Regular Issue |
S.No. |
Research Topic |
Pages |
1 |
An Adaptive Security Scheme For Wireless
Sensor Networks
G. Kavitha |
256-262 |
2 |
Key-Aggregate Cryptosystem And Parallel
Allocation In Cloud Storage
M.Sathishkumar,R.Sathyamoothi, B.Venkatesh and S.Vigneshkumar
|
263-267 |
3 |
Dual Domain Miner For Feature Based Opinion
Summarization From Product Reviews
R. Abirami and S. Ramesh |
268-273 |
4 |
Edge Detection Using First Order Infinite
Impulse Response Digital Differentiators
B.T.Krishna |
274-277 |
5 |
A Raid-Based Secure Storage Of Personal Health
Records In Cloud Computing Using MA-ABE
P.Sivakumar, K.Devi And V.Deepalakshmi |
278-282 |
6 |
A Survey On Cloud Sustained Big Data
Computing
C. Vijayakumaran and M. Joharan Beevi |
283-290 |
7 |
Advanced Power Reduction Technique For
Dram Using Lossless Compression
Alpha J.S and Anand S |
291-297 |
8 |
An Approach For Optimal Energy Conservation
In WSN Utilizing Spline
Belina Sweety. D and Sivakala.S |
298-302 |
9 |
An Efficient Approach For Sensing And
Transmission In Cognitive Radio With Minimal
Interference
Suveba.S.N and Vicneswari.M |
303-307 |
10 |
An Innovative Path For Appeasing Cruel Rating
And Computerized Reputation
K.Rajalakshmi &Vidhya;,R.Rajeswari and S.Chitra |
308-312 |
11 |
A Scaffolding For Emergency Management
Through Android Based Mobile Devices
J.Vinothini and E.Srie Vidhya Janani |
313-318 |
12 |
Mining Reviews On Drugs For Effective Purpose
P. Suganya |
319-321 |
13 |
Delay Tolerant Networks On Trust Based Dynamic Data For Secure Routing
Suganya.S and M. Anandha Kumar |
322-326 |
14 |
Power Consumption And Improvement Of Qos In
Vehicular Network By M-Prma
P.Shobha and S.Emeraldshia, |
327-336 |
15 |
Preserving Location Privacy Of Mobile Users In
Social Applications
R.Amirtharathna |
337-341 |
16 |
Recommender System With Collaborative
Filtering Approach For Bigdata Application
Bharathi S |
342-348 |
17 |
Secure Communication For Lightweight
Privacy-Preserving To Hybrid Ad Hoc Wireless
Networks
Vidhya.D |
349-353 |
18 |
Aspect Based Sentiment Analysis For Textual
Reviews Using Probabilistic Aspect Ranking
Algorithm
K.Kalpana and S. Bairavel |
354-359 |
19 |
Spectrum Detection In Cognitive Radio Over
Fading Channels Using Locally Optimum
Detection
D.Selvaraj, S.S.Baratwaj, K.J.Guru Shankaran, K.Hariharasudhan
and D.Jagadesh
|
360-366 |
20 |
Study of Opinion Mining From Web Content
R. Abirami and S. Ramesh |
367-373 |
21 |
Vehicle Crashing Avoidance Using Wireless
Sensor Network
M.Naveena and S.Priya |
374-377 |
22 |
Improving Online Security Byusing
Cryptographic Algorithms For Efficient
Storage Of Password
S.B.Saravanan and K.Babu |
378-383 |
23 |
Improving Security By Enhancing Cloud
Assisted Virtualized Android Application
Specific Firewall
Ananthraj K |
384-390 |
24 |
The Next Leading Edge For Modernization,
Challenge And Efficiency – Big Data
Emayavaramban A and ,Pushparaj S |
391-393 |
25 |
DA Comparative Study On Multi-Target
Solar-Flare Dataset
N.Sheelarani
|
394-397 |
26 |
Automatic Product Aspect Identification For
Opinion Mining
N.Kiruthika and, M.Siva Kumar |
398-401 |
27 |
Classification Of Trajectories In Live Traffic
Using Variance Based Approach
S.Muthuselvi1 and R.Bhuvanya
|
402-405 |
28 |
A Survey on Quality of Service In Wireless
Networks
M.Yohapriyaa and A.Lalitha |
406-410 |
29 |
Design And Implementation Of Voip
Mechanism In Distributed Networks
A.Chidambara Bharathi and S.Franson Varun Richo |
411-414 |
30 |
Sovereign Consumption of Sensors For
Maximizing Range And Surefire Connectivity In
Uasn
C.Gabriella Leela Rache,Priyadharshine,
S.Ramya and M.Vinoth Kumar
|
415-419 |
31 |
Detecting Structure-Based Sybil Nodes Using
Sybil Belief
Prabavathi.K and Santhiya.S |
420-426 |
32 |
Region-Based Saliency Detection And Its
Application In Object Recognition
R.Gunasekaran and K.Babu |
427-431 |
33 |
Shape Retrieval Using Angular Pattern and Binary
Angular Pattern
S.Sindhuja, T.M.Padmalatha, N.Renukadevi and R.Premalatha |
432-437 |