|
| |
International Journal of Applied Engineering Research (IJAER)
Volume 10, Number 82 (2015) Special Issues
CONTENTS
RESEMBLANCE SEARCH THROUGH
SECURE KNN AND LSH IN CLOUD
pp.1-7
G Reddy Rani and G Reddy Rani
IMPROVED APRIORI ALGORITHM
USING GENETIC ALGORITHM FOR ITEMSET MINING
pp.8-12
D. Ashok Kumar and T. A. usha
CLOUD SECURITY ALGORITHMS –
A SURVEY
pp.13-18
D.I. George Amalarethinam and H.M. Leena
AN ALGORITHMIC APPROACH
WITH HBMO TO EFFICIENT DATA PREDICTION USING ARTIFICIAL NEURAL NETWORK
pp.19-23
T. Chakravarthi and k.kalyani
Prediction of Diabetes
mellitus using Data Mining Techniques: A Survey
pp.24-31
D.I.George Amalarethinam and N.Aswin Vignesh
Analysis of Measuring the
Complexity of Advice using a Cognitive Approach
pp.32-37
G.Arockia Sahaya Sheela, A.Aloysius and K.R.Martin
A Survey on Big Data
Analytics
pp.38-42
R. Vanathi and A. Shaik Abdul Khadir
Intelligent Agent for
Network Monitoring
pp.43-47
B.Murali and T.N.Ravi
Extended Load Shared Ant
Colony Optimization for Meta Task Scheduling in Grid Computing
pp.48-54
T.Kokilavani and D.I. George Amalarethinam
A Predictive Model to
Forecast and Pre-Treat Diabetes Mellitus using Clinical Big Data in
Cloud
pp.55-59
Shantha Mary Joshitta and L. Arockiam
Challenges In Cloud
Computing Security
pp.60-64
Lalu P.George and D.I. George Amalarethinam
ENHANCED ELLIPTICAL CURVE
CRYPTOGRAPHY BASED PKI FOR SECURE DATA STORAGE IN A CLOUD
pp.65-71
B.Rex Cyril and S.Britto Ramesh Kumar
Software Reliability Growth
Model based on Order Statistics of Lehmann-Type Laplace
Distribution-Type II
pp.72-78
V.S.Akilandeswari and V.Saavithri
Intelligent Ranking Of
Cardio Vascular Disease Among Indian Patients
pp.79-83
M.SHOBEETHA and A.SHAIK ABDUL KHADIR
Fuzzy Logic Decision Based
Effective Adaptive Median Filter for Removing High Density Impulse
Noises in Digital Images
pp.84-90
S. Abdul Saleem and T. Abdul Razak
Validation of Cognitive
Weighted Method Hiding Factor Complexity Metric
pp.91-96
Francis Thamburaj and A. Aloysius
The Performance Comparison
of Spatial Filtering based on the Full Reference Image Quality Measures
PSNR, RMSE, MSSIM and UIQI in Medical Image Improvement
pp.97-102
A.R.Jasmine Begum and T. Abdul Razak
A SURVEY ON MEDICAL
APPLICATION USING CLOUD COMPUTING
pp.103-108
T.NALINI and A.SHAIK ABDUL KHADIR
A Novel Approach to build
Smart Phone based Wireless sensor Networks for Social Wellbeing
pp.109-115
Wilson Thomas and E. Madhusudhana Reddy
GREEN CLOUD TECHNIQUE:A
SURVEY
pp.116-121
Helen Anderson Akpan and Rebecca JeyaVadhanam
Improving the Reliability
of data transfer against sinkhole in Wireless Sensor Networks – a Review
pp.122-125
M.S.Nidhya and R.Chinnaiyan
A Dynamic Two Stage
Authentication Framework to Enhance Security in Public EduCloud
pp.126-131
G. Kumaresan, N. Veeraragavan and L. Arockiam
An experiment report on
identifying disease patterns for Healthcare System based on Data Mining
pp.132-136
J.Anitha Arockia Rani and S.Baskaran
Discovering a Solution for
Web Hubs using Candidate Transaction Rank Algorithm
pp.137-142
Srinaganya.G. and J.G.R.Sathiaseelan
