2017 Special Issue 6

Article No.

Article Title & Authors

1
Energy efficient data transmission and Aggregation of WSN using data processing in Map Reduce
Authors: Praveen T, Aswini VS, Kiruthika K, Selva Karthika C
Abstract: Pdf Format
2
Detection of Sensitive Data Leaks on Mail Server
Authors: Giri M, Shylaja G, Suganya M, Swathilakshmi R
Abstract: Pdf Format
3
RFID Based Automatic Toll Transportation System
Authors: R. Seethalakshmi, Annapoorani N, Priyanka S
Abstract: Pdf Format
4
Performance Improvement for Global Banking Based on H2hadoop
Authors: P. Meenakshi, K. Kaveri, S. Kaviya Sindhu, M. Muthuselvi
Abstract: Pdf Format
5
Large scale collaborative wildlife monitoring Using raspberry PI2
Authors: P.K. Sheela Shantha Kumari, Nishanthi M, Deepa S
Abstract: Pdf Format
6
Location-Based Services
Authors: Shanmuga Priya, U. Dharani, B. Tharani, R. Janani
Abstract: Pdf Format
7
Control Data Access Privilege and Anonymity with Fully Anonymous System
Authors: M. Queen mary vidya, J. Gayathri, G. Gnanapriya, M. Sharmila
Abstract: Pdf Format
8
Creation and Amalgamation for Health Information Exchange Using Cloud Computing System Based on CDA
Authors: A. Merry Ida, Manikandan K, Kannan R, Aditya S Warrier
Abstract: Pdf Format
9
Semantic Aggregation and Retrievel of Resource Description Framework Datasets from Remote Virtualization Centre
Authors: Veeramalai Sankaradass, Anuj P Unnithan, Praveen Rajkumar N, and Naveen Kumar A
Abstract: Pdf Format
10
An Efficient Scheme For Identify Spam Bots and Terminate Comprised Mail
Authors: C. Chandravathi, Parimelazhagan D, Dinesh V, Essaki Raja G
Abstract: Pdf Format
11
Optimizing Data Collection in Rechargeable Sensor Networks by Dynamic Sensing and Routing
Authors: W. Ancy Breen, Jawaharlal M, Venkat Karthik T, Ashwanth C, Matheen B
Abstract: Pdf Format
12
Vehicle target area detection using image processing technique
Authors: P. Karthikeyan, N. Mohamed Usman, S. Mohanraj, Shubham singh
Abstract: Pdf Format
13
Implementation of Autonomous Vehicle with Microcontroller
Authors: M. Gowthami, Pazhanivel R, Bhuvankumar R, Muruganandam K
Abstract: Pdf Format
14
Intelligent Keyword using Binary Vector in Cloud Storage System
Authors: R. Anto Rose, S. Vinitha, G. Keerthana, M. Kavipriya
Abstract: Pdf Format
15
Cloud sensor security framework against for various attacks in networks
Authors: V. Sabapathi, S. Perezhili, R. Logeshwari, S. Sangavi
Abstract: Pdf Format
16
Batch Cryptographic Technique to Discover Invalid Signatures in Adversarial Network
Authors: Senthil P, Divya S, Sirija M, and Sowmiya S
Abstract: Pdf Format
17
Privacy protection for preventing data over- Gathering of user private information
Authors: Alin Mercybha P.J,Gnana deepika J.P, Aneka P, Rahini A
Abstract: Pdf Format
18
Intelligent Image Based Relevant Data Retrieval
Authors: Monisha K, Sandhya S, Kanchanadevi M, Raja Saranya kumari R
Abstract: Pdf Format
19
Identity Based Proxy Re-Encryption Schema in Cloud Computing
Authors: Rajkumar V.S, Sangeetha C, Devipriya M, Vinitha G
Abstract: Pdf Format
20
Attribute Based Multilevel Security in Distributed Health care Information System
Authors: Veeramalai S, Geethapriya S, Gayathri B, Gayathri K
Abstract: Pdf Format
21
Safer Zone Identification in Tri zonal area using RSSI with Alert System
Authors: Giri M, Haritha S, Subashree P and Poojavathy V
Abstract: Pdf Format
22
An authentication scheme for a better security Against a peeping attack by a video camera
Authors: R. Seetha Lakshmi, Lakshmi A, Anusha R, Sangeethavani R
Abstract: Pdf Format
23
Control of a Smart Home with Brain Computer Interface by Using Brain Wave Sensor
Authors: Chandravathi, Jaya laksmi V, Gayathri D, Leankha T
Abstract: Pdf Format
24
Raspberry PI Target Detection Using Open CV
Authors: Sheela Shantha Kumari, Bhuvaneshwaran S, Nagarjun V, Yuvaprakash D
Abstract: Pdf Format
25
Scalable Video Streaming Over Wireless Access Networks
Authors: Shanmuga Priya,Abhishek Puhan, Nitin Punia, Rahul Nirmal
Abstract: Pdf Format
26
Inviting, Detection & Identification of Attacker Using Honey Words in a Purchase Portal
Authors: Akash B, Charan G, Jayasuriya M, Queen Mary Vidya
Abstract: Pdf Format
27
Identification of Black Money and Fake Currency
