|
|
SPECIAL 1 ISSUE 2016
-------------------------------------------------------------------------------------------------------------------------
Study of K-Anonymization level with Respect to Information Loss
K.AbrarAhmed, H.Abdul Rauf and A. Rajesh
1-8
-------------------------------------------------------------------------------------------------------------------------
Feature Selection Technique Based on Neuro-Fuzzy-Rough Set for
Cancer Classification using Gene Expression Data
S.Gilbert Nancy and S. Appavu Alias Balamurugan
9-17
-------------------------------------------------------------------------------------------------------------------------
Trust Based Ciphertext Policy Attribute Based Encryption Techniques for
Decentralized Disruption Tolerant Networks
Elumalaivasan P., Kulothungan K., Ganapathy Sannasi and Kannan Arputharaj
18-26
-------------------------------------------------------------------------------------------------------------------------
A Comprehensive Survey on Gesture Based Authentication Schemes in
Smart Phones
S. Milton Ganesh, P. Vijayakumar and L. Jegatha Deborah
27-36
-------------------------------------------------------------------------------------------------------------------------
A Review on Attacks and Security Approaches in Mobile Agent
Technology
Adri Jovin J.J. and Marikkannan M.
37-43
-------------------------------------------------------------------------------------------------------------------------
A Mathematical Modelling for Quality Based Ultrasound Breast
Cancer Image Using Colour Properties
V. Mary Kiruba Rani, S.S. Dhenakran and A. Heber David
44-51
-------------------------------------------------------------------------------------------------------------------------
Content-based Federated Job Scheduling algorithm in Cloud Computing
Dinesh Komarasamy and Vijayalakshmi Muthuswamy
52-59
-------------------------------------------------------------------------------------------------------------------------
Scene Change Detection Approaches Over UT Interaction Dataset
Mithun Chakaravarrti, Mithul Mathivanan, G.S. Mahalakshmi, J. Betina Antony and S. Sendhilkumar
60-66
-------------------------------------------------------------------------------------------------------------------------
Classification on Survival Rate of Ebola Patients using Bigdata
Jemimah C., Lilly Sheeba S., Beulah Jayakumari R and Vijayakumar A.
67-74
-------------------------------------------------------------------------------------------------------------------------
Detecting Phishing Urls Using Particle Swarm Optimization
Pradeepthi K.V. and Kannan A.
75-79
-------------------------------------------------------------------------------------------------------------------------
Detection of DDoS Attack Using Traceback Technique
M. Vimal Chander, Jayashree Padmanabhan, A. Ayyasamy and B. Persis Urbana Ivy
80-84
-------------------------------------------------------------------------------------------------------------------------
Computerized Object Recognition System using Undecimated Wavelet Transform
and Nearest Neighbour Classifier
P. Elakkiya, S. Audithan, K. Raja and G. Kannan
85-88
-------------------------------------------------------------------------------------------------------------------------
Facial Expression Recognition System Using Local Texture Features of
Contourlet Transformation
R. Suresh, S. Audithan, G. Kannan and K. Raja
89-92
-------------------------------------------------------------------------------------------------------------------------
Frequency Domain Approaches for Breast Cancer Diagnosis
B. Kiran Bala, Dr.S. Audithan, G. Kannan and K. Raja
93-96
-------------------------------------------------------------------------------------------------------------------------
Entrusting Legitimate-Nodes With Routing Load in Mobile Ad Hoc Networks
Anitha Veerasamy and Srinivasa Rao Madane
97-102
-------------------------------------------------------------------------------------------------------------------------
Offline Tamil Handwritten Character Recognition using Statistical based
Quad Tree
M. Antony Robert Raj and S. Abirami
103-109
-------------------------------------------------------------------------------------------------------------------------
A Mobile Cloud Application for Bus Tracking System
Vijayalakshmi Muthuswamy, S.Sandhya, S. Preethi and M.C.Ponni
110-113
-------------------------------------------------------------------------------------------------------------------------
Secure and Scattered Data Sighting and Dissemination in Wireless Sensor Networks
G. Murugadass, P. Sivakumar and R. Manikandan
114-124
-------------------------------------------------------------------------------------------------------------------------
An Intelligent Phrase Extraction Approach from Social Networks for User Classification
Anand Kannan, Anitha Kathirvel, Siddharth Madan, Pradeep Peirisand Weherage,
Henrik Sjöström and Jason Murphy
125-132
-------------------------------------------------------------------------------------------------------------------------
Pattern Recognition in Digital Images using Multiclass SVM and Back
Propagation Neural Network - A Comparative Study
P. Pandi Selvi and T. Meyyappan
133-140
-------------------------------------------------------------------------------------------------------------------------
Disease Information Extraction from Healthcare Records using CTA
Matrix
L. Sathish Kumar and A. Padmapriya
141-149
-------------------------------------------------------------------------------------------------------------------------
i-TEE – An Image Encryption Algorithm based on Multilevel Encryption
using a Randomly Generated Bitmap Image
Kanagaraj Narayanasamy and Padmapriya Arumugam
150-155
