Volume
24 (Techniques and Algorithms in Emerging Technologies),
2016
A Secure and Energy Efficient Multihop Communication
in Wireless Sensor Networks (WSN)
P. Bhuvaneswari and P. Thirumoorthy
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Arduino Microcontroller Based Online Ambient Monitoring Using Internet of Things
P. Ramya and K. Anbarasan
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
SEO Techniques for Enhancement of Site Visibility
K.R. SriPreethaa, M. Nagammai, S. Sivaranjani and T. Swathy
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Extricating Opinion Word from Review Based on
Word Alignment Model Using Topical Lexicon
S. Indhumathi and M. Senthamarai
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Clustering with Semantic Similarity for Text Mining
M.K. Vijaymeena and K. Kavitha
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Sensitive Data Leak-Detection Using Mobility Key Service
T.R. Srinivasan and S. Saranya
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Detection and Isolation of the Selfish Nodes Using
a Collaborative Contact Based Watchdogs
T.R. Srinivasan and K.G. Chithra
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Coverage Performance of Global Sensor Deployment in Smart Sensing Environment
T.R. Srinivasan and Tharun Achu Philip
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Energy Aware and Bandwidth Optimized AODV Routing
for Efficient Traffic Control in Mobile AD HOC Networks
C. Nallusamy, A. Sabari and V. Karthick
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Health Monitoring and Control System Using Wireless Sensor Network
N. Sivasankari, M. Parameswari and K. Anbarasan
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Search Engine Optimization for Effective Ranking of Educational Website
N. Yuvaraj, S. Gowdham, V.M. Dinesh Kumar and S. Mohammed Aslam Batcha
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Packet Verification and Forwarding in OpenFlow Access Used by Controller
G.K. Sowmya and R. Rajagopal
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Multi File Process Conformation in Network Overlays
G. Kiruthika and E. Menaka
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Mean Based Packet Forward by Improving Bandwidth
Reservation Request in HPN
Cybercrime Risk and Cyber Security on Online Service Avoidance
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Cybercrime Risk and Cyber Security on Online Service Avoidance
D. Muthusankar, B. Kalaavathi and M. Deepa
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
A Survival Study on Efficient File Sharing in Virtual Cloud Servers with
Load Balancing and Virtualization Techniques
C. Nelson Kennedy Babu and V. Priya
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Neural Network Modelling for Social Media Mining
to Improve Health Informatics
T. Sureshkumar and T. Rajamadhangi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Gene Based Energy and Bandwidth Optimized Routing for
Differentiated Services in Wireless Sensor Network
R. Nithya, K. Prasanth and P. Geethanjali
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Token Ring Based Co-Operative Bait Detection for Both Selfish and
Malicious Node Attacks In Ad Hoc Network Communication
A. Syed Musthafa, C. Nelson Kennedy Babu and R. Kasthuri
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Particle Swarm Optimization: Essential Concepts, Applications and
Variants in Wireless Sensor Networks
Mrs. M. Sangeetha, A. Sabari, Mrs. J. Deepika and Ms. K. Elakkiya
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Relative Node Mass Weighted Clustering Techniques in Manet
J. Mani Kandan, A. Sabari and S. Revathi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Mobile Educational Learning Using Qr Based U-Learning for Personalized Tutoring
R. Bhagya and K. Sivakumar
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Achieving Certain Optimization Objectives in
Broadband Wireless Networks Using Periodic Feedback Channels
Prof. T.R. Srinivasan and K.S. Keerthika
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Statistical Feature-Based Support Vector Machine
Approach for the Detection of Lung Cancer in Ct Images
I. Jennetmary and V. Ravi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Flow Control With Data Compression To Avoid Overload In Networks
C. Vigundhiya and E. Menaka
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Prediction and Pan Code Reuse Attack by
Code Randomization Mechanism and Data Corruption
N. Mohanappriya and R. Rajagopal
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Fake Content Delivery Using Replacement Algorithm In Wireless Sensor Networks
R. Keerthana and M.M. Kokila
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Dynamic Route Node Based Timely Content Delivery in DTN
P. Thangamani and K. Sankar
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Provide Secure Transmission to Avoid Packet Drop Attacks in WSNs
B. Poovizhi and M.M. Kokila
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Scheduling Based Broadcasting Delay Overcome in Wireless Network
D. Sharmila and E. Menaka
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Mobility Control Based Dual Data Transmission for Load Balancing in WSN
P. Poornima and R. Rajesh
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
An Effective Data Storage Management Using Advances in Hadoop Environment
D. Vivek, K.S. Giriprasath and P. Balasubramanie
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Integrated Bee Colony and Tabu Search Optimization for Feature Selection and Classification of Breast Cancer in Digital Mammogram Images
J. Nithya and M. Mugilya
