Research Article: IJIRCCE |
Robot Application of a Brain
Computer Interface To
Staubli Tx40 Robots - Early
Stages |
T.Shanmugapriya, S.Senthilkumar |
|
|
|
Research Article: IJIRCCE |
A Light-weight Data Replication for Cloud Data
Centers Environment |
Mohamed-K HUSSEIN, Mohamed-H MOUSA |
|
|
|
Research Article: IJIRCCE |
New EaaS Cloud Service Model Implementation
for Smart Education |
Dr.JaeChul Oh, HoJun Kim,Dr.Hyun Sim |
|
|
|
Research Article: IJIRCCE |
Advanced Persistent Threats & Recent High
Profile Cyber Threat Encounters |
Vaishali S Raj, Dr. R. Manicka Chezhian, M.Mrithulashri |
|
|
|
Research Article: IJIRCCE |
A Survey for Automatic Detection of Non-
Proliferative Diabetic Retinopathy |
M.Tamilarasi, Dr.K.Duraiswamy |
|
|
|
Research Article: IJIRCCE |
Study on Cloud Computing Model and its
Benefits, Challenges |
K.Kavitha |
|
|
|
Research Article: IJIRCCE |
A Quantitative Analysis of NHPP Based
Software Reliability Growth Models |
Bijoyeta Roy, Santanu Kr. Misra, Aradhana Basak, Aparupa Roy, Deyasini Hazra |
|
|
|
Research Article: IJIRCCE |
Collaborative Filtering Based On Search Engine
Logs |
DR.A.Muthu kumaravel, Mr. Kannan Subramanian |
|
|
|
Research Article: IJIRCCE |
Review on Conversion of Various Block Sizes
in Compressed Domain using DCT |
Vaishali Choudhary, Ketki Bhakare ,Swati Dhopte |
|
|
|
Research Article: IJIRCCE |
A Fast Method of Hands-Free Design Technique
For Adaptive Mobile Communications Systems |
S.Mohanram B.Aarthi C.Silambarasan T.Joyce Selva Hephzibah |
|
|
|
Research Article: IJIRCCE |
A Novel Approach for Breast Cancer Detection using
Data Mining Techniques |
Vikas Chaurasia, Saurabh Pal |
|
|
|
Research Article: IJIRCCE |
Android Application for Doctor‟s Appointment |
Prof. S. B. Choudhari, Chaitanya Kusurkar, Rucha Sonje, Parag Mahajan, Joanna Vaz |
|
|
|
Research Article: IJIRCCE |
An Obfuscation-Based Approach For Protecting
Location Privacy |
S.Thirunavukkarasu, Dr.K.P.Kaliyamurthie |
|
|
|
Research Article: IJIRCCE |
Biological Early Detection of Nasal Dermoid Cyst
Using CT/ MRI Scan - A Review |
Neeraj Singla, Sugandha Sharma |
|
|
|
Research Article: IJIRCCE |
Improved Correlation Preserved Indexing
For Text Mining |
Vinnarasi Tharania. I,M.Kanchana, V.Kavitha |
|
|
|
Research Article: IJIRCCE |
OPTIMIZED VIDEO STREAMING USING MIXED
BAYESIAN OPTIMIZATION TECHNIQUE IN P2P
VIDEO ON DEMAND |
D Sugandhi Mariyal, R Thangamani |
|
|
|
Research Article: IJIRCCE |
Development of DAVE 3D Android Gaming
Application |
Abdul Aleem Shaikh, Karm Raj, Rajat Bhandari,Prof.Anup H. Raut |
|
|
|
Research Article: IJIRCCE |
LBMP: A Logarithm-Barrier-Based Multipath
Protocol for Internet Traffic Management |
S.Thirunavukkarasu, Dr.K.P.Kaliyamurthie |
|
|
|
Research Article: IJIRCCE |
Computing List of Ordered Pairs from Disjoint Closed
Interval to compute a most Probable Delay Path:NPHard
in polynomial time |
Sujit P Nale , S.P Sonavane |
|
|
|
Research Article: IJIRCCE |
Flat Back Index Generation for E-Books: A Tri-gram
Approach |
Saket Soni, Raj Kumar Singh, Sarang Pitale |
|
|
|
Research Article: IJIRCCE |
Dimensional Analysis of GaAs Based Double Barrier
Resonant Tunnelling Diode |
Vivek Sharma, Raminder Preet Pal Singh |
|
|
|
Research Article: IJIRCCE |
Automated Survey Analysis System |
Prof. Arti Bhore, Mr V.V. Mane, Mr S.B. Poul,Mr V.G. Patil4,Mr S.S. Patil |
|
|
|
Research Article: IJIRCCE |
A Behavioral Comparison of LAR with AODV
And DSR Routing Protocols |
Romisha Arora, Noor Fatima Rizvi |
|
|
|
Research Article: IJIRCCE |
Spam Filtering in Online Social Networks Using
Machine Learning Technique |
T.Suganya, T.Hemalatha |
|
|
|
Research Article: IJIRCCE |
Multi-Objective Reactive Power Compensation
Using Evolutionary Programming and Particle
Swarm Optimization |
J. Madhavan, K.R. Venkatesan |
|
|
|
Research Article: IJIRCCE |
Estimation of Software Quality using Object
Oriented Design Metrics |
Ritu Chauhan, Rahul Singh , Ashish Saraswat, Anwar Husain Joya, Vinit Kumar Gunjan |
|
|
|
Research Article: IJIRCCE |
Review on Data Mining Techniques for
Intrusion Detection System |
Sandeep D, M. S. Chaudhari |
|
|
|
Research Article: IJIRCCE |
Implementation of Link Layer of USB 3.1 |
Durgesh Kumar Sahu, Prof. Shweta Singh, Asst. Prof. Nitin Meena |
|
|
|
Research Article: IJIRCCE |
Sentiment Analysis Using Support Vector
Machine |
Ms. Gaurangi Patil, Ms. Varsha Galande, Mr. Vedant Kekan, Ms. Kalpana Dange |
|
|
|
Research Article: IJIRCCE |
Performance Evaluation of Conventional
Controller for Positive Output Re Lift LUO
Converter |
Sivakumar.A, Ajin Sekhar.S.C, Ronal Marian.A ,Sasikumar.M |
|
|
|
Research Article: IJIRCCE |
Mining Big Sources using Efficient Data
Mining Algorithms |
Shoban Babu Sriramoju |
|
|
|
Research Article: IJIRCCE |
Automatic Defect Detection Algorithm for Woven
Fabric using Artificial Neural Network Techniques |
Dr. G. M. Nasira , P.Banumathi |
|
|
|
Research Article: IJIRCCE |
A Study on Web Services Performance
Measurements and Its Techniques |
Mathavi parvathi, Pandimurugan, Dr.Paul rodrigues |
|
|
|
Research Article: IJIRCCE |
Health Monitoring Systems for Antiquated Peoples-A
Survey |
Pandimurugan , Mathavi parvathi , Dr.Paul rodrigues |
|
|
|
Research Article: IJIRCCE |
Reversible Data Hiding using Visual Cryptography: A
Review |
Assistant Professor, Dept of MCA, Shri Ramdeobaba College of Engg. and Mgmt., Nagpur, India |
|
|
|
Research Article: IJIRCCE |
Study of Compute Application Resources
Sharing for Android with Cloud Computing |
R.Murugan |
|
|
|
Research Article: IJIRCCE |
Scalable Management Strategies using Mobile Agents in
Optical Transport Network |
Anish Saini & Dr. Atul Mishra |
|
|
|
Research Article: IJIRCCE |
An Alternative Technique to Perform Surgeriesin
Hospital by Surgical Diathermy |
S.S.Shende, P.B.Dahikar, MJ.Hedau, K.Y. Rokde |
|
|
|
Research Article: IJIRCCE |
Multi-slots Reconfigurable Microstrip
Antenna with Capacitive Loading Technique |
Chandrappa D N, Ambresh P A, Vani R M, P V Hunagund |
|
|
|
Research Article: IJIRCCE |
A Survey on the Solutions for the Problems of
Denial of sleep Attacks |
RamandeepKaur, Vinodsharma |
|
|
|
Research Article: IJIRCCE |
Fractal Image Steganography Using Non
Linear Model |
G.Suryakala Eswari , N.Leelavathy, U.Sandhya Rani |
|
|
|
Research Article: IJIRCCE |
Data mining: Techniques for Enhancing Customer
Relationship Management in Banking and Retail
Industries |
P Salman Raju, Dr V Rama Bai, G Krishna Chaitanya |
|
|
|
Research Article: IJIRCCE |
Secure Paper Distribution on Cloud Using Reencryption |
Prof.A.G.Nadaph1,Amol Dashwant2, Dipali Bhivare3, Shrikrishn Badade4, Pratik Jadhav5 |
|
|
|
Research Article: IJIRCCE |
PERFORMANCE ANALYSIS OF MULTICARRIER
CDMA SYSTEMS |
Pavani Sumala, R.Prasanth , R.A.S.Bharadwaj , Shaik Azeez,V.Nancharaiah |
|
|
|
Research Article: IJIRCCE |
A Review on Processing Big Data |
Dr. Shoban Babu Sriramoju |
|
|
|
Research Article: IJIRCCE |
A Secure Distributed Peer To Peer Systems |
H.Shaheen , M.Baskaran |
|
|
|
Research Article: IJIRCCE |
Real Time Face Tracking By Using Naïve
Bayes Classifier |
Krishna Priya Arni , Satish Ammuloju, Jagan Mohan Vithalachari Gollapalli, Dinesh Bhogapurapu Shaik Azeez |
|
|
|
Research Article: IJIRCCE |
A Secure Framework for Protection of Social Networks
from Information Stealing Attacks |
Dr. M.BalaGanesh Mrs.V.Sathya S.Vinoth Kumar |
|
|
|
Research Article: IJIRCCE |
Design of an Efficient Low power Shift Register
using Double Edge Triggered Flip-flop |
Renganayaki G , Jeyakumar.V |
|
|
|
Research Article: IJIRCCE |
Modeling of UPFC Using Model Predictive Control and
Bacterial Foraging Algorithm |
Mr.B.Gopinath, Ms.N.Vinothini, Dr.S.Suresh kumar |
|
|
|
Research Article: IJIRCCE |
Image Sharing in Clouds based on N-Server
Forward Re-encryption System |
S.Ephina Thendral , S.Indra Priyadharshini |
|
|
|
Research Article: IJIRCCE |
Development of Fuzzy based categorical Text
Clustering Algorithm for Information Retrieval |
S.M. Jagatheesan, V. Thiagarasu |
|
|
|
Research Article: IJIRCCE |
Region of Interest Based Image Compression |
PratikChavada, Narendra Patel, KanuPatel |
|
|
|
Research Article: IJIRCCE |
A Comparative Study of Frequent Pattern
Recognization Techniques from Stream Data |
F.M.Christian, N.C.Chauhan, N.B.Prajapati |
|
|
|
Research Article: IJIRCCE |
Comparative Analysis of Different Feature Extraction
and Classifier Techniques for Speaker Identification
Systems: A Review |
Jeet Kumar, Om Prakash Prabhakar , Navneet Kumar Sahu |
|
|
|
Research Article: IJIRCCE |
Performance analysis of Absolute Deviation Filter for
Removal of Impulse Noise |
G.Bindu, M.Upendra , B.Venkatesh, G.Gowreeswari , K.T.P.S.Kumar |
|
|
|
Research Article: IJIRCCE |
A Comparative Analysis of Various Representations of
Human Action Recognition in a Video |
Akila.K , Chitrakala.S |
|
|
|
Research Article: IJIRCCE |
Security for Green Communication in
Heterogeneous Wireless Networks |
Elamathi.N, Dr.S.Jayashri |
|
|
|
Special Issue Article: IJIRCCE |
Taint Flow Analysis for the Detection of Buffer
Overflow Attacks |
Abu Imran K |
|
|
|
Special Issue Article: IJIRCCE |
Clustering Enormous and Uncertain Data Steam |
A.Ashok kumar, Dr.P.Vivekanandan |
|
|
|
Special Issue Article: IJIRCCE |
Effective Image Resizing By Combining Scaling,
Seam Carving and Canny Edge Detector |
S.K. Kavinmuhil, Dr. R. Manimegalai |
|
|
|
Special Issue Article: IJIRCCE |
RCAETP: Reliable and Congestion Aware
Event Transmission Protocol in a Wireless
Sensor Network |
Sreejish Soman, A.Kaleeswaran |
|
|
|
Special Issue Article: IJIRCCE |
Mitigating Superfluous Flooding of Control
Packets MANET |
B.Shanmugha Priya |
|
|
|
Special Issue Article: IJIRCCE |
An innovative approach in Information
Extraction using Ontology for Geospatial
Domain |
A.Karthic |
|
|
|
Special Issue Article: IJIRCCE |
Web Database Search Result Annotation |
M.Manivasakam, N.Yuvraj |
|
|
|
Special Issue Article: IJIRCCE |
An Improved CBIR Method Using Color and
Texture Properties with Relevance Feedback |
MS. R. Janani, Sebhakumar.P |
|
|
|
Special Issue Article: IJIRCCE |
Secure & Energy-Efficient Intrusion Detection in
WSN |
B. Kalidass, V. Ramasamy |
|
|
|
Special Issue Article: IJIRCCE |
Design and Development Web Server and
Embedded Based Agriculture Automation with
Remote Monitoring System |
Udhaya.D |
|
|
|
Special Issue Article: IJIRCCE |
Improving Security of Single Sign-On
Mechanism for Distributed Service Enviornment |
Ragendu .T.B, Dr. R. Manimegalai |
|
|
|
Special Issue Article: IJIRCCE |
Multirate Multicarrier CDMA via Orthogonal
Codes for Wireless Mobile Communication |
B.Atchaya, J.Sudharsan, A.Thillipan |
|
|
|
Special Issue Article: IJIRCCE |
Unitary Differential Space Time Frequency Codes
For MB-OFDM Uwb Wireless Communications |
E.Senthamilpaavai, K.Shalini |
|
|
|
Special Issue Article: IJIRCCE |
An Effective Energy and Latency Of Full Text
Search Based On TWIG Pattern Queries Over
Wireless XML |
A.Rajathilak, A.Lalitha |
|
|
|
Special Issue Article: IJIRCCE |
A Weighted OFDM Signal Scheme for Peak To
Average Power Ratio Reduction Of OFDM
Signals |
C.Kayalvizhi, C.Paranitharan |
|
|
|
Special Issue Article: IJIRCCE |
Optimization based on PSO-ANFIS in Water bath
Temperature System |
K.S.Naveenkumar, Dr.S.Visalakshi |
|
|
|
Special Issue Article: IJIRCCE |
Personalized Mobile search engine with GPCA
Algorithm |
K. Murugan, S. Suma |
|
|
|
Special Issue Article: IJIRCCE |
Threshold Technique for Mobile Ad-Hoc Networks
Using Secured Revocation Check |
D.C. John Thangaraj, R.Tamilarasi |
|
|
|
Special Issue Article: IJIRCCE |
Palmprint Recognition Using Adaptive
Histogram Equalization and Discrete Curvelet
Transform |
Gopisivaraman.P, Udhayakumar.G |
|
|
|
Special Issue Article: IJIRCCE |
HealthCare Monitoring Solution with Decryption
Outsourcing by Parallel Computing in Cloud |
Mr.K.Ganesan, Mr.C.Vijayakumaran |
|
|
|
Special Issue Article: IJIRCCE |
Multiuser MIMO in LTE Advanced |
K. Dhivya, P.Perumal |
|
|
|
Special Issue Article: IJIRCCE |
Multipath Routing for Redundancy Management in
Mobile Ad-hoc Networks |
A. Thillipan, S. Dinesh Kumar |
