Current
Archives
About the Journal
Article Processing Charges
Charges Policies
Editorial Team
Submissions
Contact
Guidelines For Authors
Manuscript Preparation
Privacy Statement
Copyright & Licencing
Editorial Policy
Open Access Policy
Peer Review Policy
Publication Ethics
English
Register
Login
Current
Archives
About the Journal
Article Processing Charges
Charges Policies
Editorial Team
Submissions
Contact
Guidelines For Authors
Manuscript Preparation
Privacy Statement
Copyright & Licencing
Editorial Policy
Open Access Policy
Peer Review Policy
Publication Ethics
Language
English
Search
Register
Login
Vol. 12 No. 4 (2017)
Home
/
Archives
/
Vol. 12 No. 4 (2017)
Published:
25-02-2017
Articles
Design of GSM based Voice Data Processing Using Bone Conduction Principle
R. Arjun, R. Gowtham, G. Gokul, K. Subbulakshmi
1-8
PDF
Analysing and Improving T.O.D Effect on Ultra Long Haul High Bit Rate Optical Communication System
K. Subbulakshmi, R.S. Sidharthraj
9-18
PDF
New Source of Electricity Using Speed Arresters
K. Subbulakshmi, S. Saravana
19-25
PDF
Efficient Cloud Platform Providing an Omnipresent Healthcare Services
R. Elankavi, Dr.R. Udayakumar
26-34
PDF
Secure and Efficient Way of Handling Medical Records in Cloud
R. Elankavi, Dr.R. Udayakumar
35-43
PDF
Multiple Relay Orthogonal Frequency Division Multiplexing for Total throughput Maximization
R. Elankavi, Dr.R. Udayakumar
44-51
PDF
Dynamic Web Page Security Using Fingerprint and Card System
R. Elankavi, Dr.R. Udayakumar
52-57
PDF
Voice Command Execution with Speech Recognition and Synthesize
R. Elankavi, Dr.R. Udayakumar
58-63
PDF
Refining Service Delay Using Temporal Task Scheduling for Profit Maximization in Hybrid Cloud
R. Elankavi, Dr.R. Udayakumar
64-72
PDF
Women’s Safety System Using IBEACON Technology
R. Elankavi, Dr.R. Udayakumar
73-92
PDF
Captcha as a Graphical Passwords - A New Security Primitive based on Hard AI Problems
R. Elankavi, Dr.R. Udayakumar
93-100
PDF
A Novel Group Testing (GT) - based Approach Deployed on Back-End Servers
G. Michael, R. Kavitha
101-110
PDF
A Secure Transmission of Multiple Specialized Secret Sharing Scheme
G. Michael, R. Kavitha
111-117
PDF
Security and Privacy in Distributed Systems through Multifactor Authentication
G. Michael, R. Kavitha
118-124
PDF
To Achieve Source Anonymity in Wireless Network Using Network Coding
G. Michael, R. Kavitha
125-131
PDF
To Detect Attacks against High throughput Multicast Routing Protocol in Wireless Mesh Networks
G. Michael, R. Kavitha
132-139
PDF
Building Dictionary for Identifiers FROM Source Code Written in Object Oriented Language
G. Michael, R. Kavitha
140‐148
PDF
Peer-to-Peer and Distributed System Measurement Request Patterns
G. Michael, R. Kavitha
149-160
PDF
Performance Analysis of Transport Protocol for Video Traffic (MPEG-4) Over WiMax
G. Michael, R. Kavitha
161-170
PDF
Reliable Data Delivery in MANET Using POR
G. Michael, R. Kavitha
171-178
PDF
Broadcast Perception of Integral Data Warehouse Using Assimilated Algorithm
D. Jeyapriya, S. Theivasigamani
179-184
PDF
Precip Soothsaying of Analyzing Data Networks
D. Jeyapriya, R. Elankavi
185-189
PDF
Sensor Network Security Using Sensor Node Technology
