S.No. |
Title & Authors |
Page |
Downloads |
1. |
Locality Repulsion Projection and Minutia Extraction Based Similarity Measure for Face Recognition
Agnel AnushyaP., RamyaP |
01-05 |
|
2. |
A Modified Teaching Learning Based Optimal Smooth Ordering for Image Enhancement
Ahila.C, N.A.Vidya Mol |
06-11 |
|
3. |
Local Fuzzy Clustering for Accurate and Noise-Robust Multi-modal Medical Image Segmentation
Aji R , Ramya P |
12-16 |
|
4. |
Adaptive Gabor Wavelet and Zernike Moment Based Hashing for Image Authentication
Akshara Anand.S.D S.Gayathri |
17-22 |
|
5. |
An Efficient Active Content Reconstruction Based on Adaptive Pixel Permutation
K.K.Amutha , N.A.Vidya Mol |
23-29 |
|
6. |
Active Shape Model Based Recognition Of Facial Expression
AncyRija V , Gayathri. S |
30-33 |
|
7. |
Dark image enhancement through channel division using spectral decomposition method
S A Angel Leonie , Jemimah Simon |
34-38 |
|
8. |
Exemplar-Based Image Inpainting by Laplacian Approximation Method Using Spatiogram
G.Anto Silviya ,V.R.Bhuma |
39-44 |
|
9. |
Adaptive Fingerprint Image Enhancement with Minutiae Extraction Arul Stella , A. Ajin Mol |
45-51 |
|
10. |
An Efficient Reformulated Model for Transformation of String
Asha Achenkunju, V.R. Bhuma |
52-57 |
|
11. |
Spoofing Detection in Wireless Networks
S.Manikandan,C.Murugesh |
58-62 |
|
12. |
Visual and Motion Saliency Using Unsupervised Block Based Approach for Video Object Extraction
A.Carolin Delviya, Mrs.N.Mymoon Zuviria |
63-69 |
|
13. |
To Improve Reliability of Message Passing In MPI Libraries Using Flow Checker
N.Kanagavalli, S.Krishanth |
70-76 |
|
Part 2 |
1. |
Distributed Information Sharing Using Privacy Preserving Information Brokering
Praisy Nalamisha.N, PG Scholar, S.Agnes Joshy, Assistant Professor |
01-03 |
|
2. |
Unregulated Content Filtering In Online Social Network Using Firewall M.Priya, G.Prince Devaraj |
04-07 |
|
3. |
Effective Satellite Stream Monitoring and Controller In Aircraft Using Packet Capture. R.Saranya, G.Prince Devaraj |
08-11 |
|
4. |
Cloud audit service outsourcing by using KAC for data storage security
Ms.A.Christy Sharmila, Mr.T.Darney Tressiline M.E. |
12-18 |
|
5. |
Key Management and Group Key Agreement For Fast Transmission To Remote Groups
T.Suruthi, T.Anto Theepak |
19-22 |
|
6. |
Segmentation of Remote Sensing Image Analysis Using Neural Network
Ms.P.P.N Vijila, Ms.R.Femi M.E |
23-28 |
|
7. |
Detection of Digital Image Splicing Using Luminance
P.Sabeena Burvin, J.Monica Esther |
29-33 |
|
8. |
An Energy-efficient Distributed Self-organized Clustering Based Splitting and Merging in Wireless Sensor Networks
Mrs.J.Monisha, Mrs.M.MuthuSelvi |
34-40 |
|
9. |
Secure Data Retrieval over Graph Structured Data in Cloud
Ms.Jelba.J, Dr.V.Kavitha |
41-44 |
|
10. |
Highly secured and effective keyword search over encrypted cloud data
Michael Shabi Nathan. S, Dr.V.Kavitha |
45-49 |
|
11. |
Analysis of Automobile Drivers Stress By Using Physiological Signals
M. Anin Manjusha, Professor Mrs. Josephin Shermila.P |
50-53 |
|
12. |
Secure Data Access Over Wide Area Network Using Vanet Protocol T.Ambikapathi, Ms. Sreema |
54-60 |
|
13. |
Multi clustering approach for fast hyperspectral endmember extraction using k-means
Shobana G , Muthuvel A |
61-65 |
|
14. |
Multi-Biometric Cryptosystem on Fusion Level Distinctiveness
M.Sindhu, N.Radhakrishnan |
66-69 |
|
15. |
