Sl. No. | Paper Title | Authors | Download Paper |
1 | ENHANCED PRIVACY PRESERVING MODEL FOR TRUSTED BASED DATABASE SYSTEMS | R. Mohana Priya, G. Indhumathi, K. Bhuvaneshwari | Download Paper |
2 | ENHANCED GEOGRAPHIC BASED ROUTING PROTOCOLS FOR UNDERWATER SENSOR NETWORKS | P. Deepika, K. Sumalatha | Download Paper |
3 | PREVENTION OF EAVESDROPPER ATTACKS USING DECORRELATION PATTERNS IN WIRELESS SENSOR NETWORKS | E. Sivaranjani, R. Angelin Preethi | Download Paper |
4 | DEVELOPING AN EFFICIENT KEYWORD SEARCH MODEL FOR CIPHERED CLOUD DATA | K. Mahalakshmi, A. Lavanya | Download Paper |
5 | LOCATION FORECASTING FROM CHECK-IN DATA OF LOCATION BASED SOCIAL NETWORKS | R. Karthiga, R. Angelin Preethi | Download Paper |
6 | PRIVACY PRESERVED MEDICAL DATA SHARING MODELS FOR CLOUD SYSTEMS | K. Abirami, S. Yogalakshmi | Download Paper |
7 | MINIMIZATION OF INFLUENTIAL NODE TRACKING IN DYNAMIC SOCIAL NETWORKS | K. Nishanthi, S. Yogalakshmi | Download Paper |
8 | Operating bandwidth enhancement of fractal defected ground structure Microstrip antenna | M.Poovarasi, K.Sivadhani, S.Vinothini, J.Venkatachalapathi | Download Paper |
9 | IDENTITY BASED ENCRYPTION SCHEME IN CROWDSENSING BASED ROAD MONITORING | Nivedha.A, Prashika .M, Preethi.R, Indra . G | Download Paper |
10 | WLS Filter Based Color Transfer in Fabric Images | N.D. Ramesh, Dr.T.Thirurumurugan, R.Rajasekar | Download Paper |
11 | Implementation of Continuous and Transparent User Identity Verification for Secure Internet Services | Pruthvi M P, Tharunya B, Vinutha J S, Varsha Varadarajan, Prathibha B S | Download Paper |
12 | Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks | T. Sree Lakshmi, Sunku Umamahaheswari | Download Paper |
13 | An Efficient Top-K Query Processing in MANETS on Malicious Node Identification | A.Mahendra, K..R. Harinath, M.Shalima Sulthana | Download Paper |
14 | AUGMENTED COMPETITOR MINING WITH C-MINER ALGORITHM BASED ON PRODUCT REVIEWS | Gokkul V.S, Angel Pemala G | Download Paper |
15 | ENHANCED DATA ARCHIVAL AND RETRIEVAL SYSTEM USING REED SOLOMON CODING | G.Brajith kumar, V.Karthi | Download Paper |
16 | STATISTICS EXTRACTION IN MALICIOUS SITUATIONS | Kerenaph .A, M.Rajanandhini, K.Chandhraprabha | Download Paper |
17 | AUGMENTING THE THROUGHPUT OPTIMALITY PERFORMANCE OF DYNAMIC BACK PRESSURE ALGORITHM | T.Thamaraiselvi, P.Revathi, K.Chandhraprabha | Download Paper |
18 | Human Brain Tumor Classification Using Genetic Algorithm Approach | E. S Benelin John, Ravikumar | Download Paper |
19 | CYBERBULLYING DETECTION BASED ON SEMANTIC-ENHANCED MARGINALIZED STACKED DENOISING AUTO-ENCODER | Sparsha R, Sushma M Balgi, Amulya Anand, Sushma K B, B B Neelkantappa | Download Paper |
20 | Modified Efficient Geographic Multicasting Protocol in MANET | B.J.Praveena, P.Saiteja, G.Karthik, K.Sreekar | Download Paper |
21 | Reranked Keyword Search Access Control in Secured Cloud | Hemanth G, Kiran M B, Mohan Kumar H L, Rakesh M, Seema Kousar R | Download Paper |