privacy in Cloud Network
Prof. B. Anuradha, V. Nithya |
329-333 |
18 |
Detect and Isolate Black hole attack in MANET using AODV Protocol
Jaspinder Kaur,Birinder Singh |
334-338 |
19 |
HYBRID RECOMMENDATION USING ASSOCIATION RULE MINING BY PARTIAL EVALUATION OF WEB PERSONALIZATION FOR RETRIEVAL EFFECTIVENESS
Richa Soni,Gurpreet Kaur |
339-348 |
20 |
Vegetation of Low Cost Remote Sensing Images by Mean Shift Algorithm
S.Chitra, R.Subash, C.Premalatha |
349-353 |
21 |
A Survey: Hadoop, Managing Large Data very efficiently
Yadav Krishna R ,Ms. Purnima Singh |
354-356 |
22 |
A PCQP Technique Of Location Based Service To Improve k-NN Search Using Secret Circular Shift
B.LEKSHMI JAIN,R.S SYAM DEV,M. MADAN MOHAN |
357-363 |
23 |
ROUGH SETS APPLICATION FOR STUDENTS CLASSIFICATION BASED ON PERCEPTUAL DATA
Asheesh Kumar, Naresh Rameshrao Pimplikar, Apurva Mohan Gupta |
364-371 |
24 |
Subspace Clustering using CLIQUE: An Exploratory Study
Jyoti Yadav, Dharmender Kumar |
372-378 |
25 |
A Comparative Analysis on Symmetric Key Encryption Algorithms
G. Muthukumar,Dr. E. George Dharma Prakash Raj |
379-383 |
26 |
Application of Monte Carlo method in Grid Computing and Allied Fields
Manas kumar Yogi, Vijaya kranthi chinthala |
384-388 |
27 |
REVIEW OF IMPERCEPTIBLE TECHNIQUES FOR STILL DIGITAL IMAGE WATERMARKING
Ms. Chandrakala J. Chetri,Dr. Subhaschandra G. Desai |
389-395 |
28 |
Active Contours based SAR Image Segmentation with G0- Statistical- Model
D.SriDevi, J.Marimuthu |
396-398 |
29 |
A Novel Fuzzy Control Approach for the Allocation of Virtualized Resource
R. Nandhiniprabha, G. Sudhakar, M. Madan Mohan |
399-402 |
30 |
SELF COLLIMATION IN PILLAR TYPE PHOTONIC CRYSTAL USING COMSOL
S.Hemalatha , K.Shanthalakshmi |
403-407 |
31 |
HAVS: Hadoop Based Adaptive Video Streaming by the Integration of Cloudlets and Stratus
Keerthika Janani.M ,Sudhakar.G |
408-413 |
32 |
A Review of Phase Correction Methods for Partial Fourier Reconstruction of MRI
Sivadas Neelima, Lakshmi Prabha P |
414-418 |
33 |
GSM Based Alphanumeric Scrolling Display System
Raj Hakani |
419-422 |
34 |
Comparison and performance analysis of routing protocol for mobile adhoc network
Lokeshwer Sinha, Samta Gajbhiye |
423-426 |
35 |
Survey on Packet Hiding Scheme for Network Security by Selective Jamming Attacks
Katkar Kiran B., Dukare Ajay B., Pawar Monali R., Darandale Dnyaneshwar R. |
427-431 |
36 |
K-Means Based Clustering In High Dimensional Data
Sindhupriya. R, Ignatius Selvarani. X |
432-433 |
37 |
Survey on Playlist Generation Techniques
Sneha Antony, Jayarajan J N |
437-439 |
38 |
Real Time News Reporting Using MOBICLOUD
Dahale Jyoti A. , Ahirrao Swapnil S. , Bhagwat Sagar S. , Autade Yogesh S. |
440-443 |
39 |
Novel Approach to Discover Effective Patterns For Text Mining
Rujuta Taware, Prof. Sanchika A. Bajpai |
444-448 |
41 |
AN EFFECTIVE ALGORITHM FOR COMPARISON OF REAL-TIME AND NON-REAL TIME DATA IN TEMPORAL BASED ACTIVITY MODEL
G.Karthika, V.Bhuvaneshwari ,G.Elavarasi |