SFM: An Energy Efficient Algorithm based on Reducing Control Messages in Wireless Sensor Networks
M.Christina Ranjitham, Mrs.M.Thiruchelvi |
70-75 |
|
Part 3 |
1. |
Privacy-Preserving Back Propagation Neural Network Learning In Signature Scheme
Mrs.S.Blessy |
01-05 |
|
2. |
3D Ear Recognition System Using Neural Network Based Self Organizing Maps
M.Sathish Babu |
06-12 |
|
3. |
Hidden Data Procession for Multiple Applications in Wireless Sensor Networks
JanarishSaju C, Sharon NishaM |
13-19 |
|
4. |
An IHS-Based Fusion for Vegetation Enhancement in IKONOS Imagery
A.Vakeswari, S.Brintha Rajakumari |
20-24 |
|
5. |
Enhancing Downloading Time By Using Content Distribution Algorithm
VILSA V S |
25-29 |
|
6. |
Multiscale Gradients based directional demosaicing
A. Jasmine ,John Peter.K |
30-36 |
|
7. |
Optimal Sparse Representation Based Robust Image Inpaintin
S.SherinNelcy , VidyaMol N.A |
37-41 |
|
8. |
Misbehaviour Detection in Wireless Networks Of Selfish Individuals An Sharmi.M, Mr.A.Arul Rex |
42-48 |
|
9. |
A new metric based on Motifs for Animal Recogn
D.Samson |
49-52 |
|
10. |
A Generic Approach to detect the forgeries in Color images using ELM method
J.Angel Sajani, Mr.A.Muthumari M.E |
53-60 |
|
11. |
Color Sensitive Adaptive Gamma Correction for Image Color
and Contrast Enhancement
Asha M, Jemimah Simon |
61-66 |
|
12. |
A Study On Mechanical And Machinability Characteristics Of Hybrid Metal Matrix Composite
V.L. Kingston, Mr. John Prabhakar, Dr. N. Senthilkumar |
67-70 |
|
13. |
Segmentation Of Pulmonary Lobes Using Marker Based Watershed Algorithm
Linda.A, Ms.B. SuganyaJeyamalar M.E. |
71-75 |
|
Part 4 |
1. |
Latent Fingerprint Enhancement Via Orientation Field Reconstruction And Fingerprint Alteration
Aswathi Prathap , Siva Pradeepa.S |
01-06 |
|
2. |
Adaptive Kalman filter with GLBP feature for low resolution face tracking
Berin Selva Bennetlin s.k. , F.Tephila John |
07-12 |
|
3. |
Recognition of Face Expression using Color Space
Brruna A , Siva Pradeepa S |
13-17 |
|
4. |
Digital Image Forgery detection using color Illumination and Decision Tree Classification
Chitra Ganesan , V.R. Bhuma |
18-23 |
|
6. |
Image Enhancement for Non-uniform Illumination Images using PDE
Jenish Sherin.B.T, Jemimah Simon |
30-35 |
|
7. |
An Enhanced Novel Approach For Distributed Document Clustering
J.E. Johny Livinston, S. Siva Pradeepa |
36-40 |
|
8. |
Robust Face Recognition and Tagging in Visual Surveillance System
Kavitha MS, Siva Pradeepa S |
41-46 |
|
9. |
Histogram Analysis of Doubly Compressed JPEG Images for Forgery Detection
Krishna Sobhan , V R Bhuma |
47-51 |
|
10. |
Efficient Document Image Binarization for Degraded Document Images using MDBUTMF and BiTA
Leena.L.R , Gayathri. S |
52-57 |
|
11. |
Feature Extraction Based On Recognition of Surgically Altered Face Images
Lizy A., Gayathri S. |
58-62 |
|
12. |
Logo Matching and Recognition with Interest Points Using Context–Dependent Similarity
Nishanth.T.R ,Jemimah Simon |
63-69 |
|
13. |
Image Segmentation Using FELICM Clustering Method
Ramya, Jemimah Simon |
70-74 |
|
Part 5 |
1. |
Bicubic Based Joint DemosaicingandImage Down Sampling
Renuka T , John Peter K |
01-06 |
|
2. |
FAST: A New Novel Feature Selection Algorithm for Large Datasets
RethinRaveendran ,Bhuma V.R |
07-10 |
|
3. |
Edge-Strength Filter Based CFA Interpolation Using H-H Frequency Sub-band Channels
Shalika R.N , Nagarajan G |
11-17 |
