Article # |
Article Title & Authors (Volume 5 Issue 5 May 2014) |
Page |
1. |
Trust Worthy Framework for Wireless Sensor Networks
N.Karthik, J.Karthik
Abstract | PDF |
478-480 |
2. |
A COMPARATIVE ANALYSIS OF OBJECT POINT METHOD WITH USE CASE METHOD IN SOFTWARE EFFORT ESTIMATION
Mr.M.Senthil Kumar, Dr.B.Chidambara Rajan
Abstract | PDF |
481-483 |
3. |
ATTACKS ON SECURITY PROTOCOLS USING AVISPA
Vaishakhi S, Prof.Radhika M
Abstract | PDF |
484-487 |
4. |
Multiple Object Removal Using Exemplar-Based Image Inpainting
Prof. Kawade M.D., Prof. Ufade A.S.
Abstract | PDF |
488-493 |
5. |
COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Ms. Priyanka, Mr. Kapil Kumar Kaswan
Abstract | PDF |
494-497 |
6. |
A REVIEW: Advancement in Single node data transfer energy protocol in WSN
Lalit Kumar, Madhu sudan
Abstract | PDF |
498-501 |
7. |
Rule Based Exception Handling and Priority Modeling For Diabetes Management Using Ontology and SWRL
THANGARAJ MUTHURAMAN, GNANAMBAL SANKARAN
Abstract | PDF |
502-506 |
8. |
Survey on Service Migration to Cloud Architecture
Girish L S, Dr. H S Guruprasad
Abstract | PDF |
507-510 |
9. |
An Integrated Approach for Mining Closed Sequential Patterns
V. Purushothama Raju, Dr. G.P. Saradhi Varma
Abstract | PDF |
511-515 |
10. |
Analyze the impact of Transmission rate on the Performance of AODV and DSR Protocols in MANETs under Responsive and Non-responsive Traffic.
A.Venkataramana, S.Pallam Shetty
Abstract | PDF |
516-523 |
11. |
Dynamic Modeling Technique for Weather Prediction
Jyotismita Goswami, Alok Choudhury
Abstract | PDF |
524-531 |
12. |
AN EFFECEINT MULTI PARAMETERIC CPU SCHEDULING ALGORITHM FOR SINGLE PROCESSOR SYSTEMS
Dr. R. RAMA KISHORE, ARPNA SAXENA
Abstract | PDF |
532-540 |
13. |
A Survey Report On Software Aging and Rejuvenation studies in Virtualized Environment
SUBHASHREE BARADA, SANTOSH KUMAR SWAIN
Abstract | PDF |
541-546 |
14. |
Modified 4-Bit Comparator Using Sleep Technique
Linet. K
Abstract | PDF |
547-552 |
15. |
Malicious Code Detection through Data Mining Techniques
Ms. Milan Jain, Ms. Punam Bajaj
Abstract | PDF |
553-557 |
16. |
A Symmetric FHE Scheme Based on Linear Algebra
Iti Sharma
Abstract | PDF |
558-562 |
17. |
Highly Secured WSN Life Span Fortification with Data Compression, NNF Technique and ECC Method
M. Nagarajan, T. Dhanapalan, S. Jayanthi
Abstract | PDF |
563-569 |
18. |
Sign Language Recognition System to aid Deaf-dumb People Using PCA
Shreyashi Narayan Sawant
Abstract | PDF |
570-574 |
19. |
A Secure and Privacy Preserving Technique in Distributed Information Sharing using AES Encryption and Genetic Algorithm
Dharani.M, R.Vidhya
Abstract | PDF |
575-578 |
20. |
Different sanitization techniques to prevent inference attacks on social network data
Ms. Patel Madhuri
Abstract | PDF |
579-582 |
21. |
GUI Based Home Automation System Operated By Voice Command
Ms. Rutuja Vijay Patil
Abstract | PDF |
583-590 |
22. |
Medical Disease Diagnosis Using Structuring Text
Gomathi.P, Mrs.N.S.Nithya
Abstract | PDF |
591-594 |
23. |
Software maintenance using effective code clones detection
M.Alagurathinam, Ms.Kavitha Esther Rajakumari
Abstract | PDF |
595-599 |
24. |
The Design and Implementation of Land Management Information System (LMIS), Bauchi State Ministry of Lands and Survey
ESIEFARIENRHE MICHAEL BUKOHWO, EYE OLANREWAJU EMMANUEL
Abstract | PDF |
600-605 |
25. |
Parallel Regulation Technique Based Charge controller to operate DC Motor
Priyanka Ramesh Pandit
Abstract | PDF |
606-611 |
25. |
PAn improved load balancing adaptive QoS buffer scheduler (I-LABS) for streaming services over MANET
A. Ayyasamy, Dr. K. Venkatachalapathy
Abstract | PDF |
612-620 |