Sl. No. | Paper Title | Authors | Download Paper |
1 | NOVEL APPROACH OF FINDING ADVERSE DRUG REACTION IN HOSPITALIZED PATIENTS | B.Sadham Husain, S.Manikandan, N.Vishnukumar, M.Muthuraja | Download Paper |
2 | DATA ABNORMAL DETECTION METHOD BASED ON COMPONENT ANALYSIS IN BANKING DATASETS | V.Gokul, V.Elavarasan, A.Bala Krishnan, M.Muthuraja | Download Paper |
3 | EFFICIENT IMPROVEMENT AND HIGH PERFORMANCE APPROACH FOR MASQUERADE DETECTION ATTACKS | R.Kanimozhi, V.Sandhiya, V.Ramya | Download Paper |
4 | RECOMBINED FINGERPRINTS FOR PRIVACY PRESERVING IN P2P MULTIMEDIA DISTRIBUTION | Sangeetha R, Nethra S, S.Divya | Download Paper |
5 | FULLY ANNONYMOUS ATTRIBUTE BASED ENCRYPTION FOR PRIVILEGE AND ANONYMITY ACCESS CONTROL IN CLOUD | Divya.L, Hema.S, Kayalvizhi.C | Download Paper |
6 | RETINAL IDENTIFICATION BASED PERSONAL IDENTIFICATION SYSTEM USING SIFT ALGORITHM | Nakkiran A, Kannan K, Narendran A, Ameer A and Balaji S | Download Paper |
7 | DISTRIBUTED BROADCAST PROTOCOL IN COGNITIVE RADIO ADHOC NETWORKS | K Abimathi, L Driti, Mr.MMurugesan, Dr. SSivaSubramanian | Download Paper |
8 | SMARTCRAWLER: NOVEL TWO STAGE APPROACH TO DISCOVER HIDDEN WEB PATTERNS | Tulasi Gayatri Devi, K. S. Aparna | Download Paper |
9 | SECURE NET BANKING USING GRAPHICAL PASSWORD | S.Karpagam, M.Pavithra, V.Priyanka, K.Ranjitha, Dr.K.Saravanan | Download Paper |
10 | A NOVEL CERTIFICATE AUTHENTICATION & VERIFICATION SCHEME FOR RISKAWARE IN MANET | N.Dhineshkumar, K.Manibharathi, R.Ganesh, M.Mayamoorthi | Download Paper |
11 | ADVANCED VEHICLE THEFT SECURITY SYSTEM USING CAN TECHNOLOGY | Kamal Batcha M, Mohaideen Basha A, Asik Ahamed A, Nandakumar P and Balaji S | Download Paper |
12 | SECLUSION SAFEGUARDING AND DATA SHIELDING LOCATION BASED QUERIES | P Panindra Kumar, C.Madhuri Yashoda | Download Paper |
13 | OBJECT DETECTION AND PATH TRACKING USING QUADRAPOD ROBOT IN UNKNOWN ENVIRONMENT | V.S.Mahadevan, J.Dhivya, T.Monisha, J.Geetha,R.Divya | Download Paper |
14 | A SECURE DELEGATION OF DATA ENCRYPTION USING K-MULTILINEAR DECISIONAL DIFFIE-HELLMAN ASSUMPTION IN CLOUD COMPUTING | B.Ambika, G.Sangeetha | Download Paper |
15 | A PRIVACY-PRESERVING ACCESS CONTROL WITH ROBUST DATA AUTHENTICITY FOR CLOUD GROUP | Gothandeshwaran T, Shanmugapriya.K | Download Paper |
16 | AN DISTRIBUTED REPROGRAMMING PROTOCOL IN WIRELESS SENSOR NETWORKS | M.Dhanalakshmi, G.Gayathri | Download Paper |
17 | AN RULE BASED MINING DATABASE WITH SIMILARITYON LARGE PROBABILISTIC GRAPH MATCHING | B.Kiruthiga, K.Senthilvel | Download Paper |
18 | ANOMALY BEHAVIOR ANALYSIS FOR ELIMINATE ATTACK USING IDS IN WIRELESS NETWORKS | Poongodi.P, P.Thilagavathi | Download Paper |
19 | CLEAN SLATE ROUTING BASED ATTACKS AVOIDANCE FOR IMPROVED LIFETIME IN WIRELESS SENSOR NETWORKS | Priya .M, M.Kalaiselvi | Download Paper |
20 | EFFICIENT CLUSTERING BASED MAP REDUCE IN BIGDATA WITH PRIVACY USING SVM | R.Raja Monsingh, P.Manjula | Download Paper |
21 | EFFECTIVE BLACK BOX BASED SELF ADAPTIVE CLOUD CONTROLLERS | R.Raja Monsingh, P.Manjula | Download Paper |