-------------------------------------------------------------------------------------------------------------------------
Resource Provisioning Algorithmsin Mobile Cloud Computing- Survey
Shanthi Thangam M, Vijayalakshmi M, Manju Precillah M
156-161
-------------------------------------------------------------------------------------------------------------------------
A Novel Approach for Entropy based Invisible Watermarking Algorithm
for Digital Images using DWT
M.Veni and T.Meyyappan
162-170
-------------------------------------------------------------------------------------------------------------------------
CEKD: Computationally Efficient Key Distribution Scheme for Vehicular Ad-Hoc Networks
M. Azees and P.Vijayakumar
171-175
-------------------------------------------------------------------------------------------------------------------------
Person Identification using Gait Signatures in a Smart Classroom
Gengashree P, Hima Bindhu S, Abirami S, Sivarathinabala M
176-180
-------------------------------------------------------------------------------------------------------------------------
Ambience monitoring system for Hatchery Units
A.S.Anakath, R. Kannadasan, N. Prabakaran, A. Krishnamoorthy, K.Naresh, G. Sivashanmugam
181-185
-------------------------------------------------------------------------------------------------------------------------
Rfid Based Automatic Parking System
R.Kannadasan, A.Krishnamoorthy, N.Prabakaran, K.Naresh, V.Vijayarajan, G.Sivashanmugam
186-191
-------------------------------------------------------------------------------------------------------------------------
Cross Domain Sentiment Classification By Extracting Best Opinion
Features
P. Sanju and T.T.Mirnalinee
192-198
-------------------------------------------------------------------------------------------------------------------------
System of Systems for Observation and Response in Quality-of-Service for Cloud Computing Environments
R.Manikandan, L.Jegatha Deborah, N.Arul P.Ashok Kumar, A.Renga Rajan
199-211
-------------------------------------------------------------------------------------------------------------------------
Priority based hybrid distance vector routing protocol in Manet
V.Sameswari and E.Ramaraj
212-223
-------------------------------------------------------------------------------------------------------------------------
Progressive Path Analysis using Optimized Discrete and Continuous
Average Semantic Filters
Balaji A, S. Sendhilkumar, G.S. Mahalakshmi
224-233
-------------------------------------------------------------------------------------------------------------------------
Domain Based Named Entity Recognition using Naive Bayes Classification
G.S. Mahalakshmi, Betina Antony J, Akshaya Kumar, Bagawathi Roshini S
234-239
-------------------------------------------------------------------------------------------------------------------------
Representing Modified Co-Authorship Networks using Power Graphs
240-249
-------------------------------------------------------------------------------------------------------------------------
Tree Based Space Partition of Trajectory Pattern Mining For Frequent
Item Sets
P.Geetha and E. Ramaraj
250-261
-------------------------------------------------------------------------------------------------------------------------
Software Performance Testing Using Dynamic Load Generation In Cloud
Environment
K.Mohanram and T.T. Mirnalinee
262-266
-------------------------------------------------------------------------------------------------------------------------
Predicting Energy Consumption And Analysis Of Energy Demand,
Economic Growth Of India
K. Latha and S.Mohan
267-272
-------------------------------------------------------------------------------------------------------------------------
Ranking of Vehicular webpages based on its features in Social
Bookmarking
G. David Raj, R.L. Jasmine, G.V. Uma
273-276
-------------------------------------------------------------------------------------------------------------------------
A Novel Method for Music Retrieval using Chord Progression
R.L. Jasmine, G. David RAJ, G.V. Uma
277-282
-------------------------------------------------------------------------------------------------------------------------
Energy Aware Deforestation Monitoring System
K.Latha and S.Sathish Kumar
283-289
-------------------------------------------------------------------------------------------------------------------------
Efficient and Enhanced Visual Cryptographic Schemes in Biometric Applications
Anandhi and M.S.Josephine
290-296
-------------------------------------------------------------------------------------------------------------------------
An efficient Image Encryption Method based on Improved Cipher Block
Chaining in Cloud Computing as a Security Service
J. Mahalakshmi and K.Kuppusamy
297-306
-------------------------------------------------------------------------------------------------------------------------
An Energy-efficient Tree-based approach for Optimal Virtual Machine Placement in
Cloud Environment
R.Kanniga Devi and G.Murugaboopathi
307-314
-------------------------------------------------------------------------------------------------------------------------
Trusted Multi-Owner Data Sharing among Dynamic Users in Public Cloud
L.SaiRamesh, S. Sabena, K.Thangaramya and K.Kulothungan
315-319
-------------------------------------------------------------------------------------------------------------------------
Assessing Citation Relevance and Polarity through a Combination of
Semantic and Syntactic Information
Sangeetha Chamundeswari and G.S. Mahalakshmi
320-327
-------------------------------------------------------------------------------------------------------------------------
|
|
|