Special Issues


Energy efficient data transmission and Aggregation of WSN using data processing in Map Reduce


Authors  Praveen T, Aswini VS, Kiruthika K, Selva Karthika C

Detection of Sensitive Data Leaks on Mail Server


Authors  Giri M, Shylaja G, Suganya M, Swathilakshmi R

RFID Based Automatic Toll Transportation System


Authors  R. Seethalakshmi, Annapoorani N, Priyanka S

Performance Improvement for Global Banking Based on H2hadoop


Authors  P. Meenakshi, K. Kaveri, S. Kaviya Sindhu, M. Muthuselvi

Large scale collaborative wildlife monitoring Using raspberry PI2


Authors  P.K. Sheela Shantha Kumari, Nishanthi M, Deepa S

Location-Based Services


Authors  Shanmuga Priya, U. Dharani, B. Tharani, R. Janani

Control Data Access Privilege and Anonymity with Fully Anonymous System


Authors  M. Queen mary vidya, J. Gayathri, G. Gnanapriya, M. Sharmila

Creation and Amalgamation for Health Information Exchange Using Cloud Computing System Based on CDA


Authors  A. Merry Ida, Manikandan K, Kannan R, Aditya S Warrier

Semantic Aggregation and Retrievel of Resource Description Framework Datasets from Remote Virtualization Centre


Authors  Veeramalai Sankaradass, Anuj P Unnithan, Praveen Rajkumar N, and Naveen Kumar A

An Efficient Scheme For Identify Spam Bots and Terminate Comprised Mail


Authors  C. Chandravathi, Parimelazhagan D, Dinesh V, Essaki Raja G

Optimizing Data Collection in Rechargeable Sensor Networks by Dynamic Sensing and Routing


Authors  W. Ancy Breen, Jawaharlal M, Venkat Karthik T, Ashwanth C, Matheen B

Vehicle target area detection using image processing technique


Authors  P. Karthikeyan, N. Mohamed Usman, S. Mohanraj, Shubham singh

Implementation of Autonomous Vehicle with Microcontroller


Authors  M. Gowthami, Pazhanivel R, Bhuvankumar R, Muruganandam K

Intelligent Keyword using Binary Vector in Cloud Storage System


Authors  R. Anto Rose, S. Vinitha, G. Keerthana, M. Kavipriya

Cloud sensor security framework against for various attacks in networks


Authors  V. Sabapathi, S. Perezhili, R. Logeshwari, S. Sangavi

Batch Cryptographic Technique to Discover Invalid Signatures in Adversarial Network


Authors  Senthil P, Divya S, Sirija M, and Sowmiya S

Privacy protection for preventing data over- Gathering of user private information


Authors  Alin Mercybha P.J,Gnana deepika J.P, Aneka P, Rahini A

Intelligent Image Based Relevant Data Retrieval


Authors  Monisha K, Sandhya S, Kanchanadevi M, Raja Saranya kumari R

Identity Based Proxy Re-Encryption Schema in Cloud Computing


Authors  Rajkumar V.S, Sangeetha C, Devipriya M, Vinitha G

Attribute Based Multilevel Security in Distributed Health care Information System


Authors  Veeramalai S, Geethapriya S, Gayathri B, Gayathri K

Safer Zone Identification in Tri zonal area using RSSI with Alert System


Authors  Giri M, Haritha S, Subashree P and Poojavathy V

An authentication scheme for a better security Against a peeping attack by a video camera


Authors  R. Seetha Lakshmi, Lakshmi A, Anusha R, Sangeethavani R

Control of a Smart Home with Brain Computer Interface by Using Brain Wave Sensor


Authors  Chandravathi, Jaya laksmi V, Gayathri D, Leankha T

Raspberry PI Target Detection Using Open CV


Authors  Sheela Shantha Kumari, Bhuvaneshwaran S, Nagarjun V, Yuvaprakash D

Scalable Video Streaming Over Wireless Access Networks


Authors  Shanmuga Priya,Abhishek Puhan, Nitin Punia, Rahul Nirmal

Inviting, Detection & Identification of Attacker Using Honey Words in a Purchase Portal