22 | FAST PREDICTION WITH EVOLVING DATA DENSITY FEATURES USING SUPERVISED LEARNING | C.Sowmiya, G.Gayathri | Download Paper |
23 | FORGERY DETECTION SCHEME BIO-SPOOF AND ANTI-SPOOFING | R.Saranya, D Stalin Alex | Download Paper |
24 | GEOGRAPHIC ROUTING BASED ADAPTIVE LOCATION UPDATE FOR MOBILE AD HOC NETWORKS | Saranya. R, Padma. E , Shanthi. N | Download Paper |
25 | OPTIMUM SEMANTIC SIMILARITY SEARCH FOR PSEUDO KEYWORD TERMS FOR LARGE SCALE SCIENTIFIC DATA COLLECTION | Prabha.P, Dr.P.Sampath | Download Paper |
26 | PRIVACY ACCESS CONTROL FOR HEALTHCARE EMERGE MONITOR FRAMEWORK USING MOBILE APPLICATIONS | Nithya.S, V.Chandrasekar | Download Paper |
27 | SECURE STORAGE WITH RELATIONAL DATA IN CLOUD USING CODE REGENERATION AND PUBLIC AUDITION | R.Jhansi Rani, L.D.Raja | Download Paper |
28 | VEIN CLASSIFICATION IN RETINAL IMAGES BASED VESSEL SEAM DETECTION AND TRACKING | L.Queen Sukanya, M.Kumaran | Download Paper |
29 | REAL TIME DATA ACCUMULATION AND UPDATING BY INTEGRATING LINKED INN DATABASE CLUSTERING UNCERTAIN EVENTS USING ARTIFICIAL INTELLIGENCE | Joel Jagdish A, Avinash Adithya G D, Shajakan J, I. Varalakshmi | Download Paper |
30 | IMPLEMENTATION OF SCHOOL CHILDREN TRACKING SYSTEM AND TRANSPORTATION SAFETY ENHANCEMENT BY USING RFID TECHNIQUE | A.Gowthaman, R.Mohanraj, A.Anadhan, S.Mohan | Download Paper |
31 | TRANSFORMER-LESS DYNAMIC VOLTAGE RESTORATION BY PROGNOSTIC HANDLING OF VOLTAGE | R.N.Sarada Bai, P.Munisekhar | Download Paper |
32 | AUTOMATED IRRIGATION SYSTEM AND SMOKE DETECTOR USING A WIRELESS SENSOR NETWORK AND GPRS MODULE | S.Eliyas, R.Jayaprakash, M.Vasantha Kumar | Download Paper |
33 | ENHANCED ENERGY EFFICIENT- ADAPTIVE LOAD BALANCING ALGORITHM IN A SECURED WIRELESS SENSOR NETWORKS | M.Keerthana, P.Priyanga, M.Dharani | Download Paper |
34 | PRIVACY PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS WIRELESS SENSOR NETWORKS (WSNS) | Senthil Kumar.G.K, Ayswariya.U, Sharmila.K, Subathra.S | Download Paper |
35 | ONLINE LOCAL GROCER | Lavisha.V.Mehta, Anand.S.Pashupatimath | Download Paper |
36 | ANT COLONY OPTIMIZATION BASED GEOGRAPHIC ROUTING IN WSN | Ramesh R, Silambarasan T, Saravanan T | Download Paper |
37 | ENERGY EFFICIENT PROTOCOLS IN WIRELESS NETWORKS | Kanika Sharma, Cheena Marwaha | Download Paper |
38 | HYBRID CONGESTION CONTROL FOR WIRELESS NETWORKS | Logeshwaran. B, Kishore Shreyas. S, Vignesh. M, Mohd Avesh Gour, S.P. Maniraj | Download Paper |
39 | STUDY ON THE ADOPTION OF MOBILE INTERNET TECHNOLOGY AMONG STUDENTS | S.K.Akash, Jayanth Jacob | Download Paper |
40 | AN EFFICIENT CONSTANT MULTIPLIER ARCHITECTURE FOR RECONFIGURABLE FIR FILTER SYNTHESIS | Srinath R, Kousalya R | Download Paper |
41 | DATA LINK LAYER IMPLEMENTATION OF RPR PROTOCOL | Ritesh Kumar, Saravana Selvi, Dr. T Saravanan | Download Paper |
42 | AN APPROACH TO CONTENT BASED IMAGE RETRIEVAL SYSTEM | Firoz alam, Bharath, Krusheel, Gourav, Sarooraj R.B | Download Paper |
43 | E-ACPN: A KEYED HASH MESSAGE AUTHENTICATION CODE TECHNIQUE IN VANET | Santhosh U, Saravana S | Download Paper |
44 | MICROSTRIP PATCH ANTENNA MINIATURIZATION USING MAGNETODIELECTRIC FERRITE SUBSTRATES | Nithya.C, Dr.T.Saravanan | Download Paper |