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Random Key Updation for Certificateless Remote Authentication Protocol with Anonimity in Wban Domain: Network Security
Haobijam Jina Devi and E. Menaka
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
A Surveillance System for Real Time Monitoring and Capturi 3G with User-Friendly
M. Anto Bennet, M. Jayashanka, M. Naveen Kumar, V. Logesh, S. Sankaranarayanan and C. Murugan
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Structure Optimization Using Bee and Fish School Algorithm for Mobility Prediction
J. Ananthi, V. Ranganathan and B. Sowmya
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Power-Aware Algorithms over Dual Processors for Real Time Periodic Applications
B.M. Beena and C.S.R. Prashanth
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Ciphertext Policy Attribute Based Hybrid Encryption with User Revocation in Data Outsourcing Systems
M. Maryam Jameelah, C. Suresh Gnana Dhas and P. Suganya
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Improving Performance of Fuzzy Based Routing Through Optimization for Manet
R. Menaka, V. Ranganathan and B. Sowmya
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Optimizing Feature Selection and Support Vector Machine Using Clonal Selection for Brain Computer Interface
R. Padmavathy, V. Ranganathan and B. Sowmya
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Efficient Data Gathering Using Mobile Collectors and Dual Data Uploading in Wireless Sensor Networks
M. Papitha, C. Suresh Gnana Dhas and V. Shanmugavalli
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Information Security Issues and Challenges in Cloud Computing
S. Ramasamy, R.K. Gnanamurthy and R. Thilagavathi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
An Efficient Duplicate Detection Based on Navie Block Detection Algorithm
S. Ramya and C. Palani Nehru
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Retrieving Data Securely in Disruption Tolerant Military Networks
R. Saranya, L. Malathi and S. Sneha
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Survey on Performance Estimate Fashions for Information Retrieval System
K. Seenuvasan and V. Janani
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Image Retrieval Based on Similarity Search Using the Combination of Fisher Criterion Based Genetic Algorithm
T. Sowmi and E. Saravana Kumar
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Lung Nodule Classification Using Lsvm Classifier for Low Dose Computed Tomography Images
A. Suganya, N. Mohanapriya and B. Kalaavathi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Efficient Trace Aware Locality Clustered P2P File Sharing System
V. Priya, C. Nelson Kennedy Babu and V. Avibala
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Virtualization of Resources and Services in Cloud Environment
V.P. Dhivya and A. Sowendariya
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Performance Analysis of Supervised Machine Learning Algorithms for Opinion Mining in E-Commerce Websites
N. Yuvaraj and A. Sabari
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
A Comparative Analysis of Recommendation Systems
S. Prabha and K. Duraisamy
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Architecture of HEVC /H.265 Using Pipeline Operation
G. Sankarbabu, M. Anto Bennet, V. Thayanantha Krishnan, P. Srinivasan and R. Vivek
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Low Power High Speed Performance of Multiplexer Using Reversible Logic
R. Suresh, T.R. Dinesh kumar, M. Anto Bennet, Thamu, Santhosh and Sudhakharan
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Automatic Vehicle Parking Indicator and Traffic Violation Detection System
Ms. S. Mekala, M. AntoBennet, S. Melvin Jeyakumar, P. Karthickkumar, G. Gokul and A. Vinod
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
VLSI Modelling of FM0 and Phase Encoding Using Balanced-Logic Operation with Pulse Generator for Adaptive Transportation
R. Suresh, M. Anto Bennet, T.R. Dinesh Kumar, V. Sushmitha, R. Sarumathi and J. Sankari Gomathi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Voice Control Prosthetic Arm
S. Mohamed Sulaiman, M. Anto Bennet, P.L. Annamalai, E. Ramki and M. Mohamed tazudeen
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
A Design of E-Voting Using Fingerprint Recognition System for Secured Voting
S. Mohamed Sulaiman, M. Anto Bennet, A.A. Aravind, S.K. Rajvel and G. Janakiraman
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Energy Meter Reading System Using Automatic Camera Solar/thermal Energy
S. Venkatraman, M. Anto Bennet, N. Pradeepkumar, P. Vigneshwaran and P.V. Vijaykumar
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Speed Control and Shared Steering Control Between a Driver and an Automation: by Buzzer Intimation
V. Mahalakshmi, M. Anto Bennet, S. Aravind, B.S. Jayavignesh and S. Immanuel
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Solar Powered Automated Fertigation Control System for Terrace Farming Using Zigbee
S. Venkatraman, L. Devandra Kumar, E. Anish, V.X. Abinesh and M. Anto Bennet
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Design of Tl Shape Rectangular Patch Antenna for Global Positioning System (GPS) Applications
M. Preethi, G. Shobana, P. Thanga Nandhini, M. Sheriff and M. Anto Bennet
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
No Billing Queue Purchase System with Automatic Product Detection System Using Lifi, IOT in Retail Shop
S. Mekala, A. Arun Kumar, N. Balaji, A. Prasath and M. Anto Bennet
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Big Log Search and Analysis Using Elk Environment
