Published: 2018-01-01

A Study on Semantic Web Mining And Web Crawler

S.Balan, Dr.P.Ponmuthuramaling,

Abstract 23  | PDF

A Data Mining Technique for Prediction of Coronary Heart Disease Using Neuro-Fuzzy Integrated Approach Two Level

Ashish Kumar Sen1 Shamsher Bahadur Patel Dr. D. P. Shukla

Abstract 107  | PDF

Development of Inventory Database System Using Radio Frequency Identification

N. Ishak, N. A. Ali, A. S. Ja’afar , S. H. Husin N. M. Z. Hashim,

Abstract 18  | PDF

Achieving Anonymity and Traceability in Wireless Networks

R. Manasa, Annapurna, G.Sowmya,

Abstract 21  | PDF

Contrast Enhancement Image Fusion With Using Gaussian Filter

Mandeep Kaur, Navpreet Singh,

Abstract 24  | PDF

Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols

P.V.Naga Lakshmi B.Sasmitha C.Rama Krishna,

Abstract 20  | PDF

Faulty Node Detection in Multirate anypath Routing Protocol in Multi-Hop Wireless Networks

S.B.Manooj kumar, Dr.A.Kathirvel,

Abstract 22  | PDF

Towards Automated design of Combinational Circuits Using Evolutionary Techniques

K.Sagar, Dr.S.Vathsal,

Abstract 29  | PDF

Iris Segmentation and Recognization Using Log Gabor Filter and Curvelet Transform

K.Sathiyaraja, M.Dhineshkumar, N.Thiyagarajan,

Abstract 41  | PDF

An Efficient Twisted Edwards-Form Elliptic Curve for Fast Secured Message Passing Interface

P.Ramyadevi, Dr. P Krishnakumari,

Abstract 34  | PDF

Recommendation Diversity using Optimization Techniques and Ranking Method

S.Manimekalai, V.Kathiresan, P.Sumathi,, S.Manimekalai, V.Kathiresan, P.Sumathi,

Abstract 27  | PDF

Load Balancing Parallel Routing Protocol in Mobile Ad Hoc Network

M.Selladevi, P.Krishnakumari,

Abstract 20  | PDF

A DISCRETE CHAOTIC ENCRYPTION ALGORITHM USING LORENZ ATTRACTOR

1Rahul Ramakrishna, Rajeswari Seshadr,

Abstract 22  | PDF

Multi-criteria Recommender systems for Open Authorization

A.Ravali, G. sudhakar,

Abstract 15  | PDF

NETWORK ADVANCEMENT in 4G: TD-LTE Technology

Anu Rathi, Pulkit Narang, Sachin Kumar Rai, Mohita Aggarwal Meghna Kalra,

Abstract 16  | PDF

Risk aware and ALERT protocol for mitigating routing attacks in Mobile Ad hoc Networks

D. Francis Xavier Christopher, R.Nithya,

Abstract 15  | PDF

Network Coding as an Efficient Technique of Transmitting Data

Khundrakpam Johnson Singh, Usham Sanjota Chanu,

Abstract 15  | PDF

OBLIGING EVINCIBLE DATA CHATTELS FOR VERIFICATION IN DISTRIBUTED CLOUD APPLICATION

B.Nagalakshmi, Mr. Ramakrishna

Abstract 18  | PDF

Graphical Password or Graphical User Authentication as Effective Password Provider

Khundrakpam Johnson Singh, Usham Sanjota Chanu,

Abstract 26  | PDF

Paradigm shift for Project Managers in Agile Projects

Vakalanka Sai Phani Chandu Bharani Manapragada

Abstract 25  | PDF

Prevention of Selective Jamming Attacks Using Swarm intelligence Packet-Hiding Methods

R.karpagam, P.Archana,

Abstract 18  | PDF

Security Analysis Using Batch Verification Scheme

S.Alonshia, K.Ravikumar,

Abstract 18  | PDF

Software Product Development—an Approach Using Scrum

Vakalanka Sai Phani Chandu, Bharani Manapragada

Abstract 24  | PDF

Harmonics Compensation of HAPF with Adaptive Fuzzy Dividing Rule

Mr.Polisetti Sudheer, \ Dr.S.Satyanaraya,

Abstract 21  | PDF

ANALYSIS OF VULNERABILITY IN INTERNET FIREWALL USING RULE BASED ALGORITHM

T.Maheswari, Mr. A. Senthil Kumar

Abstract 18  | PDF

A Survey on LSB Based Steganography Methods

M. Pavani, S. Naganjaneyulu, C. Nagaraju,

Abstract 21  | PDF

Efficient Master /Slave Computing Using Threshold Value Specification

D.Deeba, A.Senthilkumar,

Abstract 26  | PDF

Detection of Flash Crowd Attack Based On Router Values Using Alarm Fixation

P.Sakila, ,A.Senthilkumar,

Abstract 25  | PDF

Survey On Vehicle And Toll Plaza For National Highways In India

Sathya.V , Abdul Samath.J,

Abstract 22  | PDF

PREVENTION OF TRESPASSER ACCESSING IN NETWORKS USING TICKET GRANTING SERVICE

C.Jayalakshmi, Mr. A. Senthil Kumar

Abstract 19  | PDF

Leakage Power Reduction by Using Sleep Methods

Vinay Kumar Madasu, B Kedharnath,

Abstract 28  | PDF

Power Efficient, High Performance SRAM array in 90nm CMOS Process

Ajay Kumar Singh, Mah Meng Seong,

Abstract 23  | PDF

Advanced Technique for Removal Of Salt & Pepper Noise In Images

Abhishek R , Srinivas N,

Abstract 151  | PDF

Sensitive Data Storage in Wireless Devices Using AES Algorithm

Anjali Patil, Rajeshwari Goudar,

Abstract 23  | PDF

A Comparative Study of Cloud based ERP systems with Traditional ERP and Analysis of Cloud ERP implementation

C.M. Navaneethakrishnan

Abstract 113  | PDF

User Access Control for Online Social Networks

Narayana Naidu Pachava, Sd. Akthar P. Babu,

Abstract 16  | PDF

Implementation of Saurp for Mobile Network

Krishna Sowmya Chinta, SD Afzal Ahmed P. Babu ,

Abstract 17  | PDF

A Survey of Various Method to improve the throughput of Zigbee Cluster Tree Networ

Mayuri Singhal , Neeraj Mehta,.

Abstract 16  | PDF