45 | DYNAMIC METHOD FOR MINING THE CONCISE AND LOSSLESS PORTRAYALS OF HIGH UTILITY ITEMSETS | A.Brigetta, V.Ajitha | Download Paper |
46 | IMPROVING THE PERFORMANCE OF NETWORK USING LEAKY-BUCKET ALGORITHM | D. Keerthana, V. Ajitha | Download Paper |
47 | IMPLEMENTATION OF ATTRIBUTE BASED ENCRYPTION WITH PRIVACY PRESERVING IN CLOUD APPLICATION | Vetripriya M, Anand K | Download Paper |
48 | FACTORS INFLUENCING KIDNEY PROBLEMS AND TREATMENT OF DIALYSIS: A DESCRIPTIVE STUDY USING DATA MINING TECHNIQUE | Krishnamoorthy.M, Srinivasan.J, Geetha.V | Download Paper |
49 | REVIEW OF BISMUTH TELLURIDE (BI2TE3) NANOSTRUCTURE, CHARACTERIZATION AND PROPERTIES | Salit Khan, Dr. Meeta Chouhan | Download Paper |
50 | REVIEW OF ZINC OXIDE (ZNO) NANOPARTICLES APPLICATIONS AND PROPERTIES | Prateek Uikey, Dr. Kirti Vishwakarma | Download Paper |
51 | A NEW RESONANCE MODULATOR MULTILEVEL STEP DOWN DC TO DC CONVERTER WITH REDUCED AND BALANCED OUTPUT | Kandasamy.N, R.Shankarganesh | Download Paper |
52 | A NOVEL METHOD FOR REDUCING PQ PROBLEMS IN HYBRID SYSTEMS (WIND &PV) USING IUPQC | Thiagarajan. T, Vijayakumar.M | Download Paper |
53 | AN INTELLIGENT CONTROLLER BASED OPTIMIZATION OF MICROGRID AND DG SYSTEM | Vichitra M.A, Thulasiyammal.C | Download Paper |
54 | AUDIO SECURED COMMUNICATION USING SMART PHONE | M.Ezhilarasi, M.Anitha | Download Paper |
55 | A PFC BASED BRIDGELESS ZETA CONVERTER FED BLDC MOTOR DRIVE | Deepika S, Dr. G.Muruganandam | Download Paper |
56 | BLDC MOTOR FED BY SOLAR PV ARRAY FOR WATER PUMPING SYSTEM BASED ON LUO CONVERTER | B.Devi Aarthi, P.Selvakumar | Download Paper |
57 | ENERGY EFFICIENT COGNITIVE MAC FOR SENSOR NETWORKS USING ADAPTIVE IMMUNE ALGORITHM | V.Logeshwari, D.Prasanna | Download Paper |
58 | CONTROL TIMING SEQUENCE OF SRM DRIVEN BY CASCADE MULTILEVEL CONVERTER | V.Karthikeyan, Dr.A.Rajendran | Download Paper |
59 | OFFLOADING ANDROID APPLICATIONS TO THE CLOUD WITHOUT CUSTOMIZING ANDROID | M.Kasthuri, M.Senbagavalli | Download Paper |
60 | POWER QUALITY IMPROVEMENT FOR HARMONIC ELIMINATION OF VARIABLE FREQUENCY DRIVE | Murugan.T, R.Shankarganesh | Download Paper |
61 | POWER QUALITY IMPROVEMENT OF GRID TIED PV WITH REDUCED NUMBER OF COMPONENTS FOR STANDALONE APPLICATION | Chinnasamy.S, R.Shankarganesh | Download Paper |
62 | LOW-COMPLEXITY TREE ARCHITECTURE FOR FINDING THE FIRST TWO MINIMA | S.Divyapriya, S.Juliet Mercy | Download Paper |
63 | AREA EFFICIENT LOW ERROR COMPENSATION WALLACE MULTIPLIER BY USING CYCLIC REDUNDANCY CHECK METHOD | K.Kalpana, G.Bhuvaneshwari | Download Paper |
64 | POWER AND BANDWIDTH SCALABLE 10-B 30-MS/S SAR ADC | C.Mageswari, M.Ashok | Download Paper |
65 | LOW-POWER PULSE-TRIGGERED FLIP-FLOP DESIGN BASED ON A HIGH FREQUENCY VTCMOS SWITCHESACTIVE INDUCTOR | T. Nishanandhini, P. Madhesh | Download Paper |
66 | A COMPARATIVE STUDY ON VARIOUS TECHNIQUES FOR IMAGE RETRIEVAL | D.Praveena, M.SureshKumar | Download Paper |
67 | MULTITIER DIVERSIFICATION IN SOFTWARECOST ESTIMATION | T.Sarada Kiranmayee, Srijith S, Kaushik P, Rahul Kumar P, Madhanagopal D | Download Paper |
