Abstract is missing.
- Effect of Randomization for Privacy Preservation on Classification TasksReena, Raman Kumar. [doi]
- Design of Emotions context based Smart ATM EnvironmentS. Geetha, J. Madhusudanan, M. Krishnamoorthy, V. Prasanna Venkatesan. [doi]
- Evolutionary Neural Networks versus Adaptive Resonance Theory Net for Breast Cancer DiagnosisTanistha Nayak, Tirtharaj Dash, D. Chandrasekhar Rao, Prabhat K. Sahu. [doi]
- A Survey on Performance of On-Chip Cache for Multi-core ArchitecturesB. Krishna Priya, Amit D. Joshi, N. Ramasubramanian. [doi]
- Computer Aided Mammography Techniques for Detection and Classification of Breast CancersStephan Punitha, S. Ravi, M. Anusouya Devi, Jothimani Vaishnavi. [doi]
- Beta Reputation and Direct Trust Model for Secure Communication in Wireless Sensor NetworksB. Priayoheswari, K. Kulothungan, Arputharaj Kannan. [doi]
- Performance Evaluation of Analysis Filter Bank Based Spectrum Sensing in Multipath Fading ChannelP. V. Sabiq, D. Saraswady. [doi]
- Dynamic Model on DDoS Attack in Computer NetworkUpendra Kumar, Samir Kumar Pandey. [doi]
- Human Motion Detection and Recognising their Actions from the Video StreamsD. Puttegowda, M. C. Padma. [doi]
- Generating Adaptive Partially Ordered Sequential RulesRadha Senthilkumar, R. Deepika, R. Saranya, M. Deepak Govind. [doi]
- Location Based Context Aware user Interface Recommendation SystemD. Natarajasivan, M. Govindarajan. [doi]
- Abrupt Shot Detection in Video using Weighted Edge InformationB. S. Rashmi, H. S. Nagendraswamy. [doi]
- Classification of brain tumours Using Genetic Algorithms as a Feature Selection Method (GAFS)Harsha Gwalani, Namita Mittal, Ankit Vidyarthi. [doi]
- Fault Tolerant Event Subscription Model for Smart CommunitiesK. Kamala Kannan, R. Baskaran. [doi]
- Integrity Verification For Outsourced XML Database In Cloud StorageG. Preethi, N. P. Gopalan. [doi]
- Recommendation of Keywords using Swarm Intelligence TechniquesJ. I. Sheeba, S. Pradeep Devaneyan. [doi]
- An Effective Framework with N-Client Transfer Dataset for Weather Prediction Using Data Mining TechniquesK. Venkatachalapathy, T. Kamaleshwar, D. Sundaranarayana, V. Ohm Prakash. [doi]
- Sentiment Classification of Crisis Related Tweets using SegmentationCandy Lalrempuii, Namita Mittal. [doi]
- Web Data Extraction from Retailers' Site using Semantic Density and Case Based ReasoningB. Umamageswari, R. Kalpana. [doi]
- Academic Tweet Classification with Spreading activation based Label propagation algorithm using Tweet centric featuresG. Manju, T. V. Geetha. [doi]
- Dimension Compactness in Speaker IdentificationSoumen Kanrar. [doi]
- Detection of DDoS DNS Amplification Attack Using Classification AlgorithmIrom Lalit Meitei, Khundrakpam Johnson Singh, Tanmay De. [doi]
- Location & User Profile based Mobile Application AccessT. Neelima Chowdary, P. Prudhvi Raj, Ch. Anupama, D. Haritha. [doi]
- A Survey on Survey of Migration of Legacy SystemsA. Sivagnana Ganesan, T. Chithralekha. [doi]
- AEGEUS: An online partition skew mitigation algorithm for mapreduceVimalkumar Kumaresan, Ramachandran Baskaran. [doi]
- Cervical Cancer Detection Using Segmentation on Pap smear ImagesMithlesh Arya, Namita Mittal, Girdhari Singh. [doi]
- RaTeR: Search Plugin supporting Temporal Operators based Information RetrievalV. Uma, L. M. Nikhila, G. Aghila. [doi]