AN EFFICIENT SEMANTIC
SIMILARITY BASED EXTRACTION OF LEXICAL DATA USING PATTERN MATCHING MODEL
pp.143-153
Elavarasan. N, LakshmiPraba. M, Anand Kumar. P and Elamaran.E
Data Mining Approaches For
Principle Component Analysis
pp.154-160
Elavarasan. N, LakshmiPraba. M, Anand Kumar. P and Elamaran .E
A NOVEL COMPUTATIONAL
APPROACH FOR HAAR WAVELET TRANSFORM TO COMPRESS GRAY SCALE IMAGES
pp.161-167
S.Vimala and P.Uma
SPBHCMA: A Secured Priority
Based Health Care Monitoring Algorithm for Body Area Networks
pp.168-172
V. Sethupathi and E. George Dharma Prakash Raj
A Comprehensive Study of
Cloud Computing and its Research Issues
pp.173-175
S.Vimala and V.Nisha
MRImgEncA- Analysis and
Enhancement of speed and security in Public key Cryptography for image
file
pp.176-181
D.I.George Amalarethinam, J.Sai Geetha and K.Mani
An Analysis of Autism
Dataset using Artificial Neural Networks
pp.182-186
M.S. Mythili and A.R. Mohamed Shanavas
Traceability and Batch
Auditing in Shared Provable Data Control in Multi-Cloud Storage
pp.187-190
S.Shaajitha Banu and K.Gokulraj
Analysis of Student
Performance Based On Personality and Informal Learning Using Data Mining
Classification Techniques
pp.191-199
A.HENDRY RICHARD
Biometric Templates
Security Using Visual Cryptography
pp.200-204
A. Shaik Abdul Khadir and G Kanimozhi
Performance Analysis for
Diabetes Diagnosis using Open Source Tools
pp.205-207
N.Vanitha
A Comparative Study on
Traditional and Virtual Classrooms
pp.210-215
J. Carmelete Silviya and Edel Josephine Rajakumari
DAG based Dynamic Task
Scheduling in Heterogeneous System
pp.216-222
A. Maria Josphin and D.I.GeorgeAmalarathinam
Fast and Effective Real
Time Sentiment Analysis on Streaming Big Data using Distributed Caching
Techniques
pp.223-228
D.I. George Amalarethinam and V. Jude Nirmal
A Recommendation Method for
Travel Package in Mixed Approach
pp.229-235
V.Lakshmi Ganesh Kumar and E.Madhusudhana Reddy
Ensuring Data Integrity
Auditing for Secure Cloud Storage in Distributed Services
pp.236-240
D.I.George Amalarethinam and Salvia Horne
Regmentation:Image
Registration for Segmentation Using Third Order Edge Mask and
Bidirectional Labeling Scheme
pp.241-246
G.J.Joyce Mary and A.Rijuvana Begum
Issues and Challenges
hampering the evolution of IoT big data analytics
pp.247-251
I.Priya Stella Mary and L. Arockiam
ENERGY EFFICIENT TARGET
TRACKING AND DATA COLLECTION IN WIRELESS SENSOR NETWORK
pp.252-261
V.Jayaraj, U.Durai and V.Mathimalar
A Survey on Meta Task
Scheduling in Cloud Computing
pp.262-266
D.I. George Amalarethinam and S.Kavitha
Scheduling Framework for
Regular Scientific Workflows in Cloud
pp.267-271
D.I. George Amalarethinam and T. Lucia Agnes Beena
eDSSuMRT- ENSURED DATA
SECURITY STRATEGY USING MATRIX RANDOM TRAVERSAL IN CLOUD STORAGE
ENVIRONMENT
pp.272-279
D.I.George Amalarethinam and B.FathimaMary
A Filter-based Feature
Selection using Information Gain with Median Based Discretization for
Naive Bayesian Classifier
pp.280-285
K.Mani and P.Kalpana
Parallel Prediction Model
for Big Data using MapReduce Programming Model
pp.286-291
