Regular Issue |
S.No. |
Research Topic |
Pages |
1 |
Transformer Less H6-Bridge Cascaded STATCOM With Star
Configuration For Real And Reactive Power Compensation
A.Elakkiya and E.Shyamaladevi |
1-5 |
2 |
International Data Encryption Algorithm (Idea) For
Data Security In Cloud
S. Artheeswari and Dr.RM. Chandrasekaran
|
6-11 |
3 |
A Technical Overview Of Various Homomorphic
Encryption Techniques For A Secure Cloud Data Storage
System
S.Kalaivany and Dr.T.Nalini |
12-16 |
4 |
Mechanical And Corrosion Properties of A
Reinforcing Steel For Self Compacting Concrete (SCC)
R.Dharmaraj and Dr.R.Malathy |
17-25 |
5 |
Impact of Insulated Electrodes In ECM – A Review
J. Prasanna and Vijay Pranav. S |
26-28 |
6 |
Comparative Study on The Effect Of Different Insulation
Materials on The Performance Characteristics of ECM
J. Prasanna and Vijay Pranav. S |
29-34 |
7 |
A Study on The Impact of Magnetic Field on EDM Process
Dr. J. Prasanna and Irfan Husain |
35-38 |
8 |
Analysis Using Response Surface Methodology (RSM) Based
Experimental Design on Magnetic Field Assisted EDM Process
Dr. J. Prasanna and Irfan Husain |
39-43 |
9 |
Enhancing Personalized Web Search Using Greedy
Algorithm
A.Smilien Rophie and Dr. A. Anitha |
44-49 |
10 |
Analysis of Aging Detection on The Effectiveness of RO
Based Sensor Using VLSI
G.Prathiba and K.Vasantha |
50-56 |
11 |
An Efficient and Integrated Preprocessing Approach
For The Diagnosis of Diabetic Retinopathy in Colour
Fundus Images
V. Anu, M. Caroline Viola Stella Mary and J. Monica Esther |
57-64 |
12 |
Sentiment Analysis For Two Sides of Review Using Dual
Prediction
V.S.Swarnalekha and V.M.Suresh |
65-69 |
13 |
Detection of Human Embryonic Stem Cells Using A Biodriven
Method
John Princy. J and Dr. R. Ravi |
70-74 |
14 |
Detecting Sinkhole Attack In MANET Using Adhoc On
Demand Distance Vector
R.Rachel and Dr.R.Ravi |
75-83 |
15 |
Detection of Vulnerability For Authentication In
Networks
G.Ramya and S. Agnes Joshy |
84-89 |
16 |
Anonymization Technique For Privacy Protection Sharing of
Sensitive Data Stream
G.Nivedha and M.Chinnadurai |
90-94 |
17 |
Secure Internet Services For Continuous And Obvious
User Identity Authentication
M.K.Tamilazhagi and V.M.Suresh |
95-100 |
18 |
Realtime Analysis of Social Network Twitter For Rating And Blocking User Comments Using NLP
Jayamoorthy, S.Divya, M.Shanmathy and R.Nalini Karpagam |
101-114 |
19 |
Performance Analysis of Underlay Secondary Networks Using Binary Scheduling Algorithm
P.Caroline Priyanka Evelyne and V.Babu |
115-121 |
20 |
Manufacturing of Bricks In The Past, In The
Present And In The Future: A State of The Art Review
V.Anandabaskaran |
122-137 |
21 |
Swarm Intelligence For Detecting Interesting
Events In Crowded Environments
R.Sudhandira and Dr.Smitha Elsa Peter |
138-142 |
22 |
Automatic Estimations of Oil Seep Locations
Using Synthetic Aperture Radar Images(SAR)
P.Keerthana and A.Rijiuvana Begum |
143-148 |
23 |
FPGA Implementation of BIST Transmitter Using
Adaptive Self Mixing Envelope Detector
V.Niveatha Saro and V.Jayanthi |
149-157 |
24 |
The Scenario of Software Industries In India
C.SenthilMurugan and Dr. S. Prakasam |
158-163 |