- Fully Homomorphic Symmetric Key Encryption with Smith Normal Form for Privacy Preserving Cloud ProcessingC. N. Umadevi, N. P. Gopalan. [doi]
- Automation of Solar System for Maximum Power Point Tracking using IoTK. Sujatha, R. S. Ponmagal, T. Godhavari. [doi]
- Provenance based Trust computation for Recommendation in Social NetworkA. Christiyana Arulselvi, S. Sendhilkumar, G. S. Mahalakshmi. [doi]
- Security Validation Using Linear Bounded Automata in Web Service EnvironmentM. Thirumaran, R. Padmanaban, J. Nandhini. [doi]
- Knowledge Based Security Model for Banking in CloudM. Auxilia, K. Raja. [doi]
- Resource Allocation Between Temporal Cloud Database and User Using Access ControlSannasy Muthurajkumar, Muthuswamy Vijayalakshmi, Arputharaj Kannan. [doi]
- FSA and NLP based Un-supervised non template Web data extraction in the construction Of Dynamic OntologyK. Uma Pavan Kumar, S. Saraswathi. [doi]
- Clonal Selection Algorithm with Adaptive Lévy Mutation OperatorT. Megala, Moganti Kashyap, K. Vivekanandan. [doi]
- Mining Chemical Information in Various Forms: A ReviewR. Hema, T. V. Geetha. [doi]
- Fuzzy-BPN Based Improved Technique for Color Image WatermarkingAshutosh Upadhyay, Mayank Dave. [doi]
- COPMOC: Co-location Pattern Mining Using Map Overlay and Clustering TechniquesNaveen Kumar, S. Siva Sathya. [doi]
- Privacy Preserving in Dynamic Social NetworksVadisala Jyothi, V. Valli Kumari. [doi]
- Variable strategy ensemble artificial bee colony algorithm for automatic data clusteringVaishali Patel, Ashish Tiwari, Amit Patel. [doi]
- Fuzzy Temporal Approach for Energy Efficient Routing in WSNM. Selvi, R. Logambigai, Sannasi Ganapathy, L. Sai Ramesh, Harichandran Khanna Nehemiah, Kannan Arputharaj. [doi]
- Extraction of Protein Sequence features for Prediction of Neuro-degenerative Brain Disorders: Pioneering the CGAP databaseShomona Gracia Jacob, R. Athilakshmi. [doi]
- Face Recognition Using Gabor Filter And Convolutional Neural NetworkAshwini Kinnikar, Moula Husain, S. M. Meena. [doi]
- Efficient Graph Clustering Algorithm and its use in Prediction of Students PerformanceJayalatchumy Dhanpal, Thambidurai Perumal, Udhayakumaran. [doi]
- Self Localization and Routing in densely deployed wireless networks using LAS AlgorithmR. Preeth, R. Mohan, Ashwini Kumar Badal. [doi]
- Incorporating Equivalence Partitioning on Classification Trees for Test Suite Size ReductionP. Maragathavalli, S. Kanmani. [doi]
- Appraisal of homogeneous techniques in Distributed Data Mining: classifier approachS. Urmela, M. Nandhini. [doi]
- Hybrid Recommendation System using Particle Swarm Optimization and User Access Based RankingG. Sumathi, S. Sendhilkumar, G. S. Mahalakshmi. [doi]
- Cache Routing and Cache Optimization Technique to Improve Time-to-Live Quality of Nodes in the Mobile Ad-HOC Network (MANET) Using Proactive Routing ProtocolK. Venkatachalapathy, A. Vijay Vasanth, T. Sowmia, V. Ohmprakash. [doi]
- IBeH: Naïve Community Detection Methodology for Dark Social NetworkS. Karthika, Sundan Bose. [doi]
- Automatic Tamil Lyric Generation based on neuro-linguisticsRajeswari Sridhar, S. R. Surya Dev, V. Sankar, K. Sivakumar. [doi]
- Non Uniform Area Coverage (NUAC) for an agricultural robot based on grid decompositionS. Kalaivanan, R. Kalpana. [doi]