|
|
|
Special Issue Article: IJIRCCE |
Usability Matrix On Dynamic Datasets For Cloud
Storage Solution Framework |
Ms.S.Dharani, Ms.S.Shanthi |
|
|
|
Special Issue Article: IJIRCCE |
Ocular Artifacts Reduction in EEG Using DWT
And ANC For Portable Applications |
R.Hemakumar, G.Banumathy |
|
|
|
Special Issue Article: IJIRCCE |
Decentralised Access Control with Aggregate
Key Encyryption For Data Stored In Cloud |
Mr. Ashwin Chandra C, Ms. Dharani S |
|
|
|
Special Issue Article: IJIRCCE |
A Modified Bec Logic Design of High Speed Csla
For Low Power And Area Efficient Applications |
D.Kumaresan, D.Jeyamani M.E, V.Vishnuprasath M.E |
|
|
|
Special Issue Article: IJIRCCE |
Multi-Sensor Railway Track Geometry
Surveying System |
Sureshkumar.R, Marimuthu.M, S. Rajeshwari |
|
|
|
Special Issue Article: IJIRCCE |
Survey of Various Techniques to Provide
Multilevel Trust in Privacy Preserving Data
Mining |
R.Mynavathi, N.Sowmiya, D.Vanitha |
|
|
|
Special Issue Article: IJIRCCE |
Improvisation of Fault Classification and
Detection |
Thilagavathi R, Anitha Raj B, Gajalakshmi N |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Resources Allocation and Reduce
Energy Using Virtual Machines for Cloud
Environment |
R.Giridharan |
|
|
|
Special Issue Article: IJIRCCE |
A Survey on Cloud Storage |
Swathi.C, Vishnupriya. S, Rajeshkumar.R |
|
|
|
Special Issue Article: IJIRCCE |
A Hierarchical Approach for the Resource
Management of Very Large Cloud Platforms |
R.Kavitha |
|
|
|
Special Issue Article: IJIRCCE |
Payment Scheme for Identifying Cheating Reports
in Multihop Wireless Networks |
Ms.T.Thenmozhi, Mr.Arunkumar |
|
|
|
Special Issue Article: IJIRCCE |
Back-Bone Assisted Hop Greedy Routing in
Vanets |
Ms.Priyanka.G, Mr.Sundareswari.K |
|
|
|
Special Issue Article: IJIRCCE |
TAKE DIVERSION Driving Directions with
Taxi Drivers Intelligence |
Dr.J.Subashchandra Bose, S.Mohan Raj, Karthikeyan.T, Devaneyan.P, Kannan.M, Dharanikumar.S |
|
|
|
Special Issue Article: IJIRCCE |
Performance Analysis Of Time Hopping Ultra
Wideband Communication System |
Mr.R.Kiruthika, Mr.K.Ramprakash |
|
|
|
Special Issue Article: IJIRCCE |
Sybil Attack Detection in Urban Vehicular
Networks |
R.Perumal, K.P.Sridhar |
|
|
|
Special Issue Article: IJIRCCE |
Activity Recognition from Video in Day or Night
Using Fuzzy Clustering Techniques |
T.Udhayakumar, S.Anandha Saravanan |
|
|
|
Special Issue Article: IJIRCCE |
Implementation of E2AODV Protocol for Load
Balancing In Cluster Ad-Hoc Network |
A.S.Narmadha, C.Vasanthapriya, D.Sangeetha |
|
|
|
Special Issue Article: IJIRCCE |
A Novel Architecture of SRAM Cell Using
Single Bit-Line |
G.Kalaiarasi, V.Indhumaraghathavalli, A.Manoranjitham, P.Narmatha |
|
|
|
Special Issue Article: IJIRCCE |
Reduction of Delay and Power by Using MLDD
Technique in Error Correction |
S.Abinaya, Mr.M.Yuvaraja |
|
|
|
Special Issue Article: IJIRCCE |
An Adaptive Contrast Enhancement of Colored
Foggy Images |
S.Mohanram, T. Joyce Selva Hephzibah, Aarthi.B, Sakthivel.P |
|
|
|
Special Issue Article: IJIRCCE |
Mitigating Malicious Activities by Providing New
Acknowledgment Approach |
G. S. Devi Lakshmi, J. Rajasekaran |
|
|
|
Special Issue Article: IJIRCCE |
MEMS Accelerometer based Digital Pen
Recognition using Neural Networks |
A. Geetha Vinothini, V. Vishnu Prasath |
|
|
|
Special Issue Article: IJIRCCE |
A Scheme for Detection of License Number
Plate by the Application of Genetic Algorithms |
A.M. Gowshalya Shri (M.E-CSE) , M. Arulprakash M.Tech., |
|
|
|
Special Issue Article: IJIRCCE |
Majority Logic Decoding Of Euclidean Geometry
Low Density Parity Check (EG-LDPC) Codes |
P. Kalai Mani, V. Vishnu Prasath |
|
|
|
Special Issue Article: IJIRCCE |
Cryptography Based Data Aggregation Scheme
for Data Integrity Analysis in Wireless Sensor
Networks |
R. Kaleeswari, M.N.Karuppusamy |
|
|
|
Special Issue Article: IJIRCCE |
Parallel AES Encryption Engines for Many-Core
Processor Arrays |
H. Naveen, M. Ramesh |
|
|
|
Special Issue Article: IJIRCCE |
Detection of Digital Image Forgeries by
Illuminant Color Estimation and Classification |
S. Rajapriya, S. Nima Judith Vinmathi |
|
|
|
Special Issue Article: IJIRCCE |
Improve the QoS of Networks Using Advanced
Hybrid Routing in WSN |
A.S. Jennathul Firthouse, S. Sasikumar |
|
|
|
Special Issue Article: IJIRCCE |
A Power Balancing Approach for Efficient Route
Discovery by Selecting Link Stability Neighbours
in Manet |
D. Rex Alex Paul, M. Prem Kumar |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Single Sign on Scheme for Distributed
Networks |
N. Rubiya (M.E-CSE), M. Arulprakash M.TECH. |
|
|
|
Special Issue Article: IJIRCCE |
Voice Recognition Robot for Visually Impaired
People |
M. Joshuva Regan, S.R.Barkunan |
|
|
|
Special Issue Article: IJIRCCE |
Grid Computing:
A solution to processing time and power issues |
Ms. B. Sornalatha |
|
|
|
Special Issue Article: IJIRCCE |
Enhanced Routing in Mobile Adhoc Network
against Denial of Service Attack |
V.R.Nisha, S.Rajeswari |
|
|
|
Special Issue Article: IJIRCCE |
Elliptic Curve Cryptography in Cloud
Architectures With Lower Latency |
R.Balaji, N. Karthick Gowtham |
|
|
|
Special Issue Article: IJIRCCE |
Sybil Attack Detection with Reduced Bandwidth
overhead in Urban Vehicular Networks |
D.Balamahalakshmi |
|
|
|
Special Issue Article: IJIRCCE |
Power Optimization in FPGA through Controller
Device |
V.Pavithra, T.Suganya, V.Suganya |
|
|
|
Special Issue Article: IJIRCCE |
Secure Crypto Multimodal Biometric System
for the Privacy Protection of User Identification |
M. Devi |
|
|
|
Special Issue Article: IJIRCCE |
Detecting Threads in Secure Communication
using RCEE |
T.Mathupriya |
|
|
|
Special Issue Article: IJIRCCE |
Energy Histogram for Image Retrieval using
Relevance Feedback |
Subashini.M, Narayanan.R.C, Dr.K.Krishnamoorthy |
|
|
|
Special Issue Article: IJIRCCE |
Near Duplicate Document Detection Using
Document-Level Features and Supervised
Learning |
Raveena.S, Nandini.V |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Approach for Requirement
Traceability Integrated With Software Repository |
P.M.G.Jegathambal, N.Balaji |
|
|
|
Special Issue Article: IJIRCCE |
Encryption of Cryptographic key technique by
crossover of Iris and Face Biometric key |
Gokulakumar.A.S, Venkataraghavan.C, Kavya priya.S, Suganya.T |
|
|
|
Special Issue Article: IJIRCCE |
Developing Intonation Pattern for Tamil Text To
Speech Synthesis System |
K.C.Rajeswari, G. Karthick Prabu |
|
|
|
Special Issue Article: IJIRCCE |
An Iterative Approach to Record Deduplication |
M. Roshini Karunya, S. Lalitha, B.Tech., M.E., |
|
|
|
Special Issue Article: IJIRCCE |
Optimal Top-K Queries Computing: Sampling and
Energetic Development Approach |
Marthe Ranjani A, Mrs.Ananthi M |
|
|
|
Special Issue Article: IJIRCCE |
Biometric Fingerprint Verification System Based on
BFS using Ridge Features |
S.Revathi, T.Naveena |
|
|
|
Special Issue Article: IJIRCCE |
Time Constrained Data Destruction in Cloud |
M.Nandhini, S.Jenila |
|
|
|
Special Issue Article: IJIRCCE |
Experimental Investigation Decentralized IaaS
Cloud Architecture Open Stack with CDT |
S. Gobinath, S. Saravanan |
|
|
|
Special Issue Article: IJIRCCE |
Contourlet Based Image Denoising Using New-
Threshold Function |
Sakthivel K. |
|
|
|
Special Issue Article: IJIRCCE |
Cost Effective Resource Mapping Based
Requisition Partitioning Through Iterated
Local Search |
R. Hema, M. Siva Kumar, R. Devi |
|
|
|
Special Issue Article: IJIRCCE |
Smart-Puter Based Sectrol for Vehicles |
R.Jeevitha, R. Prasad, L.Nishanth, D.Vignesh Kirubaharan, S.M.Boobalakumaran |
|
|
|
Special Issue Article: IJIRCCE |
Nonwhite Noise Reduction In Hyperspectral
Images |
Mrs.Suryatheja.M.B, Gokilamani.R |
|
|
|
Special Issue Article: IJIRCCE |
Restoring Degraded Documents by Using Neural
Network - KSOM Based Hybrid Techniques |
S.Nanthini and M.Yuvarani |
|
|
|
Special Issue Article: IJIRCCE |
�An Efficient Approach to Enhance Security for
Android Applications |
Dr.A.Gnanabaskaran, M. Dinesh Kumar, M.Dinesh, K.Latha, S.Nithya, C.Prakash6 |
|
|
|
Special Issue Article: IJIRCCE |
Garment Company Automation Using the
Concept Of Big Data And Open Source Software |
M.K. Ama Gayathri Surangika, S. Ananthi, G. Anitha, M. Sivaranjani |
|
|
|
Special Issue Article: IJIRCCE |
Dynamic Virtual Machine Scheduling for
Resource Sharing In the Cloud
Environment |
Karthika.M |
|
|
|
Special Issue Article: IJIRCCE |
ICGICT-213-Internet Based User Service-Mobile
Computing Internet Based User Service |
SiniJoy P J, Dr. T. Sheela |
|
|
|
Special Issue Article: IJIRCCE |
Securing and Region Based Algorithms For
Wireless Sensor Networks |
M.M.Chithra, A.Gayathri, S. Selva Birunda |
|
|
|
Special Issue Article: IJIRCCE |
Design & Implementation of Nios II Processor
for Low Powered Embedded Systems |
R. BalaKumar, S. Kalimuthukumar |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Transmission over Cooperative
Groups Using Hybrid Scheme |
K.Banupriya |
|
|
|
Special Issue Article: IJIRCCE |
System of Quality Automation for Documents
(SQAD) |
R. Babi Saraswathi, K. Divya, A. Habeebur Rahman, D.B.HariPrakash, S.Jayanth, T.Kumar, S. Mohan Kumar |
|
|
|
Special Issue Article: IJIRCCE |
A Comparative Study of Software Effort
Estimation Using Fuzzy Logic Membership
Function |
R.Akalya, K.Meera |
|
|
|
Special Issue Article: IJIRCCE |
Video Enhancement Based on Piecewise Tone
Mapping |
T. Manikandan |
|
|
|
Special Issue Article: IJIRCCE |
Meta Heuristic Harmony Search Algorithm for
Network Reconfiguration and Distributed
Generation Allocation |
Sangeetha N, Prof. Jalendiran J |
|
|
|
Special Issue Article: IJIRCCE |
GNSS Based Bus Monitoring And Sending SMS
To The Passengers |
A.Kannaki@VasanthaAzhagu, N.Vijayalashmy, V.Yamuna, G.Rupavani, G.Jeyalakshmy |
|
|
|
Special Issue Article: IJIRCCE |
Integrating Wireless Sensor Networks into Internet
Of Things For Security |
M.Tharani, N. Senthilkumar |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Retrieval of Encrypted Data In Cloud
Computing |
N.Nandhini and P.G Kathiravan |
|
|
|
Special Issue Article: IJIRCCE |
Discovering Patterns of Human Interaction in
Meetings Using Tree-Based Mining |
S.Abarna |
|
|
|
Special Issue Article: IJIRCCE |
Enhancing Map-Reduce Framework for Bigdata
with Hierarchical Clustering |
Vadive.M, Raghunath.V |
|
|
|
Special Issue Article: IJIRCCE |
Performance and Analysis of Video Streaming of
Signals in Wireless Network Transmission |
Chinnusamy.K, Abinaya Preethi.K |
|
|
|
Special Issue Article: IJIRCCE |
Secure Data Sharing for Dynamic and Large
Groups in the Cloud |
M.R. Kalai Selvi |
|
|
|
Special Issue Article: IJIRCCE |
A Roadmap to an Enhanced Graph Based Data
mining Approach for Multi-Relational Data mining |
D.Kavinya |
|
|
|
Special Issue Article: IJIRCCE |
Three Step Password Scheme for Secured Data
Transfer |
M.S.Vinu, R.T.Nivetha, M. Mano Chitra, K.Priyadharsini |
|
|
|
Special Issue Article: IJIRCCE |
A Hybrid BTF Approach for Temporal Query
Processing In the Patented Medical Database |
T. Yogameera, Dr.D.Shanthi Saravanan |
|
|
|
Special Issue Article: IJIRCCE |
Automation of URL Discovery and Flattering
Mechanism in Live Forum Threads |
T.Nagajothi, M.S.Thanabal |
|
|
|
Special Issue Article: IJIRCCE |
Detection and Mitigation of DDOS Attacks By
Circular IPS Protection Network |
S. Shanthini Priyanka, S. Hasan Hussain |
|
|
|
Special Issue Article: IJIRCCE |
Trust Aware Secure Routing for Cluster-based
Wireless Sensor Networks - A Comparative
Study |
P.Prittopaul, Dr.N.Shankarram |
|
|
|
Special Issue Article: IJIRCCE |
Risk-Awareness for Manet Routing Attacks
Based On D-S Theory |
Geethanjali.B, P.Arulprakash M.E., (Ph.D), Dhanasekaran.G |
|
|
|
Special Issue Article: IJIRCCE |
Detection of Cheater Nodes Based On Evidences
and Reports in MultiHop Wireless Networks |
S.Sowbakiyalakshmi, B.Sathishkumar |
|
|
|
Special Issue Article: IJIRCCE |
Reducing Data Redundancy Scheme in
Heterogeneous Cloud Storage |
Saranya.A, Sadhasivam.N |
|
|
|
Special Issue Article: IJIRCCE |
A Trust Based Mechanism for Preventing
Noncooperative Eavesdropping in WSN |
