Regular Issue |
S.No. |
Research Topic |
Pages |
1 |
Authentication Protocol For Security Based
Captcha as a Countersign on Hard Ai Problems
S.Banupriya, G.Sowmiya, C.Komala and J.Gobinath |
118-123 |
2 |
Authentication Protocols That For Net Banking Security
Priyadharsini.S and Belina.N |
124-129 |
3 |
Digital Campus Information System Based on
Soa Using Aspect Oriented Software Development
S. Anjana Sri and Roycee Priyadarsini
| 130-133 |
4 |
Indian Regularity Complaint Service (IRCS) Using Cloud Computing
V. P. Kirubanidhi, V. M. Dinesh and J. Gobinath |
134-139 |
5 |
Mining Gene Expression of Data Using Ant Colony
Optimization Algorithm
G.Arutperumjothi, M.Keerthivasan and P.Prabhakar |
140-156 |
6 |
Identifying Fake User’s In Social Networks Using Non Verbal Behavior
M.Balaanand, R.Sowmipriya, S.Sivaranjani and S.Sankari |
157-161 |
7 |
Simultaneous Video Stream Recording With Audio in Android
Nivetha G R |
162-165 |
8 |
Survey of Data Mining Techniques Used For Intrusion Detection
B.Senthilnayaki, M.Chandralekha and Dr.K.Venkatalakshmi |
166-171 |
9 |
Tasks Scheduling in a Customized Approach
Using Genetic Algorithm
R.Sukanyam and Rathna Devi |
172-175 |
10 |
Enhanced Detection of Learners Learning
Styles For E-Learning
L.Jegatha Deborah and P.Vijayakumar |
176-180 |
11 |
Routers In On Chip Network Using Roshaq For Effective Transmission
Sivasankari.S and Selvaganesan.M |
181-187 |