Volume 7 Issue 1 – March 2014
Sl. No. | Paper Title | Authors | Download Paper |
1 | A MICROMIRROR SOLAR CELL AS AN ELECTROSTATIC MEMS POWER SUPPLY | S. Suresh, R. SureshKumar | Download Paper |
2 | A NEW HEURISTIC APPROACH TO REDUCE STATIC POWER USING CLUSTERING ALGORITHM | SREEDHAR K.S, LAKSHMI NARAYANAN. S, REEBA KORAH | Download Paper |
3 | A NOVEL APPROACH FOR DOCUMENT RETRIEVAL USING HAC BASED ON MULTI-VIEW POINT SIMILARITY MEASURE | KALAIVENDHAN.K, SUMATHI.P | Download Paper |
4 | A Pre-Fetch Based Fast Handover Scheme for Femtocell Networks | M.Indhumathi, K. Kamala | Download Paper |
5 | A SECURE KEYLESS CYPTOSYSTEM | T.P.Jayakumar, R.Saranya | Download Paper |
6 | A SECURE SINGLE SIGN ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS | V. Priya, A. Rajeswari, J. Nithya, P. Shrivithya | Download Paper |
7 | ADVANCED SECURITY WITH ADVANCED BIOMETRICS | K.G.ArunKumar, J.V.Bhavithra, P.Mohanraj | Download Paper |
8 | ATTRIBUTE BASED ENCRYPTION OF PERSONAL HEALTH RECORD ON CLOUD COMPUTING | J.Sathish, S.Ashiq Ahmed | Download Paper |
9 | Automated Two Level Variable for Multiview Clustering | R.Gandhimathi, T.Seetha | Download Paper |
10 | CERTIFICATE REVOCATION to COPE with FALSE ACCUSATIONS in AD HOC NETWORKS | R. Bindhunaath, N. Anbarasi | Download Paper |
11 | CLASSIFICATION OF BRAIN TUMOUR IN MRI USING PROBABILISTIC NEURAL NETWORK | PRIMI JOSEPH, Er.D.Jagadiswary | Download Paper |
12 | COLLISION FREE PERMUTATION ON-CHIP NETWORK BY USING VHDL FOR SoC APPLICATIONS | K.K.Sasikala, B.Yuvarani | Download Paper |
13 | A DELAY- TOLERANT PROBABILISTIC REBROADCAST FOR MOBILE AD HOC NETWORKS | Download Paper | |
14 | Design and Analysis of 4 Port Coupler based Delay Line Filter for Dispersion Compensation | G.Aarthy, P.Prakash, M.Ganesh Madhan | Download Paper |
15 | DESIGN AND ANALYSIS OF REVERSIBLE VEDIC MULTIPLIER IN NANO SCALE TECHNOLOGY | Vaitheeswaran.A, Bharathababu.K, REEBA KORAH | Download Paper |
16 | DESIGN AND IMPLEMENTATION OF BIDIRECTIONAL DC-DC CONVERTER WITH FIFTH ORDER RESONANT CONTROL | MariyaJohnson.A, Mariammal.T | Download Paper |
17 | DESIGN OF VEHICLE MONITORING SYSTEM USING ARM MICROCONTROLLER | JAYADEVI.R, Allen Joseph .R | Download Paper |
18 | Detecting Misbehavior and Establish Trust Authority in DTN | S.Karthika | Download Paper |
19 | DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS | M. Raghu, M. Ananthi | Download Paper |
20 | ELECTROMAGNETIC ROCKET LAUNCHER | Nirmal.A.S, Romanuse.R | Download Paper |
21 | Enhanced Intelligent Discovery Mechanism to support Mobile Web Search Information Retrieval | S.Aarthi, N.Vijay | Download Paper |
22 | EXTRACTING SECRET KEY FROM RECEIVED SIGNAL STRENGTH (RSS) MEASUREMENTS IN WIRELESS NETWORKS | R. Surya, S.V. Manikanthan | Download Paper |
23 | HUMAN HEALTH MONITORING SYSTEM USING ANDROID MOBILE PHONE AND GPRS | Fiona.E.Josy, R. Allen Joseph | Download Paper |
24 | INTERFERENCE ALIGNMENT TECHNIQUES FOR MIMO MULTICELL BASED ON RELAY INTERFERENCE BROADCAST CHANNEL | S.V.Manikanthan, D.Sugandhi | Download Paper |
25 | Location Update Strategy For position based Routing In MANET’s | L.Selva Adaikala Germeni, K. Saminathan | Download Paper |
26 | NOVEL PILOT ASSISTED SPECTRUM SENSING FOR OFDM SYSTEMS ON CLUSTERED DIFFERENTIAL ESD | S.V.Manikanthan, K.Pravina | Download Paper |
27 | OUTLIER DETECTION THROUGH UNSUPERVISED APPROACH WITH HOLOENTROPY | N.Ganesa Moorthy, S.Nandhini Devi | Download Paper |
28 | PERFORMANCE ANALYSIS OF QoS BASED DYNAMIC HANDOVER MECHANISM IN HIGH SPEED VEHICLES | S.Mayavady, D.Prabha | Download Paper |
29 | Personal Identification Based on Retinal Blood Vessel Segmentation | Ramya.M, Sornalatha.M | Download Paper |
30 | PRIVACY PROTECTION THROUGH UNOBSERVABLE SECURE ONDEMAND ROUTING PROTOCOL FOR MANET | A.Arulmozhi, Narasimmalou | Download Paper |
31 | Protection and Detection of Flood Attacks in Disruption Tolerant Networks | K.Aruna devi, R.Sasikala | Download Paper |
32 | RENEWABLE ENERGY: EFFECTIVE USE OF SOLAR ENERGY BY INTELLIGENT BATTERY CHARGING TECHNIQUE | S.Sudharshanan, A.Anbalagan | Download Paper |
33 | SECURING SPONTANEOUS WIRELESS ADHOC NETWORK CREATION WITH SECRET KEY TECHNIQUES | P.Siva sankar, K.Karpagalakshmi | Download Paper |
34 | Socio-Technical Accordance Perspective For Software Implementation Correlation With Fault Aptitude | M.Gomathi, B.Bazeer Ahamed | Download Paper |
35 | Time-Based Proxy-encryption for Secure Erasure Code Based Cloud Storage System | K.V.Mahalakshmi, S.Karthikeyan | Download Paper |
36 | TRACING AND FILTERING INORGANIC TWEETS URLs IN TWITTER | Mahalakshmi A, Padma M | Download Paper |
37 | Zombie Based Attack Detection and Prevention in Web Applications | Saranya A, Dr. Kola Sujatha P, Dr. Kannan A | Download Paper |
38 | Secure Transmission of Packets using EAACK in MANETs | K.Esther, K.Sathish, K.Balamurugan, A.Udhayakumar | Download Paper |
39 | Securing Personal Information Using Data Mining in Public Networks | Kiruthiga S, Dr. Kola Sujatha, Dr. Kannan A | Download Paper |