Hemalatha.P, Mary Shyamala.L |
|
|
|
Special Issue Article: IJIRCCE |
Analyse the New Path Weight Using Hop By
Hop Routing Mesh Networks |
Sangeetha. C, Rajkumar. S |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Detection and Elimination of Vampire
Attacks in Wireless Ad-Hoc Sensor Networks |
K.Sivakumar, P.Murugapriya |
|
|
|
Special Issue Article: IJIRCCE |
A Survey on Energy Efficient Hierarchical (Leach)
Clustering Algorithms in Wireless Sensor Network |
M.Usha, Dr.N.Sankarram |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Cluster Based CCRVC Scheme in Manet |
Mrs.U.Devisree, Mrs.M.santhi |
|
|
|
Special Issue Article: IJIRCCE |
Enhancing the High Performance Resource
Allocation and Data Sharing in Cloud Computing |
Ramya Krishnasamy and P.G.Kathiravan |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Dynamic Multilevel Priority Task
Scheduling For Wireless Sensor Networks |
Mrs.K.Indumathi, Mrs. M. Santhi |
|
|
|
Special Issue Article: IJIRCCE |
Automated Diagnosis of Cardiac Health |
Suganya.V |
|
|
|
Special Issue Article: IJIRCCE |
A Performance Analysis for Manet Using Secured
Algorithm |
A.Vijayalakshmi |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Approach for Emergency Message
Dissemination in VANET |
Shibu.J, Ramkumar.R, D.Gowthami, S.G.Siddharth |
|
|
|
Special Issue Article: IJIRCCE |
SPOT- E-mail Spam Zombie Detection System |
Arathy Rajagopal, ArulPrakash.P M.E., (Ph.D.) |
|
|
|
Special Issue Article: IJIRCCE |
Implementation of 3-Tier Architecture Using
C-MART |
M.Poovizhi, S.Kalpana |
|
|
|
Special Issue Article: IJIRCCE |
Highly Efficient and Intelligent Indoor and
Outdoor Lighting System Using a ZigBee
Network of Devices and Sensors |
P.Dhinakar, R.Pradeepraja, R.Preethilatha, M.Barani, S.Shanmathi |
|
|
|
Special Issue Article: IJIRCCE |
Border Alert System for Boats Using Zigbee |
Suresh.M, Gandhiraj.S, Saranya.T, Thenmozhi.S, Divya.M.M |
|
|
|
Special Issue Article: IJIRCCE |
Secure Data Sharing in Cloud Environment
Using Multi Authority Attribute Based
Encryption |
K.Divya, N.Sadhasivam |
|
|
|
Special Issue Article: IJIRCCE |
Avoiding Overload Using Virtual Machine in
Cloud Data Centre |
Ms.S.Indumathi, Mr. P. Ranjithkumar |
|
|
|
Special Issue Article: IJIRCCE |
Vibrant Resource Allocation Algorithms using
Virtual Machine in Cloud-Survey |
B. Magesh Kumar, C. Ramesh |
|
|
|
Special Issue Article: IJIRCCE |
Protected Patients Data Centre in Cloud
Computing |
Ms.M.Shanthi, Mr. P. Ranjithkumar |
|
|
|
Special Issue Article: IJIRCCE |
An Architecture to Enhance Privacy and Security
in Collaborative Systems |
Ms. G. Sathya M.E. , Mr. K. Loganathan M.E., |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Management Algorithm for Non-
Interrupting Data Communication in Wireless
Networks |
Jeeva.R and R.Natchadalingam |
|
|
|
Special Issue Article: IJIRCCE |
Enhancing the Efficiency of Secure and
Distributed Reprogramming Protocol for
Wireless Sensor Network |
Sandeepa Perumalsamy, Balaji Subramani |
|
|
|
Special Issue Article: IJIRCCE |
Simple Algorithm for the Magnetic Field
Computation in Bobbin Coil Arrangement |
V.Suresh, V.K.Gopperundevi, Dr.A.Abudhahir, R.Antonysamy, K.Muthukkutti |
|
|
|
Special Issue Article: IJIRCCE |
Entity Recognition in a Web Based Join
Structure |
J.Kavitha M.Tech, A.Pasca Mary |
|
|
|
Special Issue Article: IJIRCCE |
Multi Organization Records Sharing in Cloud
Computing Using Attribute Based Encryption |
ME, Department of CSE, SSM College of Engineering, Komarapalayam, Tamil Nadu, India |
|
|
|
Special Issue Article: IJIRCCE |
Authentication of Online Digitized Content Using
Trapdoor Hash Function Method |
M.Muthuselvi, P.Jeevananthini |
|
|
|
Special Issue Article: IJIRCCE |
Reducing Burst Transmission Error by Honey
comb method in Sensor networks |
D. Saranya |
|
|
|
Special Issue Article: IJIRCCE |
An Elastic and Scalable Data Streaming System for
Distributed Cloud |
S.B. Daniel Barnabas M.E |
|
|
|
Special Issue Article: IJIRCCE |
APU - Mobility Prediction Scheme for Routing
Protocols in MANET |
Archana.S.S, P.Arulprakash M.E., (Ph.D), Priyanka.S |
|
|
|
Special Issue Article: IJIRCCE |
Brain Gate Technology |
Manjunatha .V |
|
|
|
Special Issue Article: IJIRCCE |
Secure Sharing Of Data for Dynamic Multi
Owner in Cloud Storage |
S.Surya, V.Karuppuchamy |
|
|
|
Special Issue Article: IJIRCCE |
MD5: Anonymous Location-Aided Routing in
Suspicious Secure MANETs |
Manjuladevi.V, Jennie Bharathi.R |
|
|
|
Special Issue Article: IJIRCCE |
ECG Steganography Based Privacy Protecting Of Medical Data for
Telemedicine Application |
N. Suganya,M.Marimuthu |
|
|
|
Special Issue Article: IJIRCCE |
A Preserving Location Privacy of Mobile Network |
P. Sakthi Priyanka and B. Raja Rajeswari, Tamilnadu, India |
|
|
|
Special Issue Article: IJIRCCE |
Authenticating Service Request in Kernel Mode
against Malicious Code |
D. Raghu Raman, K.Rajan |
|
|
|
Special Issue Article: IJIRCCE |
Recognizing and Mask Removal in 3D Faces Even
In Presence of Occlusions |
M.Dhivya, P.Purushothaman |
|
|
|
Special Issue Article: IJIRCCE |
Maintaining Privacy and Secrecy in Untrusted
Network with Stile |
M. Anbu Chezhian, S.Ramalakhsmi |
|
|
|
Special Issue Article: IJIRCCE |
Adaptive Fuzzy Based Solution of Inverted
Pendulum & Aircraft Landing Problems |
Vijayalakshmi.J, Pavithra.R, Rudresha.M |
|
|
|
Special Issue Article: IJIRCCE |
Camerareadycopy-ICGICT-403-Cloud Computing
(Networks) |
S. Kalaichelvi |
|
|
|
Special Issue Article: IJIRCCE |
The Brain Fingerprinting Technology |
K. Logeshwari |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient I/O Cost Model for Novel Indexing
algorithms in a Joint Top K Spatial Keyword
Query Processing |
T. Bairavi, R. Priya, A. Evangelin |
|
|
|
Special Issue Article: IJIRCCE |
A Novel Approach to Ranking On Data Manifold
With Sink Points |
A. Mahesh. M.E. , G.R.Sumithra |
|
|
|
Special Issue Article: IJIRCCE |
A Fuzzy Ontology Based Automatic Video
Content Retrieval |
P.Anlet pamila suhi, S.Deepika |
|
|
|
Special Issue Article: IJIRCCE |
Optimized Data Transmission from Cloud to
Society by Mapreduce |
S.P.Prasanth and P.G.Kathiravan |
|
|
|
Special Issue Article: IJIRCCE |
Analysis and Principles of Green UI Design for
Web Portals |
S.Vetrivel, S.Pandikumar, M.Athigopal |
|
|
|
Special Issue Article: IJIRCCE |
Fingerprint Matching Incorporating Ridge
Features Using Contourlet Transforms |
M.S. Keerthana |
|
|
|
Special Issue Article: IJIRCCE |
Non-Invasive EEG Based Wireless Brain
Computer Interface for Safety Applications
Using Embedded Systems |
Uma.K.J, Mr. C. Santha Kumar |
|
|
|
Special Issue Article: IJIRCCE |
An Improved Privacy Preserved Rule Mining for
Credit Dataset with Discrimination Prevention |
Boopathiraja K, Nithyakalyani S M.E., (Ph.D) |
|
|
|
Special Issue Article: IJIRCCE |
Hyperspectral Image Resolution Enhancement
Using Object Tagging OLHE Technique |
R. Dhivya, S. Agustin Vijay |
|
|
|
Special Issue Article: IJIRCCE |
Artificial Intelligence
(Biologically inspired intelligent robots using
artificial muscles) |
B.Nandadeepa |
|
|
|
Special Issue Article: IJIRCCE |
An Improved Semi-Supervised Clustering
Algorithm Based on Active Learning |
S.Shalini, R.Raja |
|
|
|
Special Issue Article: IJIRCCE |
Multidimensional Image Registered Scanner using
MDPSO (Multi-objective Discrete Particle Swarm
Optimization) |
Rishiganesh V, Swaruba P |
|
|
|
Special Issue Article: IJIRCCE |
Privacy-Preserving Data Sharing for Dynamic
Groups in the Cloud: A Survey |
S.Mythili, M.Velmurugan |
|
|
|
Special Issue Article: IJIRCCE |
An Optimal Cloud Service Selection Based on the
QoS Values: A Survey |
Sobhika, Rajagopal |
|
|
|
Special Issue Article: IJIRCCE |
Brain Gate Technology |
Manjunatha .V |
|
|
|
Special Issue Article: IJIRCCE |
A support for end user-Centric SLA
administration of Cloud-Hosted Databases |
A.Vasanthapriya, Mr. P. Matheswaran, M.E |
|
|
|
Special Issue Article: IJIRCCE |
SeCom: A Novel Approach for Malware
Confiscation in OS level Virtual Machines |
R. Hema, T. VetriSelvi |
|
|
|
Special Issue Article: IJIRCCE |
Disperse Processin Of Presumption Top-K Inquire
In Wireless Sensor Networks |
M.P.Navaneedha, P. Matheswaran |
|
|
|
Special Issue Article: IJIRCCE |
User Behaviour Prediction Based Adaptive
Mobile Video Streaming and Efficient Social
Video Sharing in the Clouds |
Prabhu R, Gautham K, Nagajothi A |
|
|
|
Special Issue Article: IJIRCCE |
Grid connected renewable energy system
using unified power quality conditioner for
improving power quality |
A.Jayaprakash, D.Jananisri |
|
|
|
Special Issue Article: IJIRCCE |
Cluster Based Intrusion Detection System for
Wireless Sensor Networks |
Gopi K, Sivaprakash S |
|
|
|
Special Issue Article: IJIRCCE |
Bandwidth Scheduling for Content Delivery in
VANET |
Babu G , Uma Maheswari M |
|
|
|
Special Issue Article: IJIRCCE |
Personal Authentication using Fingerprint
Biometric System |
V Prasathkumar, Mrs. V. Evelyn Brindha |
|
|
|
Special Issue Article: IJIRCCE |
Presence Server For Mobile Ubiquity Services In
Presence Cloud |
D. Dhiravida Vasantha Nayaki, G. Mangayarkarasi |
|
|
|
Special Issue Article: IJIRCCE |
RFID Based Smart Grid with Power Factor
Maintenance in Load Side |
B.Rajesh Kumar,G.kiruthika |
|
|
|
Special Issue Article: IJIRCCE |
ICGICT Allocation of DG for IEEE 33 Bus
Systems |
S.Ishwarya, P.R.Surya |
|
|
|
Special Issue Article: IJIRCCE |
MST Clustering and Relevancy Analysis for Key
Element Identification Process |
Satheesh V, Poongothai T |
|
|
|
Special Issue Article: IJIRCCE |
Various Segmentation Techniques in Image
Processing: A Survey |
Suganya, Menaka |
|
|
|
Special Issue Article: IJIRCCE |
Profit based unit commitment using IPPDT and
genetic algorithm |
A.Prakash, M.Yuvaraj |
|
|
|
Special Issue Article: IJIRCCE |
A Unified Scheduling For Multi-Hop Wireless
With Order Optimal Per Flow Delay |
D.Elayarani, R.Parijatham |
|
|
|
Special Issue Article: IJIRCCE |
Preventing DNS Queries Against DDOS Attack |
P.Soniya, Mrs.S.Rajeswari |
|
|
|
Special Issue Article: IJIRCCE |
A Semantic Model for Concept Based
Clustering |
S.Saranya, S.Logeswari |
|
|
|
Special Issue Article: IJIRCCE |
Providing High Security in User for Vehicular Ad-
Hoc Network |
S.Manoranjitha, M.Vasanthi |
|
|
|
Special Issue Article: IJIRCCE |
Adeptness Comparison between Instance Based
and K Star Classifiers for Credit Risk Scrutiny |
C. Lakshmi Devasena |
|
|
|
Special Issue Article: IJIRCCE |
Determination of LMP for Congestion
Management in Electricity Market |
K.Kamal dass, P.Kanakaraj, M.Prabavathi |
|
|
|
Special Issue Article: IJIRCCE |
Analysis of ECG Signals for Arrhythmia Using
MATLAB |
Sibushri.G |
|
|
|
Special Issue Article: IJIRCCE |
A Survey on Wireless Sensor Network Security |
S. Mohan, S. Grace Diana. S. Ramya |
|
|
|
Special Issue Article: IJIRCCE |
Practical Approach for Achieving Minimum Data
Sets Storage Cost In Cloud |
M.Sasikumar, R.Sindhuja, R.Santhosh |
|
|
|
Special Issue Article: IJIRCCE |
Single Query Optimization of SPARQL Using
Ant Colony Optimization |
Ms.P R Rupashini, Mrs. R Gomathi |
|
|
|
Special Issue Article: IJIRCCE |
Power Quality Improvement using Hysteresis
Voltage Control of DVR |
J Sivasankari, U.Shyamala, M.Vigneshwaran |
|
|
|
Special Issue Article: IJIRCCE |
Service and Data Security for Multi Cloud
Environment |
Rajkumar B, Balamurugan K |
|
|
|
Special Issue Article: IJIRCCE |
Multi Sink based Data Collection Scheme for
Wireless Sensor Networks |
B.Sudhakar, K.Sangeetha, |
|
|
|
Special Issue Article: IJIRCCE |
To Enhance the Lifetime of WSN Network using
PSO |
K.SyedAliFathima, T.Sumitha |
|
|
|
Special Issue Article: IJIRCCE |
Dynamic Economic Dispatch for Power
Generation Using Hybrid optimization
Algorithm |
G.Karthika, Mr.M.Vigneshwaran, M.E. |
|
|
|
Special Issue Article: IJIRCCE |
Enhanced Intrusion Detection for Zombie
Exploration Attacks in Mobile Adhoc Networks |
M.Srimathi, L.Mary Shyamala M.Tech. |
|
|
|
Special Issue Article: IJIRCCE |
Dynamic Architecture for Scalable and Proficient
Group Key Management |
G M Mythili, N M Saravana Kumar |
|
|
|
Special Issue Article: IJIRCCE |
