Volume
9, Number 27 (2014) Special Issues
CONTENTS
Sliding Mode Observer Design for Nonlinear Modified Quadruple Tank
Process
pp. 9427-9432
S. Sutha1, P. Lakshmi, S. Sankaranarayanan
A Computational Modeling Of Epidemics Using
Susceptible-Exposed-Infected-Recovered- Deceased Model
pp. 9433-9437
M. Senbagavalli, Dr.G.Tholkappia Arasu
SMADA - Secure Model for Attack Detection and Authentication of
Multicast Routing in MANET
pp. 9438-9446
Arthi Arumugam, Chinnappan Jayakumar, Rama Chaithanya Tanguturi
Secure Certificate Based Intrusion Detection System for MANET
pp. 9447-9453
S.Gopalakrishnan and P. Ganeshkumar
An Intelligent Bandwidth Allocation Protocol To Avoid Biological Effects
In Human Body By Radiations From Manets
pp. 9447-9453
S.Gopalakrishnan and P. Ganeshkumar
An Investigation of Different Low Power Testing Techniques for SOC
Designs
pp. 9460-9464
A.Kavitha,S.Sasikumar
Fault Localizationusing Combination Of Statement And Branch Coverage
pp. 9465-9468
1R.Kavitha, N.Kannan
Automatic Clustering of Video Frames using Invaraint Features Towards
Face Recognition
pp. 9477-9480
SJana and Dr.N Kannan
Information Retrieval Based On User Profile
pp. 9481-9484
R.Kavitha, N. Kannan
A Call Reservation Scheme For Channel Allocation Using Capa Algorithm In
Wireless Networks
pp. 9485-9492
P.Jesu Jayarin
Hybrid Intelligent Agent –Based Architecture For Chronic Liver Ailments
pp. 9493-9499
H.Ratnamala Kiruba, Dr.G Tholkappia Arasu
Motion Estimation Algorithms For Video Compression-A Review
pp. 9500-9506
C.Arunkumar Madhuvappan, Dr.J.Ramesh
Generation And Reordering Of Test Vectors Using Nodal Ant Colony
Optimization
pp. 9507-9510
A.Kavitha, Dr.S.Sasikumar
Mathematical Modeling and Implementation of Predictive Control Schemes
to Nonlinear Thermal Process
pp. 9511-9515
P.Dhinakaran and D.Manamalli
Comparison of Classification Accuracy in Anonymized and Non Anonymized
Data
pp. 9515-9518
Dr.S.A.Sahaya Arul Mary
Probabilistic Latent Feature Discovery Model And Multi Label Content
Categorization In E-Learning Using R Package
pp. 9519-9526
M.Ravichandran , Research Scholar
Hybrid Power Efficient Route Discovery (HPERD) Technique For Manet
pp. 9527-9531
M. Ramakrislma and v. Palanisamy
Application For Aiding Stray Folks By Using Multi-Agent Based Composed
Framework
pp. 9532-9536
V. Revathi, Dr. G. Tholkappia Arasu
Link Adaptive Routing Strategy With Route Handoff Usingca-Aomdv
pp. 9537-9541
Prof.M.Sakthivel, Dr.V.Palanisamy
Available Bandwidth And Packet Delay Estimation In Wimax Network
pp. 9542-9545
V.Saravanan, Dr. A.Sumathi
Efficient Routing for Broadcasting in Mobile Ad Hoc Networks
pp. 9546-9552
V.Sivakumar, A.M.J.Md.Zubair Rahman, K.Vanitha
Tensile Properties and Microstructural Characteristics of Friction
Welded Medium Carbon Steel Joints
pp. 9553-9559
N.Mathiazhagan, T.Senthil kumar
Five Level Inverters - A Review On Modulation Topologies, Techniques,
Components And THD.
