International Journal of Computer Science and Engineering Communications

List of Articles 2015

Volume 3, Issue 1

PAPER ID
TITLES
1V3I1606612
Implementation of WSN in Disaster Detection and Monitoring
Author(s):  A.YOGANANTH, V.G.RAJARAMYA,R.GOMATHI
1V3I1613620
Implementation of Wireless Sensor in Coal Mine Safety System
Author(s):  R.MUTHAIYAN, V.G.RAJARAMYA, A.BILOMIN RAMYA
1V3I1621626
Control and Energy Monitoring Scheme for a Stand-Alone Wind Energy Conversion System
Author(s):  Abdu Samad P K, C. Ganesh

Volume 3, Issue 2

1V3I2627635
Security Model for Healthcare Application In Cloud Computing
Author(s):  Kanchana.E, Vasanthi.K
1V3I2636640
Software Effort Estimation Using Scott Knott Test
Author(s):  Sujitha.M, Sivakumar.N
1V3I2641650
Fuzzy Based Energy Competent Cluster Head Selection in Wireless Sensor Networks
Author(s):  Veni Devi Gopal, Radika Devakumar, Niranjana Palaniyappan, Nivethika Ramachandran
1V3I2651656
Augmenting Financial Inclusion through Mobile Phone Using USSD Application
Author(s):  Bhuvaneswari.R, Murali.D, Kumaresan.A
1V3I2657662
Graphical Password Authentication Using for Multistage Image Recognition Captcha
Author(s):  Anitha.M, Mahalakshmi.B
1V3I2663669
SEMANTIC BASED DATA STORAGE WITH NEXT GENERATION CATEGORIZER
Author(s):  Ragavan.A, Vijayakumar.K, Kumaresan.A
1V3I2670675
Security Defence Decision in Mobile Ad hoc Networks
Author(s):  Manimozhi.V, Nandhakumar.G, Kumaresan.A
1V3I2676684
SUBJECTIVE AND OBJECTIVE TRUSTED BINARY AND CONTINUOUS INFERENCE MODELS FOR WEB SERVICE QOS
Author(s):  Premalatha.S,Rajesh.A,Kumaresan.A
1V3I2685690
AN EFFICIENT METHOD TO DETECT AND PREVENT SYBIL ATTACK
Author(s):  Balamalathy.N, Parvathi.S, Kumaresan.A
1V3I2691694
STATISTICAL TRAFFIC ANALYSIS FOR ROUTING PROTOCOL ON MANETs
Author(s):  Abinaya.M, Vasanthi.R