A Cost Effective Multicast Key Management
Scheme for Secure Group Communication |
R Keerthana, Dr.N.M Saravana Kumar |
|
|
|
Special Issue Article: IJIRCCE |
Integrating Colors, Shapes and Motions Using
Active Contour Based Visual Tracking |
P. Kiruthika, J.Sathya priya, S.P. Prakash |
|
|
|
Special Issue Article: IJIRCCE |
Proposed Architecture for Implementing Privacy in
Cloud Computing using grids and virtual private
network |
P.Sathishkumar, Mrs. S.Aruna |
|
|
|
Special Issue Article: IJIRCCE |
Multi Resolution Pruning Based Co-location
Identification in Spatial Data |
Mrs.V.Prema, R.Selvasudhan |
|
|
|
Special Issue Article: IJIRCCE |
Digitalised Secure Information Channel
Maintenance in Distributed Broking System |
A. Uma Maheswari, Mrs.V.Muthamilselvi |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Techniques for Message Authentication
and Communication for Wireless Sensor
Network |
M.Santhi, D.Suganthi |
|
|
|
Special Issue Article: IJIRCCE |
Implementing Black hole Password Entry
Technique For Mitigating Shoulder-surfing Threat |
Yogesh Babu.B, Visvanathan.G |
|
|
|
Special Issue Article: IJIRCCE |
GeoZigBee: A Wireless GPS Wristwatch Tracking
Solution |
Sathish kumar.R, Vengadapathiraj.M |
|
|
|
Special Issue Article: IJIRCCE |
Online and Remote Motor Energy Monitoring and
Fault Diagnostics Using Wireless Sensor
Networks |
Anbarasu.M, Rajendhiran.V |
|
|
|
Special Issue Article: IJIRCCE |
Time Constrained Data Destruction in Cloud |
S. Christina Suganthi Monica, M.Subasini |
|
|
|
Special Issue Article: IJIRCCE |
Per-Colorant-Channel High Capacity Color Barcodes:
An Interference Cancellation Framework |
Soma. V, Vijaya Lakshmi. P |
|
|
|
Special Issue Article: IJIRCCE |
A Study on Optimization Algorithms for
Clustering Gene Expression Data |
Athul Jose, Chandrasekar P |
|
|
|
Special Issue Article: IJIRCCE |
Lossless Compression and Efficient Reconstruction
of Colour Medical Images |
M.Suganya, A.Ramachandran, D.Venugopal, A.Sivanantha Raja |
|
|
|
Special Issue Article: IJIRCCE |
Copy Frame Detection in Video by Using Data
Mining Techniques |
K.Girija, R.Maheswaran, P.Sabarinathan |
|
|
|
Special Issue Article: IJIRCCE |
Remote Monitoring of Vital Signs in Chronic
Heart Failure Patients |
M.Arunkumar |
|
|
|
Special Issue Article: IJIRCCE |
Using Interleaving Techniques with FEC
Mechanisms to Deal with Burst Errors |
M.SangeethaPriya, C.Devipriya, Dr. N.Saravana selvam |
|
|
|
Special Issue Article: IJIRCCE |
Green Computing For System Efficiency and
Optimization |
L.Dhanam, Sumathi Sivaraj, R. Vanathi |
|
|
|
Special Issue Article: IJIRCCE |
Enabling Cost-Effective Privacy Preserving Of
Intermediate Sensitive Data Sets in Cloud Using
Proxy Re-Encryption Technique |
A.Jeeva |
|
|
|
Special Issue Article: IJIRCCE |
Reduce Traffic in Optical Switching Networks by
Using Control Packet Buffering Method |
Saranya.N, Sathya.K, P. Vijaya |
|
|
|
Special Issue Article: IJIRCCE |
Preserving Data Integrity in Cloud Storage |
Jegadeesan.K, Sivakumar.K |
|
|
|
Special Issue Article: IJIRCCE |
High Speed Boosted CMOS Differential Logic for
Ripple Carry Adders |
S.Mohan, A.Anitha |
|
|
|
Special Issue Article: IJIRCCE |
Global Innovations in Cloud Computing Services
and Deployment |
Fathima Rifaa.P |
|
|
|
Special Issue Article: IJIRCCE |
Dynamic Key Management System for
improving security in Three-Tier environment |
P.Kabil dev, II - ME (CSE) , O.M. Soundara Rajan |
|
|
|
Special Issue Article: IJIRCCE |
Scalable And Secure Sharing Of Personal Health
Records In Cloud Computing Using Multi Authority
Attribute-Based Encryption |
Satheesh.K, Ram kumar.A |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Optimization of Sparql Basic Graph
Pattern |
Ms.M.Manju, Mrs. R Gomathi |
|
|
|
Special Issue Article: IJIRCCE |
Feature subset selection using filtering with
Mutual information and Maximal information
coefficient |
C.Gayathri |
|
|
|
Special Issue Article: IJIRCCE |
A New Algorithm for Finding Automatic
Clustering In Unlabeled Datasets |
S Chitra, G Komarasamy |
|
|
|
Special Issue Article: IJIRCCE |
Intrusion Detection System to Detect Malicious
Misbehaviour Nodes in Manet |
M.Vijay, R.Sujatha |
|
|
|
Special Issue Article: IJIRCCE |
An Effective Approach for Video Copy Detection
and Identification of Misbehaving Users |
S.Sujatha, G.Kalaiarasi |
|
|
|
Special Issue Article: IJIRCCE |
Car Authentication and Accident Intimation
System Using GPS and GSM |
R.Monisha, Jessen Joseph Leo, B.T.Tharani Sri Sakthi |
|
|
|
Special Issue Article: IJIRCCE |
Algorithmic-Technique for Compensating Memory
Errors in JPEG2000 Standard |
M. Pradeep Raj, E.Dinesh |
|
|
|
Special Issue Article: IJIRCCE |
Smart Energy Meter with Instant Billing and
Payment |
R. Dhananjayan, E. Shanthi |
|
|
|
Special Issue Article: IJIRCCE |
A Framework for Secret Sharing In Multisession
Trust Negotiation |
S. Pavithra, R. Jeyanthi |
|
|
|
Special Issue Article: IJIRCCE |
Key Generation for Outsourced Storages in Clouds |
Sandeep.S, Vijayakumar.P, Anand.V |
|
|
|
Special Issue Article: IJIRCCE |
Systolic Tree Algorithms for Discovering High
Utility Itemsets from Transactional Databases |
B.Shibi |
|
|
|
Special Issue Article: IJIRCCE |
A Clustering Mechanism for Energy Efficient
Routing Path |
Nangai Abinaya S, Sudha R |
|
|
|
Special Issue Article: IJIRCCE |
Gateway Discovery Approaches Implementation
and Performance Analysis in the Integrated Mobile
Ad Hoc Network (MANET)-Internet Scenario |
K.Gautham, Nagajothi A |
|
|
|
Special Issue Article: IJIRCCE |
Content Based Image Retrieval System-an
Evaluation |
N.Shanmugapriya, R.Nallusamy |
|
|
|
Special Issue Article: IJIRCCE |
ETAM Enhanced Trust Authentication Mechanism
for Vehicular Ad Hoc Networks |
J. Martina Jasmine |
|
|
|
Special Issue Article: IJIRCCE |
Authentication and Intrusion Detection System for
Mobile Ad-Hoc Networks |
R.Divya, N.Saravanan |
|
|
|
Special Issue Article: IJIRCCE |
Multi Focus Image Fusion Using Joint Sparse
Representation |
Prabhavathi.P |
|
|
|
Special Issue Article: IJIRCCE |
Vehicle Detection Using Gabor Filter |
B.Sahayapriya, S.Sivakumar |
|
|
|
Special Issue Article: IJIRCCE |
Design of Dipole Antenna Using Mom |
K.Priyadharshini, Mrs.G.Brenie Sekar |
|
|
|
Special Issue Article: IJIRCCE |
Dynamic Profile Based Technique to Detect
Flooding Attack in MANET |
Sathish.T, Sasikala.E |
|
|
|
Special Issue Article: IJIRCCE |
Face Verification across Ages Using Self
Organizing Map |
B.Mahalakshmi, K.Duraiswamy, P.Gnanasuganya, P.Aruldhevi, R.Sundarapandiyan |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Algorithm to Mitigate Packet Drop
Attack in AODV Protocol |
Arunprasath.M, Mr.M.Mohana Sundharam |
|
|
|
Special Issue Article: IJIRCCE |
Establishing SSH Connection and Interfacing
GSM/GPRS Functionality with Raspberry PI |
Mrs.P.Suvitha Vani, Miss.Nithyappriya.G |
|
|
|
Special Issue Article: IJIRCCE |
Attribute Based Encryption with Privacy Protection
in Clouds |
Geetanjali. M, Saravanan. N |
|
|
|
Special Issue Article: IJIRCCE |
Low Cost (PUF) Physical Unclonable Function
Using Secured Clock Network |
Muthumeenakshi.N, Rajaprabha.R |
|
|
|
Special Issue Article: IJIRCCE |
Invariant Based Integration of Web Service
Interface Testing |
V.Alanthuraiyan1, E.Kruthika2, R.Devisri3 |
|
|
|
Special Issue Article: IJIRCCE |
Security for Smart Distribution Grid By Using
Wireless Communication |
S.K.Saranya, Dr.R.Karthikeyan |
|
|
|
Special Issue Article: IJIRCCE |
Cloud-based Secure Log Management using
Homomorphic Encryption to reduce
Communication Overhead |
Deepalakshmi.A, Mohanraj.T |
|
|
|
Special Issue Article: IJIRCCE |
Enhance Privacy Preserving In Location Based
Service |
Karthik R, Anguraj S |
|
|
|
Special Issue Article: IJIRCCE |
Design of 2/3 prescalerLow Power Flexible
Multiband Divider |
R.Naveenkumar, V.A.Saravanan |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Method for Secure Transmission from
Malicious Nodes through Certificate
Authentication |
M.L.Vijin Stephi and Dr.B.Latha |
|
|
|
Special Issue Article: IJIRCCE |
Reputation and Quality of Service for Wireless
Sensor Networks Using Ant Colony Optimization |
J. Arulanand, K. Syed Ali Fathima |
|
|
|
Special Issue Article: IJIRCCE |
TPA Based Batch Auditing Mechanism for
Commercial Clouds |
Mr.R.Sathyaraj, Dr.V.K.Manavala Sundaram M.E., Ph.D., |
|
|
|
Special Issue Article: IJIRCCE |
Data Access Control in Cloud Using Attribute
Based Revocation Algorithm |
Karthikeyan.C, Vignesh.R |
|
|
|
Special Issue Article: IJIRCCE |
Modified K-Means Algorithm for Initial Centroid
Detection |
D. Sharmila Rani, V.T.Shenbagamuthu |
|
|
|
Special Issue Article: IJIRCCE |
Virtual Shopping Application for Android Devices
Using Virtual Reality |
Dr.J.Subashchandra Bose, Yuvaraj.S, Siva.R, Sabarisan.K, Kannan.P, Santhosh Kumar.S.M |
|
|
|
Special Issue Article: IJIRCCE |
An Overview of Knowledge Discovery Database
and Data mining Techniques |
Priyadharsini.C, Dr. Antony Selvadoss Thanamani |
|
|
|
Special Issue Article: IJIRCCE |
Cluster Tree Based Hybrid Document Similarity
Measure |
M. Varshana Devi |
|
|
|
Special Issue Article: IJIRCCE |
A Novel Method of Vehicle Accident Protection
and Early Precaution System |
M.Rajesh kumar |
|
|
|
Special Issue Article: IJIRCCE |
A Self-Learning Optimization Approach to Single
Image Super-Resolution using Kernel ridge
regression model |
Ms. Dharani S |
|
|
|
Special Issue Article: IJIRCCE |
Detection and Localization of Multiple Spoofing
Attackers in Wireless Network |
Mekala R, Arul V, Keerthana B, Sobana J |
|
|
|
Special Issue Article: IJIRCCE |
Improving Scalability of R-Dictionary Using
Keyword Based Approach |
G.Kokila, Dr.R.Rajasekaran |
|
|
|
Special Issue Article: IJIRCCE |
Real Time Sentiment Classification Using
Unsupervised Reviews |
E.Divya |
|
|
|
Special Issue Article: IJIRCCE |
Reversible Gate Based Testable Sequential Circuits |
K.Rekha swathi sri, M.Mano, G.Selvapriya |
|
|
|
Special Issue Article: IJIRCCE |
Mobile Health Monitoring Based On New Power
Management Approach |
R.Kanimozhi, M.Suguna |
|
|
|
Special Issue Article: IJIRCCE |
Scheduling Enabled Compressive Data Collection
Scheme For Wireless Sensor Networks |
Kalaiyarasi.R, Rajeswari.S |
|
|
|
Special Issue Article: IJIRCCE |
Applications of Security System |
G.Ramachandran, Jayanthi S, E.Ravishankar, P.Balaji, S.SivaPrakash |
|
|
|
Special Issue Article: IJIRCCE |
Query Services in Cost Efficient Cloud Using
Query Analysis |
VanthanaPriya.J, ArunKumar.B |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Resource Allocation for Improving
Resource Utilization in Self Organizing Clouds |
S. Saranya, N. Saranya |
|
|
|
Special Issue Article: IJIRCCE |
Modified Networks Selection Scheme for 4G
System Based On QOS |
K.Saranya, B.Jeeva |
|
|
|
Special Issue Article: IJIRCCE |
Balancing privacy and Utility in Defect Prediction
by Privatization Algorithm |
Dr.S.Chitra, P.Sumathi, T.Kanchana |
|
|
|
Special Issue Article: IJIRCCE |
User Centric Privacy Access control For MHealthcare
Emergency in Opportunistic Computing |
M.Anandhajothi, S.Hasan Hussain |
|
|
|
Special Issue Article: IJIRCCE |
Balancing privacy and Utility in Defect Prediction
by Privatization Algorithm |
Dr.S.Chitra, P.Sumathi, T.Kanchana |
|
|
|
Special Issue Article: IJIRCCE |
Effective Neighbor Identification with False
Report Verification Using Manets |
M.Abinaya, Mrs K.Thamaraiselvi |
|
|
|
Special Issue Article: IJIRCCE |
An Enhancement in Data Collection |
R.Sangeetha, V.Seethalaksmi |
|
|
|
Special Issue Article: IJIRCCE |
Semantic Analysis based Dirichlet Clustering
Scheme for Text Documents |
C.Selvarathi, M.E, K.Karthika |
|
|
|
Special Issue Article: IJIRCCE |
Securely Managing the Personal Health Records
Using Attribute Based Encryption in Cloud
Computing |
S.Aarthika |
|
|
|
Special Issue Article: IJIRCCE |
Packet Concealing From Discriminating
Selective Jamming Attacks Using Prevention
Methods |
Mr. A.Rajesh Kumar, Mrs. R.Bharathi |
|
|
|
Special Issue Article: IJIRCCE |
Adaptive Discriminating Detection for DDoS
Attacks from Flash Crowds Using Flow
Correlation Coe f f ic i ent with Collective