- A Study on Performance of Dominant Scheduling Algorithms on Standard Workflow Systems in CloudK. Kanagaraj, S. Swamynathan. [doi]
- An NLP based Information Extraction System for PatentsNaima Vahab, K. V. Neethu, R. Binu, Sinoy Mathew, Lokanath Khamari. [doi]
- Accessibility Evaluation of Indian Railway WebsitesV. Balaji, K. S. Kuppusamy. [doi]
- Fast Level Set Method for Segmentation of Medical ImagesRamgopal Kashyap, Pratima Gautam. [doi]
- Providing Trust Enabled Services in Vehicular Cloud ComputingAmit Kumar Tyagi, Sreenath Niladhuri. [doi]
- Outlier Detection using Evolutionary ComputingGutha Jaya Krishna, Vadlamani Ravi. [doi]
- Optimization-Aware Scheduling in Cloud ComputingNeenu George, K. Chandrasekaran, A. Binu. [doi]
- A Novel Multi-Criteria Channel Decision in Co-operative Cognitive Radio Network Using E-TOPSISLoganathan Jayakumar, T. P. Latchoumi, S. Janakiraman, Latha Parthiban. [doi]
- Rake-Pmi Automated Keyphrase Extraction: An unsupervised approach for automated extraction of keyphrasesSomya Gupta, Namita Mittal, Alok Kumar. [doi]
- Integrated Framework for Speech Categorization based on Clustering in Dynamic EnvironmentJ. Jayabharathy, R. Kavitha Kumar, J. Kanimozhi. [doi]
- An Empirical Evaluation model for Software Architecture Maintainability for Object oriented DesignUdaya Dayanandan, K. Vivekanandan. [doi]
- Cloud Computing Overview, Security Threats and Solutions-A SurveyA. Kannaki VasanthaAzhagu, J. M. Gnanasekar. [doi]
- Soft Computing Approaches to Classification of Emails for Sentiment AnalysisPranjal S. Bogawar, Kishor K. Bhoyar. [doi]
- A Survey of Tools for Community Detection and Mining in Social NetworksR. Maivizhi, S. Sendhilkumar, G. S. Mahalakshmi. [doi]
- Analysis of Spoofing Detection using Video Subsection ProcessingP. J. Arathy, Vrinda V. Nair. [doi]
- Navigation Framework for Autonomous Mobile RobotsSuganya Viswanathan, Baskaran Ramachandran, Deivamani Mallayya. [doi]
- A Fuzzy Approach to Centrality and Prestige in Online Social NetworksEbin Deni Raj, L. D. Dhinesh Babu, Ezendu Ariwa. [doi]
- A Method for Mode Selection in a dynamic network for Device-to-Device Communication for 5GPavan Kumar Mishra, Sudhakar Pandey. [doi]
- Performance Analysis of Virtual Machine Introspection Tools in Cloud EnvironmentBharati Ainapure, Deven Shah, A. Ananda Rao. [doi]
- A Survey on Wearable Computers: Human Computer InterfaceL. Swetha, G. Muneeswari. [doi]
- A Detailed Survey on Recent Trends in Secure XML Labeling SchemesS. Sankari, S. Bose. [doi]
- A Comprehensive Survey on Workflow Scheduling Algorithms in Various EnvironmentsS. Balamurugan, S. Saraswathi. [doi]
- Attribute Based Encryption with Fine-grained Access Provision in Cloud ComputingG. S. Tamizharasi, B. Balamurugan, R. Manjula. [doi]
- Analysis of SVM and kNN Classifiers For Egocentric Activity RecognitionK. P. Sanal Kumar, R. Bhavani. [doi]
- Energy Aware Routing Protocol for Resource Constrained Wireless Sensor NetworksSonia Prasad, Shubham Jaiswal, N. S. V. Shet, P. Sarwesh. [doi]
- Dynamic Scheduling Algorithm for Reducing Start Time in HadoopS. Gunasekaran, L. Sai Ramesh, S. Sabena, K. Selvakumar, S. Ganapathy, Arputharaj Kannan. [doi]
- Particle Swarm Optimization Trained Class Association Rule Mining: Application to Phishing DetectionKshitij Tayal, Vadlamani Ravi. [doi]
