Sl. No. |
Title and Authors |
PP No. |
View |
1. | An Overview of maintaining security in Web services
S.Anjugam P.Visalakshi |
01-04 |
|
2. | Call Admission Control, Packet Level QOS in 4G broad band Wireless Access System with CDMA
M.Annam, Mr.M.Ramasubramanian |
05-08 |
|
4. | Energy Efficient Algorithm Using Data Integrity In Wired Networks
T.Balasathuragiri, Prof Mr.T.Anand
|
12-16 |
|
5. | Linux Device Driver Coding for Pseudo Device
Murali. B. A
|
17-28 |
|
6. | Modification on Non-Cryptographic Hash Function
C. Krishna Kumar, Dr. C. Suyambulingom
|
29-35 |
|
7. | Bruit Bait: Peer To Peer Systems
P.Devika, Dr.R.S.Ponmagal
|
36-40 |
|
8. | Green Computing Future of Liveliness
Sk. Fayaz Ahamad, P.V.Ravikanth
|
41-45 |
|
9. | CRM System in Cloud Computing with Different Service Providers
Mrs.I.Golda Selia, S.K. Madhumithaa
|
46-49 |
|
10. | Solution for Accessing a Computer Using VNC in Mobile Cloud Computing
I.Golda Selia, R.Iswarya
|
50-55 |
|
11. | Implementation of Honeypot using Kerberos Authentication
Aishwarya.S, SurabhiKinariwala, Sujatha.G
|
56-59 |
|
12. | Developing Framework to do the Reliability Testing on webMethods Product Suite
Harsh Chincholi, Sandhya S, Rameshchandra V
|
60-64 |
|
13. | Intrusion Detection for Smart phone using Cloud
G.Hemaprabha, Visalatchi.R
|
65-68 |
|
14. | Intrusion Detection System Using K-SVMeans Clustering Algorithm
Jaisankar N, Swetha Balaji, Lalita S, Sruthi D
|
69-73 |
|
15. | Policy for Security issues in Cloud Computing
Jijo S. Nair, Mukesh Kumar
|
74-77 |
|
16. | Data Security in Cloud
Jijo.S. Nair, BholaNath Roy
|
78-79 |
|
17. | Cloud Computing: Review
Jijo S. Nair, Mukesh Kumar
|
80-82 |
|
18. | Software Visualization of Text Content in Ecosystem
Karthiga Mohanmani, Chamundeswari Arumugam
|
83-87 |
|
19. | Synchronous and Asynchronous Collabrative Writing Methods on the Cloud
Ms.R. Mangala Gowri, K.Kumaran
|
88-90 |
|
20 |
An Enhanced Energy Efficient Routing Protocol for MANETs
Kadiveti. Koteswar Rao, Ragendra.C, Ramesh.Ragala |
91-95 |
|
21 |
Improving the Performance of Search Engine
With Respect To Content Mining
Kr.Jansi, L.Radha |
96-100 |
|
22 |
A New Image Compression Scheme with Wavelet Packets for Best Basis Selection Using Improved Pso
Manish Kumar, Prof.Nishat Kanvel |
101-106 |
|
23 |
A 32-Bit Signed/Unsigned Fixed Point Non-Restoring Square-Root Operation Using VHDL
Ms. M.U. Buradkar, Prof. P. P. Zode |
107-116 |
|
24 |
Embedded Web Server using Soft Processor on FPGA Platform
V. Muthamil Selvi, Dr. K. Rathnakannan |
117-120 |
|
25 |
Role of Feature Reduction in Intrusion Detection Systems for 802.11 Attacks
K. NAGARJUNA REDDY, Prof. S. SRINIVASULU, P.V. RAVI KANTH |
121-127 |
|
26 |
Provably Protected Nested One-Time Secret Mechanisms for Rapid Mutual Certification and Key Swap in Mobile Interactions
N.Mahesh, K.Subba Reddy, P.V.Ravikanth |
128-133 |
|
27 |
Group Movement Pattern Mining Algorithm for Data Compression
P.Saranya, P.Divya Rani, S.Dhivya Prabha, V.SathyaBama |
134-138 |
|
28 |
Reconstruction of sensible 3D Face Counterpart From 2D Images - A hybrid approach
M. Ramasubramanian, M.A. Dorai Rangaswamy |
139-144 |
|
29 |
Developing a Conceptual Relationship between Web Service Supply Chain
Entities Using KPS Mining Algorithm
Mr.P.Ramesh, Mrs.R.Prema latha |
145-149 |
|
30 |
Shared Secret Key Agreement to increase in bandwidth and computation
R.Rampriya M.E., K.S.Giriprasath Asst Prof |
150-152 |
|
31 |
Enterprise Planning Process Based On Etl Technology Using Mesh Algorithm for Magna Energy and Hydro Systems
Mrs.S.SUDHA, V.S.Saranya |
153-155 |
|
32 |
Limitations of Function Point Analysis in E-Learning System Estimation
T.S.Shiny Angel, Dr. Paul Rodrigues , John T. Mesiah Dhas, S. SelvaKumara Samy |
156-161 |
|
33 |
Reconfiguration of Wireless Sensor Node In Fpga
S.K. Amudhavalli, Dr.K.Rathnakannan |
162-166 |
|
34 |
Comparative and Efficient Analysis of Gradient Based Edge Detection Technique in Medical Images
Sree Sharmila T, Ramar K |
167-170 |
|
35 |
Characterization of Noise removal based on Hypergraph model of Images
D. Sudha, Dr.T.T. Mirnalinee |
171-178 |
|
36 |
Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols
R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi |
179-184 |
|
37 |
Social Network Services for Families Having Children with Learning Disabilities
M.Synthiya, T.Niranjani |
185-188 |
|
38 |
Security issues and vulnerabilities in Mobile Ad hoc Networks
(MANET)-A Survey
P.Visalakshi, S.Anjugam |
189-194 |
|
39 |
Energy-Efficient Node Selection in Multihop Wirelessntworks
S.Radhika |
195-198 |
|
40 |
Biological target discovery from data mining approaches
Kalavathy.R, Swaytha R, Jayabalan2 Remya M |
199-205 |
|
41 |
Intelligence in Elearning for Differently abled learner
R. Senthamarai Dr.V.Khanna |
206-209 |
|
42 |
Automated Negotiation System in E-Commerce Using Economic Psycho Knowledge
T.Vijila, P.Vijayaragavan |
210-216 |
|
43 |
Wireless Sensor Networks' emergence and Growth- A survey
L.K. HEMA , Dr. D. MURUGAN , M.CHITRA |
217-224 |
|