Académique Documents
Professionnel Documents
Culture Documents
SNO
1
TITLE
A New Reliable Cryptographic Technique for Protection of Digital Signals using n-Dimensional Matrix G.Mohanapriya1, V.G.Akilan2, L.Boopathi2 & S.V.Kammatchinathan2 Analysis of Lexical Ambiguity in Multi Language Image Retrieval T.Kavitha1 & P.Monica2 Broadcast for cache sharing in manet using enhanced ip vector R.Rama Prabha1 & Dr. S. A. Sahaaya Arul Mary2 Cloud computing a walk on the cloud N.Divya1 & S.Kanthimathi2 Develop a Quality Strategy for RE Process by mapping of SOA using RUP Ms.T.Priyaradhikadevi1, Dr.R.M.S.Parvathi2 Realizing Fault-Tolerant Grids Using Adaptive Checkpoints and Replication R.Shanmugapriya1, S.Tajunnissa2 & G.Nallasivan2 Adaptive minimum spanning tree based clustering R.Yasodha1 & K.Soundararajan2 Efficient and secure broadcasting using time bound hierarchical key management M.AkkilaaShriee1, S.Deepika2 & D.Arun Shunmugam2 Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple Packet Transmission Geena George1 & JyothimolJohny2 Person search system using dismbiguation algorithm M. Nalini1 & DR. N. Kannan2 Resource management framework for differentiated qos in competitive wireless data networks using game theory P.Anandkumar1 & S.Manikandan2 A full featured stream web portal design in cloud computing A.Nelson1 & P.Arul Raj2 V&v lifecycle methodologies, L.Mohan1 Two factor authentication using mobile phones Sathishkumar.P1 & SubashKannan.S2
PAGE NO 8-11
7 8
42 56 61
10 11
66 72 1 77 89
12
13 14
15
Network intelligent intrusion detection systems based on data- 94 mining techniques R.Tinasudhaa1 & K.Balaji2 Energy conserving Routing in Energy conserving Routing in Wireless Sensor Networks Praddep.A1 & S.M.NandhagopaL2 Automobile protection using A wireless device Ramya Shree.K1, Revathi.K2 & Pavithra.B2 Study and performance analysis of advanced image compression algorithm R.Indrakumari1, A.Delphia Reena2, D.Meenambigai2, T.pearl jebamalar2 & S.Shunmugapriya2
16
100
17
105
18
109
19
Trusted center authentication for key distribution using quantum key cryptography S.Srivadhana1 Efficient transmission of video framesover lossy computer networks J.Brindha1 Effecient learning for distributional features in text categorization N.Naveenkumar1 & DR.K.Batri2 Secure routing in wireless sensor networks A.Senthilkumar1 Biometrics tracker displacement features facila expression V.Anuradha1 & M.Nirmala2 Maximized wlan throughput with optimized fairness B.Preetha1 & K.Soundararajan2 Wireless network security G.Senthil Kumar1 & P.Kumar2 Identifying Bug Signatures Using Discriminative Graph Mining A.M.Viswa Bharathy1 & V.Chandrasekar2 THE ARTIFICIAL INTELLIGENCE PROGRAM LUCY FOR INTEGRATING ENGLISH ORAL PRACTICE AND WRITING SKILLS P.K. Gomathi1 & S. Buvana2 TEACHING ENGLISH LANGUAGE IS A BOON IN THE NETWORK AGE P. Kavitha1 & K.P. Jaiyasri2
115
20
21
22 23 24 25 26
27
28
199
29
207
241
Privacy-Preserving Fast Backpropagation Neural Network Learning on Vertically Partitioned Data D.Shanthi1 & Dr. R.Amalraj2 NANOTECHNOLOGY D.Senthilraja1 & T.W.Penchela Babu2
35
36 37 38 39
286
2
SECURED ROUTING PROTOCOL WITH IMPROVED ATTACK MANAGEMENT SCHEME FOR MANET S.Sathiyakantharaj1 & V.Vijeynathan2
295