Article # |
Article Title & Authors (Volume 5 Issue 9 September 2014) |
Page |
1. |
CONTENT WRITING IN THE 21ST CENTURY -INFORMATION NEEDS, CHALLENGES AND OPPORTUNITIES: AN OVERVIEW
Jomy Jose, Jismy Vakkachan
Abstract | PDF |
848-853 |
2. |
SURVEY ON BIG DATA MINING PLATFORMS, ALGORITHMS AND CHALLENGES
SHERIN A, Dr S UMA, SARANYA K, SARANYA VANI M
Abstract | PDF |
854-862 |
3. |
Concerto of Remedy Network Dais on Side Effects amongst Claim for Remedy Entrust
C. BALA SARAVANAN, R.S. SAN MATHI PRIYA, T.V.RAMYA, L.SUCITRA
Abstract | PDF |
863-867 |
4. |
How Accountability Improves Software Reliability?
Pawan Kumar Chaurasia
Abstract | PDF |
868-871 |
5. |
An Incremental Sanitization Approach in Dynamic Databases
Cynthia Selvi P, Mohamed Shanavas A.R
Abstract | PDF |
872-876 |
6. |
SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW
P. KIRUTHIKA DEVI, Dr. R. MANAVALAN
Abstract | PDF |
877-886 |
7. |
Outdoor Dynamic Scene Video Object Segmentation Using SRM Algorithm
A.Niranjil Kumar, Dr.C.Sureshkumar
Abstract | PDF |
887-893 |
8. |
One Dominant Graph Topology for Heterogeneous Wireless Sensor Networks
Jasmine Norman
Abstract | PDF |
894-900 |
9. |
A Similarity Function with Pruning Strategy for Tree Structured Data
SIMILA.K, SRIVIDHYA.R
Abstract | PDF |
901-903 |
10. |
A Review on the Factors that have Driven E-Commerce in Modern Day Business
Prof. R.H.Vijaylaxmi
Abstract | PDF |
904-908 |
11. |
A New Multi-hop approach for sensing coverage in wireless sensor network
Er. AMLAN JYOTI BARUAH
Abstract | PDF |
909-914 |
12. |
A SURVEY ON CYBER TERRORISM
SHIVA KUMAR K
Abstract | PDF |
915-917 |
13. |
Forming Packages of the Services as a Way for Keeping Existing Users and for Increasing ARPU
Zvezdan Stojanovic
Abstract | PDF |
918-923 |
14. |
Automatic System For Brain Tumor Detection And Classification Using Level Set And ANN
Nisha Babu A, Agoma Martin
Abstract | PDF |
924-934 |
15. |
Prime Generating Algorithms by Skipping Composite Divisors
Neeraj Anant Pande
Abstract | PDF |
935-940 |
16. |
Image Encryption and Decryption Using Selective Block Encryption Technique
Megha Seth, Kaminee Salam
Abstract | PDF |
941-946 |
17. |
A comparative study of fuzzy logic and weighted Association rule mining in frequent datasets
K. Rubia, S. Sasikala
Abstract | PDF |
947-951 |