Regular Issue |
S.No. |
Research Topic |
Pages |
1 |
Accident Information System Using ARM Processor, GPS and GSM
Technology S.Vivek, A.Ramesh, S.Bharathi |
1-4 |
2 |
A Context Based Honeypot Deployment Strategy S.Sivachandiran,M.Rajeshkumar |
5-9 |
3 |
Registered laser speckle imaging analysis of cerebral
tumor K.Ashok kumar,V.Aruna |
14-16 |
4 |
Channel Aware Routing Protocol for MANET Mr.B.V.Baiju,R.Sudhakar Rajendran |
17-23 |
5 |
Testing of RF Differential Low Noise Amplifiers using Built-In-
Test circuits J.Kaviyarasan,S.Suvitha
|
24-28 |
6 |
Efficient Multicasting In Manet Using RSGM Technique K.Kavitha,Dr.S.Nagarajan. |
29-35 |
7 |
Enhanced Security through Agent Based Non-Repudiation
Protocol for Mobile Agents CeronmaniSharmila V,KomalaValli V |
36-40 |
8 |
Query-driven Adaptive Term Set Search in large Peer-topeer
Textual Collections V.Deepa,P.S. Balamurugan |
41-44 |
9 |
Prediction and Detection of Malware Using Association
Rules B.Dwarakanath,A.Suthakar. |
45-50 |
10 |
Effective Navigation for Visually Impaired by Wearable Obstacle
Avoidance System S.Bharathi,A.Ramesh,S.Vivek,J.Vinoth Kumar |
51-53 |
11 |
Ethical Hacking S.Dinesh Babu |
54-58 |
12 |
Service Oriented Architecture using ISO RM-ODP with respect to
Engineering and Technology Viewpoints C.Madana Kumar Reddy,Dr.A.Ramamohan Reddy |
58-63 |
13 |
Network Monitoring Using SNMP Protocol SivakumarS.R., Mangaiyarkarasi.R |
64-66 |
14 |
Towards privacy preservation Against traffic analysis in
Wireless networks T.E.Janani Devi,Dr.S.Nagarajan |
67-75 |
15 |
Embedded based Remote Control Application using Mobile Phone in
Irrigation S.Sumeetha,D.Sharmila |
76-79 |
16 |
An Optimization of Association Rule Mining Algorithm using
Weighted Quantum behaved PSO S.Deepa, M.Kalimuthu |
80-85 |
17 |
Minimum Bandwidth Reservations for Periodic Streams in Wireless
Real-Time Systems A. Shanmuga priya,P.Sumathi |
86-90 |
18 |
Mobile Based CVD Detection and Diagnosis from
Compressed ECG by K-Means Clustering K.Dhivya, R.Deepa |
86-90 |
19 |
A secure key transfer in decentralized secure group
communication T.Sangeetha,V.Jeyakrishnan,A.Srisakthi,R.B.Dravidaapriya,K.Rajakumari |
91-95 |
20 |
VLSI Implementation of Fast Convolution Based 2-D Discrete
Wavelet Transform for High Speed, Area Efficient Image
Computing Chandny Ramachandran,T.R.Dinesh Kumar |
96-101 |
21 |
Blocking Misbehaving Users In Anonymizying Networks-
Embedded Based R.Divya |
102-104 |
22 |
Signal Integrity modeling for high-speed DDRx Using Chip-
Package Board analysis S.Revathi,R.Radhika |
105-109 |
23 |
A Comparative Study of Maximum Power Point Tracking
(MPPT) Of a Solar Powered Ups Using Dc-Dc Boost
Converter C.Thulasiyammal,Dr.S.Sutha |
110-113 |
24 |
Performance and Accuracy related issues of Content-Based Image
Retrieval E.Saravana Kumar,Dr.A.Sumathi,K.Latha |
114-117 |
25 |
Wireless Fingerprint Attendance System using
ZigBee Technology L.Rajasekar,S.Vivek |
118-121 |
26 |
Performance Analysis of Most Common Symmetrical
Encryption Algorithms G. Ramesh, R. Umarani |
122-125 |
27 |
Comparison Study of Classification Algorithms N.Hema and Jha |
123-126 |