Issue 29(Computer Sciences, Engineering and Its Applications), 14
Wavelet Based Loseless Huffman Compression Algorithm
for Effective Abnormality Extraction in Medical Thermograms
R. Udayakumar, K.P. Thooyamani and Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Deploying Site-To-Site VPN Connectivity: MPLS Vs IPSec
R. Udayakumar, K.P. Thooyamani and Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
An RFID Perception to Secure Kids: A Conceptual Mapping Approach
R. Udayakumar, K.P. Thooyamani and Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Fresh Information Reterival Using P2P Web Search
R. Udayakumar, K.P. Thooyamani and Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Random Projection Based Data Perturbation Using Geometric Transformation
R. Udayakumar, K.P. Thooyamani and Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
IT Security and Audit
R. Udayakumar, K.P. Thooyamani Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
A Frame Work for Modeling Task Coordination in Multi-Agent Systems
R. Udayakumar, K.P. Thooyamani Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Performance Comparison for DSR and AODV
R. Udayakumar, K.P. Thooyamni Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Power-Efficient Data Fusion Assurance Using Indirect Anti-Voting
Mechanism in Wireless Sensor Networks
R. Udayakumar, K.P. Thooyamani Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Novelty Detection in Stored Video Stream
R. Udayakumar, K.P. Thooyamani Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Dynamic Model of Intelligent Intrusion Detection System
R. Udayakumar, K.P. Thooyamani Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
An Sofm Classifier for Improved Convergence for Detection of
Picks Syndrome Using Wavelet Transforms
R. Udayakumar, K.P. Kaliyamurthie Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
An Analysis on the Modelling Techniques in Building Knowledge Repositories
R. Udayakumar, K.P. Kaliyamurthie, Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Designing ODA for Protein Databases
R. Udayakumar, K.P. Kaliyamurthie, Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
SN-Pass Scheme for Flow Control and Incentive Engineering in
Non-Cooperative MANETs
R. Udayakumar, K.P. Kaliyamurthie, Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Security Requirements in Distributed E-Business Environment
R. Udayakumar, K.P. Kaliyamurthie Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Remote PC Administration Using F_BUS Protocol
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Data Mining a Boon: Predictive System
for University Topper Women in Academia
R. Udayakumar, K.P. Kaliyamurthie, Khanaa and K.P. Thooyamani
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Mechanism to Ensure Success in Software Projects
R. Udayakumar, K.P. Kaliyamurthie, Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Application of Data Mining/Strategic CRM
for Indian Public Sector Banks
R. Udayakumar, K.P. Kaliyamurthie, Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Heterogenous Patterns in Database Using Mining
R. Udayakumar, K.P. Kaliyamurthie Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Random Number Generation and Cryptography with
Four Neighborhood Cellular Automata (4NCA)
R. Udayakumar, K.P. Kaliyamurthie, Khanaa and A.V.Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Modeling of Steganography with Audio Files Using Matlab
R. Udayakumar, K.P. Kaliyamurthie, Khanaa and A.V.Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Concealed Information Aggregation theme for
Multiple applications in Wireless Device Networks
R. Udayakumar, K.P. Kaliyamurthie, Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
A Parallel Implementation to Schedule the Detection of Moving
Object in a Video Sequence by a Genetic Algorithm Approach
R. Udayakumar, K.P. Thooyamani, Khanaa and A.V. Allin Geo
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
An Anomaly Detection Scheme in Mobile AD HOC Network
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Supervised Approach to Extract Sentiments from Unstructured Text
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Trusted Tree Signature Authentication for Multicasting
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Secure and Efficient Ey Distribution for Scada
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Intrusion Detection Techniques in Distributed
Grid Environment Using Analysis Service
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Highly Secured ECC and RSA Based Crypto Processor
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Extra Authentication in ATM Using Bluetooth
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Design and Implementation of Zigbee-RFID Based Vehicle Tracking
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Structure Independent Fault Detection Scheme for
Obtaining a Reliable Advanced Encryption Standard
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Intrusion Detection and Blocking Using Conditional
Random Fields in Layered Approach
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
A Novel Ruin Gratis Fair Digital Contract
Signing Protocol Based on Rsa Signature
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
A Novel Approach Towards Prevention of Spam, Phising,
Controlling Hierarchical Access Using Domain Keys
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Load Balancing in Structured PEER TO PEER Systems
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Modelling Cloud Storage
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Patient Monitoring in Gene Ontology with
Words Computing Using SOM
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Traffic Policing Approach for Wireless Video Conference Traffic
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Two Factor Authentication Using Mobile Phones
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Traffic Balancing on Co-Operative Proxy Caching for Peer to Peer Networks
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Next Major Wave of it Inovation
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Crypto-Devices Algorithms Test Techniques and Fault Detection
R. Udayakumar, V. Khanaa and K.P. Thooyamani
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Energy Efficient Reprogramming for Mobile Sensor Network
R. Udayakumar, V. Khanaa and K.P. Thooyamani
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Efficient Node Replica Detection in Wireless Sensor Networks
R. Udayakumar, V. Khanaa and K.P. Thooyamani
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Dynamic Peer-To-Peer Distributed Document Clustering and Summarization
R. Udayakumar, V. Khanaa and K.P. Thooyamani
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Cooperative Trust Management Scheme for Wireless Sensor Networks
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Tracing the Bugs in Dynamic Web Application Using Failure Detection
Algorithmand Explicit-State Model Checking
K.P.Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Elliptic Curve Cryptography Using in Multicast Network
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Symmetric Key Cryptosystem Using 2d Reversible Cellular Automata
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Impact Of Route Stability Under Random Based Mobility Model In MANET
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
SRW/U as a Lingua Franca in Managing the Diversified Information Resources
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Compact Lens Antenna for 60GHz Millimeter-Wave Applications
R. Udayakumar, V. Khanaa and K.P. Thooyamani
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Efficient Broadcast Authentication with Maximum Lifetime in
Wireless Sensor Networks Using X-TESLA
K.P. Thooyamani, R. Udayakumar and V. Khanaa
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Multi Resigncryption Protocol Scheme for an
Identification of Malicious Mobile Agent Host
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
A Secure and Efficient Authentication System
for Distributed Wireless Sensor Network
V. Khanaa, K.P. Thooyamani and R. Udayakumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
An Enhanced Detection of Exudates in Color Fundus Images of the Human
Retina a Contribution for the Mass Screening of Diabetic Retinopathy
R. Udayakumar, V. Khanaa and K.P. Thooyamani
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————