B.Arputhamary and L. Arockiam
Autoconfig algorithm:
Result analysis using test point method
pp.292-295
Abdul Rauf EM and E.Madhusudhana Reddy
Improving the Speed of
Scalar Point Multiplication in Elliptic Curve Cryptography Using 1’s
Complement
pp.296-301
K. Mani and M. Viswambari
Extemporization of Business
Strategies using Apriori based on Import and Export Patterns with
Quantities
pp.302-306
K.Mani and R.Akila
A SECURITY FRAMEWORK FOR
SOCIAL NETWORK SERVICES
pp.307-314
S. Thiraviya Regina Rajam and S. Britto Ramesh Kumar
HAADAS : An enhanced
approach for Re-allocation of Fragments in Peer-to-Peer Distributed
Databases
pp.315-320
D.I. George Amalarethinam and C. Balakrishnan
RankingComponents in
various Cloud Model for Cloud Migration: A Survey
pp.321-327
T. Karthikeyan and T. Nandhini
A Review on Recognition and
Classification of Ancient Scripts in Stone Inscriptions Using Image
Segmentation Techniques
pp.328-332
S. Sundareswari and I. Kaspar Raj
Enhancing Security in
PublicKey Algorithms using SCRZE Approach
pp.333-337
K Mani and R. Mahendran
MULTI DIMENSIONAL QUALITY
ATTRIBUTES APPROACHES FOR ADAPTING COMPONENT-BASED SYSTEMS
pp.338-342
Saradha. R and Mary Jesintha.X
A Review Of Mining Frequent
Patterns
pp.343-349
Ramah Sivakumar and J.G.R.Sathiaseelan
Enhancing Security in
Cryptographic Algorithms Based on IENCCRS Scheme
pp.350-354
K.Mani and A.Devi
Virtual machine Migration
based on greedy Knapsack algorithm for optimization in Cloud computing
pp.355-358
J.MadhuPriya
Implementation of KM
Framework for Social Networking Web-pages
pp.359-362
Rajesh D and K.David
Critical Task First
Algorithm for Scheduling Parallel Applications in Grid Environment
pp.363-373
D.I.George, P.Muthulakshmi and Ignatius Stanis Santosh.G
Dependency Analysis for
Component Based Systems using Graphs
pp.374-379
D.I.George Amalarethinam and P.H. Maitheen Shahul Hameed
SEFM – Secure Enterprise
Fence Monitoring on the Cloud
pp.380-387
Thiruchendhil Arasu and E.George Dharma Prakash Raj
Text Mining In Big Data
Analytics - Survey
pp.388-393
R.Merlin Packiam and Sinthu Janita Prakash
A Survey on Task Scheduling
Algorithms in Cloud Computing Environment
pp.394-400
H.Krishnaveni and V.Sinthu Janita Prakash
Algorithm for Managing
Uncertainty in Job and Data Aware Scheduling in Grid Computing
pp.401-408
G.Kalpana and D.I.George Amalarethinam
An EMPRICAL REVIEW ON
ENHANCING THE ROBUSTNESS OF MULTIRESOLUTION WATERMARKING
pp.409-414
S.Selvam, S.Thabasu Kannan and S.Pragatheswaran
A NEW TECHNIQUE FOR
COLOR-BASED IMAGE RETRIEVAL SYSTEM USING HISTOGRAM
pp.415-421
S.Selvam, S.Thabasu Kannan and P.K.Hari Hara Prabu
A Novel Method for
Representing User Activities in a Smart Environment
pp.422-427
H. Karamath Ali and D. I. George Amalarethinam
AUGMENT THE SECURITY IN
MANET USING QOS - DHT A NOVEL KEY SHARING PROTOCOL
pp.428-435
P.Rajeswari and T.N.Ravi and A.Bhuvaneswari
Entropy Based Image
Retrieval Method for Retrieving the images and Feature Based Image
Recovery Method for Extracting the Features via Image Gathering and
Reclamation using Image Mining Procedures
pp.436-443
