Volume 10, Number 31 (2015)
Special Issues
CONTENTS
Test Suite Prioritization
by t-way CIT and Hybrid Evaluation Metric for Web Based Application
pp.23080-23087
Mrs. B. Vani, Dr. R. Deepalakshmi
Biclustering ACO Algorithm
for Mining Coherent Biclusters From Gene Expression Profiling
pp.23088-23098
M.Maheswari and Dr.C.P.Chandran
Mining Weakly Identify
Network Facial Pictures for Inquiry Established Face Observation
pp.23099-23104
Ms. M.S. Uma Rani
RETRIEVAL OF WEBBASED CLOUD
DOCUMENT USING ADVANCED CBRS
pp.23105-23110
C.Rajesh Kumar, Rintumol M Thomas, S.Muthulakshmi
RARE ITEMSET MINING BASED
ON THE WEIGHT
pp.23111-23117
S.PRIYADHARSHINI,
Suitable Methodologies for
key frame extraction from videos
pp.23118-23121
Thanga Ramya S, Dr. Rangarajan P
DetectingForgeries in
Double Jpeg Compressed images by Parallel Approach
pp.23122-23127
S.T Suryakanthi Sornalatha, S.Devi Mahalakshmi, K.Vijayalakshmi
Identification of T
Descriptor in TNM Classification of Lung Cancer Using Multilevel Single
Click Region Growing Method
pp.23128-23132
G.Niranjana, M.Ponnavaikko
SUBSUMING GLOBAL
INFORMATION IN LOCAL BINARY PATTERNS FOR ULTRASOUND KIDNEY IMAGES
RETRIEVAL
pp.23133-23141
R.E. Jensie, C. Callins Christiyana
Dual Image watermarking
Using DWT And Chaotic Maps
pp.23142-23146
Shanthi P, R.S Bhuvaneswaran
Comparison of SVM and RFT
in Quality Detection of Jasmine Flower
pp.23147-23155
Dr.A.P.Pethalakshmi, S.Krishnaveni
Identification of Beningn
and Malignant Tumor in Multiparametric MR Images Using SVM, PSVM and
FSVM
pp.23156-23162
A.Nanthini
IMPROVED DISPARITY MAP
COMPUTATION USING PATCHES
pp.23163-23167
Shankar J , Venkateswaran A, Satish V.M, Sivaraman R, N.R.Raajan
BREAST CANCER TUMOUR
PREDICTION BASED ON COMPLEX TEXTURE FEATURES
pp.23168-23173
Prof . P.Valarmathi , Dr.S.Robinson , N.Pavithra
Effects of Scaling Factor
for Non-Blind Watermarking of Colour Images in DWT-SVD Domain
pp.23174-23181
S.Muthumanickam C.Arun, Manoj Kumar.V.R., Ritesh Kumar Sharma & 5Rahul
Sharma
DESIGN AND DEVELOPMENT OF
TRAFFIC SIGN RECOGNITION SYSTEM
pp.23182-23186
S .K.Athreya , A.Sivasankar
Segmentation of Masses in
Digital Mammograms using Fractal-Bound Computing Technique for Breast
Cancer Prognosis
pp.23187-23192
P. Shanmugavadivu, V. Sivakumar,
Automatic ambulance rescue
system using shortest path finding Algorithm
pp.23193-23197
Mercy Esther Tharabai.M
Improvements in Internet
Key-Exchange
pp.23198-23203
Prem Sasi Kumar A, Dr.Kannan Balasubramanian,
Secrecy Preserving Image
Search Using Homomorphic Encryption
pp.23204-23210
D.Aarthy, Dr.Kannan Balasubramanian,
Improve a Network Lifetime
and Scalable Routing Using Configurable Coverage Protocol in WSN
pp.23211-23216
Ms. S. Aswathi,
Cluster Based Energy
Efficient Scheduling Algorithm for Wireless Sensor Network
pp.23217-23223
K.Muthumari
Dynamic Duty – Cycle
