Sl. No. | Paper Title | Authors | Download Paper |
1 | By Using Effective Mechanism for Detection and Prevention of Routing Attacks in Mobile Networks | K. Meghana, K. Manohar | Download Paper |
2 | Secure Data Aggregation in Wireless Sensor Networks | G.R.BhargaviRani, K.Srilakshmi | Download Paper |
3 | An Approach of Fast Clustering On High Dimensional Data for Efficiency and Effectiveness | P. Naveen Kumar | Download Paper |
4 | Fair Resource Allocation in Cloud Using Virtual Machines | A.Nandishwar | Download Paper |
5 | A Range of queries in adaptive forms using document cluster with KNN algorithm | L.Kavitha, H.Lookman Sithic | Download Paper |
6 | An Improving Performance in Complex Data of Filter Method Using Feature Subset Selection Algorithm | N.Divya, V.Vijayadeepa | Download Paper |
7 | Combined Tracking Technologies Using Data Mining With Markov- Chain Process | R.Priyanga, M.Geetha | Download Paper |
8 | Customized Web User Search Using Feedback Sessions | C.Gopalakrishnan, V.Vijayadeepa | Download Paper |
9 | Data Mining Analysis Using Query Formulation In Aggregated Distributed Database | M.Deepika, V.Vijayadeepa | Download Paper |
10 | Discovery Of Association Rules With Secure Mining In Horizontally Distributed Databases | K.Gogulapriya, V.Vijayadeepa | Download Paper |
11 | A Distributed Handling Mobility Handover in Collaborative Spatially With Classifies the Generation Partnership | R. Suguna, S. Kumaravel | Download Paper |
12 | A Image Denoising Selective Wavelet Transform Shrinkage Algorithm Using Threshold Method | A.Neenaa, M.Sumathi | Download Paper |
13 | Access Control with Authentication privacy and Intrusion Detection to Secure Data in Wireless Sensor Networks | A.R.Nithya, C.Renuga | Download Paper |
14 | Cluster Interfaced Objective Function in clustering-based feature selection algorithm for Mining Data | B.Suganya, M.Pachiyammal | Download Paper |
15 | Distributed System Invoke the Cloud Computing in Web Services using Caching | A.SADAMHUSSAIN, M.SUMATHI | Download Paper |
16 | Mitigating Vampire Attack in Wireless Ad-Hoc Sensor Networks of Draining Life Using Resource Allocation | K.Divya Priya, V.Vijayalakshmi | Download Paper |
17 | Security and Privacy Challenges Mona in Cloud Computing Using Signature Generation | G. Mahalakshmi, S. Kumaravel | Download Paper |
18 | Personalizing Web Directories with Community Discovery Algorithm | Sriram K.P, Joel Robinson | Download Paper |
19 | Energy Efficient and Secure, Trusted framework for Wireless Sensor Networks | Sriramula SriPujitha, SubbaRao.k | Download Paper |