K.Saraswathi and V.Ganesh Babu
HUDDLING ANALYSIS
PROCEEDING MRI IMAGES INTENSE IKM
pp.444-451
S.DIVYA and A.R.MOHAMED SHANAVAS
A technical review on
Clustering Techniques
pp.452-456
R . GOVINDARAJ and T. N. Ravi
Hybrid Flow Shop Scheduling
Problem with Preventive Maintenance as Constraints: A Discrete Firefly
Algorithm Approach
pp.457-464
A. Delphin Carolina Rani and B.S.E. Zoraida
An Enhanced AODV Routing
Protocol for Wireless Sensor Network using NS2.34
pp.465-471
J.Daniel Mano and S.Sathappan
Issues and Perspectives
on Road Traffic Signal Control Systems and Methodologies
pp.472-476
V.C.Maha Vishnu and M.Rajalakshmi
Distance Based Approach for
Data Clustering Problems Using Hybrid K-means++ and Improved Fuzzy
c-means Algorithm
pp.477-483
O.A. Mohamed Jafar and R. Sivakumar
Confidentiality Framework
to Enhance Data Security in Public Cloud Storage
pp.484-488
S. Arul Oli and L. Arockiam
Proposed Architecture for
Secure Distributed Data Transaction Management in Cloud Environment
pp.489-497
J.Antony John Prabu and S Britto Ramesh Kumar
FSBIR: Fuzzy Implemented
Semantic Based Information Retrieval Algorithm using Query Expansion
pp.498-502
R. Thamarai Selvi and E. George Dharma Prakash Raj
Market Basket Analysis in
Association Rule Mining Based on Frequent Itemset
pp.503-507
M.Sathya and K.Thangadurai
Dynamic Triangular Vision
and Optimized Slant Selection Protocol for Mobile Ad Hoc Networks
pp.508-514
M.Anandhi and T.N.Ravi
A Study and Exploration of
Privacy Preserving Distributed Data Mining Rules
pp.515-522
J.Preethy and R.Hemalatha
Enhanced Swarm Based
Feature Selection for Clustering Gene Expression Data
pp.523-527
P. K. Nizar Banu and S. Andrews
Security Issues in Internet
of Things using Next Generation Mobile Networks
pp.528-531
George Gabriel Richard Roy and Britto Ramesh Kumar
LEARNING BEHAVIOR ANALYSIS
USING DATA MINING TECHNIQUES
pp.532-537
I.Carol and S.Britto Ramesh Kumar
AGGRANDIZING AUTHORIZATION
BY ENHANCING TRUST USING FUZZY LOGIC IN CLOUD ENVIRONMENT
pp.538-542
J.Persis Jessintha and R.Anbuselvi
Internet of Things (IoT)
Architecture for Smart Services
pp.543-548
Vimal Jerald. A, Daisy Premila Bai. T and Albert Rabara. S
Human Face Recognition
System (HFRS) using K Nearest Neighbor (KNN) and Hierarchical
Agglomerative Clustering (HAC)
pp.549-553
A. Vijaya Kumar and R. Ponnusamy
A Multi-Layered Secured
Framework for Context-Aware Web Services in Health Care Industries
pp.554-560
P.Joseph Charles and S. Britto Ramesh Kumar
Prediction of Defects in
Defects Reduction A Brief Study
pp.561-564
K. DAVID and R.ANAND
A Novel Algorithm for
Handling Missing Values Based on Decision Attribute
pp.565-569
J. Hajiram Beevi and M. Nazreen Banu
Comparative Analysis of
Decision Tree Classifiers for Machine Learning of Chronic Kidney Disease
pp.570-576
L.Jerlin Rubini and P.Eswaran
Artificial Intelligence
based Cyber Defense
pp.577-585
S. Senthil Kumar and T. N. Ravi
Cloud Computing in Higher
Education
pp.586-591
G.Sobers Smiles David and R.Anbuselvi
Educational Data Mining
Using SCORM Specifications on Learning Management System.
