Paper Publication

Indexing

Latest News

Welcome to new website of Paper Publications.

     

Vol 2 Issue 2 October 2015-March 2016

Downloads Complete Paper

Avoiding Anonymous Users in Multiple Social Media Networks (SMN)

Vol 2 Issue 2 October 2015-March 2016

Mr.T.A. Mohana Prakash, Manigandan .G, Chidambaram .Y, Rajesh .V


Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Vol 2 Issue 2 October 2015-March 2016

Priyadharshni.A, Geo Jenefer.G


Efficient Resource Utilization under Discount Pricing in Cloud Computing

Vol 2 Issue 2 October 2015-March 2016

Malar.J, Jesintha Starvin.M


Automatic Conversion of 2D Image into 3D Image

Vol 2 Issue 2 October 2015-March 2016

Soniya L. Samgir, Priyanka B. Shelar, Sarika S. Gadade


Administration of DHCP Addressing

Vol 2 Issue 2 October 2015-March 2016

Mohammed Ibrahim Kareem


Diabetics Online

Vol 2 Issue 2 October 2015-March 2016

Nisha Balani, Anusha Thakwani, Divya Sachani


Efficient File Sharing Scheme in Mobile Adhoc Network

Vol 2 Issue 2 October 2015-March 2016

Y. Santhi, Mrs. M. Maria Sheeba M.E


Fingerprint Feature Extraction, Identification and Authentication: A Review

Vol 2 Issue 2 October 2015-March 2016

Farah Fayaz Quraishi, Summera Ashraf, Dr. Manzoor Ahmad Chachoo


Energy Aware Computing in Sensor Networks

Vol 2 Issue 2 October 2015-March 2016

B.S.Chinju, Ms.Archana.V.Nair.S


Wireless Charging for Multi-Node Using Wireless Charging Vehicle

Vol 2 Issue 2 October 2015-March 2016

S.Anisha, T.L.Nija Shining Gold


Efficient and Optimal Routing Scheme for Wireless Sensor Networks

Vol 2 Issue 2 October 2015-March 2016

G.M.Nishibha, Mrs.Manchu.M


An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Sensor Networks

Vol 2 Issue 2 October 2015-March 2016

J.Joel Jino Moses, V.Bibin Chirstopher


Sign Language Recognition with Gesture Analysis

Vol 2 Issue 2 October 2015-March 2016

Suhas Dhavale, Prashant Umbare, Rutwik Gunjal, Sushil Daswadikar


Optimized Traffic Flow over Multipath in Optical Networks

Vol 2 Issue 2 October 2015-March 2016

B. Shincy Mercylin, Mrs. Manchu.M


Privacy Preserving Data Leak Detection for Sensitive Data

Vol 2 Issue 2 October 2015-March 2016

Sumi.M, Mrs.Bonshia Binu.M.S


Secure Encrypted Data in Cloud Based Environment

Vol 2 Issue 2 October 2015-March 2016

K.R.Raji, Ms.Archana.V.Nair.S, Ms.K.R.Raghi


Friend Recommendation on Social Network Site Based on Their Life Style

Vol 2 Issue 2 October 2015-March 2016

Ramya.R, Mrs.Bonshia Binu M.S


Improved Greedy Routing Protocol for VANET

Vol 2 Issue 2 October 2015-March 2016

Ambica


Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Computing System

Vol 2 Issue 2 October 2015-March 2016

Nandhini.D, Shineka.K, Sivagami.S, Kiruthiga.P


INPAINTING FOR LAZY RANDOM WALKS SEGMENTED IMAGE

Vol 2 Issue 2 October 2015-March 2016

Ringu Varghese


New Proposed Contention Avoidance Scheme for Distributed Real-Time Systems

Vol 2 Issue 2 October 2015-March 2016

ENSAF A. AL-ZURQA


Intelligent Heart Attack Prediction System Using Big Data

Vol 2 Issue 2 October 2015-March 2016

Prajakta Ghadge, Vrushali Girme, Kajal Kokane, Prajakta Deshmukh


Understanding interaction context for development interactive models

Vol 2 Issue 2 October 2015-March 2016

Ricardo Rosales, Manuel Castanon-Puga, Nora Osuna-Millan, Margarita Ramirez-Rarmirez, Miguel Flores-Parra, Luis Palafox-Maestre


Fuzzy α^m-Separation Axioms

Vol 2 Issue 2 October 2015-March 2016

Qays Hatem Imran, Hayder Kadhim Zghair


Tree Based Proactive Source Routing Protocol for MANETs

Vol 2 Issue 2 October 2015-March 2016

Jubina Mohammed


Control Cloud Data Access Using Attribute-Based Encryption

Vol 2 Issue 2 October 2015-March 2016

Shinde Rupali R, Mane Manisha B, Malkhede Pallavi D, Karavade Rupali M, Prof. Sahane Prema B


Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Aware Routing

Vol 2 Issue 2 October 2015-March 2016

Suja K.U


EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious Node in the Adversary Environment

Vol 2 Issue 2 October 2015-March 2016

Aida Andrews


The Study on Role of Information Technology in the Management of Govt. Hospital with Special Reference to Nagpur District for the Year 2001-2010

Vol 2 Issue 2 October 2015-March 2016

Priyanka Ashok Lambat


Network Security Using IDS, IPS & Honeypot

Vol 2 Issue 2 October 2015-March 2016

Surabhi Malav, Medankar Sanika Avinash, Nagarkar Sanika Satish, Shah Charmi Sandeep


Comparative Study of Data Mining Classification Algorithms in Heart Disease Prediction

Vol 2 Issue 2 October 2015-March 2016

Durgadevi A., Prof. Saravanapriya K.


Investigating VANET for Unwavering Ways with Flawless Connectivity

Vol 2 Issue 2 October 2015-March 2016

Ms. Pradnya kamble, Dr. M.M. Kshirsagar


Mobile Cloud Computing

Vol 2 Issue 2 October 2015-March 2016

Nishant Katiyar


The Relationship between Kernel Set and Separation via ω-Open Set

Vol 2 Issue 2 October 2015-March 2016

Dr. Luay A.A. AL-Swidi, Sarah Haider. khalil. ALjilawi


Edge Detection Using Fuzzy Logic with Varied Inputs

Vol 2 Issue 2 October 2015-March 2016

Pragya Tiwari




Paper Publication