1V3I2627635
Security Model for Healthcare Application In Cloud Computing
Author(s): Kanchana.E, Vasanthi.K
1V3I2636640
Software Effort Estimation Using Scott Knott Test
Author(s): Sujitha.M, Sivakumar.N
1V3I2641650
Fuzzy Based Energy Competent Cluster Head Selection in Wireless Sensor Networks
Author(s): Veni Devi Gopal, Radika Devakumar, Niranjana Palaniyappan, Nivethika Ramachandran
1V3I2651656
Augmenting Financial Inclusion through Mobile Phone Using USSD Application
Author(s): Bhuvaneswari.R, Murali.D, Kumaresan.A
1V3I2657662
Graphical Password Authentication Using for Multistage Image Recognition Captcha
Author(s): Anitha.M, Mahalakshmi.B
1V3I2663669
SEMANTIC BASED DATA STORAGE WITH NEXT GENERATION CATEGORIZER
Author(s): Ragavan.A, Vijayakumar.K, Kumaresan.A
1V3I2670675
Security Defence Decision in Mobile Ad hoc Networks
Author(s): Manimozhi.V, Nandhakumar.G, Kumaresan.A
1V3I2676684
SUBJECTIVE AND OBJECTIVE TRUSTED BINARY AND CONTINUOUS INFERENCE MODELS FOR WEB SERVICE QOS
Author(s): Premalatha.S,Rajesh.A,Kumaresan.A
1V3I2685690
AN EFFICIENT METHOD TO DETECT AND PREVENT SYBIL ATTACK
Author(s): Balamalathy.N, Parvathi.S, Kumaresan.A
1V3I2691694
STATISTICAL TRAFFIC ANALYSIS FOR ROUTING PROTOCOL ON MANETs
Author(s): Abinaya.M, Vasanthi.R