Volume 3, Emitir 1 (2015)

Artigo de Pesquisa

Secure Data Storage using Decentralized Access Control with Anonymous Authentication Using Cloud

  • Mr.G.Lenin, Ms.B.Vanitha, Mrs.C.K.Vijayalakshmi

Artigo de Pesquisa

Log Linear Model for String Transformation Using Large Data Sets

  • Mr.G.Lenin, Ms.B.Vanitha, Mrs.C.K.Vijayalakshmi

Artigo de Pesquisa

A Progressive Approach to Enhance Lifetime for Barrier Coverage in Wireless Sensor Network

  • C N Abhilash, A S Chandan, S H Manjula, K R Venugopal, L M Patnaik

Artigo de Pesquisa

Literature Survey on Mobile Q&A System in the Cloud Based Environment

  • D.Aravind Gosh, Dr.C.Nalini

Artigo de Pesquisa

Cloud Computing:Ultimate Home of All Computing Resources

  • Manaswini Pradhan

Artigo de Pesquisa

Scanning Severe Motion Blur Level in Barcode Images Using Image Blur Estimation Scheme

  • S.Raguvaran, A.Ragavi, D.Sasikala, A.Mayuri

Artigo de Pesquisa

WBC Segmentation Using Morphological Operation and SMMT Operator - A Review

  • Belekar S. J , Dr. Chougule .S .R

Artigo de Pesquisa

Recognition of Novel Variance Parameters Using Taguchi Loss Function in MANET

  • Dheeraj Rawat, Prof. Nitesh Gupta, Prof. Sini Shibu

Artigo de Pesquisa

Neuro Fuzzy Classifier for Image Retrieval

  • S.Asha, S.Ramya, M.Sarulatha, M.Prakasham, P.Priyanka

Artigo de Pesquisa

A Review on Model Based Neuromuscular Blockade Control System with Injector

  • Dr. S.M. Deshmukh, Prof. A.S. Patharkar, Roshan M. Bodile

Artigo de Pesquisa

An Investigation on Gesture Analysis and Geometric Features Extraction

  • Noor Adnan Ibraheem, Mokhtar Mohammed Hasan, RafiqulZaman Khan

Artigo de Pesquisa

A Literature Review on Variation in Text and Different methods for Text Detection in Images and Videos

  • Prof. N.N. Khalsa, Prof. S.G. Kavitkar, Nagendra.G. Kushwaha

Artigo de Pesquisa

Implementation of a Wireless Gesture Controlled Robotic Arm

  • Saurabh A. Khajone, Dr. S. W. Mohod, V.M. Harne

Artigo de Pesquisa

Periocular and Iris Feature Encoding - A Survey

  • Vibha S Rao, P Ramesh Naidu

Artigo de Pesquisa

Different Syntactic Methods and Clustering For Web Service Integration

  • Different Syntactic Methods and Clustering For Web Service Integration

Artigo de Pesquisa

Smart Phone Controlled Robot Using ATMEGA328 Microcontroller

  • Aniket R. Yeole, Sapana M. Bramhankar, Monali D. Wani, Mukesh P. Mahajan

Artigo de Pesquisa

A Novel Collective Neighbor Clustering in High Dimensional Data

  • Sudha.N, Sneka Arulraj

Artigo de Pesquisa

Generic Lossless Visible Watermarking: A Review

  • Mrunali U. Bhaisare, Prof. V.R.Raut

Artigo de Pesquisa

An Overview of Content Recommendation Methods

  • Neethu Raj , Suja Rani M S

Artigo de Pesquisa

A Literature Review on Different models for Human and Vehicle Tracking

  • Prof. A.P. Bodkhe, Prof. S.A. Nirmal, Snehal A. Thakre

Artigo de Pesquisa

Building a Tool to Extract Data from Users and Potential Users of E-Government

  • Asma A. Alhashmi, Dr. Abdulbasit Darem, Dr. Suresha

Artigo de Pesquisa

Building a tool to extract data from users and potential users of e-government

  • Asma A. Alhashmi, Dr. Abdulbasit Darem, Dr. Suresha

Artigo de Pesquisa

Adaptive Intelligent Traffic Control System using PLC

  • S .V. Viraktamath, Priyamvada Holkar, Priyanka V. Narayankar, Jayashri Pujari

Artigo de Pesquisa

Application of Genetic Algorithm in Communication Network Security

  • SomalinaChowdhury, Sisir Kumar Das, Annapurna Das

Artigo de Pesquisa

Empirical Study of Motion Planning in Robotic Control Model

  • Nisha P. Zode, Ujwal A. Lanjewar, Bhaskar Y. Kathane

Artigo de Pesquisa

Safety Platform of Traffic in Cloud Computing Environment

  • Chetan.R , Ranjith .J , Umesh.M, Usha N

Artigo de Pesquisa

Future Trends of Cloud Computing Security: An Extensive Investigation

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Certain Investigations on Evolution of Approaches for Cloud Computing Security

