Vol. 2 No. 03 (2013)

Published: 2017-12-29

Articles

  • USING CLOUD COMPUTING TO PROVIDE DATA MINING SERVICES

    Naskar Ankita, Mrs. Mishra, Monika R.,
    151
    209
  • An Unlinkable and Unobservable Secure Routing with Symmetric Approach for MANETS

    Dr.V.Khanaa, Dr.Krishna Mohanta
    200
    221
  • Secure And Authenticated Reversible Data Hiding In Encrypted Images

    Dr.V.Khanaa, Dr.Krishna Mohanta,
    179
    211
  • Increasing no. of nodes for Dijkstra algorithm without degrading the performance

    Nikita Jaiswal , Rajesh Kumar Chakrawart
    195
    221
  • Qi Open Wireless Charging Standard – A Wireless Technology for the Future

    P.Manivannan, S.Bharathiraja,
    204
    403
  • An Efficient Scheme To Improve The Overlapped Transmission In Wireless Adhoc Network Using Carrier Sense Multiple Access

    R .VivekanadhanDr.V.Khanaa , T.Nalini, Dr.V.Khanaa,
    162
    0 198
  • A Soc Trojan Virus Detector And Corrector Using Multiple Monitoring Schemes

    R .Vivekanadhan T.Nalini Dr.V.Khanaa
    157
    183
  • A SURVEY ON 3D INTERNET IN WEB 3.0

    Mrs.G.Sumalatha, Mr.S.Bharathiraja
    402
    285
  • INTER SECURE WEBPORTAL SOLUTION

    K.Anitha, Manjula.R, Sukila.S, Thiyagarajan.k, Vinothkumar.M, Mrs.G.Padmapriya
    150
  • REDUCING ATTACK FREQUENCY IN MANET ROUTING

    Janaranjani.C, , Kavieyanchale.R, Muthusamy.A Nataraj.S, Krishnakumar.R,
    163
    212
  • Persistent And Concurrent Server For Reliable Transacton

    Gokulakannan R, Indhumathi M, Kalpana P, karthick.S,
    159
  • Final Year, Department Of Computer Science And Engineering K.S.R College Of Engineering

    Geetha.K , Dr.Chandra.E,
    152
    218
  • Increase In Cache Performance Use Of Size As Factor In Replacement Algorithm

    Nandnee Jain, Rajesh kumar chakrawarti,
    164
    192
  • Bayesian Classifier Approach For An Effective Outlier Intrusion Detection System In Mobile Adhoc Networks

    CherukuriSai Gowtham, BobbaVeeramallu,
    171
    196
  • Adaptive Web Based Application Development

    Annan Naidu Paidi,
    156
    217
  • Andropay- M-Commerce Application For Procurement Of Products Enabled With Barcode Through Mobiles

    Sindhu.M, , Panneer Selvam.N2, Sabarish.S,
    155
    233
  • STRATEGIC ENVIRONMENTAL ASSESSMENT (SEA) OF MULTIMODAL TRANSPORT ON NH-9 IN HYDERABAD CITY USING REMOTE SENSING AND GIS

    Ishita Roy , Vijaya Lakshmi T, Anji Reddy M,
    168
  • Survey On Argo UML Tool

    Tincy Rani, Manisha Sanyal, Sushil Garg,
    151
    202
  • Implementation and Control of an Hybrid Multilevel Converter

    Swapna.Rikka, M.Divya Charitha, T. Naveen Kumar,
    167
    190
  • Modeling and Simulation of Non-Grid-Connected Wind Energy Conversion System

    K.Shravankumar, D.R.K.Mahesh, K.Ravishanker,
    149
    190
  • Study Of Different Attacks On Network & Transport Layer

    Deepti Rajwal, Deepali Band, Prof. Atul Yadav
    172
    232
  • AN AUTONOMOUS FRAMEWORK FOR CLASSIFIER SELECTION IN WEKA

    Arjun Solanki , Rajesh kumar chakrawarti,
    143
  • Comparative study of reactive routing protocol (AODV, DSR, ABR and TORA) in MANET

