- » Front Page
- » Front Inner Page
- » Integrated Security in Cloud Computing Environment
S.Arun Kumar, S.Rajathi And S.Jayakumar - » A Supervised Web-Scale Forum Crawler Using URL Type Recognition
A. Anitha, Mrs. R. Angeline - » A Robust Data Obfuscation Approach for Privacy Preserving Data Mining
S. Deebika , A. Sathyapriya - » E-Waste Management – A Global Scenario
R. Devika - » An Adequacy Based Multipath Routing In 802.16 WIMAX Networks
K.Saranya Dr. M.A. Dorai Rangasamy - » Calculation of Asymmetry Parameters for Lattice Based Facial Models
M. Ramasubramanian Dr. M.A. Dorai Rangaswamy - » Multi-Scale and Hierarchical Description Using Energy Controlled Active Balloon Model
T. Gandhimathi M. Ramasubramanian M.A. Dorai Rangaswamy - » Current Literature Review - Web Mining
K. Dharmarajan Dr.M.A.Dorairangaswamy - » The Latchkey of the Research Proposal for Funded
Mrs. B. Mohana Priya - » A Combined PCA Model for Denoising of CT Images
Mredhula.L , Dorairangaswamy M A - » RFID Based Personal Medical Data Card for Toll Automation
Ramalatha M, Ramkumar.A K, Selvaraj.S, Suriyakanth.S - » Adept Identification of Similar Videos for Web Based Video Search
Packialatha A. Dr.Chandra Sekar A. - » Predicting Breast Cancer Survivability Using Naïve Baysein Classifier and C4.5 Algorithm
R.K.Kavitha, Dr. D.Dorairangasamy - » Video Summarization Using Color Features and Global Thresholding
Nishant Kumar , Amit Phadikar - » Role of Big Data Analytic in Healthcare Using Data Mining
K.Sharmila , R.Bhuvana - » Secure Cybernetics Protector in Secret Intelligence Agency
G.Bathuriya , D.E.Dekson - » Revitalization of Bloom’s Taxonomy for the Efficacy of Highers
Mrs. B. Mohana Priya - » Security and Privacy-Enhancing Multi Cloud Architectures
R.Shobana Dr.Dekson - » Stratagem of Using Web 2.0 Tools in TL Process
Mrs. B. Mohana priya - » The Collision of Techno- Pedagogical Collaboration
Mrs. B. Mohana priya - » No Mime When Bio-Mimicries Bio-Wave
J.Stephy Angelin, Sivasankari.P - » A Novel Client Side Intrusion Detection and Response Framework
Padhmavathi B, Jyotheeswar Arvind M, Ritikesh G - » History Generalized Pattern Taxonomy Model for Frequent Itemset Mining
Jibin Philip , K. Moorthy - » IDC Based Protocol in AD HOC Networks for Security Transactions
K.Priyanka , M.Saravanakumar - » Virtual Image Rendering and Stationary RGB Colour Correction for Mirror Images
S.Malathy , R.Sureshkumar , V.Rajasekar - » Secure Cloud Architecture for Hospital Information System
Menaka.C, R.S.Ponmagal - » Improving System Performance Through Green Computing
A. Maria Jesintha, G. Hemavathi - » Finding Probabilistic Prevalent Colocations in Spatially Uncertain Data Mining in Agriculture using Fuzzy Logics
Ms.latha.R , Gunasekaran E . - » Qualitative Behavior of A Second Order Delay Dynamic Equations
Dr. P.mohankumar, A.K. Bhuvaneswari - » Hall Effects On Magneto Hydrodynamic Flow Past An Exponentially Accelerated Vertical Plate In A Rotating Fluid With Mass Transfer Effects
Thamizhsudar.M, Prof Dr. Pandurangan.J - » Detection of Car-License Plate Using Modified Vertical Edge Detection Algorithm
S.Meha Soman, Dr.N.Jaisankar - » Modified Context Dependent Similarity Algorithm for Logo Matching and Recognition
S.Shamini, Dr.N.Jaisankar - » A Journey Towards: To Become The Best Varsity
Mrs. B. Mohana Priya - » Extraction of 3D Object from 2D Object
Diya Sharon Christy , M. Ramasubramanian - » Cloud Based Mobile Social TV
Chandan Kumar Srivastawa, Mr.P.T.Sivashankar - » Blackbox Testing of Orangehrmorganization Configuration
Subburaj.V - » Back Inner Page - Call for Paper Next Issue
- » Back Cover
» The Effect of Cross-Layered Cooperative Communication In Mobile AD HOC Networks
N. Noor Alleema , D.Siva kumar, Ph.D