Australian Journal of Basic and Applied Sciences
         [ Home ] [ Instructions ] [ Contact us ]
   


SPECIAL 1 ISSUE 2016

-------------------------------------------------------------------------------------------------------------------------

Study of K-Anonymization level with Respect to Information Loss

K.AbrarAhmed, H.Abdul Rauf and A. Rajesh

1-8

-------------------------------------------------------------------------------------------------------------------------

Feature Selection Technique Based on Neuro-Fuzzy-Rough Set for
Cancer Classification using Gene Expression Data

S.Gilbert Nancy and S. Appavu Alias Balamurugan

9-17

-------------------------------------------------------------------------------------------------------------------------

Trust Based Ciphertext Policy Attribute Based Encryption Techniques for
Decentralized Disruption Tolerant Networks

Elumalaivasan P., Kulothungan K., Ganapathy Sannasi and Kannan Arputharaj

18-26

-------------------------------------------------------------------------------------------------------------------------

A Comprehensive Survey on Gesture Based Authentication Schemes in Smart Phones

S. Milton Ganesh, P. Vijayakumar and L. Jegatha Deborah

27-36

-------------------------------------------------------------------------------------------------------------------------

A Review on Attacks and Security Approaches in Mobile Agent Technology

Adri Jovin J.J. and Marikkannan M.

37-43

-------------------------------------------------------------------------------------------------------------------------

A Mathematical Modelling for Quality Based Ultrasound Breast
Cancer Image Using Colour Properties

V. Mary Kiruba Rani, S.S. Dhenakran and A. Heber David

44-51

-------------------------------------------------------------------------------------------------------------------------

Content-based Federated Job Scheduling algorithm in Cloud Computing

Dinesh Komarasamy and Vijayalakshmi Muthuswamy

52-59

-------------------------------------------------------------------------------------------------------------------------

Scene Change Detection Approaches Over UT Interaction Dataset

Mithun Chakaravarrti, Mithul Mathivanan, G.S. Mahalakshmi, J. Betina Antony and S. Sendhilkumar

60-66

-------------------------------------------------------------------------------------------------------------------------

Classification on Survival Rate of Ebola Patients using Bigdata

Jemimah C., Lilly Sheeba S., Beulah Jayakumari R and Vijayakumar A.


67-74

-------------------------------------------------------------------------------------------------------------------------

Detecting Phishing Urls Using Particle Swarm Optimization

Pradeepthi K.V. and Kannan A.

75-79

-------------------------------------------------------------------------------------------------------------------------

Detection of DDoS Attack Using Traceback Technique

M. Vimal Chander, Jayashree Padmanabhan, A. Ayyasamy and B. Persis Urbana Ivy

80-84

-------------------------------------------------------------------------------------------------------------------------

Computerized Object Recognition System using Undecimated Wavelet Transform
and Nearest Neighbour Classifier

P. Elakkiya, S. Audithan, K. Raja and G. Kannan

85-88

-------------------------------------------------------------------------------------------------------------------------

Facial Expression Recognition System Using Local Texture Features of
Contourlet Transformation

R. Suresh, S. Audithan, G. Kannan and K. Raja

89-92

-------------------------------------------------------------------------------------------------------------------------

Frequency Domain Approaches for Breast Cancer Diagnosis

B. Kiran Bala, Dr.S. Audithan, G. Kannan and K. Raja

93-96

-------------------------------------------------------------------------------------------------------------------------

Entrusting Legitimate-Nodes With Routing Load in Mobile Ad Hoc Networks

Anitha Veerasamy and Srinivasa Rao Madane

97-102

-------------------------------------------------------------------------------------------------------------------------

Offline Tamil Handwritten Character Recognition using Statistical based Quad Tree

M. Antony Robert Raj and S. Abirami

103-109

-------------------------------------------------------------------------------------------------------------------------

A Mobile Cloud Application for Bus Tracking System

Vijayalakshmi Muthuswamy, S.Sandhya, S. Preethi and M.C.Ponni

110-113

-------------------------------------------------------------------------------------------------------------------------

Secure and Scattered Data Sighting and Dissemination in Wireless Sensor Networks

G. Murugadass, P. Sivakumar and R. Manikandan

114-124

-------------------------------------------------------------------------------------------------------------------------

An Intelligent Phrase Extraction Approach from Social Networks for User Classification

Anand Kannan, Anitha Kathirvel, Siddharth Madan, Pradeep Peirisand Weherage,
Henrik Sjöström and Jason Murphy


125-132

-------------------------------------------------------------------------------------------------------------------------

Pattern Recognition in Digital Images using Multiclass SVM and Back
Propagation Neural Network - A Comparative Study

P. Pandi Selvi and T. Meyyappan

133-140

-------------------------------------------------------------------------------------------------------------------------

Disease Information Extraction from Healthcare Records using CTA Matrix

L. Sathish Kumar and A. Padmapriya

141-149

-------------------------------------------------------------------------------------------------------------------------

i-TEE – An Image Encryption Algorithm based on Multilevel Encryption
using a Randomly Generated Bitmap Image