68 | SECURITY AND PRIVACY OF CLOUD DATA USING HEALTH CARE SYSTEM | Anlet Anusha, Sibi Varthan K, Sandeep K, Subramanian S, Siddharth Oza V | Download Paper |
69 | AN EFFICIENT DATA CENTRIC WORKFLOW MODEL TO PUBLISH/SUBSCRIBE IN DISTRIBUTED COMPUTING | M. Senthil, Nishant Gupta, Sohom Majumder, Gokul Vanniar, J. Sravan Kumar | Download Paper |
70 | AN EFFICIENT COST OPTIMIZATION IN CLOUD COMPUTING BASED ON WEIGHTED ROUND ROBIN SCHEDULING | R. Boopathi Rajan, Suma Sira Jacob | Download Paper |
71 | AN EFFICIENT GROUP MANAGEMENT FRAMEWORK FOR DYNAMIC GROUPS IN PUBLIC CLOUD | B.Shanmugapriya, M.Murali | Download Paper |
72 | HYBRID ALGORITHM FOR THE CLASSIFICATION OF TRAFFIC FLOWS | T.Kalaiselvi, P.Shanmugaraja | Download Paper |
73 | EFFICIENT DISTRIBUTED DEDUPLICATION SYSTEM WITH HIGHER RELIABILITY MECHANISMS IN CLOUD | R.S. Ganga, M.Pandiyan | Download Paper |
74 | SECURE PRIVACY ASSISTANCE CONTENT PROTECTING LOCATION BASED QUERIES USING ENHANCED | M.Indhumathi, B. Sakthivel | Download Paper |
75 | REVERSIBLE WATERMARKING INFORMATION HIDING USING LZW CODE IN DATA QUALITY | Punithavathy.B, R. Kiruthika | Download Paper |
76 | SELFISH MISBEHAVIORDETECTION AND PREVENTION OF CONGESTION ATTACKS WITH FALSE DATA INJECTION | P.Pintooraj, R.B. Ramesh | Download Paper |
77 | ESTIMATING THE PERFORMANCE OF LOAD BALANCING AND DELAY ESTIMATION IN CLUSTERING SCHEME OF DATA IN WSN | G. Iniya, M. Ramesh Kumar | Download Paper |
78 | LOCALIZATION OF JAMMERS IN BROADCAST NETWORKS | Vidya Nanda Hruday Pidikiti, Mule Raja Sekhar Reddy, Vignesh KV, B Arbaz, Rajathi | Download Paper |
79 | USING COAP PROTOCOL FOR RESOURCE OBSERVATION IN IOT | Syed Roohullah Jan, Fazlullah Khan, Farman Ullah, Nazia Azim, Muhammad Tahir | Download Paper |
80 | ROUTING OF MOBILE HOSTS IN ADHOC NETWORKS | Nazia Azim, Abdul Majid, Fazlullah Khan,Muhammad Tahir, Muhammad Safdar, Qamar Jabeen | Download Paper |
81 | PEOPLE FACTORS IN AGILE SOFTWARE DEVELOPMENTAND PROJECT MANAGEMENT | Nazia Azim, Abdul Majid, Fazlullah Khan,Syed Roohullah Jan1, Muhammad Tahir, Qamar Jabeen | Download Paper |
82 | INTER-RELATIONSHIP BETWEEN ENERGY-EFFICIENT ROUTING AND SECURE COMMUNICATION IN WSN | Muhammad Tahir, Fazlullah Khan, Syed Roohullah Jan, Izaz Ahmad Khan, Nazim Azim | Download Paper |
83 | SECURE DATA HIDING IN ENCRYPTED IMAGE USING CO-EFFICIENT AND REVERSE BASED SHIFTING TECHNIQUE | PremaS, Sakthivel S | Download Paper |
84 | NUMERICAL ANALYSIS OF VIBRATION CONTROL TECHNIQUES OF A STRUCTURE | B.Mohamed Asiq, S.Santhosh Kumar, S.Julius Fusic | Download Paper |
85 | SEMANTIC BASED SUGGESTION SYSTEM FOR ACQUAINTANCES | B. Nikhila, D. Harshini Kalyan, Mary Vinothini, Sandeep Saraf | Download Paper |
86 | Patient Self-Controllable and Authorized Accessible Privacy Model in Distributed m-healthcare Cloud Computing System | Narmatha. P, Dharani Manoharan.B | Download Paper |
87 | MULTI OWNER DATA SHARING AND DUPLICATE DETECTION | P.Bhavani, V.Karpagavalli, S.Thamilselvi, R.K.Shyamala | Download Paper |
88 | A STUDY ON MATCHING OF LARGE IMAGES | Ashwina Tari Volvoikar, Maruska Mascarenhas | Download Paper |