Schedule Scheme For Deliver Bursty Traffic Efficiently
pp.23224-23229
G.Vigneshraja
SECURE FOR HANDHELD UNITS
AGAINST MALICIOUS COMPUTER SOFTWARE IN MOBILE SYSTEMS USING MD5
pp.23230-23235
Ms. K.Surya
ENCRYPTION BASED INTRUSION
DETECTION IN MANET USING AODV ROUTING PROTOCOL
pp.23237-23241
Abila Judith Suganthi.S, Rajesh.P
Deniable Conceivable
Encryption from Memorable Keys
pp.23242-23248
M.Kalai Mathi
An Efficient Fault
SegregationMethod Using Hybrid Multi Channel Protocol on Wireless MCI
pp.23249-23254
G.Anithasankari,
QoS Comparison of IEEE
Wireless Technologies for WSN under Different Logical Topologies using
Cross Layer Parameters
pp.23255-23260
V.P. Jayachitra, R.Preethi
High Speed and secure data
transmission in medical body Sensor network using IEEE802.16 Protocol
pp.23261-23267
G.Durgadevi
Solving Multicast Routing
Problem using Bi-Velocity Discrete Particle Swarm Optimization Technique
in Wireless Networks
pp.23268-23273
S.Saranyadevi
Investigation of Fuzzy
Logic Based Energy Efficient Routing Protocols in Mobile ad hoc networks
pp.23274-23278
M.GIRIJA, P.MANICKAM
Energy Conservation based
Payment Scheme (ECP) using GCKNA sleep scheduling algorithm
pp.23279-23284
R. Pricilla, T.R. Vedhavathy
E-GOVERNANCE APPLICATIONS
ENHANCEMENT – AN APPLICATION OF SEMANTIC WEB MINING
pp.23285-23300
R.Bhavani, Dr.K.Chitra
Enhancing High speed
Networks using Proportional Rate Control Technique
pp.23301-23307
C.Preethi, M.Raghini
Secured Hall Ticket
Authentication System using Iris as QR Code
pp.23308-23312
S. Janani, R.Ramya, K. Muthulakshmi
IMPACT OF MOBILITY AND
DIVERSITY ON COVERAGE AND ENERGY CONSUMPTION IN WSNs
pp.23313-23320
Mr.S.Mansoor, Mrs.P.Krishnaveni
COMPOSITE PORTABLE DATA
OFF-LOAD THROUGH INTERRUPTION COMPASSIONATE NETWORKS
pp.23321-23325
Ms.R.Kanmani, Ms.S.Shanmugapriya, Ms.M.Jilsath Begam
Performance Evaluation of
Scheduling Schemes in Wireless Sensor Networks
pp.23326-23330
N.Mahendran, Dr.S.Shankar
LEVERAGING THE TAIL TIME
FOR SAVING ENERGY IN CELLULAR NETWORKS
pp.23331-23335
Mr.A.Peter Soosai Anandaraj, Mr.B.Shanmugaraja, Ms.A.Amali Angel Punitha
A Review on Service
Differentiation and Packet Scheduling schemes
pp.23336-23341
S.Rajarajeswari, J.Sutha
DISRUPTION TOLERANT
MILITARY NETWORK USING CP-ABE FOR SECURE DATA RECLAMATION
pp.23342-23347
I.Ponnupriya, Dr.N.Lakshmi Narasimman
Dynamic Load Balancing of a
Private Cloud Using Software Defined Networking Architecture
pp.23348-23353
Amutha.B, Arivarasan.M, Karthick Nanmaran
Trust based Authentication
Scheme to Remove Malicious nodes in Mobile Ad hoc Networks
pp.23354-23359
S.Sivagurunathan and K.Prathapchandran
AN EFFICIENT MOBILE
HEALTHCARE SYSTEM IN WIRELESS SENSOR NETWORK
pp.23360-23363
Ms.D.Srivaishnavi, Ms.S.Selvi
Wireless Sensor Network
Applications for Detection and leakage control of gas by using X-bee
with Arduino
pp.23364-23367
Usha Rani.M, Muthuselvi.R