    .Mr. L Raja , Capt Dr. S Santhosh Babo,
    233
    244
  • BROADCASTING OF URBAN-STATISTICS VIA VEHICULAR INTELLECT DIA

    Vinothini.R, Sugapriya.M,Sudha.S, Srisakthi.C,
    169
  • Effect Of Global Thresholding On Tumor-Bearing Brain Mri Images

    Tirpude NN, Welekar RR,
    141
    202
  • MULTIPLE KEY GENERATION USING ELLIPTIC CURVE CRYPTOGRAPHY FUSION ALGORITHM FOR BIOMETRIC SOURCE

    Joju John, Mr T. Rajesh
    206
  • Human Body as a Medium for Communication

    P.Lakshmi Narayana, , B.Meena Bharghava, P.Lakshman kumar,
    163
    231
  • VIRTUAL, ALL TOO VIRTUAL THE VIRTUAL TRANSACTION AND THE END OF POSTMODERNISM

    Rawaa Mahmoud Hussain, Rawaa Mahmoud Hussain
    226
    209
  • Information Retrieval From Web Document Using Clustering Techniques

    Mr..Keole.Ranjit R, Dr..Karde.Pravin.P,
    154
    191
  • Reduce The False Positive And False Negative From Real Traffic With Intrusion Detection

    1 Vivek.A, 2 Asst Prof. Anbazhagan.K, Sathish kumar.P,
    213
    209
  • A CHARGE CONTROL MODEL OF SURROUNDING GATE MOSFET

    1 P.SuveethaDhanaselvam 2 Dr.N.B.Balamurugan, N.BasheerAhamed,
    160
    194
  • Predictive Model Of Stroke Disease Using Hybrid Neuro-Genetic Approach

    K.Priya, T.Manju, R.Chitra,
    186
    198
  • IRIS­-GRATITUDE STRATEGIES ACTIVELY INVOLVED IN AN IMPROVEMENT OF REVOLUTIONARY MERCANTILE APPLICATION ACROSS UNRESTRICTED & RESTRICTED SECTOR.

    Ashwini D. waghmare, A.D. Kapse,
    153
  • TRANSFORMATION OF UML ACTIVITY DIAGRAMS INTO PETRI NETS FOR VERIFICATION PURPOSES

    Bhawana Agarwal,
    165
    200
  • ODA : PROCESSING MODEL DESIGN FOR LINKING DOCUMENT

    R. N. Jugele, Dr. V. N. Chavan,
    162
    226
  • WEATHER TEMPERATURE COMPUTATION USING DISCRETE FOURIER TRANSFORMATION TOOLS

    A.A. Mohit, Md. Jashim Uddin, M. Shohidul Islam3
    179
    249
  • Performance Evaluation of Alamouti Space-Time Block Coded Multi-User W-CDMA Wireless Communication System

    M.M. Rahmanm, S.E.Ullah , S.M.A. Rahim, Md. Jashim Uddin,
    159
    184
  • Comparative study between MFCC and LP-Mel based front-ends for noisy speech recognition using HMM

    Md. Jashim Uddin, S.M.A. Rahim, Md. Abdul Al Mohit, M. Shohidul Islam
    163
    186
  • Ensuring Data Storage Security in Cloud Computing

    Rampal Singh Sawan Kumar, Shani Kumar Agrahari
    184
    202
  • SURVEY ON RESOURCES PROVISIONING IN CLOUD SYSTEMS FOR COST BENEFITS

    M.Karthi, S.Nachiyappan,
    135
    0
  • AN IMPROVED TECHNIQUE FOR ENRICHING THE QUALITY OF IMAGE USING ENHANCED NL MEANS APPROACH

    Mr. Anuj Kumar, Mr. Harvinder Singh, Mr. Prateek Bansal
    161
  • RF ID TAGS BASED ENERGY AUTOMATION SYSTEM USING EMBEDDED TECHNOLOGY

    G.Karthikeyan, J.DineshKumar, S.Kannadhasan
    162