Feedback |
N.V.Poorrnima, K.ChandraPrabha, B.G.Geetha |
|
|
|
Special Issue Article: IJIRCCE |
Optimum Service Interval and Service Period:
MBR in Wireless Networks |
Ms. K.Tamilarasi, Mrs. R.Bharathi |
|
|
|
Special Issue Article: IJIRCCE |
ADA: Data Aggregation Scheme for Dynamic
Application Using PBDR in Wireless Sensor
Networks |
B.Mahalakshmi (ME., CSE) , R.Rajavignesh ME., |
|
|
|
Special Issue Article: IJIRCCE |
Dynamic Resource Allocation Using Nephele
Framework in Cloud |
Anand Prabu P, Dhanasekar P, Sairamprabhu S G |
|
|
|
Special Issue Article: IJIRCCE |
Ranking the Relationship on Wikipedia through
Strength Determination |
S.P.Angaiyarkanny, G.Sharmila |
|
|
|
Special Issue Article: IJIRCCE |
SECUDROID - A Secured Authentication in
Android Phones Using 3D Password |
Ms. Chandra Prabha K M.E. Ph.D., Mohamed Nowfel E S, Jr., Gowtham V, Dhinakaran V |
|
|
|
Special Issue Article: IJIRCCE |
A Secure Erasure Code-Based Multi Cloud
Architecture with Privacy and Preservation |
Kousalya.K, Nagajothi.A |
|
|
|
Special Issue Article: IJIRCCE |
Restructure Search Results for Efficient Web
Search |
Addlin Shinney R, Saravana Kumar T and Roslinmary M |
|
|
|
Special Issue Article: IJIRCCE |
Combined Cluster Based Ranking for Web
Document Using Semantic Similarity |
V.Anthoni sahaya balan, S.Singaravelan.M.E. |
|
|
|
Special Issue Article: IJIRCCE |
Privacy Preserving Public Auditing for Data in
Cloud Storage |
M.Priya, E. Anitha, V.Murugalakshmi |
|
|
|
Special Issue Article: IJIRCCE |
An Effective Approach for Detecting and
Preventing Sqlinjection Attacks |
M. Roslinmary, S. Sivasakthi, A. Shenbaga Bharatha Priya |
|
|
|
Special Issue Article: IJIRCCE |
An Effective Approach for Detecting and
Preventing Sqlinjection Attacks |
M. Roslinmary, S. Sivasakthi, A. Shenbaga Bharatha Priya |
|
|
|
Special Issue Article: IJIRCCE |
Privacy Preserved Data Scheduling For Cloud Data
Services |
Mr.R.Sathish, Mr.T.Sathishkumar M.C.A., M.E., |
|
|
|
Special Issue Article: IJIRCCE |
Sum Query Evaluation over Uncertain Data |
Roslinmary M, Saravana Kumar T and Addlin Shinney R |
|
|
|
Special Issue Article: IJIRCCE |
Design of Hybrid Multicasting Network for
Authentication |
R.Vidhyalakshmi, P.Sankardayal, G.Sankareeswari |
|
|
|
Special Issue Article: IJIRCCE |
Secured Routing For Manet Using Friend Based
Adhoc Routing (FAR) |
Ms.K.Deepa, Mrs.V.Durgadevi |
|
|
|
Special Issue Article: IJIRCCE |
Improved Client Data Security with Aggregated
Query Using CDAMA |
Ms.S.Kanimozhi, Mrs.K.Makanyadevi |
|
|
|
Special Issue Article: IJIRCCE |
A Relevant Clustering Algorithm for High-
Dimensional Data |
Bini Tofflin.R1, Kamala Malar.M2, Sivasakthi.S3 |
|
|
|
Special Issue Article: IJIRCCE |
Image Mining: frameworks and techniques |
Madhumathi.k, Dr.Antony Selvadoss Thanamani |
|
|
|
Special Issue Article: IJIRCCE |
Low Power Multi Bit Flip Flops Design for VLSI
Circuits |
L.Ange Prabha, S.Joy |
|
|
|
Special Issue Article: IJIRCCE |
Robust Rate control for Video Streaming
in Heterogeneous Environment |
B. Nandhini, S. VinothKumar M.E., |
|
|
|
Special Issue Article: IJIRCCE |
An Effective Cluster-Based Routing With Link
Quality For Power Varied Manets |
Jerrin Joe Francis, Vignesh S |
|
|
|
Special Issue Article: IJIRCCE |
Design and Implementation of Efficient Binary to
Residue Converter Using Moduli Method |
Vidhyalakshmi.M, Prof.Satyabama |
|
|
|
Special Issue Article: IJIRCCE |
Measure of Implicit Relationship between Words
by Network Count |
Keerthana.S.M, V.Rajakumareswaran |
|
|
|
Special Issue Article: IJIRCCE |
Inferring Private Information from Social Network
Using Collective Classification |
A.Annapoorani, Ms.P.Indira Priya |
|
|
|
Special Issue Article: IJIRCCE |
Balancing the Load to Reduce Network Traffic in
Private Cloud |
A.Shenbaga Bharatha Priya, J.Ganesh |
|
|
|
Special Issue Article: IJIRCCE |
Clustering of Data with Mixed Attributes based
on Unified Similarity Metric |
M.Soundaryadevi, Dr.L.S.Jayashree |
|
|
|
Special Issue Article: IJIRCCE |
Implementation of Pick and Place Operation,
Battery Backup and Zone Control in Automated
Guided Vehicle |
Saravana Sundar.T, R.C.Vignesh, G.Moorthi, Nivedhan.M |
|
|
|
Special Issue Article: IJIRCCE |
Security Using Anonymization and Slicing |
Mr.K.Manikanda Prabhu |
|
|
|
Special Issue Article: IJIRCCE |
An Anonymous Authentication and Secure
Communication Protocol in Ad-hoc Networks |
D. Pavun Kumar, Mr S.Sundar Raj M.Tech |
|
|
|
Special Issue Article: IJIRCCE |
A Self Adaptive Approach for Defending Flood
Attacks in Disruption Tolerant Networks |
P.Sakthipriya, P.Rajeswari |
|
|
|
Special Issue Article: IJIRCCE |
Acknowledgment-Based Secure Authentication
Method for Manet |
Dr.J.Subash Chandra Bose, U.Akila Devi, M.Prasanalaxmi, K.Malathi, K.P.Vinodhini, S.Saranya |
|
|
|
Special Issue Article: IJIRCCE |
Improving energy and cost-effective workflow
scheduling in cloud computing |
MuthuSowmya.S, ArunKumar.B |
|
|
|
Special Issue Article: IJIRCCE |
Intrusion Detection Using Double Guard In Multi-
Tier Architecture |
K.Kavitha, S.V.Anandhi |
|
|
|
Special Issue Article: IJIRCCE |
Improving Word Similarity Using PPMIC
with Estimates of Word Polysemy |
Nagajothi P, Hemalatha L, Kumari K, Jeevarathinam S |
|
|
|
Special Issue Article: IJIRCCE |
Design of Double Tail Comparator for High
Speed ADC |
S.Sivasathya, T.Manikandan |
|
|
|
Special Issue Article: IJIRCCE |
Unstructured Data into Intelligent Information
Analysis and Evaluation |
Dr.S.Chitra M.E, Ph.D, Mrs.N.Shunmuga Karpagam M.E, Mr.K.Venkataramanan |
|
|
|
Special Issue Article: IJIRCCE |
Accumulative Privacy Preserving Data Mining
Using Gaussian Noise Data Perturbation at Multi
Level Trust |
G.Mareeswari, V.Anusuya |
|
|
|
Special Issue Article: IJIRCCE |
Particle Filtering Framework and Occlusion
Handling Using Region Based Tracking Technique
for 2-D and 3-D Image Sequences |
J.Cynthia Esther Rani, R.Sathya, R.D. Sathiya |
|
|
|
Special Issue Article: IJIRCCE |
Simulation on Cyber War in Cloud Computing |
Arul Selvam. P, Jeevanantham. G |
|
|
|
Special Issue Article: IJIRCCE |
Inspection of Vulnerabilities through Attack
Graphs and Analyzing Security Metrics Used For
Measuring Security in A Network. |
R.Dhaya D.Deepika |
|
|
|
Special Issue Article: IJIRCCE |
An Analysis of Unwanted Messages Filtering
Methods from OSN User Walls |
Mr. K.Arulmurugan, Mr.P.Ranjithkumar |
|
|
|
Special Issue Article: IJIRCCE |
Robust Cloud Resource Provision |
M.Sharmila Banu |
|
|
|
Special Issue Article: IJIRCCE |
High Throughput, Low Area, Low Power
Distributed Arithmetic Formulation for Adaptive
Filter |
G.Selvapriya, M.Mano, K.RekhaSwathiSri, Mr S.Karthick |
|
|
|
Special Issue Article: IJIRCCE |
Mobile Virus Prevention Techniques: A Survey
Perspective |
R.Dhaya, M.Poongodi |
|
|
|
Special Issue Article: IJIRCCE |
Mining Of Inconsistent Data in Large Dataset In
Distributed Environment |
M.Shanthini |
|
|
|
Special Issue Article: IJIRCCE |
Multi Keyword Web Crawling Using Ontology In
Web Forums |
J.Santhiya |
|
|
|
Special Issue Article: IJIRCCE |
Content Based Analysis Improves Audiovisual
Archieve Retrieval |
Muthusankar.D, Kalaiselvi.M, Karthik.M, Mahendravarma.A |
|
|
|
Special Issue Article: IJIRCCE |
Robust Data Authenticity and Group Signature
Mechanism for Enhanced Cloud Security Process |
D.Sharmili, B. Palani Chelvam |
|
|
|
Special Issue Article: IJIRCCE |
Privacy and Efficiency On Health Care Data
Using Private Proxy Reencryption Scheme |
S.Kousalya |
|
|
|
Special Issue Article: IJIRCCE |
Dynamic Congestion Control with Multihop
Scheduling Algorithm For Mobile Ad-Hoc
Network |
Naveena.G, Hemal Babu.H |
|
|
|
Special Issue Article: IJIRCCE |
A Technique to Prevent Dynamic Unsafe
Component Loadings |
M.Malathi, Mrs.P.Sumathi, M.E., Dr.S.Chitra M.E., Ph.D |
|
|
|
Special Issue Article: IJIRCCE |
Hand Gesture Recognition using MACD |
Geethu Prakasan, Bimal Bose B.S |
|
|
|
Special Issue Article: IJIRCCE |
Enhanced Node Utilization and Responsiveness for
Parallel Workload Based On Priority Consolidation
in the Cloud |
R.Suganya |
|
|
|
Special Issue Article: IJIRCCE |
Handling Flood Attacks in Disruption Tolerant
Networks Based On Claim Verification |
G. Pushpa Rega |
|
|
|
Special Issue Article: IJIRCCE |
Feature Extraction and Analysis of Breast
Lesions in UltrasoundB mode and Elastography |
S.Sasikala, B.kirthika, P.S. Dharsana |
|
|
|
Special Issue Article: IJIRCCE |
Optimization of Content Downloading Using
Dynamic Cache Memory |
Ms.A.Gayathri, Ms.M.M.Chithra, Ms.R.Jeyashree, Mr.A.Premkumar |
|
|
|
Special Issue Article: IJIRCCE |
Analysis of a DWDM transmission system for
multichannel long haul link |
N.T.Gowree, R.Hemalatha |
|
|
|
Special Issue Article: IJIRCCE |
Establishing Adversary Resistant Communication
in Wireless Network |
Sona G, Annapandi P, Addlin Shinney |
|
|
|
Special Issue Article: IJIRCCE |
A Framework Outline for Word Catalog Based
Model in Cloud |
Mr.C.Sivakumar, Mr.M.Arulprakash M.Tech |
|
|
|
Special Issue Article: IJIRCCE |
Concept Based Ontology Matching By Concept
Enrichment |
Preethi. M |
|
|
|
Special Issue Article: IJIRCCE |
Retinal Microaneurysm Exclusion on Optic Disc
and Detection Using Cross Section Profile
Analysis |
K.Ruthra |
|
|
|
Special Issue Article: IJIRCCE |
Xml Based Digitalized Secure Information
Channel Maintenance in Distributed Broking
Systems |
S.Saravanakumar, M.N.Karuppusamy |
|
|
|
Special Issue Article: IJIRCCE |
User Search Histories Based On Query Relevance
Using Incremental Algorithm |
A.Revathi, A.Mekala |
|
|
|
Special Issue Article: IJIRCCE |
Secure Auditing For Outsourced Data in Cloud
Using Homomorphic Token and Erasure Code |
N.S. Monalisa Devi, T. Sounder Rajan |
|
|
|
Special Issue Article: IJIRCCE |
Cluster Based Certificate Revocation and CBRP in
Manet |
Mathan.S, S.Shahul Hammed |
|
|
|
Special Issue Article: IJIRCCE |
Intelligent network stabilization of dynamical
systems using topological condition |
A.Evangelin, P.Sathiyaseelan |
|
|
|
Special Issue Article: IJIRCCE |
Multiview Pedestrian Detection Based on Online
Support Vector Machine Using Convex Hull |
Revathi M K, Ramya K P, Sona G |
|
|
|
Special Issue Article: IJIRCCE |
Protecting Streaming Data Using Provenance
Spread Spectrum Watermarking |
Ramya K P, Revathi M K |
|
|
|
Special Issue Article: IJIRCCE |
Detecting DDOS Attacks by Circular Protection
Network |
Yamini B, Chithra Devi R |
|
|
|
Special Issue Article: IJIRCCE |
On-Demand Routing in Mobile Ad Hoc Network |
Buvana.P, Arun Sebastian, Deepika.K.S, Keerthivasan.S |
|
|
|
Special Issue Article: IJIRCCE |
An Energy Improvement in Cache System by
Using Write Through Policy |
Vigneshwari.S |
|
|
|
Special Issue Article: IJIRCCE |
Tampering and Copy-Move Forgery Detection
Using Sift Feature |
N.Anantharaj |
|
|
|
Special Issue Article: IJIRCCE |
Retrieval of Encrypted cloud data using
multikeyword |
C.Rajeshkumar, Dr.K.Rubasoundar |
|
|
|
Special Issue Article: IJIRCCE |
A Framework for Secure Mechanism to Detecting
Localizing Multiple Spoofing Attacks in Wireless
Sensor Network |
R.Poornima, C.Premanand |
|
|
|
Special Issue Article: IJIRCCE |
Replica Allocation Technique with Mobility Based
Beacons In Mobile Ad Hoc Networks |
Jeyasri.V, Ramamoorthy.P |
|
|
|
Special Issue Article: IJIRCCE |
Resource Allocation under Uncertainty in Cloud
Storage for Computational Environment |
Deepa.V, Gopalakrishna.L |
|
|
|
Special Issue Article: IJIRCCE |
Multiple Class Identification and Categorization
with Nuggets on Health Care Data |
P. Jamuna, G, Mohana Prabha, M.E, (Ph.D) |
|
|
|
Special Issue Article: IJIRCCE |
Disperse Processing of Presumption Top-K
Inquire in Wireless Sensor Networks |
K.Shanmuga priya, M.Manopriya |
|
|
|
Special Issue Article: IJIRCCE |
Strength of Evolving Agent Population in MAS |
M. Eniya, M. Vinothkumar M.E.,(Ph.D) |
|
|
|
Special Issue Article: IJIRCCE |
Fingerprint Privacy Preservation by Minutiae and
Orientation |
Bercelin Rose Mary.W, Subbulakshmi.N, Bala Kumari.P |
|
|
|
Special Issue Article: IJIRCCE |
Provide Integrity for Spatial Data Outsourcing |
SivaSakthi S, Bini Tofflin R, Roslinmary M |
