Sl. No. | Paper Title | Authors | Download Paper |
1 | DETECTION OF COMPROMISED ACCOUNTS ON SOCIAL NETWORKS BASED ON ANOMALOUS USER BEHAVIOUR | Jince P Kuruvilla,Kavitha P, Dr.G.Kalpana | Download Paper |
2 | Energy Efficient Duty-Cycling for Mobile Sensor Networks | S.Navaraj, G.Raja | Download Paper |
3 | A NEW SMART GRID DEVICE FOR EFFICIENT ACTIVE AND REACTIVE POWER CONTROL IN HYBRID POWER SYSTEM | NITHYA K, DINESHKUMAR G | Download Paper |
4 | AN INTERACTIVE OPERATION STRATEGY FOR MICROGRID COOPERATED WITH DISTRIDUTION SYSTEM | SARADHA D, Dr. SP. UMAYAL | Download Paper |
5 | ENHANCED GUI TEST SCRIPT MODEL IN SOFTWARE TESTING PROCESS | Selvakumari. N, Muthamizharasan. M | Download Paper |
6 | REPAIRING CORRUPTED BLOCK OF DATA OWNER FILES IN CLOUD | Kodukulla ArunaGayatri, Vadali Srinivas | Download Paper |
7 | A Distributed Handling Mobility Handover base LTE Advanced Networks | A.UMA MAHESWARI, R Asha | Download Paper |
8 | SENSORLESS TEMPERATURE ESTIMATION AND FAULT REMOVAL DUE TO SWITCH FAULT | M.MUTHUKUMAR, N.KARTHICK | Download Paper |
9 | PROTOTYPE DESIGN OF ARDUINO BASED VOLTAGE STABILITY IN MARINE POWER SYSTEMS | K.NANDHINI, R.KALPANA | Download Paper |
10 | ARDUINO BASED EFFECTIVE DC MICROGRID POWER TRANSFER MODES | S.BHARATHI, K.GOPINATH | Download Paper |
11 | UNDER FREQUENCY LOAD SHEDDING MODEL WITH OVERLOAD PROTECTION | P.SHANTHI, V.S.CHANDRIKA | Download Paper |
12 | DC MICROGRID BASED SIMPLEX COMMUNICATION WITH CENTRALIZED WIRELESS FEEDBACK | G.SRILAKA, V.GEETHA | Download Paper |
13 | CFII IMPROVEMENT AND FAULT PROTECTION IN BIPOLAR HVDC TRANSMISSION LINES | S.VIJAYAKUMAR, L.P.VETTRIVELAN | Download Paper |
14 | An Enhanced Circuit Ciphertext in Cloud based Efficient User Revocation Mechanism on Top of Anonymous ABE | ANIL KUMAR MAGAPU, K RAJESH | Download Paper |
15 | AN ENHANCED MULTI-LAYERED CRYPTOSYSTEM BASED SECURE AND AUTHORIZED DEDUPLICATION MODEL IN CLOUD STORAGE SYSTEM | CHEDULURI N VENKATA KIRANKUMAR, T.RAJENDRA PRASAD | Download Paper |
16 | Enhanced Trust & HLA based public auditing architecture in MANET to Eliminate Packet Dropping Attacks | RAYUDU SUDHEER, CH SUBHASH | Download Paper |
17 | DISCOVERY OF MALWARE PROPAGATION ATTACK USING MULTIVARIATE CORRELATION ANALYSIS | DEVALLA SRI MAHALAKSHMI MANIKYAMBA, R.CHANDRA SEKHAR | Download Paper |
18 | ENHANCED BUG TRIAGE USING EFFECTIVE TERM SELECTION METHOD FOR A HIGH QUALITY BUG DATA SET | DEVALLA SATYA SOWJANYA, NAGARAJU TIRUKOTI | Download Paper |
19 | OPPORTUNISTIC VOID AVOIDANCE ROUTING PROTOCOL FOR UNDERWATER SENSOR NETWORKS | M.JANANI, L.A.RAVINDIRAN | Download Paper |
20 | PERORMANCE ANALYSIS OF COMPRESS AND FORWARD RELAY USING COOPERATIVE TWO PATH RELAY CHANNELS | B.SHANMUGAPIRIYA, L.A.RAVINDIRAN | Download Paper |
21 | PREVENTION OF MIMICRY ATTACKS USING SECULAR CERTIFIED ECC AUTHENTICATION MECHANISM | K.Rajammal, Antony Mutharasan | Download Paper |
22 | A NEW TWIN CLOUD FRAMEWORK FOR COPIED DATA ELIMINATION AND MINIMIZE COMMUNICATION OVERHEAD | Ch.MadhuKarthik, Sk.MubeenaSulthana | Download Paper |
23 | Impact of Moral Dimension of Teachers | Dr. Paras Jain | Download Paper |
24 | ENCRYPTING SECRET KEY IN STEGANOGRAPHY TO EMBED SECRET IMAGE AND RETRIEVE IT USING CONTOURLET TRANSFORM | N.Lettishyal | Download Paper |