pp. 9560-9564
R.Yalini, Dr.N.SuthanthiraVanitha
A Study On Stress Management Among Employees Working In Steel Industry
pp. 9565-9571
Dr.A.RAVI, PROFESSOR, Mrs. K.R.SELVI., RESEARCH SCHOLAR
A Study On E-Marketing Management Strategies
pp. 9572-9573
Dr.A.RAVI, MR.J.VIVEKANANDA
A Study On The Marketing Of
Industrial Products
pp. 9574-9575
Dr.A.RAVI, MR.S.SURESH
Channel Estimation For OFDM System With Time Varying Channels And
Modified-CGTLS
pp. 9576-9578
Mr.M.Naresh Kumar, Dr.G.Tholkappia Arasu
Evaluating Soft Memory Repair Strategy Using Sdma Technique
pp. 9579-9581
Priya, Dr.H.Abdul Shabeer
Reducing Energy Consumption In Noc Using Encoding Techniques
pp. 9582-9585
Radhika, Dr.H.AbdulShabeer
Review Paper On Aluminium Alloys/ Flyash/ Rice Husk Ash Metal Matrix
Composite
pp. 9586-9600
Ravikumar.R, Chandramohan.V, Vengatesh.D
Assessment Of Ergonomics In Manufacturing Industries
pp. 9601-9604
H.Abdul Zubar , Arun Mohan
A new KK coder with Low Computation and Low Memory for Image Compression
pp.9605-9610
Krishnamoorthy R and Karthikeyan N
LUNG CANCER AND LUNG NODULES- AN INTRODUCTION
pp.9611-9615
Afshan Khanum, Purushothaman S. and Rajeswari P
An Overview of Humanitarian Assistance Ontology for Emergency Disaster Response
pp.9616-9622
C.Anbarasi and P.Mayilvahanan
Analysis of web mining types and weblogs
pp.9623-9626
S.Kamalakkannan and.S.Prasanna
A protected and fusion certification Protocol of Intrusion Detection System for MANET
pp.9627-9630
P.Mayilvahanan and M.CHARLES AROCKIARAJ
A New approach for converting 2D to 3D videowith Image wrapping and Hole filling method
pp.9631-9635
S.Bharathbabu, M.Kavitha and E.Kannan
Cloud Computing Using Open Source Solution – OpenStack
pp.9636-9639
P. Sujatha, and. R. Vijaya
AppSec Challenges and Resolution Techniques on Cloud Computing
pp.9640-9643
P.Sujatha and M.J.Balachandran
DATA MINING IN EDUCATION-A REVIEW OF DATA MING USED IN PREDICTION OF STUDENT PLACEMENT AND ACADEMIC PERFORMANCE
pp.9644-9647
BLESSY GEO.V.M and S.PRASANNA
A STUDY OF DATA MINING CONCEPTS AND TECHNIQUES
pp.9648-9651
P. SUJATHA and S. SARADHA,
A Glance of Digital Watermarking techniques with an Evaluation of Haar and Daubechies wavelet.
pp.9652-9657
P.Sujatha R.Devi
GAIT RECOGNITION USING ARTIFICIAL NEURAL NETWORKS
pp.9658-9662
P.Sripriya and S.Purushothaman
A Robust Vehicular Communication System in Life Threatening Events Based on Node Stability
pp.9663-9667
Gitanjali.U, Cloudin.S and.K.Komathy
A Study on Supervised Leaning Approaches in Question Classification
pp.9668-6971
S. Jayalakshmi
A Comparative study on Techniques of Information flow, Influence maximization and Influence diffusion models in Online Social Networks
pp.6972-6975
H.Jayamangala, and AnanthiSheshasaayee
Video retrieval using human emotions
pp.9676-9680
Jeyalakshmi S, and S.Prasanna
Data Mining approaches for medical diagnosis
pp.9681-9685
K.Kasturi, and.S.Prasanna
Comparative Analysis of
Mammogram EnhancementUsing Adaptive Quadratic Volterra Filter
pp.9686-9690
G.R.Jothilakshmi and E.Gopinathan
Analyzing Person’s Enthusiasm From Various Facial Expressions
pp.9691-9696
Kaviya.J, and. X.Arputha Rathina
Data Concealment Approach with Steganography
pp.9697-9700
P.Sujatha and S.Mangayarkarasi
Dynamic Video Compression Using Ideal Scene Recognition, For Low Surveillance Applications.
pp.9701-9705
Meena. M and Sridhar.R
TEXTURE IMAGE SEGMENTATION USING NEURO EVOLUTIONARY METHODS-a survey
pp.9706-9710
Meenakshi S., and Purushothaman S. and Rajeswari P.
Mobile adhoc network
pp.9711-9715
Sathish Kumar G., and Purushothaman S. and Rajeswari P.
IDENTIFICATION OF MICROALGAE –An approach using image processing and texture analysis
pp.9716-9720
Nirmala R.,Purushothaman S. and Rajeswari P.
A STUDY OF SOFTWARE TESTING STRATEGIES
pp.9721-9724
P.Sujatha and Valliammai
A SURVEY ON CLOUD COMPUTING ONTOLOGIES
pp.9725-9730
M.GOMATHE and S.PRASANA
Efficient Cluster Head Election in Mobile WSN Using Game Theory
pp.9731-9735
R.Parimalasundari and T.Preethiya
Analysis of Students Behavior using Hidden Markov Model
pp.9736-9739
V.Sumalatha and R.Santhi
IMPLEMENTATION OF INTRUSION DETECTION USING BACKPROPAGATION ALGORITHM
pp.9740-9744
Y.Kalpana, S.Purushothaman and.S.Rajeswari
Discovering Frequent Item
set in student database using association rule mining emphasizing stress
factors.
pp.9745-9756
R. Priya and Ananthi Sheshasaayee