Vol. 2 No. 09 (2013)

Published: 2018-01-01

Articles

  • A Study on Semantic Web Mining And Web Crawler

    S.Balan, Dr.P.Ponmuthuramaling,
    180
    274
  • A Data Mining Technique for Prediction of Coronary Heart Disease Using Neuro-Fuzzy Integrated Approach Two Level

    Ashish Kumar Sen1 Shamsher Bahadur Patel Dr. D. P. Shukla
    296
    345
  • Development of Inventory Database System Using Radio Frequency Identification

    N. Ishak, N. A. Ali, A. S. Ja’afar , S. H. Husin N. M. Z. Hashim,
    165
    222
  • Achieving Anonymity and Traceability in Wireless Networks

    R. Manasa, Annapurna, G.Sowmya,
    198
    211
  • Contrast Enhancement Image Fusion With Using Gaussian Filter

    Mandeep Kaur, Navpreet Singh,
    190
    216
  • Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols

    P.V.Naga Lakshmi B.Sasmitha C.Rama Krishna,
    172
    215
  • Faulty Node Detection in Multirate anypath Routing Protocol in Multi-Hop Wireless Networks

    S.B.Manooj kumar, Dr.A.Kathirvel,
    160
    242
  • Towards Automated design of Combinational Circuits Using Evolutionary Techniques

    K.Sagar, Dr.S.Vathsal,
    220
    226
  • Iris Segmentation and Recognization Using Log Gabor Filter and Curvelet Transform

    K.Sathiyaraja, M.Dhineshkumar, N.Thiyagarajan,
    188
    373
  • An Efficient Twisted Edwards-Form Elliptic Curve for Fast Secured Message Passing Interface

    P.Ramyadevi, Dr. P Krishnakumari,
    221
    258
  • Recommendation Diversity using Optimization Techniques and Ranking Method

    S.Manimekalai, V.Kathiresan, P.Sumathi,, S.Manimekalai, V.Kathiresan, P.Sumathi,
    211
    227
  • Load Balancing Parallel Routing Protocol in Mobile Ad Hoc Network

    M.Selladevi, P.Krishnakumari,
    149
    235
  • A DISCRETE CHAOTIC ENCRYPTION ALGORITHM USING LORENZ ATTRACTOR

    1Rahul Ramakrishna, Rajeswari Seshadr,
    200
    266
  • Multi-criteria Recommender systems for Open Authorization

    A.Ravali, G. sudhakar,
    166
    211
  • NETWORK ADVANCEMENT in 4G: TD-LTE Technology

    Anu Rathi, Pulkit Narang, Sachin Kumar Rai, Mohita Aggarwal Meghna Kalra,
    165
    229
  • Risk aware and ALERT protocol for mitigating routing attacks in Mobile Ad hoc Networks

    D. Francis Xavier Christopher, R.Nithya,
    174
    213
  • Network Coding as an Efficient Technique of Transmitting Data

    Khundrakpam Johnson Singh, Usham Sanjota Chanu,
    188
    197
  • OBLIGING EVINCIBLE DATA CHATTELS FOR VERIFICATION IN DISTRIBUTED CLOUD APPLICATION

    B.Nagalakshmi, Mr. Ramakrishna
    182
    184
  • Graphical Password or Graphical User Authentication as Effective Password Provider

    Khundrakpam Johnson Singh, Usham Sanjota Chanu,
    209
    254
  • Paradigm shift for Project Managers in Agile Projects

    Vakalanka Sai Phani Chandu Bharani Manapragada
    192
  • Prevention of Selective Jamming Attacks Using Swarm intelligence Packet-Hiding Methods

    R.karpagam, P.Archana,
    167
    204
  • Security Analysis Using Batch Verification Scheme

    S.Alonshia, K.Ravikumar,
    168
    207
  • Software Product Development—an Approach Using Scrum

    Vakalanka Sai Phani Chandu, Bharani Manapragada
    177
    192
  • Harmonics Compensation of HAPF with Adaptive Fuzzy Dividing Rule

    Mr.Polisetti Sudheer, \ Dr.S.Satyanaraya,
    229
    198
  • ANALYSIS OF VULNERABILITY IN INTERNET FIREWALL USING RULE BASED ALGORITHM

    T.Maheswari, Mr. A. Senthil Kumar
    196
    180
  • A Survey on LSB Based Steganography Methods

    M. Pavani, S. Naganjaneyulu, C. Nagaraju,
    196
    233
  • Efficient Master /Slave Computing Using Threshold Value Specification

    D.Deeba, A.Senthilkumar,
    202
    197
  • Detection of Flash Crowd Attack Based On Router Values Using Alarm Fixation

    P.Sakila, ,A.Senthilkumar,
    170
    198
  • Survey On Vehicle And Toll Plaza For National Highways In India

    Sathya.V , Abdul Samath.J,
    168
  • PREVENTION OF TRESPASSER ACCESSING IN NETWORKS USING TICKET GRANTING SERVICE

    C.Jayalakshmi, Mr. A. Senthil Kumar
    179
    206
  • Leakage Power Reduction by Using Sleep Methods

    Vinay Kumar Madasu, B Kedharnath,
    188
    233
  • Power Efficient, High Performance SRAM array in 90nm CMOS Process

    Ajay Kumar Singh, Mah Meng Seong,
    179
    202
  • Advanced Technique for Removal Of Salt & Pepper Noise In Images

    Abhishek R , Srinivas N,
    320
    202
  • Sensitive Data Storage in Wireless Devices Using AES Algorithm

    Anjali Patil, Rajeshwari Goudar,
    173
    207
  • A Comparative Study of Cloud based ERP systems with Traditional ERP and Analysis of Cloud ERP implementation

    C.M. Navaneethakrishnan
    435
    331
  • User Access Control for Online Social Networks

    Narayana Naidu Pachava, Sd. Akthar P. Babu,
    177
    204
  • Implementation of Saurp for Mobile Network

    Krishna Sowmya Chinta, SD Afzal Ahmed P. Babu ,
    148
    199
  • A Survey of Various Method to improve the throughput of Zigbee Cluster Tree Networ

    Mayuri Singhal , Neeraj Mehta,.
    166
    187