- Qualitative and Quantitative Review of QOS based Web Services Selection and Composition TechniquesSangeetha Muthuraman, V. Prasanna Venkatesan. [doi]
- Bidirectional Data Dissemination in Vehicular Ad Hoc Networks using Epidemic Spreading ModelM. Chitra, S. Siva Sathya. [doi]
- Automatic Policy Based Web Service Integration Using OntologyS. Tiroumalmouroughane, P. Thambidurai. [doi]
- An Efficient Intrusion Detection System based on Adaptive Acknowledgement with Digital Signature scheme in MANETsG. Santhi. [doi]
- Spatial Domain Watermarking Technique: An Introspective StudyK. Chitra, V. Prasanna Venkatesan. [doi]
- Securing Biometric Template using a Hybrid SchemeKarthi Govindharaju, M. Ezhilarasan. [doi]
- Attribute Based Encryption Using Quadratic Residue for the Big Data in Cloud EnvironmentBalaji Chandrasekaran, Ramadoss Balakrishnan. [doi]
- Ensemble based Parallel k means using Map Reduce for Aspect Based SummarizationV. Priya, K. Umamaheswari. [doi]
- Exploring Bilingual Word Vectors for Hindi-English Cross-Language Information RetrievalVijay Kumar Sharma, Namita Mittal. [doi]
- Performance Analysis of Java Virtual Machine for Machine Learning Workloads using Apache SparkN. Hema, K. G. Srinivasa, Saravanan Chidambaram, Sandeep Saraswat, Sujoy Saraswati, Ranganath Ramachandra, Jayashree B. Huttanagoudar. [doi]
- MASPHID: A Model to Assist Screen Reader Users for Detecting Phishing Sites Using Aural and Visual Similarity MeasuresGunikhan Sonowal, K. S. Kuppusamy. [doi]
- Disease Diagnosis Using Pattern Matching Algorithm from DNA Sequencing: a Sequential and GPGPU based ApproachSandeep U. Mane, Ketaki H. Pangu. [doi]
- A Sparse and Inlier Based SIFT and SURF Features for Automated Face RecognitionA. Vinay, Vinay S. Shekhar, Vasudha S. Shekar, S. Natarajan, K. N. Balasubramanya Murthy. [doi]
- Security Enhancement using a modified AES algorithmR. Bala, N. P. Gopalan. [doi]
- A Comparative Study and Analysis of DNA Sequence Classifiers for Predicting Human DiseasesN. K. Sakthivel, N. P. Gopalan, S. Subasree. [doi]
- Optimized color image watermarking using improved firefly algorithmS. Janardhanam, K. Venkatalakshmi. [doi]
- Smart Sensing based Societal Applications in Public Cloud EnvironmentVaithianathan Geetha. [doi]
- PSO assisted OLSR Routing for Cognitive Radio Vehicular Sensor NetworksThompson Stephan, K. Suresh Joseph. [doi]
- An Efficient Service Selection Approach through a Goodness Measure of the Participating QoSAdrija Bhattacharya, Sankhayan Choudhury. [doi]
- Efficient and Secure Implementation of Elliptic Curve Scalar Multiplication Against Power Analysis AttacksT. Sudhakar, V. Natarajan, A. Kannathal. [doi]
- Semantic Querying based Concept Hierarchy Construction for Ontology LearningB. Sathiya, T. V. Geetha. [doi]
- A Framework towards Generating Effective Business Process Model by Goal based PruningDipankar Deb, Nabendu Chaki. [doi]
- End to End Text Recognition from Natural SceneLeena Mary Francis, K. C. Visalatchi, N. Sreenath. [doi]
- Automatic Keyword Extraction for Text Summarization in e-NewspapersJustine Raju Thomas, Santosh Kumar Bharti, Korra Sathya Babu. [doi]
- Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature SelectionNingombam Anandshree Singh, Khundrakpam Johnson Singh, Tanmay De. [doi]
- A Dominating Set Based Data Gathering in Wireless Sensor Network using Fuzzy Logic and ACOSanjoy Mondal, Saurav Ghosh, Utpal Biswas. [doi]
