Sl. No. | Paper Title | Authors | Download Paper |
1 | DIFFUSION-PROFICIENT CLUSTERING METHOD USING COMPRESSIVE SENSING IN WIRELESS SENSOR NETWORKS | Sakey Siva Kumar, M.Harathi, S.G.Nawaz | Download Paper |
2 | ANALYSIS OF BIG DATA TRENDS AND FUTURE DIRECTIONS: A REVIEW | Dr. S. Manimekalai, A Santhi | Download Paper |
3 | INVESTIGATING PRIVACY PRESERVATION ISSUES IN DATA MINING | Dr. S. Manimekalai, M Ranjani | Download Paper |
4 | AUTHENTICATION PROTOCOL FOR SECURITY BASED ON CAPTCHA AS COUNTERSIGN ON HARD AI PROBLEMS | Saranya. S, Infantina A, Jabez J | Download Paper |
5 | A NOVEL ALGORITHM FOR DYNAMIC RESOURCE PROVISIONING POLICIES IN N-TIER WEB APPLICATIONS | P. Anandajayam, K. Swedha | Download Paper |
6 | A SPECTRAL CLUSTERING APPROACH TO IDENTIFYING CUTS IN WIRELESS SENSOR NETWORKS | Vidhya Ramu, Neha Mariam Joseph | Download Paper |
7 | DESIGN AND ANALYSIS OF EFFICIENT RECONFIGURABLE FIR FILTER USING CONSTANT MULTIPLIER ARCHITECTURE | Anni Benitta.M, Felcy Jeba Malar.M | Download Paper |
8 | EFFECTIVE DATA SKEW MITIGATION | S.Thilagavathi, G.Vidhya, R.Sowmya | Download Paper |
9 | TRACING HACKER IP AND LOCATION IN SECURED NETWORK USING IP TRACE ALGORITHM | Mary anni jegila.A, shanuba.S, D. kaavya | Download Paper |
10 | AN EFFICIENT DISTRIBUTED TRUST MODEL FOR SECURE TRANSMISSION IN WIRELESS SENSOR NETWORK | S.Shashank, R. Precila | Download Paper |
11 | ENHANCED DYNAMIC DISTORTION-RESISTANT & LEAKAGE DETECTION WITH COLLUSIVE PIRACY PREVENTION SCHEME IN MULTIHOP WIRELESS NETWORKS USING ANOMALY SOFTWARE AGENT SYSTEM | S.Nirenjena, S. Prasanna Kumar | Download Paper |
12 | ENHANCED NEARNESS AND TRUST BASED ELASTIC DATA SHARING ON PEER-TO-PEER FILE SHARING SYSTEM | K.Deepapriya, J. Nulyn Punitha | Download Paper |
13 | ALCOHOL ADDICTION CONTROL SYSTEM USING AADHAAR CARD | M.Chandru, S.Vijayalakshmi | Download Paper |
14 | AN ADAPTIVE FEATURE BASED STEREO MATCHING | R.Lavanya, S.Nirenjena | Download Paper |
15 | TOP-K KEYWORD QUERIES MENDED FOR NOVEL MAPPING ON XML DATA | K.Pushparaj, J.Nulyn Punitha | Download Paper |
16 | MOBILE APP’S SECURITY MEASURE USING CFC | S.P.Neeraja, P.Kanimozhi | Download Paper |
17 | INTENSIFIED FINGERPRINTS USING BLOWFISH TECHNIQUE IN DISTRIBUTED SYSTEMS | M.Elakkiya, P.Manju Bala | Download Paper |
18 | ENHANCED LEAKAGE RESILIENCY BASED SECURE DATA TRANSMISSION USING KEY ALLOCATION SCHEME SHUFFLING ALGORITHM | M.O.Ramkumar, G.Padhmavathi | Download Paper |
19 | SIMILARITY SEARCH USING MRDTW (MAP REDUCE DYNAMIC TIME WARPING) IN HADOOP | S.Naveen, M. Pajany | Download Paper |