|
|
|
Special Issue Article: IJIRCCE |
Filtering Noisy Contents in Online Social Network
by using Rule Based Filtering System |
Bala Kumari P, Bercelin Rose Mary W and Devi Mareeswari M |
|
|
|
Special Issue Article: IJIRCCE |
Removal of High Density Impulse Noise Using
Boundary Discriminative Noise Detection
Algorithm |
Sai Gayathri. N |
|
|
|
Special Issue Article: IJIRCCE |
Energy Efficient E-BMA Protocol for Wireless
Sensor Networks |
M.Manivannan, R. Palanikumar. M.Tech, |
|
|
|
Special Issue Article: IJIRCCE |
A Study on Wireless Sensor Networks Localization |
Poonkodi.K, Vinodhini.B, Karthik.S |
|
|
|
Special Issue Article: IJIRCCE |
Reversible Information Hiding in Videos |
V.Priya |
|
|
|
Special Issue Article: IJIRCCE |
Smart Survillience Rover ? Industarial Monotoring |
Maheshkumar p |
|
|
|
Special Issue Article: IJIRCCE |
Reduction of Decoding Time in Majority Logic
Decoder for Memory Applications |
K.Jayalakshmi, B.Sivasankari |
|
|
|
Special Issue Article: IJIRCCE |
Packet Classification Using Standard Access
Control List |
S.Mythrei, R.Dharmaraj |
|
|
|
Special Issue Article: IJIRCCE |
Scott Knott Test Based Effective Software Effort
Estimation through a Multiple Comparison
Algorithms |
N.Padma priya, D.Vidyabharathi |
|
|
|
Special Issue Article: IJIRCCE |
Detecting Anomalies by Online Techniques Using
Spam Detection |
R. Dharani M.E (CSE) , S. Subashini M.Tech (IT) AP/CSE |
|
|
|
Special Issue Article: IJIRCCE |
Minimizing Packet Loss Using Buffer
Management Scheme for Video Streaming |
Kousik Kiran V |
|
|
|
Special Issue Article: IJIRCCE |
A Collaborative Approach Based On Ant Colony
Algorithm for Data Aggregation in Wireless
Sensor Networks |
R.Renganayaki, Dr.K.Vimala Devi |
|
|
|
Special Issue Article: IJIRCCE |
Optimization of Bit Rate in Medical Image
Compression |
Dr.J.Subash Chandra Bose, Mrs.Yamini.J, P.Pushparaj, P.Naveenkumar, Arunkumar.M, J.Vinothkumar |
|
|
|
Special Issue Article: IJIRCCE |
Modified Difference-Histogram based Reversible
Data Hiding Scheme |
E.Gayathri, Dr.K.A.Palaniswamy |
|
|
|
Special Issue Article: IJIRCCE |
A Model of Textual Emotion Mining From Text
Document |
S.Sujitha, S.Selvi |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Location Based Routing for
Mobile Adhoc Networks |
S.Saranya, D.Gokilapriya, M.Maheswari |
|
|
|
Special Issue Article: IJIRCCE |
Realization of High Speed VLSI Architecture for
Decision Tree Based Denoising Method In Images |
Gobu.CK and Priya.R |
|
|
|
Special Issue Article: IJIRCCE |
Sensory Data Collection Using Rendezvous Nodes |
N.Lokesh, D.Gokilapriya |
|
|
|
Special Issue Article: IJIRCCE |
Detection and Segmentation of Brain Tumors using
AdaBoost SVM |
Nithyapriya.G, Sasikumar.C |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Segmentation and Classification of
Remote Sensing Image Using Local Self Similarity |
Karthikeyan.K, Thiruselvi.M |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Segmentation and Classification of
Remote Sensing Image Using Local Self Similarity |
Karthikeyan.K, Thiruselvi.M |
|
|
|
Special Issue Article: IJIRCCE |
Design and Development of a Real-Time Ground
Station Software System and Small Satellite for
Weather Monitoring Applications |
K.B.Manikandan, R. Sivaramakrishnan |
|
|
|
Special Issue Article: IJIRCCE |
Efficient and Secure Dynamic Auditing Protocol
for Integrity Verification In Cloud Storage |
Priyanga.R, Maheswari.B, Karthik.S |
|
|
|
Special Issue Article: IJIRCCE |
A Survey on Intrusion Detection in Mobile Ad Hoc
Networks Using Enhanced Adaptive
Acknowledgment |
B. Sindhu |
|
|
|
Special Issue Article: IJIRCCE |
Searching Application-Level Meaning for Data
Compaction |
L. Nagarajan |
|
|
|
Special Issue Article: IJIRCCE |
Performance Analysis Using Controlled-Loose-
Virtual-Clumping-Based Expelling for Power
Heterogeneous (CBEPH) Manets |
V. Sathiya Priya |
|
|
|
Special Issue Article: IJIRCCE |
Multichannel Satellite Image Resolution
Enhancement Using Dual-Tree Complex Wavelet
Transform and NLM Filtering |
P.K Ragunath, A.Balakrishnan |
|
|
|
Special Issue Article: IJIRCCE |
Secrecy Maintaining Public Inspecting For Secure
Cloud Storage |
K.Sangamithra, S.Tamilselvan |
|
|
|
Special Issue Article: IJIRCCE |
Implements The Spatial Inverted Indexes To
Perform Quick Search |
Sophiya.K, Sounderrajan.T |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Clustering Method To Find Similarity
Between The Documents |
Kalaivendhan.K, Sumathi.P |
|
|
|
Special Issue Article: IJIRCCE |
Accident Detection Using Android Smart Phone |
P.Kaladevi, T.Kokila, S.Narmatha, V.Janani |
|
|
|
Special Issue Article: IJIRCCE |
A Countermeasure Circuit for Secure
AES Engine against Differential Power
Analysis |
V.S.Subarsana, C.K.Gobu |
|
|
|
Special Issue Article: IJIRCCE |
Detection of Pre-Skin Cancer Using Automatic
Cell Segmentation Technique |
Greeshma Rajan |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Algorithms for Incessant Position Based
Spatial Queries in Mobile Environments |
G.Elavarasi, K.Manokaran |
|
|
|
Special Issue Article: IJIRCCE |
Indexing For Sequential Stochastic Mechanism-
Based Movement Replicas In Recognition Of
Human Activity |
G.Karthika, V.Bhuvaneswari |
|
|
|
Special Issue Article: IJIRCCE |
A Method of Segmentation For Glaucoma
Screening Using Superpixel Classification |
Eleesa Jacob, R.Venkatesh |
|
|
|
Special Issue Article: IJIRCCE |
Critical Nuggets Identification for Classification
Task |
V.Priya |
|
|
|
Special Issue Article: IJIRCCE |
A Dempster-Shafer Framework For Decision
Fusion In Image Forensics |
C.R.Lakshmi, Alex george |
|
|
|
Special Issue Article: IJIRCCE |
Sensor Network Deployment and Critical
Parameter Selection for Intrusion Detection System |
Manjula.N, Sumathi.P |
|
|
|
Special Issue Article: IJIRCCE |
Detection of Cancer Using Biclustering |
Sayana Sunny, M.Pratheba |
|
|
|
Special Issue Article: IJIRCCE |
EEEM: An Energy-Efficient Emulsion Mechanism
for Wireless Sensor Networks |
M.Sudha, J.Sundararajan, M.Maheswari |
|
|
|
Special Issue Article: IJIRCCE |
Hybrid Location Based Forward Routing in
Manet?s |
Arjun sankar.J, Ramar.C.K, Venkatesan.N |
|
|
|
Special Issue Article: IJIRCCE |
A Novel Noise Filtering Technique for Denoising
MRI Images |
Priyadharsini.B |
|
|
|
Special Issue Article: IJIRCCE |
Detection of Text with Connected Component
Clustering |
B.Nishanthi, S. Shahul Hammed |
|
|
|
Special Issue Article: IJIRCCE |
Traveling Salesman Problem Solved Using Bio
Inspired Algorithms (ABC) |
S. Saranya, R. Priya Vaijayanthi |
|
|
|
Special Issue Article: IJIRCCE |
Preventing Mobility Device Intrusion And Theft
Using Biometric Fingerprint Recognition |
Vanitha.M, Vidhya Gandhi.P, Rajkumar.M, Rajkumar.S |
|
|
|
Special Issue Article: IJIRCCE |
Letter Pair Similarity Classification and URL
Ranking Based on Feedback Approach |
P.T.Shijili |
|
|
|
Special Issue Article: IJIRCCE |
A Scalable Approach for Effective Content
Delivery Using Enhanced Distributed Load
Balancing Mechanism |
D.Amrita, A.Aruna |
|
|
|
Special Issue Article: IJIRCCE |
Analysis of Secure In-Network Aggregation for
Anomaly Detection in Wireless Sensor Networks |
Arthi.A |
|
|
|
Special Issue Article: IJIRCCE |
Secure Data Transmission in MANETS Using
ELIPTIC Curve Cryptography |
K.Sangeetha |
|
|
|
Special Issue Article: IJIRCCE |
Delay Based Scheduling For Cognitive Radio
Networks |
A.R.Devi R.Arun kumar S.Kannagi |
|
|
|
Special Issue Article: IJIRCCE |
Accessing Distributed System Using Hashed
Fingerprint Recognition |
R.Mekala, S.A.Jiji Jasmine, Vinisha.D |
|
|
|
Special Issue Article: IJIRCCE |
AMI Mesh Networks Based Home Energy
Management System |
G.KausalyaDevi, M.Premkumar |
|
|
|
Special Issue Article: IJIRCCE |
Enhanced Packet Scheduling Scheme for Wireless
Sensor Networks |
P.Narayani, Mrs.R.Meena prakash , A.R.Devi |
|
|
|
Special Issue Article: IJIRCCE |
A Load Balanced Greening Approach for
Proficient Resource Allocation with Cloud
Partitioning |
R.Divya, S. Premkumar deepak |
|
|
|
Special Issue Article: IJIRCCE |
Novel Dynamic Fault Localization for Server
side Vulnerabilities |
C.P.Shabariram, V.Sharmila, J.Francy, R.Anandhi |
|
|
|
Special Issue Article: IJIRCCE |
Enhancing Digital Forensic Analysis through
Document Clustering |
B.Vidhya, R.Priya Vaijayanthi |
|
|
|
Special Issue Article: IJIRCCE |
Unconstrained Face Recognition From Blurred and
Illumination with Pose Variant Face Image Using
SVM |
C.Indhumathi |
|
|
|
Special Issue Article: IJIRCCE |
Beyond Text QA Multimedia diverse relevance
ranking based Answer Generation by Extracting
Web |
R.Manju |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Power Management in Wireless
Communication |
R.Saranya, Mrs.J.Meena |
|
|
|
Special Issue Article: IJIRCCE |
Enhancement of a Novel Secure Data Storage &
Privacy in Cloud Network |
V. Nithya, B. Anuradha |
|
|
|
Special Issue Article: IJIRCCE |
Packet classification based on priority with
shortest path algorithm |
A.Vijayalalitha, R.Dharmaraj M.E.,(Ph.D) |
|
|
|
Special Issue Article: IJIRCCE |
Optimal Route Query Based On Forward
Search and Backward Search |
S.KARTHIK |
|
|
|
Special Issue Article: IJIRCCE |
A Trust Based Payment Scheme for Multihop
Wireless Networks |
S.Suganya,S.Dhivya,Y.Jenifer |
|
|
|
Special Issue Article: IJIRCCE |
Biconnectivity Of Zigbee UMTS Hybrid
Network |
D.DIVYA |
|
|
|
Special Issue Article: IJIRCCE |
Audio Steganography Using Least Significant
Bit |
Sudha Lakshmi N |
|
|
|
Special Issue Article: IJIRCCE |
Performance Optimization Of Poultry Farm By Using
Instrumentation With Help Of Embedded Automation |
Boopathy.S, Satheesh kumar.M,Mohamed Feroz.A |
|
|
|
Special Issue Article: IJIRCCE |
Development Of Efficiency Model Of Three Phase
Induction Machine And Improving Efficiency At
Low Load Condition Using Controllers |
D.Santhosh kumar, G.Jayanthi mala |
|
|
|
Special Issue Article: IJIRCCE |
Security Enhanced Service Level Agreement for
Cloud Storage Services |
E.Kiruthika, S.D.PrabuRagavendiran |
|
|
|
Special Issue Article: IJIRCCE |
Rank Preserving Discriminant Analysis for Human
Behaviour Recognition Using Dash7 Protocol |
N.PADMAVATHI, T.MOHANRAJ |
|
|
|
Special Issue Article: IJIRCCE |
AMAP: Accelerated Message Authentication
Protocol for Vehicular ADHOC Networks |
R. Rajkumar, S.Shahul Hammed |
|
|
|
Special Issue Article: IJIRCCE |
Privacy-Assured OIRS Service with
Performance Speedup in Cloud |
P.ARUNPRIYA,S.RINESH |
|
|
|
Special Issue Article: IJIRCCE |
Brain Tumor Statistical Structure Analysis And
Prediction Based On Self Organised Map |
A.Mary Joycy |
|
|
|
Special Issue Article: IJIRCCE |
4 Level Authentication Security In Cloud
Computing |
P.Shenbagam, C. Namasivayam |
|
|
|
Special Issue Article: IJIRCCE |
Enhanced Detection of Packet Droppers And
Modifiers In Wireless Sensor Networks |
R. Karthikeyan |
|
|
|
Special Issue Article: IJIRCCE |
MPPT Algorithm Based PV System
Connected To Single Phase Inverter |
T.Rengaraj, Ms.S.Soniya |
|
|
|
Special Issue Article: IJIRCCE |
Achieve Ranking Accuracy Using Cloudrank
Framework for Cloud Services |
R.Yuvarani, M.Sivalakshmi |
|
|
|
Special Issue Article: IJIRCCE |
A Framework to Enhance Cryptographic
Parameter for Data In Cloud |
R.Sivaranjani, R.Radhika |
|
|
|
Special Issue Article: IJIRCCE |
Access Control Policies Of Socio Networking
Websites For Multiple Profile Holders |
B.Vijaya Kumar, G.Nirmala Devi, V.Vanaja, P.Meena |
|
|
|
Special Issue Article: IJIRCCE |
VLSI Implementation of Reconfigurable Low
Power Fir Filter Architecture |
Mr.K.ANANDAN Mr.N.S.YOGAANANTH |
|
|
|
Special Issue Article: IJIRCCE |
Electromagnetic Coupling Microstrip Patch
Antenna for Improving Wide Bandwidth
and Broad Beamwidth |
G.Karthikeyan, Dr.Meena @ jeyanthi, Ms.S.Soniya, Ms.Thangaselvi |
|
|
|
Special Issue Article: IJIRCCE |
Congestion Based Pricing Resources
Managemant In Broadband Wireless Networks |
M.Banupriya, ME, P.Manokari.B.E (ME) , T.B.Dharmaraj,ME., |
|
|
|
Special Issue Article: IJIRCCE |
A N-Radon Slantlet Transforms Based OFDM
System Design with PCC Algorithm to
improve the Performance |
Srithar.A |
|
|
|
