| Home | Journals | Special Issues | Conferences | Contact us |


ANAS Volume 10, Number 5: May, 2016

----------------------------------------------------------------------------------------------------------------------------------
Analysis of Decentralized On Demand Cross Layer in Cognitive Radio Ad Hoc Network

A.Sri Janani, K.Immanuvel Arokia James

1-5

----------------------------------------------------------------------------------------------------------------------------------

Enhancing Utility and Privacy using tcloseness For Multiple Sensitive Attributes

S.Saraswathi, PG Scholar, Mr.K.Thirukumar, M.E,Assistant Professor

6-13

----------------------------------------------------------------------------------------------------------------------------------

Monoidal Norm Based Propositional Fuzzy Technique in Data Leak Detection

M.Rajasekar, K. Joshua Babu Rao, M.Prabakar

14-19

----------------------------------------------------------------------------------------------------------------------------------

Localization with Mobile Anchor Points Using Wireless Sensor Networks

V.Savitha and M.Rajesh Khanna

20-25

----------------------------------------------------------------------------------------------------------------------------------

Secure Multi Owner Data Sharing With Virtual Password Mechanism in Cloud

Sujitha R, Sharavanan S, Thangadurai K and Balajee R M

26-31

----------------------------------------------------------------------------------------------------------------------------------

Comprehensive Survey on Semantic Web Service Discovery and Composition

K. Venkatachalam, N.K. Karthikeyan, S. Kannimuthu

32-40

----------------------------------------------------------------------------------------------------------------------------------

Cipher Text-Policy Abe Scheme With Efficient Verifiable Outsourced Decryption

SOWMYA J, SHARAVANAN S and BALAJEE R M

41-47

----------------------------------------------------------------------------------------------------------------------------------

Quantitative Prespective Transaction Of Keys Based Service Providers When
Encryption Occurs

A.Nazreen Banu and A.Sushanthi, 3S.Vinod

48-52

----------------------------------------------------------------------------------------------------------------------------------

Multiview Face Tracking In Videos Using Clustering And Tracklet Linking Technique

A.Vivek Yoganand and S.H.Annie Silviya

53-58

----------------------------------------------------------------------------------------------------------------------------------

Adaptive Modeling On Satellite Image Processing Information Extraction Using
Knowledge Fusion Mining

E.Jayasowbaghyam., K.Nithya.M.Tech.

59-67

----------------------------------------------------------------------------------------------------------------------------------

Data Cleansing using Automated Extraction Tools

S.Rajarajeswari and K.Somasundaram

68-78

----------------------------------------------------------------------------------------------------------------------------------

Finding Experts In Collaborative Environment For Gaining Better Knowledge

A.Sangeetha, C.Bhuvaneshwari, P.Selvaraj, A.Kumaresan, K.Vijayakumar

79-84

----------------------------------------------------------------------------------------------------------------------------------

An Efficient Business Intelligence Tool It Asset Management And Maintenance System
Using Ibm Maximo 7.5 Intelligent Suite

Mr.S.S.Aravinth, N.Vanitha, M.Mangaiyarkarasi, R.Menagadevi, S.Menaka

85-89

----------------------------------------------------------------------------------------------------------------------------------

Power Efficient Algorithm for Energy Harvesting in Sensor Networks

V.C.Edwin Britta and N.Insozhan

90-96

----------------------------------------------------------------------------------------------------------------------------------

Detection Of Isolation Attack Using Olsr Protocol On Manet

G.Devi Iswarya, V.lakshmipriya, M.Senthil, A.Kumaresan PG Scholar, Professor, Associate Professor

97-101

----------------------------------------------------------------------------------------------------------------------------------

Analyzing the Risk of Diabetes Mellitus using Patient EMR by Association Rule Mining

C. Bhuvaneshwari, A. Sangeetha, K. Vijayakumar and A. Kumaresan

102-106

----------------------------------------------------------------------------------------------------------------------------------

Intelligent Information Extractor Mechanism and Validating Image in Electrocardiographic Data

T. Suganthi and Mr.R.Karthikeyan M.E,(Ph.D)

107-111

----------------------------------------------------------------------------------------------------------------------------------

An EEG-Based Accurate Biometric Identification Using Back Propagation Network

Vinothini V. and Mr. Premnath G.