pp.592-600
Zameer Gulzar, A. Anny Leema and A.Salman Ayaz
DESIGN OF A WIRELESS
TRANSFER FOR A SECURE SIGNAL OF SENDER AND RECEIVER SYSTEM THROUGH THE
NETWORK
pp.601-605
R.DURGA and P.SUDHAKAR
A Study on Biometric Iris
Recognition System.
pp.606-612
K.Saminathan, T.Chakravarthy and M.Chithra Devi
GLCM Inertia Based
Ultrasound Image Enhancement
pp.613-617
P.Shanmugavadivu and A.Shanthasheela
A Study on Big Data
Storage Tools and its Specifications
pp.618-625
M. Durairaj and A. Alagu Karthikeyan
Secure Data Forwarding
using Proxy based Cloud Re-Encryption Scheme
pp.626-628
V. Sobana Devi and G. Ravi
Building Numerical
Clusters Using Multidimensional Spherical Equation
pp.629-634
A. Joy Christy and S. Hari Ganesh
An Improved Anisotropic
Diffusion of Rate Control Algorithm Approach for H.264/AVC
pp.635-639
M.Arrivukannamma and J.G.R.Sathiaseelan
Incorporating the Services
of Mobile Technology to Meet the Demand of Medical Emergencies – Smart
Blood Donors Management and Mapping System
pp.640-643
A.Jenita Mary, A.Subashini and Ignatius Stanis Santosh.G
Challenges and Solutions
of Smart Communication in VANET: A Survey
pp.644-648
Pragasa Mary and D. Pugazhenthi
Big Data: An Analysis and
Survey of Past Decade
pp.649-654
S. Roshnara Banu, D. Saraswathi F. Jeno Sandana Brina Rouvier and R.
Priya
Customer Churn Prediction
Using Hybrid Support Vector Machine in Telecommunication Industry
pp.655-662
S.Induja and V.P.Eswaramoorthy
An Empirical Study on
Sensor Nodes to Increase the Energy in Wireless Sensor Networks using
Directed Diffusion Technique
pp.663-666
P. KARTHIKEYANI and P.Arul
Analysing Students
Performance Using Educational Data Mining Methods
pp.667-671
S. Lakshmi Prabha and A.R.Mohamed Shanavas
High Secure HDWT based
Image Steganography and Genetic algorithm based chaotic Encryption
pp.672-678
G.Sudha devi and K.Thangadurai
AN IMPROVISED RUN LENGTH
ENCODING BASED DNA SEQUENCE COMPRESSOR
pp.679-683
Panneer Arokiaraj S, Robert L and Arunachalaprabu G
A Novel Support Vector
Machine Based Image Mining Framework with Relevance Feedback to
Diagnosis MRI Brain Tumor
pp.684-692
M.Arthi and V.P.Eswaramurthy
A Novel Privacy-Preserving
Patient-Centric Clinical Decision Support System Based On Enhanced Least
Square Support Vector Machine
pp.693-698
M.sathya and R.Hemalatha
Vibrant Ambient
Intelligence with Modified Edge based Greedy Routing Approach
pp.699-704
T. Karthikeyan and V. Rajasekaran
MAXRG : MAXIMIZATION OF
RESOURCE UTILIZATION FOR GRID COMPUTING ENVIRONMENT
pp.705-710
S. Vaaheedha Kfatheen and M. Nazreen Banu
Visual Cryptography and
Stegnography for Data Hiding in image to avoid Bot attack
pp.711-713
Diana Judith.I and G.J.Joyce Mary
An Empirical validation of
Effort Estimation Techniques
pp.714-718
V.Jayaraj, N.A.Bhaskaran and S.Hemalatha
[UP]
| |
|