Volume 3, Special Issue 2

1V3I2695700
Multiple Aspect Ranking Using Sentiment Classification for Data Mining
Author(s):  N.Anandhi, R.Vasanthi
1V3I2701704
Effective Cloud Search Based on Multi Keyword Ranked Over Encrypted Cloud Data
Author(s):  S.Sasikala, A.Joseph Selva Kumar
1V3I2705713
An Efficient Energy Storage System Fed by Permanent Magnet Synchronous Generator Based Wind Energy Conversion System
Author(s):  Vignesh Raja.B, Sridhar.M
1V3I2714721
RTCP CRAHN: A Renovated Transport Control Protocol for Cognitive Radio Ad Hoc Networks
Author(s):  Prabu.V, Divya.K
1V3I2722727
Neural Network Training for Efficient Resource Sharing in Cloud
Author(s):  Saranyadevi.C, G.Vijayanand
1V3I2728740
Low Power Design of Johnson Counter Using DDFF Featuring Dual Mode Logic
Author(s):  M.R.Sangameswari, V.Vishnuprasath
1V3I2741747
Detecting the Originality of Biometric Details Using Image Quality Assessment
Author(s):  S.Swarthy, A.Amali Angel Punitha
1V3I2748756
Cascaded Multilevel Inverter for Induction Motor Drive
Author(s):  Suganya.S, Ravichandran .S
1V3I2757762
Build Efficient Query Services in the Cloud with RASP and Range Queries
Author(s):  Balamalathy.N, Parvathi.S, Kumaresan.A
1V3I2763770
Data Analysis Classifier Model for Prediction of Human Ailments Using Artificial Neural Network
Author(s):  T.Rajasekaran
1V3I2771775
Detecting Tuberculosis in Chest Radiographs Using SVM Classifier
Author(s):  Yalini Priya.R,A.Priya
1V3I2776780
A Network Lifetime Enhancement using Multi Heuristic Algorithm in WSN
Author(s):  Niraimathi.R, Sasikala.M
1V3I2781786
An Efficient Data Explore Scheme with Multiple DHT in Mobile Wireless Networks
Author(s):  K.Lavanya, K.S.Thirunavukarasu
1V3I2787792
Ensuring interoperability between IPv6 and IPv4 Networks and Analysis on Quality in Network
Author(s):  Nithya.O, Venkatesh Kumar.U
1V3I2793801
Deadline Based Execution of Scientific workflows on IaaS Clouds using Resource Provisioning and Scheduling Strategy
Author(s):  D.Silpa, A.Sudha, P.M.Gajalakshmi, A.Kalaivani
1V3I2802807
Spatial-Temporal email Malware Propagation by using OLSR Protocol
Author(s):  M.Vijayapriya, N.Anandh
1V3I2808814
Extended Functional Minimum-Storage Cooperative Regenerating for Cloud Bandwidth Problem
Author(s):  M.Nithya, K.Sasireka
1V3I2815820
Design and Analysis of Adiabatic Logic Based Frequency Divider
Author(s):  Bhavya.K, K.Praveen Kumar, B.Prasanalakshmi
1V3I2821828
Superior Seclusion over Confirmation of K-Nearest Neighbor Enquiry on Spatial Network
Author(s):  V.Srilakshmi, P.Dhamodharan
1V3I2829834
Fault Secure Memory Using Modified Decimal Matrix Code
Author(s):  Kavitha.A, Ramasathu.L
1V3I2835839
Enhancing Recommender System for Matrimonial Sites using Collaborative Filtering Method
Author(s):  Sampath.M.K, Nithya.C, Mohana Priya.R
1V3I2840847
Defending Shoulder Surfing Attacks in Secure Transactions using Multi Color Technique
Author(s):  M.R.Divya,A.P.Janani
1V3I2848853
Anonymous Access Control by SAPA in Cloud Computing
Author(s):  A.Gomathi, P.Mohanavalli
1V3I2854861
Remote Data Auditing Scheme in Secured Cloud Storage Environment
Author(s):  Sangeetha.T,Saranya.M
1V3I2862865
Privacy and Secure rescindable information Access management in Multi-Authority Cloud
Author(s):  R.Bhavani, R.Vasanthi
1V3I2866869
Qos and Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications
Author(s):  T.Sasikala, S.Jaya Sundar
1V3I2870880
Wlan Power Save with offset Listen Interval for Machine to Machine Communications
Author(s):  Prakash.T
1V3I2881884
Secure Data Sharing With Data Integrity in Public Clouds Using Mediated Certificate-Less Encryption
Author(s): P.Renukadevi , A.Josephselvakumar
1V3I2885888
Fine Grained updates with Consignment Auditing of Dynamic Bigdata Storage on Cloud
Author(s):  G.Navaneetham, K.Gandhimathi
1V3I2889892
Scalable Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
Author(s):  A.Keerthana, S.JayaPrakash
1V3I2893898
Distributed Client Tracker in Manet
Author(s):  G.Prabhakaran, P.Sivakumar
1V3I2899902
Application specific Anonymization and Privacy – Preserving Access Control Mechanism for Relational Data
Author(s):  T.Monika, S.JayaPrakash
1V3I2903909
Secure and Efficient Sharing of Resources in Dynamic Harmony Platform for Collaborative Cloud Computing
Author(s):  Senthilvadivu.K, Rasi.D

Volume 3, Issue 3

1V3I310061012
A Strong Key Pre Distribution Scheme for Wireless Sensor Networks
Author(s):  Rajender Gajula,Balaram.A
1V3I310131020
Auditing Protocol for Secured Data Storage in Cloud
Author(s):  Sunitha.B,Suresh Babu.K
1V3I310211025
Online Social Network and Cloud Based Video Sharing System
Author(s):  Santhia.R.K,Thilagamani.R
1V3I310261033
Enforcing Access Control to Cloud With Preserved Users Privacy
Author(s):  Sabitha.D,Babu.M.C
1V3I310341039
Multi Sensor Fusion Model for Detecting Movements of a Target in Wireless Sensor Networks
Author(s):  Sasikala.T,Sibiya.I
1V3I310401046
Mining Techniques for Clinical Expert System and Predicting and Treating Lung Cancer with Big Data
Author(s):  Naveenkumar.N,Selvavinayagam.G
1V3I310471051
A Study on the Energy Efficient Path Selection Protocols in Wireless Sensor Network
Author(s):  Manopriya.P.C,Sugashini.S

Volume 3, Issue 4

1V3I412101215
A Mechanism to Inhibit Unsolicited Texts from OSN User Walls
Author(s):  Raja.K,SureshBabu.K,Manikandan.R
1V3I412161219
Secure Collaboration Framework for Multicloud Systems
Author(s):  Radha Devi.G,Babu.M.C
1V3I412201223
Online Review Mining for Forecasting Sales
Author(s):  Pandi.C,Suresh Babu.K
1V3I412241228
Frequent Pattern Mining in Big Data
Author(s):  Nagaraju.T,Subhashini.P
1V3I412291234
Extraction of Business Contracts and Temporal Constraints in Business Events
Author(s):  Angelin Jeba Linta.L.T,P.Subhashini
1V3I412351239
Data Hiding in Compressed Video using Motion Vector
Author(s):  Mahalakshmi.S,Subhashini.P

Volume 3, Issue 5

1V312401245
Intelligent Control of Induction Motor
Author(s):  V.Sakthi, A.Sivasubramanian

Volume 3, Issue 6

1V3I612461256
Analysis of Single Switch, CUK/SEPIC based Multi-Port Converters
Author(s):  Kishore C K, Ramesh GP
1V3I612571264
Torque and Flux Ripple Reduction of Direct Torque Control for Induction Motor Using Intelligent Technique
Author(s):  V.Sakthi,A.Sivasubramanian