Authors  Akash B, Charan G, Jayasuriya M, Queen Mary Vidya

Identification of Black Money and Fake Currency


Authors  A. Merry Ida, Ambarish G.V.S, Dhamodaran R, Manoj Kumar N, Yashwanth Raj S

Sentiment analysis in social media Using machine learning techniques with R language


Authors  T. Praveen, Rohit Kumar Sharma, Gurdeep Singh, Ram Shankar

Multi Secured Dynamic Data Sharing With Multi Key Verification & User Behaviour Analysis


Authors  P. Meenakshi, Vasanth M, Sanaulla S, Muthukumaran S

Multimodal verification for internet banking system


Authors  W. Ancy Breen, D. Praveen Kumar, G. Gothandan, D. Meganathan

Information Retrieval for Medical Queries Using Data Mining


Authors  V. Sabapathi, S. Sasikumar, M. Ganesh, J. Yuvaraj, P.R. Harishraj

Eyeball Movement Based Cursor Using Raspberry Pi


Authors  Anto rose, Mirunalini M, Divya darshini N

Reducing Key Space Using KASE and Searching Multi Keyword for Multiple Data Owners in Cloud Computing


Authors  M. Gowthami, T. Praveen, V.S. Vinitha, G. Nandhini

Multi Bank Family Debit Card


Authors  Danu R, Saranya M, Sindhu E

Detection of Brain Tumour by Image Fusion Based on Discrete Wavelet Transform


Authors  D. Jagadish, K. Sindhu Priya, V. Saranya, A.S. Akshara, G. Mohanapriya

Secure Data Transfer in Double Image Using Reversible Data Hiding Technique


Authors  D. Jagadish, K. Sindhu Priya, V. Saranya, B. Akshaya, T. Mahalakshmi

Survey on Scrambled Data Control with Dedupulication in Cloud Computing


Authors  J. Velmurugan, A. Vishnukumar, S.K. Manigandan, V. Anupriya, S. Minnu Priyanga

Providing Data Security in Cloud Computing Using Quantum Search in Black box Approach


Authors  J. Velmurugan*, S.K. Manigandan, P. Vinothkumar, Mohammad K Saifullah Basha, S. abhilash kumar

Optimized queuing prediction staging sustained computational scheme


Authors  S.K. Manigandan, J. Velmurugan, A. VishnuKumar, Dinesh Kumar G, Syed Fazal Ahmed A

A Survey on Effective Endowment of Multiple-Level Auction Mechanism in Cloud


Authors  A. Jayanthi, B. Nikhila, S. Kiruthika

A Systematic Survey on Multidimensional Spinning Cube of Potential Doom Resource Utilization in Network Visualization


Authors  Nirmal Kumar A, Sai Keerthi C, and Poorna Shree V

Design and Analysis of Double Encryption Scheme for Cloud Storage System


Authors  S.K. Manigandan, Sandhiya A, J. Velmurugan and D. Ramya

Survey on Knowledge Discovery Applications and Technique in Healthcare Sector


Authors  I. Roseline Jecintha, K. Suganya, A. Vishnukumar, J. Velmurugan

Content Based Collaborative Filtering and POI Recommendation for Taxi Monitoring Web Services


Authors  Sakthivel M, Senthil Murugan J, Tejashwini S, Monica A

An Improved Smartcard Based Password Authentication with Enhanced Security


Authors  D. Dhayalan, K. Malathi, P. Kirubai Nesam, P. Prasannakumari

Video-on-Demand Delivery by synchronizing users using Multicast Gain


Authors  Reshmi Yadav R, Punitha U, Sandeep Kumar R, Jugeetha R, Sakthivel M

Centralized Bank Monitoring of Fraudulent Tax Payment using Placard System


Authors  Vignesh Hemanth M, Praneela M, and Senthamizh S, Sakthivel M

Encryption in Cloud Computing With Efficient File Hierarchy


Authors  S.K. Manigandan, J. Rathna, J. Velmurugan and D. Ramya

E-Payment for Toll-Gate Processing using QR Technology


Authors  R. Latha, C. Sivaraj, V. Sivaranjani and S. Vimaleeshwari

A Study of Mathematical Analytical Topology Application over Computer Network Systems


Authors  S. Sivapriya, N. Srinivasan, V. Sabapathi, J. Senthil Murugan