Regular Issue |
S.No. |
Research Topic |
Pages |
1 |
A Novel XML Documents Using Clustering Tree Pattern Algorithms N.Kannaiya Raja,Dr.K.Arulanandam,P.Umadevi,A.Balakrishnan |
1-13 |
2 |
Performance Analysis of Speaker Identification System
Using GMM with VQ M.G.Sumithra,A.K.Devika |
14-19 |
3 |
Dynamic Time Slot Partitioning For a Mobile Multihop Relay
In Cellular Network K.Praveen kumar,J.Geetharamani |
20-24 |
4 |
Video Object Detection using Particle Filters Sharda Mahajan,C.K.Kurve |
25-27 |
5 |
Multiview Unauthorized Human Action Recognition P.Kalaivani,S.P.Audline Beena,J.Rajalakshmi
|
28-32 |
6 |
Robust Video Watermarking based on Discrete Wavelet
Transform S.Nafees Ahmed,B.Sridhar,Dr.C.Arun |
33-37 |
7 |
Optimized Service Level Agreement Negotiation System
for Web Services: Case Study V.Senthil,M.Alamelu,A.M.J.Md Zubair Rahman |
38-41 |
8 |
Deploying Storage Node Aiming to Minimize the
Communication Cost of Sink in Sensor Networks Vijayalakshmi.G, Tamilarasi.D |
42-47 |
9 |
Survey on Scheduling Methods in P2P Desktop Grid T.Avudaiappan, B.S.Balamurugan, L.srinivasan ,C.Pradeep |
48-51 |
10 |
Enhanced voice recognition to reduce fraudulence in ATM
machine Hridya Venugopal, Hema.U, Kalaiselvi.S, Mahalakshmi.M |
52-56 |
11 |
Improving Performance Using Mobile Data Collectors In
Wireless Sensor Networks MS. M.Salomi,Mrs.S.Sivaranjani |
57-61 |
12 |
SVM-BDT Based Intelligent Fingerprint Authentication System using
Geometry Approach Dr.S.Valarmathy,Mr.P.Satheesh Kumar |
62-67 |
13 |
Privacy Preserving of VoIP against Peer-to-Peer
Network Attacks And Defense K. Bharathkumar,R.Premalatha Kanikannan,Dr.Rajeswari Mukesh,M.Kasiselvi and T.Kumanan |
68-73 |
14 |
Enhancement of Hierarchical Key Management Scheme of
Secure Multicast Transmission for Overlay Networks P.G.Kathiravan,C.Rajan,Dr.N.Shanthi |
74-82 |