D. Jeyapriya, S. Theivasigamani
190-195
PDF
Image Segmentation for a Hierarchical and Scalable Model
K. Anita Davamani, S. Amudha
196-202
PDF
Tamil Character Recognition
K. Anita Davamani, S. Amudha
203-209
PDF
Enhancing the Embedding Capacity in Line-based Cubism-Like Image
K. Anita Davamani, S. Amudha
210-215
PDF
Mobile Replica Node Attack Detection in Wireless Sensor Networks
K. Anita Davamani, S. Amudha
216-223
PDF
Texture Classification based on DLBP
K. Anita Davamani*, S. Amudha
224-234
PDF
Improving Dormant Matching Accuracy through Multiple Features
K. Anita Davamani, S. Amudha
235-245
PDF
Semantic Web Analysis Using Web Services
K. Anita Davamani, S. Amudha
246-258
PDF
Secure Multiparty Protocols
K. Anita Davamani, S. Amudha
259-264
PDF
Avoiding Traffic Congestion Using Position based and Cognitive Radio in VANET
K. Anita Davamani, S. Amudha
265-273
PDF
Ontology based Personalized Mobile Search Engine
K. Anita Davamani, S. Amudha
274-280
PDF
Wormhole Attack Detection in Geographic Routing Protocol
K. Anita Davamani, S. Amudha
281-290
PDF
Proxy Re-encryption Scheme for Decentralizes Erasure Code for Defending the Distributed System
K. Anita Davamani, S. Amudha
291-295
PDF
Methods for the Estimation of Ellagic Acid and Curcumin in Antidiabetic Herbal Formulations – A Review
Megha Ashesh Shah, Harsha Patel, Hasumati Raj
295-311
PDF
Determination of Zinc, Copper, and Mercury in Water Samples by Using Novel Micro Cloud Point Extraction and UV-Vis Spectrophotometry
Elham Ghasemi, Massoud Kaykhaii
313-324
PDF
Stability Indicating High Performance Thin Layer Chromatographic Determination of Alogliptin Benzoate as Bulk Drug and in Tablet Dosage Form
Padmanabh B. Deshpande, Santosh R. Butle
325-335
PDF
A Concise Review on Analytical Profile of Valsartan
Atul A. Shirkhedkar, Suraj R. Chaudhari, Amod S. Patil, Sanjay J. Surana
337-364
PDF
Determination of Albendazole in the Presence of its Alkaline Degradation Product Using TLC-Densitometric and Chemometric Methods: A Comparative Study
Khalid Abdel-Salam Attia, Ahmad Abdel-Halim Mohamad, Mohamed Saleh Emara
365-383
PDF
Development and Validation of RP-HPLC Method for the Simultaneous Determination of Amiloride Hydrochloride and Furosemide in Pure and Pharmaceutical Dosage Form
Jinal N. Tandel
385-394
PDF
Development and Validation of Stability Indicating RPHPLC Method for Simultaneous Estimation of Beclomethasone Dipropionate and Clotrimazole
Santosh Vilaschand Gandhi, Abhishek D. Ogale
395-404
PDF
Determination of 238PU and 239+240PU in Marine Sediment Using Alpha Spectrometry
Noor Fadzilah Yusof, Jalal Sharib, Nurrul Assyikeen Md. Jaffary
405-416
PDF
Design of Experiments Based Validated HPTLC Method for Quantification of Oxybenzone and Avobenzone in Personal Care Products
J. Kavitha, K. S. Lakshmi
417-428
PDF
Tin Electrodeposition from Sulfuric Acid Solution Containing Nigella Sativa Essential Oil Added
Benabida Abdelillah, Mohammed Cherkaoui
429-442
PDF
A Study of Routing Protocols and Asynchronous Attack Patterns in Mobile Ad-Hoc Networks
Dr.C. Rajabhushanam, Sulekha Kumara
443-449
PDF
Thick Client Web Application Prototype
Dr.C. Rajabhushanam, V. Sundar
450-455
PDF
Loading...