Vous êtes sur la page 1sur 3

INDEX

SNO
1

TITLE
A New Reliable Cryptographic Technique for Protection of Digital Signals using n-Dimensional Matrix G.Mohanapriya1, V.G.Akilan2, L.Boopathi2 & S.V.Kammatchinathan2 Analysis of Lexical Ambiguity in Multi Language Image Retrieval T.Kavitha1 & P.Monica2 Broadcast for cache sharing in manet using enhanced ip vector R.Rama Prabha1 & Dr. S. A. Sahaaya Arul Mary2 Cloud computing a walk on the cloud N.Divya1 & S.Kanthimathi2 Develop a Quality Strategy for RE Process by mapping of SOA using RUP Ms.T.Priyaradhikadevi1, Dr.R.M.S.Parvathi2 Realizing Fault-Tolerant Grids Using Adaptive Checkpoints and Replication R.Shanmugapriya1, S.Tajunnissa2 & G.Nallasivan2 Adaptive minimum spanning tree based clustering R.Yasodha1 & K.Soundararajan2 Efficient and secure broadcasting using time bound hierarchical key management M.AkkilaaShriee1, S.Deepika2 & D.Arun Shunmugam2 Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple Packet Transmission Geena George1 & JyothimolJohny2 Person search system using dismbiguation algorithm M. Nalini1 & DR. N. Kannan2 Resource management framework for differentiated qos in competitive wireless data networks using game theory P.Anandkumar1 & S.Manikandan2 A full featured stream web portal design in cloud computing A.Nelson1 & P.Arul Raj2 V&v lifecycle methodologies, L.Mohan1 Two factor authentication using mobile phones Sathishkumar.P1 & SubashKannan.S2

PAGE NO 8-11

12-16 17-20 21-25 26 32

7 8

42 56 61

10 11

66 72 1 77 89

12

13 14

15

Network intelligent intrusion detection systems based on data- 94 mining techniques R.Tinasudhaa1 & K.Balaji2 Energy conserving Routing in Energy conserving Routing in Wireless Sensor Networks Praddep.A1 & S.M.NandhagopaL2 Automobile protection using A wireless device Ramya Shree.K1, Revathi.K2 & Pavithra.B2 Study and performance analysis of advanced image compression algorithm R.Indrakumari1, A.Delphia Reena2, D.Meenambigai2, T.pearl jebamalar2 & S.Shunmugapriya2

16

100

17

105

18

109

19

Trusted center authentication for key distribution using quantum key cryptography S.Srivadhana1 Efficient transmission of video framesover lossy computer networks J.Brindha1 Effecient learning for distributional features in text categorization N.Naveenkumar1 & DR.K.Batri2 Secure routing in wireless sensor networks A.Senthilkumar1 Biometrics tracker displacement features facila expression V.Anuradha1 & M.Nirmala2 Maximized wlan throughput with optimized fairness B.Preetha1 & K.Soundararajan2 Wireless network security G.Senthil Kumar1 & P.Kumar2 Identifying Bug Signatures Using Discriminative Graph Mining A.M.Viswa Bharathy1 & V.Chandrasekar2 THE ARTIFICIAL INTELLIGENCE PROGRAM LUCY FOR INTEGRATING ENGLISH ORAL PRACTICE AND WRITING SKILLS P.K. Gomathi1 & S. Buvana2 TEACHING ENGLISH LANGUAGE IS A BOON IN THE NETWORK AGE P. Kavitha1 & K.P. Jaiyasri2

115

20

126 129 134 146 151 162 169 190

21

22 23 24 25 26

27

28

199

29

ANALYSIS OF DYMO PROTOCOL IN VANET Vs MANET TOPOLOGY

207

K.M.Karthick Raghunath1 , P.Rajasekaran2 & B.Shanmuga Raja2


30 OVER ALL PERFORMANCE DEGRADATION IN CONGESTED SENSOR NETWORKS R.Mekala1 & R.Vijayalakshmi2 31 SHARING ENHANCED MEMORY FOR PROCESSES USING POLICY-ENFORCED AUGMENTED TUPLE SPACE Gowrisankar.m 1 & Muthusamy.p 2 32 Privacy-Preserving Fast Backpropagation Neural Network Learning on Vertically Partitioned Data D.Shanthi1 & Dr. R.Amalraj2 33 34 ADAPTIVE RESTFULL WEB SERVICES ON IPHONE Sankar Ram , R.Sivaraman
1 2

213 223 232

241

Privacy-Preserving Fast Backpropagation Neural Network Learning on Vertically Partitioned Data D.Shanthi1 & Dr. R.Amalraj2 NANOTECHNOLOGY D.Senthilraja1 & T.W.Penchela Babu2

35

36 37 38 39

Development in rural Sector by using ICT Rajeswari.S Praddep.A


1 1

257 246 272

Alarming rising of Network Security Threats & A.M.Nandhagopal


1 2

ARTIFICAL INELLIGENCE V.P.Venkata muthu & D.Senthilraja NANO ROBOTICS


1 2

286
2

M.Balaganga & V.P.Venkata Muthu 40

SECURED ROUTING PROTOCOL WITH IMPROVED ATTACK MANAGEMENT SCHEME FOR MANET S.Sathiyakantharaj1 & V.Vijeynathan2

295

Vous aimerez peut-être aussi