454-457 |
42 |
Emotion classification of textual document using Emotion – Topic Model
S.Sujitha, S.Selvi, J.Martina Jasmine |
458-462 |
43 |
A RESEARCH: RESOLUTION FOR TYPICAL QUESTIONS IN TEMPORAL EXPRESSION(TERSEO) WITH THE HELP OF FILE.C ,WHAT.OUTPUT
Vijayaraghavan.U, Dr.Kumar.A,Sivakumar.V, Maharajan.K,Vijayalakshmi.S |
463-469 |
44 |
Adaptive DS/CDMA Non-Coherent Receiver using MULTIUSER DETECTION Technique
V.Rakesh, S.Prashanth, V.Revathi, M.Satish, Ch.Gayatri |
470-474 |
45 |
Q-FACTOR IMPROVEMENT IN 32 APSK FOR LONG HAUL OPTICAL COMMUNICATION
Sathiya vathi B , Siva kumar M |
475-478 |
46 |
An Evolution of Testing In Software Engineering
K. Rajasri, T. Godwin Selva Raja |
479-482 |
47 |
Smart Address Book
Saurabhee A. Wandhekar,Amey P. Pagar,Sagar V. Yewatkar, Shivkanya S. Shinde |
483-486 |
48 |
Secure Frequent Itemset Hiding Techniques in Data Mining
Arpit Agrawal,Jitendra Soni |
487-495 |
49 |
Liver And Hepatic Tumors Segmentation in 3-D CT Images
Christo Ananth, D.L.Roshni Bai, K.Renuka, A.Vidhya, C.Savithra |
496-503 |
50 |
Comparative Study of Routing Protocols in MANET
Prerna Yadav,Shubhra Saxena |
504-509 |
51 |
Dynamic Cluster Scoring Job Scheduling algorithm for grid computing
S. Dineshbabu, S. Supriya |
510-514 |
52 |
Attendance Monitoring Using Image Processing
Divya Singh, Monica Kamnani, Ruhi Hadke,Shruti Khonde,Valhavi Patil, Mitali.R. Ingle |
515-518 |
53 |
A Review of Empirical Evaluation of Software Testing Techniques with Subjects
Manika Tyagi, Sona Malhotra |
519-523 |
54 |
Secret Sharing in Multisession Using Peer Head Authority
S.Pavithra, R.Jeyanthi |
524-527 |
55 |
A machine doctor that diagnosing ophthalmology problems using Neural Networks
A.Jenefa, R.Ravi,H.Manimala |
528-533 |
56 |
DESIGN AND PERFORMANCE ANALYSIS OF FAULT SECURE NETWORK-ON-CHIP USING FPGA
C.Ashok Kumar, P.Muneeswari, K.Rajkumar |
534-539 |
57 |
Job Scheduling in Cloud Computing using Ant Colony Optimization
Dr.D.Maruthanayagam,T. Arun Prakasam |
540-547 |
58 |
AUTOMATIC TRACK CREATION AND DELETION FRAMEWORK FOR FACE TRACKING
Renimol T G, Anto Kumar R.P |
548-552 |
59 |
Overview of Sequential Pattern-Mining Algorithms
Prof. Kirti S. Patil. |
553-555 |
60 |
An Improved Fuzzy C-means Algorithm learned wavelet network for segmentation of Dermoscopic image
LishaRajan T L,Jemila Rose R |
556-563 |
61 |
A Comparative Study of Various Filters in Image Denosing with Curvelet Transformation
Sunil Kumar Naik,Abha Choubey |
564-567 |
62 |
PREVENTING DNS BASED BOTNET COMMUNICATION FOR DDOS ATTACK
K.Suganya, Asst.Prof C.Gomathi
|
568-574 |
63 |
DOMAIN KNOWLEDGE IDENTIFICATION AND CLASSIFICATION FOR DISEASE DIAGNOSIS
Jothilakshmi.M, Asst.Prof Anuvelavan.S |
575-581 |
64 |
SCHEDULING TRANSFERABLE OBJECTS FOR QUERY PROCESSING IN WSN
S.Kanimozhi,Asst.Prof P.Karthikeyan |
582-589 |
65 |
Multi Level Malicious Behaviour Detection and Analysis Using Genetic Algorithm for Social Network
Sudhansu Gaur, Ashwani Kumar |
590-597 |