Regular Issue |
S.No. |
Research Topic |
Pages |
1 |
An Efficient Algorithm for Disease Diagnosis using Hybrid Fuzzy-Rough set model
C.Ashwini,S.A.Ramesh Kumar and V.K.Rathina Bharathy |
1-10 |
2 |
ATM at a Touch : Secure And User Friendly Pin
Entry
Shobana.S, Belina.N and Rajamohan.L |
11-15 |
3 |
Qos Based Web Service Recommendation And
Impeding Malicious Users
R.Anitha ,K.Anusha, R.Saradha and S.Chitra
| 16-20 |
4 |
Denoising Underwater Acoustic Signal By
Empirical Mode Decomposition And Discrete
Wavelet Transform
Srinivasaprabu.M and Arivazhagan |
. |
5 |
Detection of Defects In Dental With
Support Vector Machine (Svm) Using Image
Processing
M.Prakash and S.Sathiyapriya |
21-25 |
6 |
A Centralized Approach For
Augmentation of Energy Consumption In
Residential Broadband Gateways
B.C.Praveena Kumary,Chettiyar Vani and Vivekanand |
26-32 |
7 |
Adaptive Acknowledgement For Manet Using
Eaack Alogrithm To Improve Packet Density
Ratio
S.Kannadhasan and G.Srividhya |
33-38 |
8 |
Environmental High Performance of
Data-Centers In Green Cloud Computing
V.Nagalakshmi and K.Arunmozhiarasan |
39-42 |
9 |
Performance Analysis of ZRP And GPSR Routing
Protocols In Manet
S.Kodimalar,S.R.Nevetha And S.Suganya |
43-48 |
10 |
A Probabilistic Misbehavior Detection Scheme on
Trust Establishment In Manets
C.Vijayakumaran and T.Lakshmana Kumar |
49-53 |
11 |
Trust And Reputation Management Based
Cluster Head Selection In Mobile Ad-Hoc
Networks
Suja Rajeswari .K and Arivazhagi .A |
54-58 |
12 |
Data Anonymization With Specialized Ring
Signature Technique For Preserving Privacy In
Big Data
Deepalakshmi V, Mayuranathan M and T.Lakshmanakumar |
59-63 |
13 |
Malware Detection In Kernel Centric Virtual
Machine Using Hybrid Kernel Memory Mapping
Technique
B.Satishkumar , M.Prabhakar, D.Chandru and M.Vinoth Kumar |
64-68 |
14 |
An Enhanced Bait Approach To Defend Against
Collaborative Attacks In Manets
R.Somasundaram, Dr.P.Sivakumar and K.Sumithra |
69-75 |
15 |
Enhanced Mining Of High Dimensional Data Using
Clustering Based Feature Subset Selection
Algorithm
K.Babu and P.Charles |
76-80 |
16 |
Spatial – Temporal Modeling on Propagation
of Malware on E-Mail
M.Subramaniyan, R.Thamizhazhagan , A.Vignesh and R.Vijayabharathi |
81-85 |
17 |
Energy-Efficient Routing For Power Utilization In Manet Using Residual Energy
G.Balamurugan, M.Shanmugasundaram and V.Lokesh |
86-88 |
18 |
Enhanced Web Service Ranking Approach Based on Non-Functional Qos Criterion With User Preference
M.Suchithra and Dr.M.Ramakrishnan
|
89-97 |
19 |
Adaptive Decision Tree Based Los And Nlos
Classification
Adlin Shiny |
98-107 |
20 |
Adaptive Neuro Fuzzy Based Data Fusion For Cooperative Spectrum Sensing Technique In Cognitive Radio
T. Allen Nissi |
108-117 |