Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
About
For Authors
Manuscript Preparation
Privacy Statement
Copyright & Licencing
Editorial Policy
Open Access Policy
Peer Review Policy
Publication Ethics
Current
Archives
APC
Charges Policies
Editorial Team
Submissions
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 12 No. 4 (2017)
Vol. 12 No. 4 (2017)
Published:
25-02-2017
Articles
Design of GSM based Voice Data Processing Using Bone Conduction Principle
R. Arjun, R. Gowtham, G. Gokul, K. Subbulakshmi
1-8
PDF
Analysing and Improving T.O.D Effect on Ultra Long Haul High Bit Rate Optical Communication System
K. Subbulakshmi, R.S. Sidharthraj
9-18
PDF
New Source of Electricity Using Speed Arresters
K. Subbulakshmi, S. Saravana
19-25
PDF
Efficient Cloud Platform Providing an Omnipresent Healthcare Services
R. Elankavi, Dr.R. Udayakumar
26-34
PDF
Secure and Efficient Way of Handling Medical Records in Cloud
R. Elankavi, Dr.R. Udayakumar
35-43
PDF
Multiple Relay Orthogonal Frequency Division Multiplexing for Total throughput Maximization
R. Elankavi, Dr.R. Udayakumar
44-51
PDF
Dynamic Web Page Security Using Fingerprint and Card System
R. Elankavi, Dr.R. Udayakumar
52-57
PDF
Voice Command Execution with Speech Recognition and Synthesize
R. Elankavi, Dr.R. Udayakumar
58-63
PDF
Refining Service Delay Using Temporal Task Scheduling for Profit Maximization in Hybrid Cloud
R. Elankavi, Dr.R. Udayakumar
64-72
PDF
Women’s Safety System Using IBEACON Technology
R. Elankavi, Dr.R. Udayakumar
73-92
PDF
Captcha as a Graphical Passwords - A New Security Primitive based on Hard AI Problems
R. Elankavi, Dr.R. Udayakumar
93-100
PDF
A Novel Group Testing (GT) - based Approach Deployed on Back-End Servers
G. Michael, R. Kavitha
101-110
PDF
A Secure Transmission of Multiple Specialized Secret Sharing Scheme
G. Michael, R. Kavitha
111-117
PDF
Security and Privacy in Distributed Systems through Multifactor Authentication
G. Michael, R. Kavitha
118-124
PDF
To Achieve Source Anonymity in Wireless Network Using Network Coding
G. Michael, R. Kavitha
125-131
PDF
To Detect Attacks against High throughput Multicast Routing Protocol in Wireless Mesh Networks
G. Michael, R. Kavitha
132-139
PDF
Building Dictionary for Identifiers FROM Source Code Written in Object Oriented Language
G. Michael, R. Kavitha
140‐148
PDF
Peer-to-Peer and Distributed System Measurement Request Patterns
G. Michael, R. Kavitha
149-160
PDF
Performance Analysis of Transport Protocol for Video Traffic (MPEG-4) Over WiMax
G. Michael, R. Kavitha
161-170
PDF
Reliable Data Delivery in MANET Using POR
G. Michael, R. Kavitha
171-178
PDF
Broadcast Perception of Integral Data Warehouse Using Assimilated Algorithm
D. Jeyapriya, S. Theivasigamani
179-184
PDF
Precip Soothsaying of Analyzing Data Networks
D. Jeyapriya, R. Elankavi
185-189
PDF
Sensor Network Security Using Sensor Node Technology
D. Jeyapriya, S. Theivasigamani
190-195
PDF
Image Segmentation for a Hierarchical and Scalable Model
K. Anita Davamani, S. Amudha
196-202
PDF
Tamil Character Recognition
K. Anita Davamani, S. Amudha
203-209
PDF
Enhancing the Embedding Capacity in Line-based Cubism-Like Image
K. Anita Davamani, S. Amudha
210-215
PDF
Mobile Replica Node Attack Detection in Wireless Sensor Networks
K. Anita Davamani, S. Amudha
216-223
PDF
Texture Classification based on DLBP
K. Anita Davamani*, S. Amudha
224-234
PDF
Improving Dormant Matching Accuracy through Multiple Features
K. Anita Davamani, S. Amudha
235-245
PDF
Semantic Web Analysis Using Web Services
K. Anita Davamani, S. Amudha
246-258
PDF
Secure Multiparty Protocols
K. Anita Davamani, S. Amudha
259-264
PDF
Avoiding Traffic Congestion Using Position based and Cognitive Radio in VANET
K. Anita Davamani, S. Amudha
265-273
PDF
Ontology based Personalized Mobile Search Engine
K. Anita Davamani, S. Amudha
274-280
PDF
Wormhole Attack Detection in Geographic Routing Protocol
K. Anita Davamani, S. Amudha
281-290
PDF
Proxy Re-encryption Scheme for Decentralizes Erasure Code for Defending the Distributed System
K. Anita Davamani, S. Amudha
291-295
PDF
Methods for the Estimation of Ellagic Acid and Curcumin in Antidiabetic Herbal Formulations – A Review
Megha Ashesh Shah, Harsha Patel, Hasumati Raj
295-311
PDF
Determination of Zinc, Copper, and Mercury in Water Samples by Using Novel Micro Cloud Point Extraction and UV-Vis Spectrophotometry
Elham Ghasemi, Massoud Kaykhaii
313-324
PDF
Stability Indicating High Performance Thin Layer Chromatographic Determination of Alogliptin Benzoate as Bulk Drug and in Tablet Dosage Form
Padmanabh B. Deshpande, Santosh R. Butle
325-335
PDF
A Concise Review on Analytical Profile of Valsartan
Atul A. Shirkhedkar, Suraj R. Chaudhari, Amod S. Patil, Sanjay J. Surana
337-364
PDF
Determination of Albendazole in the Presence of its Alkaline Degradation Product Using TLC-Densitometric and Chemometric Methods: A Comparative Study
Khalid Abdel-Salam Attia, Ahmad Abdel-Halim Mohamad, Mohamed Saleh Emara
365-383
PDF
Development and Validation of RP-HPLC Method for the Simultaneous Determination of Amiloride Hydrochloride and Furosemide in Pure and Pharmaceutical Dosage Form
Jinal N. Tandel
385-394
PDF
Development and Validation of Stability Indicating RPHPLC Method for Simultaneous Estimation of Beclomethasone Dipropionate and Clotrimazole
Santosh Vilaschand Gandhi, Abhishek D. Ogale
395-404
PDF
Determination of 238PU and 239+240PU in Marine Sediment Using Alpha Spectrometry
Noor Fadzilah Yusof, Jalal Sharib, Nurrul Assyikeen Md. Jaffary
405-416
PDF
Design of Experiments Based Validated HPTLC Method for Quantification of Oxybenzone and Avobenzone in Personal Care Products
J. Kavitha, K. S. Lakshmi
417-428
PDF
Tin Electrodeposition from Sulfuric Acid Solution Containing Nigella Sativa Essential Oil Added
Benabida Abdelillah, Mohammed Cherkaoui
429-442
PDF
A Study of Routing Protocols and Asynchronous Attack Patterns in Mobile Ad-Hoc Networks
Dr.C. Rajabhushanam, Sulekha Kumara
443-449
PDF
Thick Client Web Application Prototype
Dr.C. Rajabhushanam, V. Sundar
450-455
PDF