|
4. |
Reversible Watermarking Based on Optimal Dynamic Histogram Shifting
Shyja.T.V , N.A.Vidya Mol |
18-23 |
|
5. |
Scheduling to Minimize Time Staleness and Execute Job using Max Benefit Algorithm
Simi M Cyril,S Gayathri |
24-27 |
|
6. |
Feature Based Data Stream Classification (FBDC) and Novel Class Detection
Sminu N.R , Jemimah Simon |
28-32 |
|
7. |
An Efficient Blind Source Separation Based on Adaptive Wavelet Filter and SFA
Subi C , Ramya P |
33-38 |
|
8. |
Integrated Atlas Based Localisation Features in Lungs Images
Mr.N.Bensingh |
39-44 |
|
9. |
Optic Disk Detection in Retinal Images – Evaluat
Mrs. R. Sharmiladevi, Mr. G. Sathish kumar |
45-49 |
|
10. |
Design of Tri-Generation for a Hotel
Lakshmi Narasimhan S., Hussain Najmi, Setty Uday Kumar |
50-54 |
|
11. |
Peak to Average Power Ratio Reduction in MIMO OFDM using QPSK based on Partial Transmit Sequence method Aarathi Gokulan, J Friska |
55-58 |
|
12. |
Design of Optimizing Adders for Low Power Digital Signal Processing
Mr. Akhil M S, Mr. N. Muthukumara |
59-65 |
|
13. |
High Throughput in MANET Using relay algorithm and rebroadcast probability
Mr. Marvin Mark M, Mr. N. Muthukumaran |
66-71 |
|
14. |
Intelligent Traffic System Using BAHG Protocol with Secured Intrusion Detection System
Rakesh Krishna SR, Dr.M. Irulappan Ph.D |
72-78 |
|
Part 6 |
1. |
Secure Multiparty Computation and Privacy Preserving Data Sharing with Anonymous ID Assignment
Shiny. I.S , S. Gayathri |
01-05 |
|
2. |
Optimal Parameter Tuning Based Multi-Scale Image Enhancement
S.Sonia,A.J. Adlin Deepika |
06-11 |
|
3. |
Segmentation and Tracking Framework for Video Object by Using Threshold Decision and Diffusion
Uma Rani A , M.G Justin Raj |
12-15 |
|
4. |
Comparable Entity Mining From Comparative Question Archive
Veena.G.R.Kumar, Jameemah Simon |
16-20 |
|
5. |
A Self-Learning Approach to Edge-Adaptive Demosaicking Algorithm for CFA Images
Shiny.A,Nagarajan.G |
21-28 |
|
6. |
Empowered Service Delegation With Attribute Encryption For Distributed Cloud Computing
S.Vidhya, R.Raja Ramya, N.kanagavalli |
29-32 |
|
7. |
Multiscale Feature Extraction For Content Based Image Retrieval Using Gabor Local Tetra Pattern
R. Navani, Ms. Jiji S. Raj |
33-38 |
|
8. |
Reliable Storage Services and Avoidance of Integrity Problems in Cloud Computing
T.Subetha, M.Rajasekar |
39-42 |
|
9. |
Efficient And Advance Routing Logic For Network On Chip
Mr. N. Subhananthan, Mrs. C. G. Joy Merline M.E. |
43-48 |
|
10. |
An Efficient General Access Structure Based Multiple Secret Visual Cryptography
S.A.Ayswaria, Mrs.A.M.Asbel Shiny |
49-53 |
|
11. |
Fuzzy Clustering With Spatial Information For Image Segmentation Using Kernel Metric
G.J.Abisha Shiji, Ms. Berakhah .F. Stanley |
54-58 |
|
12. |
An Efficient Technique for Hyperspectral Endmember Extraction based on SE2PP
M.Cynthia, Mrs. Ablin.R |
59-63 |
|
13. |
Private Data Transferring among 'N' Nodes in a group by Using Anonymous ID Assignment
M.Anisha Vergin, T.Anto Theepak |
64-68 |
|
14. |
Fingerprint Matching For Privacy Protection Dora Angel. M, Andrew Rayan.T |
69-71 |
|
15. |
Dynamic Virtual Resource Management In Cloud Computing Environment
D.Golden Jemi, C.S Soumiya |
72-78 |
|
Part 7 |
1. |
Towards Secrecy on Public Auditability for Secure Storage in Cloud Computing
Jency. D. J, D. Joseph Pushparaj |
01-04 |
|
2. |
Image Denoising Using Multi Resolution Analysis (Mra) Transforms T.Jones Daniel, Mrs. M. Caroline viola Stellamary |