Kanagaraj Narayanasamy and Padmapriya Arumugam

150-155

-------------------------------------------------------------------------------------------------------------------------

Resource Provisioning Algorithmsin Mobile Cloud Computing- Survey

Shanthi Thangam M, Vijayalakshmi M, Manju Precillah M

156-161

-------------------------------------------------------------------------------------------------------------------------

A Novel Approach for Entropy based Invisible Watermarking Algorithm
for Digital Images using DWT

M.Veni and T.Meyyappan

162-170

-------------------------------------------------------------------------------------------------------------------------

CEKD: Computationally Efficient Key Distribution Scheme for Vehicular Ad-Hoc Networks

M. Azees and P.Vijayakumar

171-175

-------------------------------------------------------------------------------------------------------------------------

Person Identification using Gait Signatures in a Smart Classroom

Gengashree P, Hima Bindhu S, Abirami S, Sivarathinabala M

176-180

-------------------------------------------------------------------------------------------------------------------------

Ambience monitoring system for Hatchery Units

A.S.Anakath, R. Kannadasan, N. Prabakaran, A. Krishnamoorthy, K.Naresh, G. Sivashanmugam

181-185

-------------------------------------------------------------------------------------------------------------------------

Rfid Based Automatic Parking System

R.Kannadasan, A.Krishnamoorthy, N.Prabakaran, K.Naresh, V.Vijayarajan, G.Sivashanmugam

186-191

-------------------------------------------------------------------------------------------------------------------------

Cross Domain Sentiment Classification By Extracting Best Opinion Features

P. Sanju and T.T.Mirnalinee

192-198

-------------------------------------------------------------------------------------------------------------------------

System of Systems for Observation and Response in Quality-of-Service for Cloud Computing Environments

R.Manikandan, L.Jegatha Deborah, N.Arul P.Ashok Kumar, A.Renga Rajan

199-211

-------------------------------------------------------------------------------------------------------------------------

Priority based hybrid distance vector routing protocol in Manet

V.Sameswari and E.Ramaraj

212-223

-------------------------------------------------------------------------------------------------------------------------

Progressive Path Analysis using Optimized Discrete and Continuous
Average Semantic Filters

Balaji A, S. Sendhilkumar, G.S. Mahalakshmi

224-233

-------------------------------------------------------------------------------------------------------------------------

Domain Based Named Entity Recognition using Naive Bayes Classification

G.S. Mahalakshmi, Betina Antony J, Akshaya Kumar, Bagawathi Roshini S

234-239

-------------------------------------------------------------------------------------------------------------------------

Representing Modified Co-Authorship Networks using Power Graphs


240-249

-------------------------------------------------------------------------------------------------------------------------

Tree Based Space Partition of Trajectory Pattern Mining For Frequent Item Sets

P.Geetha and E. Ramaraj

250-261

-------------------------------------------------------------------------------------------------------------------------

Software Performance Testing Using Dynamic Load Generation In Cloud Environment

K.Mohanram and T.T. Mirnalinee

262-266

-------------------------------------------------------------------------------------------------------------------------

Predicting Energy Consumption And Analysis Of Energy Demand,
Economic Growth Of India

K. Latha and S.Mohan

267-272

-------------------------------------------------------------------------------------------------------------------------

Ranking of Vehicular webpages based on its features in Social Bookmarking

G. David Raj, R.L. Jasmine, G.V. Uma

273-276

-------------------------------------------------------------------------------------------------------------------------

A Novel Method for Music Retrieval using Chord Progression

R.L. Jasmine, G. David RAJ, G.V. Uma

277-282

-------------------------------------------------------------------------------------------------------------------------

Energy Aware Deforestation Monitoring System

K.Latha and S.Sathish Kumar

283-289

-------------------------------------------------------------------------------------------------------------------------

Efficient and Enhanced Visual Cryptographic Schemes in Biometric Applications

Anandhi and M.S.Josephine

290-296

-------------------------------------------------------------------------------------------------------------------------

An efficient Image Encryption Method based on Improved Cipher Block
Chaining in Cloud Computing as a Security Service

J. Mahalakshmi and K.Kuppusamy

297-306

-------------------------------------------------------------------------------------------------------------------------

An Energy-efficient Tree-based approach for Optimal Virtual Machine Placement in
Cloud Environment

R.Kanniga Devi and G.Murugaboopathi

307-314

-------------------------------------------------------------------------------------------------------------------------

Trusted Multi-Owner Data Sharing among Dynamic Users in Public Cloud

L.SaiRamesh, S. Sabena, K.Thangaramya and K.Kulothungan


315-319

-------------------------------------------------------------------------------------------------------------------------

Assessing Citation Relevance and Polarity through a Combination of
Semantic and Syntactic Information

Sangeetha Chamundeswari and G.S. Mahalakshmi

320-327

-------------------------------------------------------------------------------------------------------------------------

   
   
   
    ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------