|
Regular Issue |
| S.No. |
Research Topic |
Pages |
| 1 |
A Novel XML Documents Using Clustering Tree Pattern Algorithms N.Kannaiya Raja,Dr.K.Arulanandam,P.Umadevi,A.Balakrishnan |
1-13 |
| 2 |
Performance Analysis of Speaker Identification System
Using GMM with VQ M.G.Sumithra,A.K.Devika |
14-19 |
| 3 |
Dynamic Time Slot Partitioning For a Mobile Multihop Relay
In Cellular Network K.Praveen kumar,J.Geetharamani |
20-24 |
| 4 |
Video Object Detection using Particle Filters Sharda Mahajan,C.K.Kurve |
25-27 |
| 5 |
Multiview Unauthorized Human Action Recognition P.Kalaivani,S.P.Audline Beena,J.Rajalakshmi
|
28-32 |
| 6 |
Robust Video Watermarking based on Discrete Wavelet
Transform S.Nafees Ahmed,B.Sridhar,Dr.C.Arun |
33-37 |
| 7 |
Optimized Service Level Agreement Negotiation System
for Web Services: Case Study V.Senthil,M.Alamelu,A.M.J.Md Zubair Rahman |
38-41 |
| 8 |
Deploying Storage Node Aiming to Minimize the
Communication Cost of Sink in Sensor Networks Vijayalakshmi.G, Tamilarasi.D |
42-47 |
| 9 |
Survey on Scheduling Methods in P2P Desktop Grid T.Avudaiappan, B.S.Balamurugan, L.srinivasan ,C.Pradeep |
48-51 |
| 10 |
Enhanced voice recognition to reduce fraudulence in ATM
machine Hridya Venugopal, Hema.U, Kalaiselvi.S, Mahalakshmi.M |
52-56 |
| 11 |
Improving Performance Using Mobile Data Collectors In
Wireless Sensor Networks MS. M.Salomi,Mrs.S.Sivaranjani |
57-61 |
| 12 |
SVM-BDT Based Intelligent Fingerprint Authentication System using
Geometry Approach Dr.S.Valarmathy,Mr.P.Satheesh Kumar |
62-67 |
| 13 |
Privacy Preserving of VoIP against Peer-to-Peer
Network Attacks And Defense K. Bharathkumar,R.Premalatha Kanikannan,Dr.Rajeswari Mukesh,M.Kasiselvi and T.Kumanan |
68-73 |
| 14 |
Enhancement of Hierarchical Key Management Scheme of
Secure Multicast Transmission for Overlay Networks P.G.Kathiravan,C.Rajan,Dr.N.Shanthi |
74-82 |