Mrs. I. Nivetha and Mrs. J. Preethi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
A Fuzzy-Genetic Based Approach for Improving OLSR Routing Protocol in Mobile Adhoc Networks
R.S. Latha and Dr. G. Murugesan
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Spreading Process Avoidance by Building Firewall in Base Station on Multilayer Networks
Ms. S. Kanmani and Mr. K. Sankar
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Secure Deduplication Using De Key with Efficient and Reliable Convergent Key Management in Cloud Storage
R. Thilagavathi, S. Ramasamy and R.K. Gnanamurthy
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Efficient Trace Aware Locality Clustered P2P File Sharing System
V. Priya, C. Nelson Kennedy Babu and V. Avibala
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
A Comparative Analysis of Recommendation Systems
S. Prabha and K. Duraisamy
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Architecture of HEVC /H.265 Using Pipeline Operation
G. Sankarbabu, M. Anto Bennet,
V. Thayanantha Krishnan, P. Srinivasan and R. Vivek
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Energy Meter Reading System Using Automatic Camera Solar/thermal Energy
S. Venkatraman, M. Anto Bennet, N. Pradeepkumar, P. Vigneshwaran and P.V. Vijaykumar
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Secure AASR Protocol with Trust for Manets in Adversarial Environment
R. Archana and W. Gracy Theresa
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
An Medical Image Segmentation Using Regional Maxima
Based Watershed Algorithm
K.K. Devika, N. Mohanapriya and B. Kalaavathi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Secure Data in Muliti-Cloud Using Multi Integrity Auditing
Protocol in Drops Teqniques
S. Indhumathi and A.S. Radhika D. Renuga Devi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
An Efficient Private Frequent Itemset and Association Rule Mining
A. Jayakumari, R. Rohini and B. Anitha
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Review on Cover Coefficient Concept and
Incremental Approach for Document Clustering
N. Kannammal, Dr. S. Vijayan and R. Sathish Kumar
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Big Log Search and Analysis Using Elk Environment
S.I. Nivetha and S.J. Preethi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
A Fuzzy-Genetic Based Approach for Improving
OLSR Routing Protocol in Mobile Adhoc Networks
R.S. Latha and G. Murugesan
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Design and Implementation of Low Power Finfets Using Adiabatic Logic
V.M. Senthil Kumar, S. Saravanan, P. Deepa and S. Priyanka
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
An Efficient Parallel Iterative Mapreduce Based
Frequent Subgraph Mining Algorithm
A. Praveena, B. Anitha and R. Rohini
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Super Threshold FinFET Circuits Based on Pass
Transistor Adiabatic Logic-2N Operating Region
V.M. Senthil Kumar , S. Saravanan , S. Priyanka and P. Deepa
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Efficient Re-Ranking and Image Retrieval Based on Fuzzy Color Feature Extraction
S. Deepa, S.R. Menaka and S. Syed Farmhan
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Propagation Analysis and Prevention Model for
Modern Email Malware
S. Sneha, L. Malathi and P. Pandian
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Improve Privacy Policy Inference Model for Network
Communication Using Enhanced Parent Policy Control Algorithm
K. Soniya Lakshmi, D. Gowdhami and P. Brindha
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Secure Deduplication Using De Key with Efficient and
Reliable Convergent Key Management in Cloud Storage
R. Thilagavathi, S. Ramasamy and R.K. Gnanamurthy
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Trust Based Services in Youtube Using Compressed Video Steganographic Scheme
S. Vishnu Priya, V. Arul and G. Sasikala
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Integrating ARM Based Controller for a
Single Area Deregulated LFC Modeled in LabVIEW
R.R. Lekshmi, B. Suresh, C. Vineel Sreya Sujith and Shrishti
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Breast Cancer Detection: A Framework to Classify Mammograms
S. Devisuganya and R.C. Suganthe
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Cloud Security: Trust with Swarm Based Scheduling
D. Sumathi and P. Poongodi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Design and Development of Hybrid Energy Control Scheme for
Multi Purpose Usage in a Building
P. Karthikeyan and K. Anbarasan
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
A Survey on Bio Inspired Algorithms for Trusted
AODV Routing Optimization in Manet
V. Keerthika and N. Malarvizhi
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Performance Evaluation of Cyclic Prefix OFDM Using Mimo
R. Meenakshi, P. Indumathi and R. Raja Kumar
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
High Gain Step up Converter Using Multilevel Inverter for HVDC Application
B. Suriya, Ms. T. Lavanya and K. Anbarasan
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
An Implementation of Battery Charging Methods for
Electric Transportation Application
K. Thenmozhi,
Mrs. P. Chandra and K. Anbarasan
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
A Stable and Energy Efficient Clustering Algorithm for
Mobile AD HOC Networks
G.R. Sreekanth and R.C. Suganthe
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————
Study on Big Data
N.V. Monisha, A. Nagalakshmi, Namratha Raj, N. Purnashree and K.R. Suneetha
[ Abstract ] [ Full Text ]
—————————————————————————————————————————————————————————————————————————————————————————————————————————