| S.No |
Title / Authors |
| 1 |
Title : Energy Aware Dynamic Source Routing In Wireless Ad Hoc Networks
Authors : Abirami. J,Raja.R |
| 2 |
Title : Wireless Power Transfer System and reduce abnormal noise for Electric Vehicles Using Block box testing Method in VANET
Authors : Deepika.B,Gopi.R,Dr.A.Rajesh |
| 3 |
Title : MODIFIED DEMOSAICKING AND DENOISING TECHNIQUE FOR RGB IMAGE LEVEL SETS BY USING BAYER FILTER
Authors : A.THAMODHARAN,M.PRAKASH KUMAR |
| 4 |
Title : ENABLING THE EFFICIENT INTEGRITY PROTECTION TO THE OPEN MOBILE PLATFORMS
Authors : ELANGOVAN K |
| 5 |
Title : AN USING A SIM-LESS DEVICES AGAINST A DENIAL OF SERVICE ATTACK TO UMTS NETWORK
Authors : VINOTH RAJA.G,JAISON VIMAL RAJ.T |
| 6 |
Title : STATISTICAL TRAFFIC ANALYSIS ATTACKS ON END TO END COMMUNICATIONS
Authors : M.Abinaya |
| 7 |
Title : Efficient and Provably Secure Aggregation of Encrypted Data Using Without Secure Channel
Authors : S.Vanmathimanju,P.Sumathi,S.Kalaiyarasi,A.Joseph selva kumar |
| 8 |
Title : DETECTION AND CLASSIFICATION OF MRI BRAIN IMAGES USING A HYBRIDTECHNIQUE
Authors : M.Kanagalakshmi, Mrs.A.S.Shanthi.M.E.,(Ph.D)., |
| 9 |
Title : AUP-GROWTH METHORD FOR MINING HIGH UTILITY ITEMSET FROM TRANSACTIONAL DATABASE
Authors : Drishya.T,Mrs.A.S.Shanthi.M.E.,(Ph.D)., |
| 10 |
Title : A Survey on Distributed Detection of Byzantine Attacks in WSNs
Authors : Reshma Begum G H,Manjesh B N |
| 11 |
Title : Survey on DES Algorithm using Swarm Intelligence
Authors : Archana S S,Harish H K |
| 12 |
Title : Appraisal of Web Security Contrivances by Means Of Vulnerability & Attack Injection: A Survey
Authors : Abdur Rahman.A,Chitra Devi.S |
| 13 |
Title : Privacy in Wireless Sensor Networks
Authors : Priyanka Jaikumar Upadhye, Rakesh S |
| 14 |
Title : IDENTITY BASED CRYPTOGRAPHY FOR CLIENT SIDE SECURITY IN WEB APPLICATIONS
Authors : V.Chithrapavai |
| 15 |
Title : A Novel AQM Algorithm Named CHOKeR For Proportional Bandwidth Allocation and TCP Protection
Authors : Shabeena Lylath.D.B,Miss.Pallavi.R |
| 16 |
Title : Survey on One Time Password for Adhoc
Authors : Karthik HD,Pallavi R |
| 17 |
Title : A Survey on Dual-Radio Opportunistic Networking for Energy Efficiency
Authors : Mr Suhas G K,Ms Roopa T |
| 18 |
Title : SEMANTIC MULTI-KEYWORD SEARCH OVER ENCRYPTED CLOUD DATA
Authors : KrishnapriyaKailas |
| 19 |
Title : Identification of face in Videos Using Color Edge Based Re-Ranking and Fusion with PSO-SVM
Authors : Remya Chandran |
| 20 |
Title : Cloud Computing
Authors : B.Kavirajan |
| 21 |
Title : Data Security on Cloud
Authors : B.Kavirajan |
| 22 |
Title : Service Oriented Socio-Network Framework in Cloud Based Architecture
Authors : Ezhilarasi. M ,D. P. Devan |
| 23 |
Title : SECURITY MANAGEMENT USING CLOUD COMPUTING AGAINST CRIMINALS AND ANTI – SOCIAL ELEMENTS FROM ESCAPING
Authors : C.Bindu |
| 24 |
Title : ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING
Authors : P.ILAMATHY,V.ANITHA,M.E |
| 25 |
Title : Binarization of Historical Document Images Using PhaseGT
Authors : S. Mohanapriya,E.Saranya |
| 26 |
Title : Genetic based adaptive task scheduling in cloud computing
Authors : Sheena S.Nowshad,N.Ashok Kumar |
| 27 |
Title : A Study of Random Forest Algorithm with implemetation using Weka
Authors : Dr. N.Venkatesan,Mrs. G.Priya |
| 28 |
Title : PRIVACY PRESERVING PUBLIC AUDITING FOR SHARED DATA WITH TRACEABILITY IN THE CLOUD
Authors : Shijina Karim |
| 29 |
Title : Poisonous gas detection using self localized robot
Authors : Aswini.P |
| 30 |
Title : APPLICATION OF DISTRIBUTED CANNY EDGE DETECTOR IN MEDICAL FIELD
Authors : Neethu P.R |
| 31 |
Title : TESTNET-An Integrated Testing Environment For Network Protocols Using Symbolic Execution
Authors : Kalesh E S |
| 32 |
Title : BESTPEER++: A PEER-TO-PEER BASED DATA SHARING USING LARGE SCALE
Authors : ASIF VB |
| |
|
| |
|
| |
|