20 | ENHANCED SECURE MD5 AND CRYPTOGRAPHIC PUZZLE HIDING SCHEME TO DEFEND DENIAL-OF SERVICE ATTACKS | V.Abirami, P.Manju Bala | Download Paper |
21 | SPATIAL – RSASSOL: IMPROVISED STRING SEARCH ON LOCATION ORIENTED SERVICES IN GRID SYSTEM | S.Preethika, P.Kanimozhi | Download Paper |
22 | FORWARD SECURE SMART GRID WITH ID BASED RING SIGNATURE | Swathika B S, Rajesh R | Download Paper |
23 | AUTOMATIC PACKET GENERATION FOR DYNAMIC TESTING | Selvi M, Sivaranjini B, Sharmasth Vali Y | Download Paper |
24 | A SECURE ANTI RESISTANT APPROVAL DATA SHARING SCHEME FOR ACTIVE GROUPS IN THE CLOUD | Vijayalakshmi M, Sathyapriya M, Anitha B | Download Paper |
25 | ENERGY EFFICIENT CONTROL FOR RESOURCES IN CLOUD COMPUTING | Divya Sreenivasan, K.S. Afrose Fathima, S. Devi | Download Paper |
26 | PROGRESSIVE IMAGE DENOISING USING DETERMINISTIC ANNEALING AND ROBUST NOISE ESTIMATION | Raj kumar R, Muruga prasanth K, Kalaivani M | Download Paper |
27 | PRECISION-BOUNDED ACCESS CONTROL USING SLIDING-WINDOW QUERY VIEWS FOR PRIVACY-PRESERVING DATA STREAMS | A.Ganesan, A.Sumitha, A.Savithiri | Download Paper |
28 | EFFECTIVE CLASSIFICATION OF TEXT AND IMPROVING LEARNING EXPERIENCE | K.Surya, K. Kavitha, G.Joy princy | Download Paper |
29 | POWER QUALITY IMPROVEMENT USING DSTATCOM AND UPFC BY BACK-PROPAGATION CONTROL ALGORITHM | Shaik Ashik, C. Viswanath | Download Paper |
30 | CaRP – FOR AUTOMATIC ONLINE GUESSING ATTACKS | N.Shobana, V.Sowmiya, R.Kanimozhi | Download Paper |
31 | HIGH SECURITY SMART METERS AS PART OF SENSOR NETWORK FOR MONITORING THE LOW VOLTAGE GRID WITH DIFFERENT POWER PROFILE | R.ARUNKUMAR, K.VIGNESH | Download Paper |
32 | FAULT TOLERANCE SYSTEM FOR HVDC AGAINST COMMUTATION FAILURE | S.DIVYA, M. SANKARALAKSHMI | Download Paper |
33 | ARTIFICIAL NEURAL NETWORK BASED EFFICIENT POWER TRANSFERS BETWEEN HYBRID AC/DC MICRO-GRID | S.DURAI PANDI, T.MANJUNATH | Download Paper |
34 | HARMONIC CURRENT INJECTION BASED ISLAND DETECTION USING LIFTED WAVELETS SCHEME BASED ESTIMATION | D.GOKULNATH, N.KARTHICK | Download Paper |
35 | MODIFIED SWITCHING ARCHITECTURE FOR PV PANELS UNDER SHADING CONDITIONS | E.GOMATHI, V.GEETHA | Download Paper |
36 | NEURO-FUZZY OPTIMIZED REAL POWER COORDINATION IN MICRO GRID USING FIREFLY ALGORITHM | R.KAVITHA, V. S. CHANDRIKA | Download Paper |
37 | EXPERIMENTAL INVESTIGATION ON RC BEAM USING SELF-COMPACTING CONCRETE WITH COPPER SLAG | S.MAIVIZHI, S.SARANYA | Download Paper |
38 | ELECTRIC SPRINGS FOR REDUCING POWER IMBALANCE AND HYSTEREIS IN THREE PHASE POWER SYSTEMS | J.C.NIVETHA, T.MANJUNATH | Download Paper |