05-08 |
|
3. |
Remote Sensed Image Classification based on Spatial and Spectral Features using SVM Mary Jasmine. E, Muthumari. A |
09-14 |
|
4. |
Health Monitoring For Secrecy Conserving Using Cloud Computing S.Mercy, Vannarpettai |
15-18 |
|
5. |
Congestion Control for Avoiding Packet Loss in Data Centric Network S.M.BaslinNixy, S.Agnes Joshy |
19-22 |
|
6. |
Vehicle License Plate Detection Using Morphological Processing and Heuristics K.Pitchammal, J. Monica Esther |
23-26 |
|
7. |
Security and Privacy through Multiple Clouds in Cloud Computing
Arputha Nilasini.A, Anli Sherine.S.M |
27-32 |
|
8. |
Robust Face Recognition of Variations in Blur and Illumination by Using LDA
Ms. K. Hema, Mr. J. Arun Prem Santh |
33-38 |
|
9. |
A Novel Approach for Reducing Routing Overhead In MANET
A.Meenakshi, Mrs. J. Banmmathi M. E |
39-43 |
|
10. |
A Review Study of Various Routing Protocols Based on Routing Information Update Mechanism of Mobile Ad Hoc Networks
Mrs. S. Gowsiga, Dr. P. Senthil Kumar |
44-49 |
|
11. |
Intelligent Door Locking System
B. Anubala, M. Rahini, T. Bavithra |
50-53 |
|
12. |
Difference Expansion Reversible Image Watermarking Schemes Using Integer Wavelet Transform Based Approach
Subhanya R.J, Anjani Dayanandh N |
54-59 |
|
13. |
An Automatic Classification of Lung Tissue Using Density Based Approach
Mrs. M. Vinthu Kumari, Mrs. J. Vijila2 M. E. |
60-63 |
|
14. |
Low Power Error Correcting Codes Using Majority Logic Decoding
A. Adline Priya, K.L. Nisha |
64-68 |
|
15. |
Image Reconstruction Using Dual Tree Complex Wavelet Transform For Mosaic Video Sequences
C. P. Lillyashitha, Professor E. P. Kannan |
69-72 |
|
16. |
Optical Character Recognition from Degraded Document Images
P.R.Nisha Beevi, Mr.S.Mohammed Nuhuman |
73-78 |
|
Part 8 |
1. |
Adaptive Based Multiobjective Optimization Based Node Placement and Target Detection in Bistatic Radar Network
M. Amala Christy, Ms. N.Anushya |
01-06 |
|
2. |
Detection of Node Replication Attacks in Mobile Sensor Networks Using Efficient Localized Detection Algorithm
Glory Rashmi. A, Mr.C.Murugesh |
07-12 |
|
3. |
Survey Paper on the Performance Analysis of Routing Protocols in DTN Mrs. J. Banumathi, Ms. P. Sneha Tharshini |
13-18 |
|
4. |
Numerical and Categorical Attributes Data Clustering Using K-Modes and Fuzzy K-Modes
S.Sumathi and M.M.Gowthul Alam |
19-24 |
|
5. |
Bio Medical Sensor Network for Patient Monitoring
R.Durga, T.Suresh |
25-29 |
|
6. |
Energy Harvesting Capability of Air for Measurements Using Self-Powered Wireless Sensor Network
Y. Susan Florence, T. Blesslin Sheeba |
30-34 |
|
7. |
Doppler Compensated Front – End Receiver Design for Underwater Acoustic Channels Using Mimo-Ofdm
J. Jenisha, Ms. N. Subhashini |
35-40 |
|
8. |
Power Allocation for Hybrid Overlay/Underlay CRN
A. Joel Livin, R. Johncily |
41-45 |
|
9. |
Hybrid Glucoma Screening Method Using Optic Disc
Segmentation and True Vessel Extraction
J. Basline Jenuba, P. V. Deepa |
46-48 |
|
10. |
A Survey on Cloud Computing and Cloud Security Issues
V. Abricksen |
49-54 |
|
11. |
Secure Authentication Using Certificate Revocation List (Crl) and Message Signature in Vanet
R. Saranya, J. Hariharan |
55-60 |
|
12. |
Optimal Implementation of Bi-Directional Strategy for AC/DC Converters Using A PWM Technique
Ervin Arul. A, Kathiravan. R, Balamurugan. T |
61-65 |
|