Special Issue Article: IJIRCCE |
Decentralized Approach for Balancing Load in
Dynamic Cloud Environment |
Karthick Smiline Britto.J , PrittoPaul.P |
|
|
|
Special Issue Article: IJIRCCE |
Integration of Subspace Clustering and
Action Detection on Financial Data |
Meenu Mathai, Mrs.P.Sumathi |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Resource Allocation And Avoid Traffic
Redundancy Using Chunking And Indexing |
S.V.Durggapriya, N.Keerthika |
|
|
|
Special Issue Article: IJIRCCE |
Preventing Private Information Leakage on
Social mining |
A.Krishna Kumar , M.Suriya |
|
|
|
Special Issue Article: IJIRCCE |
Performance Enhancement Using Naodv
Algorithm In Manet |
Julian.P, Smiline Arokya Pradeepa.J |
|
|
|
Special Issue Article: IJIRCCE |
Reduction of End To End Delay Using Priority
Queues in Wireless Sensor Network |
Jayasudha.J , T.Prabakaran |
|
|
|
Special Issue Article: IJIRCCE |
Transferring Knowledge Using Feature Extraction from
Sparse Data for Drug Toxicity Prediction Using Utility and
Drug Combinations |
M.S.Danessh, S.Vasanth |
|
|
|
Special Issue Article: IJIRCCE |
Improving Service Credibility in Password
Authentication Peer Services |
V. Vijayashanthi, C. Bala Saravanan |
|
|
|
Special Issue Article: IJIRCCE |
Securing Data Packets from Vampire Attacks in
Wireless Ad-Hoc Sensor Network |
Mr.M.Rajesh Khanna, S.Divya, Dr.A.Rengarajan |
|
|
|
Special Issue Article: IJIRCCE |
A Novel Approach for Restructuring Web Search
Results by Feedback Sessions Using Fuzzy
clustering |
R.Dhivya, R.Rajavignesh |
|
|
|
Special Issue Article: IJIRCCE |
Combined Fingerprint Minutiae Template
Generation |
Guruprakash.V, Arthur Vasanth.J |
|
|
|
Special Issue Article: IJIRCCE |
Filtering Injected False Data in Wireless Sensor
Networks by Using L, F, S Nodes and Key
Distribution |
Amuthan Mathy.P, Gowri Sankar.U |
|
|
|
Special Issue Article: IJIRCCE |
Bottleneck Zone Analysis in Wireless Sensor
Network Using XOR Operation and Duty Cycle |
P.Dhivakar, K. Sindhanaiselvan |
|
|
|
Special Issue Article: IJIRCCE |
Optimized Re-Ranking In Mobile Search
Engine Using User Profiling |
A.VINCY, M.KALAIYARASI, C.KALAIYARASI |
|
|
|
Special Issue Article: IJIRCCE |
Moving Object Detection By Background
Subtraction |
V.AISWARYA LAKSHMI, E.ANITHA, S.SELVAKUMARI. |
|
|
|
Special Issue Article: IJIRCCE |
An Enhanced Memory Management For An
Advanced Line Buffer Based Image
Processing Pipeline |
R.Priya,S.Priyadharshini,Thanjaibharathi. |
|
|
|
Special Issue Article: IJIRCCE |
Data Hiding Using Difference Expension
Method |
YASMEEN M.G,RAJALAKSHMI G |
|
|
|
Special Issue Article: IJIRCCE |
A Bi-Objective Approach for Cloud Computing
Systems |
N.Geethanjali, M.Ramya |
|
|
|
Special Issue Article: IJIRCCE |
Performing Enhancement and Providing Minutiae
Matching Score in LQFI |
M.Jayalakshmi, P. Robert |
|
|
|
Special Issue Article: IJIRCCE |
Thecritical Event Monitoring In Wireless Sensor
Networks Using Sleep Scheduling |
K. Somu, Mr. U.Gowri Sankar |
|
|
|
Special Issue Article: IJIRCCE |
Protecting Web Service Composition From
Privacy Attacks Using Dynamic Privacy Model |
Ms.M.Sabrabeebe, Ms.C.Nancy Nightingale |
|
|
|
Special Issue Article: IJIRCCE |
Range Query Grouping In Spatial Networks Using
Dual Distance Measurements |
S.Udhayakumar M.E., (CSE) , D.Sureshkumar M.E., (CSE) |
|
|
|
Special Issue Article: IJIRCCE |
Security Scenarios over Cloud Computing through
Espousing Multi-Cloud Structure |
Karthika.RN, Vijay Anand.P |
|
|
|
Special Issue Article: IJIRCCE |
Neighbor Position Verification in
Mobile Ad Hoc Network |
C. LOURDU RAJA |
|
|
|
Special Issue Article: IJIRCCE |
A Rational Approach For Data Reporting In
Wireless Sensor Networks Using Sink Trial
Protocol |
Ms.R.Anitha, Mr.Santhosh M.E.,MBA.,Ph.D |
|
|
|
Special Issue Article: IJIRCCE |
Robust Shape Representatio Using Minium Near
Convex Decomposition |
Ms.Sathya Prabha.p, Mr.Santhosh.R |
|
|
|
Special Issue Article: IJIRCCE |
Speech Processing Of Tamil Language With Back
Propagation Neural Network And Semi-
Supervised Traning |
N.Pushpa, R.Revathi, C.Ramya, S.Shahul Hameed |
|
|
|
Special Issue Article: IJIRCCE |
Reducing Routing Overhead In Manet Using Ncpr
Protocol |
Ms.Manjula.R, Mr.Santhosh.R |
|
|
|
Special Issue Article: IJIRCCE |
Audio Alert for Safe Driving by Smartphones |
R.Ancy Ramya,ME, R.SwathiRamya,M.E., S.Krishnaveni,M.E |
|
|
|
Special Issue Article: IJIRCCE |
Detecting Forged Acknowledgement in Mobile
Ad-Hoc Network Using Intrusion Detection
System |
Lavanya.K |
|
|
|
Special Issue Article: IJIRCCE |
Secured And Reliable Data Transmission Using
Lychrel Numbers Rgb Colors And One Time
Password |
P. Dhivya, S. Mohana Gowri, M. Vijay Kumar |
|
|
|
Special Issue Article: IJIRCCE |
Semi supervised clustering for Text Clustering |
N.Saranya |
|
|
|
Special Issue Article: IJIRCCE |
To improve Security enhancement and Lifetime
Management Scheme for Wireless Sensor
Networks |
K.R.Senthilnathan, Shalini Merine George |
|
|
|
Special Issue Article: IJIRCCE |
Effective Heart Disease Prediction using
Frequent Feature Selection Method |
S.Saravanakumar, S.Rinesh |
|
|
|
Special Issue Article: IJIRCCE |
A Image Forensics Analysis by Using DST,
Fuzzy and Bayesian Approaches |
D.Gokila Bharathi, G.Selvavinayagam |
|
|
|
Special Issue Article: IJIRCCE |
Data Aggregation In Wireless Sensor Networks
Using Mobile Data Collector |
P.Saranya |
|
|
|
Special Issue Article: IJIRCCE |
Tour Planning For Mobile Data-Gathering
Mechanisms In Wireless Sensor Networks |
D.Yasar Arfath, K.R.Kavitha |
|
|
|
Special Issue Article: IJIRCCE |
AUGMENTING THE SECURITY IN TOR |
S.Kokilavani, G.Priyadharshini |
|
|
|
Special Issue Article: IJIRCCE |
An Improved Edge Adaptive Grid Technique To
Authenticate Grey Scale Images |
Ishwarya.M, Mary shamala.L |
|
|
|
Special Issue Article: IJIRCCE |
Dynamic Router Design For Reliable
Communication In Noc |
Mr. G.Kumaran, Ms. S.Gokila, M.E. |
|
|
|
Special Issue Article: IJIRCCE |
A Cluster Based Group Management Using Zone
Leader Allocation In Manet |
K. Senthil Kumar, Dr. S. Sasi Kumar, Dr. C. Sugapriya |
|
|
|
Special Issue Article: IJIRCCE |
Image Fusion And Denoising Technique: Survey |
P.Thirumurugan, Dr. S. Sasikumar, C.Sugapriya |
|
|
|
Special Issue Article: IJIRCCE |
Enhancement of secured Mobile voting based on
IMEI number as Key |
Venkatesh J, Viswaprasath KS |
|
|
|
Special Issue Article: IJIRCCE |
Optimization Of Energy Efficient Communication
To Improve The Lifetime Of Sensor |
S.Anbarasu, P.Balasubramani, S.Saravanakumar |
|
|
|
Special Issue Article: IJIRCCE |
Computer Based Image Algorithm For Wireless
Sensor Networks To Prevent Hotspot Locating
Attack |
J.Anbu selva, P.Bharat, S.Mathiyalagan J.Anand |
|
|
|
Special Issue Article: IJIRCCE |
Investigation of Recognition Methods in
Biometrics |
Udhayakumar.M, Sidharth.S.G, Deepak.S, Arunkumar.M |
|
|
|
Special Issue Article: IJIRCCE |
User Revocation And Fine Grained Access
Control Of Phr In Cloud Using Hasbe |
T.Radhika, S.Vasumathi Kannagi |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Approach For Multimedia
Transmission Using Multipath Routing In Manet |
A.Sheganaz, P.D.R.Vijaya Kumar |
|
|
|
Special Issue Article: IJIRCCE |
Feature Based Classifiation Of Lung Tissues For
Lung Disease Diagnosis |
V.Lakshmi, Ms. P.Krisnaveni, Mrs. S.Ellammal |
|
|
|
Special Issue Article: IJIRCCE |
Improving Privacy And Data Utility For High-
Dimensional Data By Using Anonymization
Technique |
P.Nithya, V.Karpagam |
|
|
|
Special Issue Article: IJIRCCE |
Secure Cluster Formation And Certificate
Revocation Of Adversary Nodes In Mobile
Adhoc Network |
Ambarish.A, Gowthamani.R |
|
|
|
Special Issue Article: IJIRCCE |
Prevention Model For Phishing Attacks In Web
Applications Using Linkguard Algorithm |
A.Sarannia, U.R.Padma |
|
|
|
Special Issue Article: IJIRCCE |
Comparison Of Cepstral And Mel Frequency
Cepstral Coefficients For Various Clean And
Noisy Speech Signals |
M.Kalamani, Dr.S.Valarmathy, C.Poonkuzhali, R.Karthiprakash |
|
|
|
Special Issue Article: IJIRCCE |
A Security Approach For Detection And
Elimination Of Resource Depletion Attack In
Wireless Sensor Network |
Ambili M A, BijuBalakrishnan |
|
|
|
Special Issue Article: IJIRCCE |
Privacy Preserving Public Auditing in Secured
Cloud Storage Using Block Authentication Code |
Sajeev V, Gowthamani R |
|
|
|
Special Issue Article: IJIRCCE |
Securing Location and trust extended
authentication in mobile ad hoc network |
Ms. Reshna Wilson A, Mr. Biju Balakrishnan |
|
|
|
Special Issue Article: IJIRCCE |
A Best Vigorous Resource Allocation
Autonomously In Cloud |
S.Rameez Raja, S.Rinesh MBA.,M.E.,(Ph.D) |
|
|
|
Special Issue Article: IJIRCCE |
Attention Towards Selfish Nodes Over A Manet
Using Arti-Q Technique |
S.ArunKumar, Mr.A.Bharanidharan |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Load Balanced Routing Algorithm Based
On Genetic And Particle Swarm Optimization |
K.Selvakumar, Dr.M.Senthamil Selvi |
|
|
|
Special Issue Article: IJIRCCE |
Annotating Multiple Web Databases Using Svm |
M.Yazhmozhi, M. Lavanya, Dr. N. Rajkumar |
|
|
|
Special Issue Article: IJIRCCE |
Feature Extraction Technique Based On Circular
Strip for Palmprint Recognition |
Dr.S.Valarmathy, R.Karthiprakash, C.Poonkuzhali |
|
|
|
Special Issue Article: IJIRCCE |
Automatic Tuning Of OLSR Routing Protocol
Using IWD in VANET |
M.Gunasekar, S.J.Hinduja |
|
|
|
Special Issue Article: IJIRCCE |
K-Tier Computation of Parallel Workload in Cloud |
P.Karthikeyan, R.Sudhakar |
|
|
|
Special Issue Article: IJIRCCE |
Visual Text Summarization in Supervised and
Unsupervised Constraints Using CITCC |
S.Mohan Gandhi, T.Suresh Kumar |
|
|
|
Special Issue Article: IJIRCCE |
Privacy Preserved Association Rule Mining For
Attack Detection and Prevention |
V.Ragunath, C.R.Dhivya |
|
|
|
Special Issue Article: IJIRCCE |
Automated Testing For the Refactored Codes |
K.Jeya Ganesh Kumar, Dr.M.S. Geetha Devasena |
|
|
|
Special Issue Article: IJIRCCE |
Human Gait Based Gender Classification Using
Energy Motion Approaches |
Ms.P.Muthumari, Mrs.D.Suganya, Mrs.S.Ellammal |
|
|
|
Special Issue Article: IJIRCCE |
Functional Testing Technique Using ODC to
Identify And Predict Faults |
K.Sivaprakash, Prof. Preethi harris |
|
|
|
Special Issue Article: IJIRCCE |
Online Dynamic Assessment |
Subashini.A, Aishwarya.M, Bhuvenswari.R, Manjuparkavi.R |
|
|
|
Special Issue Article: IJIRCCE |
Anonymous Privacy-Preserving Routing In
Location Based Dynamic Ad-Hoc Networks |
G.Gokila, Mrs.F.Salma Rosline Mary, M.E., P.Karthikeyan, Mr.A.Suresh Babu,M.E. |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Message Caching Scheme for MANET |
S. Manju, Mrs. K. Vanitha, M.E., (Ph.D) |
|
|
|
Special Issue Article: IJIRCCE |
Mobile Sink based Data Gathering and Forwarding
in WSN |
C. Kanimozhi, Prof. M.Mohamed Musthafa, M.Tech., (Ph.D)., |
|
|
|
Special Issue Article: IJIRCCE |
Mobile Sink based Data Gathering and Forwarding
in WSN |
C. Kanimozhi, Prof. M.Mohamed Musthafa, M.Tech., (Ph.D). |
|
|
|
Special Issue Article: IJIRCCE |
Decentralized Data Allocation with Load
Balancing Mechanism |
A. Rajalakshmi, Dr. A. M. J. Md Zubair Rahman, ME, MS, Ph.D., |
|
|
|
Special Issue Article: IJIRCCE |
Routing Attack Discovery in WSN |
J. Sabatini, Mrs. K. Vanitha, M.E., (Ph.D) |
|
|
|
Special Issue Article: IJIRCCE |
Privacy Preservation for User Profiles In Social
Networks |
Ms. U.P. Umasree, Mr. V. Bhaskar, ME, |
|
|
|
Special Issue Article: IJIRCCE |
Image Fraud Identification Using Illuminant
Analysis |
P. Kaveen, Dr. G. Singaravel Ph.D., |
|
|
|
Special Issue Article: IJIRCCE |
Image Fraud Identification Using Illuminant
Analysis |
P. Kaveen, Dr. G. Singaravel Ph.D., |
|
|
|
Special Issue Article: IJIRCCE |
Protecting DNS Query Communication against
DDoS Attacks |
Ms. R. Madhuranthaki, Ms. S. Umarani, M.E., (Ph.D) |
|
|
|
Special Issue Article: IJIRCCE |
Multi Image Super Resolution and Blind
Deconvolution |
Lincy Annet Abraham, R.Manimekala |
|
|
|
Special Issue Article: IJIRCCE |
Optimizing User Navigation with Pattern based
Web Site Restructuring Scheme |
Ms. Jissin Mary Kunjukutty, Ms. A.Priya, ME |