39 | NOVEL OPTIMIZATION OF DYNAMIC VOLTAGE RESTORER TO MITIGATE SAG AND SWELL USING ADAPATIVE FUZZY LOGIC CONTROL | P.PRAVEEN, K.GOPINATH | Download Paper |
40 | LOAD MODELING AND IDENTIFICATION BASED ON ANT COLONY ALGORITHMS FOR EV CHARGING STATIONS | S.SANDHYA, R.KALPANA | Download Paper |
41 | RETROFITTING OF RC BEAM USING SIMCON LAMINATE | V.SANTHOSH KUMAR, P.ARIYANNAN | Download Paper |
42 | STRENGTHENING OF RC SQUARE COLUMN USING STEEL ANGLES | M.SARASWATHI, S.SARANYA | Download Paper |
43 | DC BUS PROTECTION SYSTEM USING NEW ECT BASED ON GATE LOGICS | T.SEVANTHI, V.GEETHA | Download Paper |
44 | A MODULAR MULTIPORT SST WITH INTERGRATED SPLIT BATTERY ENERGY STORAGE WITH TWO WAY DC POWER FLOW IN SIMO DC-DC CONVERTER | G.SUGANYA, K.VIGNESH | Download Paper |
45 | FUZZY BASED ELECTRIC VEHICLE CHARGING WITH REDUCED POWER FLUCTUATIONS UNDER GRID POWER CONSUMPTION CONSTRAINT | K.TAMILARASAN, T.MANJUNATH | Download Paper |
46 | ENHANCING LOAD DISPATCH PERFORMANCE THROUGH TRANSIENT STABLITY BASED UCP THROUGH ROTOR ANGLE | R.THILAGAVATHI, V.GEETHA | Download Paper |
47 | ACTIVE AND REACTIVE POWER CONTROL FOR A ZERO GRID IMPACT UNDER TRANSMISSION LINE FAULT | N.THIRUMAL, L. P.VETTRIVELAN | Download Paper |
48 | ONLINE PAYMENT OF TOLLS AND TRACKING OFTHEFT VEHICLE USING RFID | A.Aruna, S. Amudhavalli, P. Brinda, A. Ganesan | Download Paper |
49 | EFFECTIVE DATA SEARCH FOR ENCRYPTED RELATIONAL DATA IN CLOUD USING K-NEAREST NEIGHBOR ALGORITHM | Abirami Swetha.L, Gokila.R, Vijaya Ragavan.P | Download Paper |
50 | FINE-GRAINED MULTI-KEYWORD SEARCH OVER ENCRYPTED CLOUD DATA | N. Azarudheen, S.D. Bharanidharan, S. Kavimugilan, Subhashini | Download Paper |
51 | PRIVACY OF ONLINE SOCIAL NETWORKS USING SOCIAL PROXIMITY | Mohammed Bilal M, Prabhakaran H.K, Murugesan M | Download Paper |
52 | AGGRESSIVE CONVENTION FOR SOURCE REGENERATION OF SCIENTIFIC DATASETS IN THE CLOUD | R.Ramesh Kannan, V.Kiruthika, G.Sangeetha | Download Paper |
53 | MPPT CONTROLLER FOR A SMALL PV CONVERSION SYSTEM BY USING FOIC METHOD | K.Ramyasree , E.Nagabhushana, C. Viswanath | Download Paper |
54 | EFFECTIVE CONTENT DELIVERY AND CACHING AMONG MOBILE USERS THROUGH MULTIMEDIA CLOUD | Gutti Vamshi | Download Paper |
55 | A REVIEW ON ENERGY EFFICIENCY IN WIRELESS SENSOR NETWORKS THROUGH MAC LAYERS | K.Rajeswari1, Dr.N.Rajendran | Download Paper |
56 | A COMPREHENSIVE STUDY ON CLUSTERING TECHNIQUES IN DATA MINING | Aravindhan, Dr.D.Maruthanayagam | Download Paper |
57 | CLOUDINAR HALLS | P. Victer Paul, P. Dhavachelvan | Download Paper |