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Strategies Developed for Effective Discovery of Dependencies: A State-of-the-Art Survey

  • R.Santhya, S.Latha, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Further More Investigations on Evolution of Approaches for Cloud Security

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Detailed Investigation on Strategies Developed for Effective Discovery of Matching Dependencies

  • R.Santhya, S.Latha, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Further Investigations on Methods Developed for Preserving Privacy of Computational Grids

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

A Survey on Decentralized Access Control Strategies for Data Stored in Clouds

  • J.Ganeshkumar, N.Rajesh, J.Elavarasan, Prof.M.Sarmila, Prof.S.Balamurugan

Artigo de Pesquisa

Survey on Security on Cloud Computing by Trusted Computer Strategy

  • K.Deepika, N.Naveen Prasad, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Further Investigations on Strategies Developed for Efficient Discovery of Matching Dependencies

  • R.Santhya, S.Latha, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Further Investigations on Evolution of Approaches Developed For Database Security

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Certain Investigations on Anonymous Authentication Mechanisms for Data Stored in Clouds

  • J.Ganeshkumar, N.Rajesh, J.Elavarasan, Prof.M.Sarmila, Prof.S.Balamurugan

Artigo de Pesquisa

Evolution of Cloud Computing: A State-ofthe- Art Survey

  • K.Deepika, N.Naveen Prasad, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Certain Investigations on Methods Developed for Efficient Discovery of Matching Dependencies

  • R.Santhya, S.Latha, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Investigations on Evolution of Approaches Developed for Data Privacy

  • R.S.Venkatesh, P.K.Reejeesh, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Security in Cloud Computing using Cryptographic Algorithms

  • Shakeeba S. Khan, Prof.R.R. Tuteja

Artigo de Pesquisa

A New Cloud Paradigm: Data Protection as a Service (DPASS)

  • KholeSagar R. ,Walunj Ajit S.,Gulave Rahul K.,Nikam Umesh P.

Artigo de Pesquisa

Performance Evaluation of Dynamic Networks Using EQOS Protocol

  • C.Chandralekha, L.Priyadharshini

Artigo de Pesquisa

A User’s Feedback Relevant Dynamic Query Forms for Database Queries

  • Neenu Anna Philip, S.S Jaya, Pradeep G

Artigo de Pesquisa

An Enriched Privacy Protection in Personalized Web Search

  • Boney cherian, E.Hari Prasath, Rahul P

Artigo de Pesquisa

A Survey on Feature Based Image Retrieval Using Classification and Relevance Feedback Techniques

  • Keyuri M. Zinzuvadia, Prof. Bhavesh A. Tanawala, Prof. Keyur N.Brahmbhatt

Artigo de Pesquisa

Sequence Flow Modelling for Efficient Protection of Personal Health Records (PHRs) in Cloud

  • V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

A Novel Activity Flow Model for Effective Protection of Electronic Health Records (EHRs) in Cloud

  • V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Data Flow Modelling for Effective Protection of Electronic Health Records (EHRs) in Cloud

  • V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa

Artigo de Pesquisa

Enhancing the Search Result for User Query Using Iterative User Feedback

  • PriyaSurana, PrashantJamdade, TejasNandedkar, Akshay S. Ghadge, NirbhayBobde

Artigo de Pesquisa

Web Vulnerabilities Caused By Social Media Web Service Integration

  • Jasmeet Kaur, Neha Singh

Artigo de Pesquisa

Review on Steganography and BPCS Technology in Steganography for Increasing Data Embedding Capacity

  • Chintan Jain, VivekParate, Ajay Dhamanikar, Rakesh Badgujar

Artigo de Pesquisa

A Survey on Feature Extraction Techniques

  • N. Elavarasan, Dr. K.Mani

Artigo de Pesquisa

War Field Robot Controlled By Android Phone

  • Prof. Jagdish Patel, Akshay Malik, Vrushali Thakare, Rahul Rajput

Artigo de Pesquisa

Application of Data Mining and CRM in Banking Sector Medical Insurance

  • Pratik Biswas, ParthaSarathi Bishnu

Artigo de Pesquisa

Secured and Robust Dual Image Steganography: A Survey

  • Hemang A. Prajapati, Dr. Nehal G. Chitaliya

Artigo de Pesquisa

Obstacle Avoidance Using Stereo Vision: A Survey

  • Pritesh S. Sharma, Dr. Nehal G. Chitaliya

Artigo de Pesquisa

A Complete Gain Knowledge on Cloud Computing

  • Dr.Kathir.Viswalingam, Mr.G.Ayyappan

Artigo de Pesquisa

An Efficient AODV-Based Algorithm for Small Area MANETS

  • Jai Prakash Kumawat, Prakriti Trivedi

Artigo de Pesquisa

Improved Protection Using Self-Recognized Image

  • Sanchit Shrikant Mahajan, Prof. Pratima Bhati