|
|
|
Special Issue Article: IJIRCCE |
Graph Clustering and Feature Selection for High
Dimensional Data |
K. Jaganath, Mr. P. Sasikumar |
|
|
|
Special Issue Article: IJIRCCE |
Efficient Data Delivery Mechanism for Distributed
Storages |
S. Koperundevi, R. Anbarasu, ME |
|
|
|
Special Issue Article: IJIRCCE |
Privacy Ensured Domain Name Query Scheme
with Attack Detection Mechanism |
M. Dhaarani, Mr. S. Sivaraj, ME |
|
|
|
Special Issue Article: IJIRCCE |
Decision Prevention Mechanism for Frequent
Pattern Mining Process |
L. Gomathi, Mr. A.T. Ravi, ME (Ph.D) |
|
|
|
Special Issue Article: IJIRCCE |
Optimal Centroid Estimation Scheme for Multi
Dimensional Clustering |
K. Lalithambigai, Mr. S. Sivaraj, ME |
|
|
|
Special Issue Article: IJIRCCE |
Distributed Cache Model with Stability and
Storage Management for MANET |
S. Padmapriya, Mr. S. Sivaraj, ME |
|
|
|
Special Issue Article: IJIRCCE |
Batch Verification Scheme for Economic Cloud
Storage Services |
K. Sudha, Mr. S. Sivaraj, ME |
|
|
|
Special Issue Article: IJIRCCE |
Anomaly Detection on Data Streams with High
Dimensional Data Environment |
Mr. D. Gokul Prasath, Dr. R. Sivaraj, M.E, Ph.D. |
|
|
|
Special Issue Article: IJIRCCE |
MULTI ORGANIZATION RECORD SHARING
IN CLOUD COMPUTING USING ATTRIBUTEBASED
ENCRYPTION |
Mr. T. Krishnakumar, Ms. S. Kayalvili M.E. |
|
|
|
Special Issue Article: IJIRCCE |
Post Market Drug Analysis using Irregular Pattern
Mining Scheme |
Mr. S. Prakash, Ms. S. Kanjanadevi |
|
|
|
Special Issue Article: IJIRCCE |
A Fast Clustering Based Feature Subset Selection
Using Affinity Propagation Algorithm |
Mr. M. Senthil Kumar, Ms. V. Latha Jothi M.E |
|
|
|
Special Issue Article: IJIRCCE |
Time Constrained Datadestruction Using
Blowfish Algorithm In Cloud |
R.K.Vinothraja, T.Krishnakaarthik |
|
|
|
Special Issue Article: IJIRCCE |
Cloud Computing Model for Large Scale System
through Merkle Hash Tree |
S.Dhivyabala, K.Gopalakrishnan |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Way of Detecting Denial-Of-Service
Attack Using Multivariate Correlation Analysis |
S.Gomathi |
|
|
|
Special Issue Article: IJIRCCE |
Privacy Preserving Outsourcing for Frequent
Itemset Mining |
M. Arunadevi, R. Anuradha |
|
|
|
Special Issue Article: IJIRCCE |
An Energy Efficient Multicast Routing Based On
Genetic Algorithm for MANET |
P.Prasanna, D.Saravanan, RM.Chandrasekaran |
|
|
|
Special Issue Article: IJIRCCE |
Enhancing Security in Wireless Ad-Hoc Network
Using ZKP |
M.Soniya, P.Sabarinathan, S.Visnudharsini |
|
|
|
Special Issue Article: IJIRCCE |
Enhanced Security in Manet Using Eaack To
Detect Malicious Attack |
K.Chinthanai Chelvan, I.Anbu Muthu, D.Saravanan |
|
|
|
Special Issue Article: IJIRCCE |
Enhancing Security in MANET Using CCRVC
Scheme |
S.Herman Jeeva, D.Saravanan, RM.Chandrasekaran |
|
|
|
Special Issue Article: IJIRCCE |
Error Reduction in WiMAX Deinterleaver
Address Generator by Using Majority Logic
Circuit |
A.Nandhini, D.Poornima Devi |
|
|
|
Special Issue Article: IJIRCCE |
Design of Wireless Framework for Energy
Efficient Street Light Automation |
P.Nithya, N.Kayalvizhi |
|
|
|
Special Issue Article: IJIRCCE |
Design of Compressed Sensing systems for
wireless sensor under the performance and
reliability constraints |
J.Parthasarathy, P.Kala |
|
|
|
Special Issue Article: IJIRCCE |
Design of Multi-region SAR Segmentation by
Parametric |
S.Narumalar, V. Madhan kumar |
|
|
|
Special Issue Article: IJIRCCE |
The Analysis of Power Transformer from
Differential Protection Using Back Propagation
Neural Algorithm |
T.Raja Pandi, MKNM.Sakthi Nagaraj, N.Panneer Selvam |
|
|
|
Special Issue Article: IJIRCCE |
Detection of an Inflammatory Disease Based on
Classification of Tissues in Brain MRI |
R.Vidhya, Mrs.P.Rajarajeswari, Mrs.S.Ellammal |
|
|
|
Special Issue Article: IJIRCCE |
Fault Secure Encoder and Decoder For Memory
Applications |
V.Jeevitha |
|
|
|
Special Issue Article: IJIRCCE |
Design Of High Performance Rc4 Stream Cipher
For Secured Communication |
R.Prabu |
|
|
|
Special Issue Article: IJIRCCE |
Low Power Consuming FFT Pipelined Processor |
A.Soundrakumar |
|
|
|
Special Issue Article: IJIRCCE |
High-Capacity Reversible Data Hiding In Binary
Images by Using Pattern Substitution |
C.Magishasini, C.Prakashnarayanan |
|
|
|
Special Issue Article: IJIRCCE |
Mobile Ad-Hoc Networks Capacity Optimized
Cooperative Communications |
R.Karthik, B.Sakthivel |
|
|
|
Special Issue Article: IJIRCCE |
Encryption Techniques for Storing Personal
Health Details (PHR) In Privacy Cloud |
Priya.C, Chandra Sekaran.S |
|
|
|
Special Issue Article: IJIRCCE |
Profit Maximization in Cloud Computing |
Saistha N, Senthil Nathan K |
|
|
|
Special Issue Article: IJIRCCE |
An Efficient Storage and a Method Of Network
Monitoring Data Compression |
Sivasakthi, Juveriya |
|
|
|
Special Issue Article: IJIRCCE |
Large Scale of Content Distribution Using
Homomorphic Hash Function |
Sridevi K, Senthil Nathan K |
|
|
|
Special Issue Article: IJIRCCE |
Detection of Tricking Attack and Localization Of
Deceivers In Multiple Wireless Networks |
Srividhya.A, Ms.M. Anitha |
|
|
|
Special Issue Article: IJIRCCE |
Reverberation Suppression of Noisy Speech Signal |
Subha S, V.Murugan M.E., (Ph.D). |
|
|
|
Special Issue Article: IJIRCCE |
Accomplishing Minimum Data Sets Transfer
Cost in the Cloud through Ant Colony
Optimization |
Thahassin.C, A.Geetha, Raseek.C |
|
|
|
Special Issue Article: IJIRCCE |
Improving The Performance For Failure-Aware
Resource Provisioning In Cloud |
Priyanka P, A Geetha, Biju Balakrishnan |
|
|
|
Special Issue Article: IJIRCCE |
A Solid State Transformer Integrating Distributed
Generation and Storage |
Ponraj.T, Alex george |
|
|
|
Special Issue Article: IJIRCCE |
Protection Of User?s Data Using Image Encryption
Domain: Image Encryption |
Balamurugan.S, S.Sureshkumar |
|
|
|
Special Issue Article: IJIRCCE |
Safeguarding Scada Network by Captious State
Based Filter |
I.Karthika, Mr. M. Mohamed Musthafa |
|
|
|
Special Issue Article: IJIRCCE |
Intrution Resilience Using Self-Healing
Mechanism In Mobile Unattended Wsns |
Roshil K Das, J.Arun |
|
|
|
Special Issue Article: IJIRCCE |
Location Based Mobile Secure Social Networks |
Roshan Sanu. Y, S. Uma Rani |
|
|
|
Special Issue Article: IJIRCCE |
Securable Routing And Elimination Of
Adversary Attack From Manet |
Sureka.N, Prof. S. Chandra Sekaran, M.E. |
|
|
|
Special Issue Article: IJIRCCE |
Dynamic Resource Allocation And Distributed
Video Transcoding Using Hadoop Cloud
Computing |
Shanthi.B.R, Prakash Narayanan.C |
|
|
|
Special Issue Article: IJIRCCE |
Secure Cluster Formation and Certificate
Revocation Of Adversary Nodes In Mobile
Adhoc Network |
Ambarish.A, Gowthamani.R |
|
|
|
Special Issue Article: IJIRCCE |
Human Gait Based Gender Classification Using
Energy Motion Approaches |
Ms.P.Muthumari, Mrs.D.Suganya, Mrs.S.Ellammal |
|
|
|
Special Issue Article: IJIRCCE |
A Security Approach for Detection And
Elimination Of Resource Depletion Attack In
Wireless Sensor Network |
Ambili M A, BijuBalakrishnan |
|
|
|
Special Issue Article: IJIRCCE |
Securing Location and trust extended
authentication in mobile ad hoc network |
Ms. Reshna Wilson A, Mr. Biju Balakrishnan |
|
|
|
Special Issue Article: IJIRCCE |
Privacy Preserving Public Auditing in Secured
Cloud Storage Using Block Authentication Code |
Sajeev V, Gowthamani R |
|
|
|
Special Issue Article: IJIRCCE |
New Dimensional Approach towards Fraps-Face
Recognition after Plastic Surgery |
Beema K.K, S. Shobana, M.E. |
|
|
|
Special Issue Article: IJIRCCE |
Regularized Sparse Kernel SFA with Decorrelation
Filtering For Separating Correlated Sources |
Rekha P, S. Shobana, M.E. |
|
|
|
Special Issue Article: IJIRCCE |
Seam Carving for Content Aware Video
Compression |
G. Suganya, S. Lavanya, G. Sheeba Farin, G. Karthick |
|
|
|
Special Issue Article: IJIRCCE |
Unconstrained Face Recognition Using SVM
Across Blurred And Illuminated Images With Pose
Variation |
Nadeena M, S.Sangeetha, M.E |
|
|
|
Special Issue Article: IJIRCCE |
Collaborative Discovery and Verification of
Neighbour position in MANET |
R.Sagunthala, P.Sharmila, M.Somasundharam |
|
|
|
Special Issue Article: IJIRCCE |
Obtaining Optimal Software Effort Estimation
Data Using Feature Subset Selection |
Abirami.R, Sujithra.S, Sathishkumar.P, Geethanjali.N |
|
|
|
Special Issue Article: IJIRCCE |
Reachability of Open Source Software |
R.Kamalraj, R. Sujatha, P. Srisathya |
|
|
|
Special Issue Article: IJIRCCE |
A New Approach For Collaborative Data
Publishing Using Slicing And M-Privacy |
Sathish.R, Silambarashi.G, Saranya.P, Santhosh Kumar.B |
|
|
|
Special Issue Article: IJIRCCE |
Design and Detection of Covert Timing
Channels and Spyware Using Warden
Technique |
C.Logasundari, V.Menaka, R.Madhubala, G.Misal |
|
|
|
Special Issue Article: IJIRCCE |
Secure Sharing Of Related Organization Records
in Cloud Computing |
S.Keerthana |
|
|
|
Special Issue Article: IJIRCCE |
Tumor cut segmentation for Blemish Cells
Detection in Human Brain Based on Cellular
Automata |
D.Mohanapriya |
|
|
|
Special Issue Article: IJIRCCE |
An Enhanced Token Ring Technique for Overhead
cut Detection Scheme in Distributed Mesh
Networks |
Mr.S.S.Aravinth, Mr.M.Ramkumar, Mr.S.Someswaran, Mr.K.Aravinthraj |
|
|
|
Special Issue Article: IJIRCCE |
An improved Automatic Virus particle Detection
method based on adaptive K-NN classifier |
Mr. Dinesh Kumar M.E., Desmond John |
|
|
|
Special Issue Article: IJIRCCE |
Intelligent Wireless Street Lighting System |
S. Sugapriya, Prof. A. Natarajan |
|
|
|
Special Issue Article: IJIRCCE |
Computer Vision Approach for Retrieving
Unconstrained Blurred Images |
K.Sridevi |
|
|
|
Special Issue Article: IJIRCCE |
TSROD: Time Synchronization By Reducing
Ocean?s Delay In Underwater Wireless Networks |
Ms.R.Vaishnavi karthika, Mr.M.N.Karuppusamy |
|
|
|
Special Issue Article: IJIRCCE |
Improving Service credibility in Password
Authenticated Peer Services |
Vignesh.R, Karthikeyan.C, Satheesh.K |
|
|
|
Special Issue Article: IJIRCCE |
A Large Scale Analysis Of Information
Re-Finding System |
Prakash.M , Karthika.D, Sophia.J |
|
|
|
Special Issue Article: IJIRCCE |
Recognition of Spatially Significant Zone Using
Morphological Dilation With Advanced
Watershed Segmentation Algorithm |
M.Kavitha, T.Sasi |
|
|
|
Special Issue Article: IJIRCCE |
Cancer Cell Detection Using Mathematical
Morphology |
Sivappriya T , Muthukumaran K |
|
|
|
Special Issue Article: IJIRCCE |
MULTI FOCUS IMAGE FUSION USING
MULTI SPECTRAL AND PAN IMAGES |
Prabhavathi. P, Mr. Ganesh Kumar. K. (Ph.D) |
|
|
|
Special Issue Article: IJIRCCE |
Visual Impairment and Blindness Identification
Using Mathematical Analysis in the Retinal Vessels |
Decia Augustian, A.Sampath Kumar |
|
|
|
Special Issue Article: IJIRCCE |
Avoiding Traffic Congestion Using Position
Based Routing Protocol in VANET |
Ms. D. Jeya, Mr P. Ranjith Kumar, Mr G. Naresh kumar |
|
|
|
Special Issue Article: IJIRCCE |
Enhancing Secured Information in Online
Social Network by Text Classifier |
A.Maheshwari, Prof.B.Sakthivel |
|
|
|
Special Issue Article: IJIRCCE |
Secure Reputation Mechanism For Unstructured
Peer To Peer System |
N. Vijaya Kumar., Prof. Senthilnathan |
|
|
|
Special Issue Article: IJIRCCE |
USING ERED-FEC MECHANISM TO IMPROVING
VIDEO QUALITY TRANSMISSION ON WiMAX |
K.Nisha, M.Anitha |
|
|
|
Special Issue Article: IJIRCCE |
Extracting the Information by Ranking
Techniques to Increase the Privacy of Search
Engine |
C.Parimala, Prof.B.Sakthivel |
|
|
|
Special Issue Article: IJIRCCE |
A NEIGHBOR COVERAGE BASED ROUTING BY
GOOD NODE DETECTION IN MANET?S |
J.Priyanka Sheela, Mr.S. Sundar Raj |
|
|
|
Special Issue Article: IJIRCCE |
Load Balanced Connection Aware Clustering
Algorithm for Wireless Sensor Networks |
S.Balaganesh, S.Periyasamy |
|
|
|
Special Issue Article: IJIRCCE |
An Enhanced Rationalize Security and
Efficient Data Gathering In Wireless Sensor
Networks |
Karthick.S, Senthil Kumar.V |
|
|
|
Special Issue Article: IJIRCCE |
Enhanced Data Transmission for Wireless
Sensor Networks |
Karthick.S, Senthil Kumar.V |
|
|
|