Authors: A. Merry Ida, Ambarish G.V.S, Dhamodaran R, Manoj Kumar N, Yashwanth Raj S
Abstract: Pdf Format
28
Sentiment analysis in social media Using machine learning techniques with R language
Authors: T. Praveen, Rohit Kumar Sharma, Gurdeep Singh, Ram Shankar
Abstract: Pdf Format
29
Multi Secured Dynamic Data Sharing With Multi Key Verification & User Behaviour Analysis
Authors: P. Meenakshi, Vasanth M, Sanaulla S, Muthukumaran S
Abstract: Pdf Format
30
Multimodal verification for internet banking system
Authors: W. Ancy Breen, D. Praveen Kumar, G. Gothandan, D. Meganathan
Abstract: Pdf Format
31
Information Retrieval for Medical Queries Using Data Mining
Authors: V. Sabapathi, S. Sasikumar, M. Ganesh, J. Yuvaraj, P.R. Harishraj
Abstract: Pdf Format
32
Eyeball Movement Based Cursor Using Raspberry Pi
Authors: Anto rose, Mirunalini M, Divya darshini N
Abstract: Pdf Format
33
Reducing Key Space Using KASE and Searching Multi Keyword for Multiple Data Owners in Cloud Computing
Authors: M. Gowthami, T. Praveen, V.S. Vinitha, G. Nandhini
Abstract: Pdf Format
34
Multi Bank Family Debit Card
Authors: Danu R, Saranya M, Sindhu E
Abstract: Pdf Format
35
Detection of Brain Tumour by Image Fusion Based on Discrete Wavelet Transform
Authors: D. Jagadish, K. Sindhu Priya, V. Saranya, A.S. Akshara, G. Mohanapriya
Abstract: Pdf Format
36
Secure Data Transfer in Double Image Using Reversible Data Hiding Technique
Authors: D. Jagadish, K. Sindhu Priya, V. Saranya, B. Akshaya, T. Mahalakshmi
Abstract: Pdf Format
37
Survey on Scrambled Data Control with Dedupulication in Cloud Computing
Authors: J. Velmurugan, A. Vishnukumar, S.K. Manigandan, V. Anupriya, S. Minnu Priyanga
Abstract: Pdf Format
38
Providing Data Security in Cloud Computing Using Quantum Search in Black box Approach
Authors: J. Velmurugan*, S.K. Manigandan, P. Vinothkumar, Mohammad K Saifullah Basha, S. abhilash kumar
Abstract: Pdf Format
39
Optimized queuing prediction staging sustained computational scheme
Authors: S.K. Manigandan, J. Velmurugan, A. VishnuKumar, Dinesh Kumar G, Syed Fazal Ahmed A
Abstract: Pdf Format
40
A Survey on Effective Endowment of Multiple-Level Auction Mechanism in Cloud
Authors: A. Jayanthi, B. Nikhila, S. Kiruthika
Abstract: Pdf Format
41
A Systematic Survey on Multidimensional Spinning Cube of Potential Doom Resource Utilization in Network Visualization
Authors: Nirmal Kumar A, Sai Keerthi C, and Poorna Shree V
Abstract: Pdf Format
42
Efficient Performance Escalation in Live Migration with Downturn in the Migration time and Downtime
Authors: Vishnu Kumar, J. Velmurugan, K. Vishali, R. Anusuya
Abstract: Pdf Format
43
Survey on Knowledge Discovery Applications and Technique in Healthcare Sector
Authors: I. Roseline Jecintha, K. Suganya, A. Vishnukumar, J. Velmurugan
Abstract: Pdf Format
44
Content Based Collaborative Filtering and POI Recommendation for Taxi Monitoring Web Services
Authors: Sakthivel M, Senthil Murugan J, Tejashwini S, Monica A
Abstract: Pdf Format
45
An Improved Smartcard Based Password Authentication with Enhanced Security
Authors: D. Dhayalan, K. Malathi, P. Kirubai Nesam, P. Prasannakumari
Abstract: Pdf Format
46
Video-on-Demand Delivery by synchronizing users using Multicast Gain
Authors: Reshmi Yadav R, Punitha U, Sandeep Kumar R, Jugeetha R, Sakthivel M
Abstract: Pdf Format
47
Centralized Bank Monitoring of Fraudulent Tax Payment using Placard System
Authors: Vignesh Hemanth M, Praneela M, and Senthamizh S, Sakthivel M
Abstract: Pdf Format
48
Encryption in Cloud Computing With Efficient File Hierarchy
Authors: S.K. Manigandan, J. Rathna, J. Velmurugan and D. Ramya
Abstract: Pdf Format
49
Design and Analysis of Double Encryption Scheme for Cloud Storage System
Authors: S.K. Manigandan, Sandhiya A, J. Velmurugan and D. Ramya
Abstract: Pdf Format
50
E-Payment for Toll-Gate Processing using QR Technology
Authors: R. Latha, C. Sivaraj, V. Sivaranjani and S. Vimaleeshwari
Abstract: Pdf Format
51
A Study of Mathematical Analytical Topology Application over Computer Network Systems
Authors: S. Sivapriya, N. Srinivasan, V. Sabapathi, J. Senthil Murugan
Abstract: Pdf Format

© Copyright 2016 JCHPS. Designed by crazywebservices