112-116

----------------------------------------------------------------------------------------------------------------------------------

Self-adjustable MapReduce Slot Configurations for Hadoop Clusters

P. Ramarajpandiyan and R. Dharmaraj

117-123

----------------------------------------------------------------------------------------------------------------------------------

Efficient Utilization of Cluster Resources Using Hfsp Size Based Scheduling

R. Gayathri, D. Durga Devi, S. Vinothini, K. Baskar and A. Kumaresan

124-128

----------------------------------------------------------------------------------------------------------------------------------

Multiple Secret Keys Based Security For Vehicular Adhoc Network

V. Lakshmi Priya, G. Devi Iswarya, M. Senthil and A. Kumaresan

129-133

----------------------------------------------------------------------------------------------------------------------------------

Enhanced Security Mechanism using Multistep Authentication for PHR in Cloud

S.Vidya, S. Sakthi Abirami and G.D. Sathya Priya

134-138

----------------------------------------------------------------------------------------------------------------------------------

Data Prediction in Hierarchy using Wireless Sensor Network

Durga Devi D., Vinothini S., Gayathri R., Archana S. and Kumaresan A.

139-142

----------------------------------------------------------------------------------------------------------------------------------

Protocol Based Verification and Authentication for Multi-Tasking Server in DUOS System

Sridevi and Ganesh kumar

143-150

----------------------------------------------------------------------------------------------------------------------------------

Deadline and Dynamic Slot Allocation for Mapreduce Clusters

S. Janani and G.R. Anantha Raman

151-158

----------------------------------------------------------------------------------------------------------------------------------

A Collaborative Filtering Approach for Service Based Recommender Systems using Big Data

P. Deepika and G.R. Anantha Raman

159-165

----------------------------------------------------------------------------------------------------------------------------------

A Cluster Based Self Adaptive Mapreduce Scheduling Algorithm in Hadoop

R.Thangaselvi, R.Aruna and S.AnanthaBabu

166-171

----------------------------------------------------------------------------------------------------------------------------------

Application of L- NAM Speech in Voice Analyser

A.Kumaresan, P.Selvaraj, N.Mohankumar, S.Mohanraj and M.Suresh Anand

172-179

----------------------------------------------------------------------------------------------------------------------------------

Recognition and Translation of Sign Language Using SVM

M. Suresh Anand, S. Mohanraj, P. Selvaraj, K. Vijaya Kumar and A. Kumaresan

180-185

----------------------------------------------------------------------------------------------------------------------------------

Secure Data and Network Traceability for Performance Expansion

Bala Sugirtha S, John Justin Thangaraj S, Jeya Priya M

186-191

----------------------------------------------------------------------------------------------------------------------------------

Human Disaster Avoidance Using Virtually Controlled Robotic Arm

S.Vinothini, R.Gayathri, D.Durga Devi, A.Kumaresan, K.Vijayakumar

192-197

----------------------------------------------------------------------------------------------------------------------------------

To Secure A Big Data In Cloud Using Data Integrity Protection

Jeya Priya M., Dr.A.Rengarajan, Bala Sugirtha S

198-204

----------------------------------------------------------------------------------------------------------------------------------

Reduction of Code Reuse Attacks Using Code Randomization and Recursive Traversal
Algorithm

K. Krishna priya and Dr.P.Murugeswari

205-211

----------------------------------------------------------------------------------------------------------------------------------

Wireless Communication Security Through Symbol Obfuscation In Physical Layer

S. Niranjani and R. Nirmalan

212-216

----------------------------------------------------------------------------------------------------------------------------------

Twin Cloud Deduplication Scheme Based on User’s Privileges

S. karthikaiselvi and R. Dharmaraj

217-222

----------------------------------------------------------------------------------------------------------------------------------

An Efficient Proxy Re-Signature Technique for Preserving Data Integrity in Cloud

M.Nithya, S.R.Thahamina, M.Sandhiya

223-227

----------------------------------------------------------------------------------------------------------------------------------

Comparison Of Computer Aided Diagnostic System For Wireless Capsule Endoscopy
Images Using Various Filters

P.Elamathi,MIEEE, P.ShanmugaSundaram, N. Santhiyakumari

228-234

----------------------------------------------------------------------------------------------------------------------------------

 
© 2007, AENSI Publications