- Software Defined Networking: Identification of Pathways for Security ThreatsA. Samson, N. P. Gopalan. [doi]
- A Comparative Study and Analysis of Data Mining Classifiers for Microarray based Cancer Pattern DiagnosticsS. Subasree, N. P. Gopalan, N. K. Sakthivel. [doi]
- A Hybrid Template Protection Technique for Fingerprint Biometric Authentication SystemN. Poonguzhali, M. Ezhilarasan. [doi]
- Multimodal Biometric Fusion Using Image Encryption AlgorithmD. Jagadiswary, D. Saraswady. [doi]
- Credit Card Fraud Detection using Big Data Analytics: Use of PSOAANN based One-Class ClassificationSk. Kamaruddin, Vadlamani Ravi. [doi]
- An Image Retrieval using combined approach Wavelets and Local Binary PatternPadmashree Desai, Jagadeesh Pujari, Anita Kinnikar. [doi]
- On Higher Dimensional Window Query: Revisited using BITS-TreeT. Hema, K. S. Easwarakumar. [doi]
- Fusion of Structural and Textural Facial Features for Generating Efficient Age ClassifiersSreejit Panicker, Smita Selot, Manisha Sharma. [doi]
- Machine Learning Techniques for Intrusion Detection: A Comparative AnalysisYasir Hamid, M. Sugumaran, Ludovic Journaux. [doi]
- Entropy Based Feature Selection for Lacunarity Analysis of Position Specific Motif Matrices of Promoter SequencesK. Kouser, B. S. Rashmi, Lalitha Rangarajan. [doi]
- Unsupervised Spectral Sparse Regression Feature Selection using Social Media DatasetsR. Sathya Bama Krishna, M. Aramudhan. [doi]
- Protecting Sensitive Warehouse Data through UML based ModelingAnurag, Deepak Arora, Upendra Kumar. [doi]
- An Efficient Management of Resources in Cloud using Supervised LearningC. Valliyammai, K. Bharathwajan. [doi]
- Detection of Microaneurysms and Exudates from Color Fundus Images by using SBGFRLS AlgorithmManoj Kumar, Manikandan, Malaya Kumar Nath. [doi]
- Task Reprocessing on Real-Time Multicore SystemsP. Pavan Kumar, Ch. Satyanarayana, A. Ananda Rao, P. Radhika Raju. [doi]
- DCT based Audio Steganography in Voiced and Un-voiced FramesAniruddha Kanhe, Gnanasekaran Aghila. [doi]
- Design of QOS based Web Service Selection/Composition Hyper-Heuristic ModelSangeetha Muthuraman, V. Prasanna Venkatesan. [doi]
- Automatic Document Summarization using Sentiment AnalysisSalil Dabholkar, Yuvraj Patadia, Prajyoti Dsilva. [doi]
- A comprehensive survey on hybridization of artificial bee colony with particle swarm optimization algorithm and ABC applications to data clusteringVaishali Patel, Ashish Tiwari, Amit Patel. [doi]
- Self-Regulating Interactive Voice Response System Using Backpatching TechniqueM. Thirumaran, N. Sivakumar, P. Banupriya, T. Bhargavi. [doi]
- A Survey on Denial of Service Attacks and PreclusionsNagesh K., Sumathy R., Devakumar P., Sathiyamurthy K.. [doi]
- Experimental Study of Optimization Algorithms for Breast Cancer Recognition by Means of Ultrasound ImagesK. Senthil Kumar, K. Venkatalakshmi, K. Karthikeyan, A. Jasiya Jabeen. [doi]
- OFS Method for Selecting Active Features using Clustering TechniquesT. P. Latchoumi, Loganathan Jayakumar, Latha Parthiban, S. Janakiraman. [doi]
- Monitoring the odd-even car rationing scheme phase 2.0 in DelhiVanita Jain, Shriya Gupta, Tanuj Ahuja. [doi]
- AOSE Methodologies and Comparison of Object Oriented and Agent Oriented Software TestingR. Padmanaban, M. Thirumaran, K. Suganya, R. Vishnu Priya. [doi]