| Home | Journals | Special Issues | Conferences | Contact us |


ANAS Volume 9, Number 6: Special (Intelligent computing), 2015

----------------------------------------------------------------------------------------------------------------------------------

A Framework for An Intelligent Job Migration in Hybrid Cloud Environment

Vijayanand K.S. and T.Mala

1-6

----------------------------------------------------------------------------------------------------------------------------------

A Hierarchical Attribute Based Privacy Preserving in Cloud Data Sharing

P.Iyappan, A.Anushka, T.Anitha and B.Shanthiya

7-13

----------------------------------------------------------------------------------------------------------------------------------

A Hybrid Bee swarm Optimized Multicast Routing for Reducing Packet Loss in VANET

R.Vanitha, A.Martin, A.Ramalingam and J.Madhusudhanan

14-18

----------------------------------------------------------------------------------------------------------------------------------

Hybrid Method Based Feature Selection using Simulated Annealing and Fuzzy
Clustering Techniques

Aneetha A.S. and Bose S.

19-23

----------------------------------------------------------------------------------------------------------------------------------

Classification of Multi-dimensional Thyroid Dataset Using Data Mining Techniques:
Comparison Study

D. Senthilkumar, N. Sheelarani and S. Paulraj

24-28

----------------------------------------------------------------------------------------------------------------------------------

Alzheimer Disease Classification using SVM and Multi-SVM

S. Pazhanirajan and P. Dhanalakshmi

29-34

----------------------------------------------------------------------------------------------------------------------------------

An Efficient Low Power Log Based FPU Design for FPGAs

D. Vaithiyanathan and R. Seshasayanan

35-40

----------------------------------------------------------------------------------------------------------------------------------

Hand Gesture Recognition for Deaf and Dumb people

N. Kathirvel and R. Praba

41-47

----------------------------------------------------------------------------------------------------------------------------------

A Survey on Code Clone and Detecting Techniques

R.Kavitha Kumar and G.Santhi

48-52

----------------------------------------------------------------------------------------------------------------------------------

Conserving the Battery Power of Smartphones through Computation Offloading

Vaishnavo Devi N and Saswati Mukherjee

53-58

----------------------------------------------------------------------------------------------------------------------------------

A Container Based IDS to Automatically Trace the Web-Application Related Attacks

Shahanaz Begum and G. Geetharamani

59-65

----------------------------------------------------------------------------------------------------------------------------------

Data Modelling & Analysis in Real-time Process Control

S. SriDevi MCA, M.Phil, (Ph.D.) and Dr. P. Sakthivel, B.E, M.E., Ph.D.

66-74

----------------------------------------------------------------------------------------------------------------------------------

Effective Analysis on Data Arrangement in Big Data

P. Indira Priya and A. Kannan

75-79

----------------------------------------------------------------------------------------------------------------------------------

Epidemic based Broadcasting for Vehicular Ad Hoc Networks

M. Chitra and S. Siva Sathya

80-85

----------------------------------------------------------------------------------------------------------------------------------

Extracting Features in Opinion Miningusing Inter Dependent Domain Relevance

R. Abirami and S. Ramesh

86-91

----------------------------------------------------------------------------------------------------------------------------------

Clustering Algorithm Based On Hadoop for Big Data

Jayalatchumy D. and Thambidurai P.

92-96

----------------------------------------------------------------------------------------------------------------------------------

Identifying Personality Traits among Peers in Collaborative Learning Environment

Shri Vindhya and T.Mala

97-101

----------------------------------------------------------------------------------------------------------------------------------

Privacy Preserving Database and Classification of Multidatabase Mining

Keerthana G., Sandhya P. and Varun R.

102-103

----------------------------------------------------------------------------------------------------------------------------------

Energy Based Attack Detection in Virtual Environment Using COSMIC FFP

Anand R. and Dr. S. Saraswathi

104-110

----------------------------------------------------------------------------------------------------------------------------------

Available Bandwidth Estimation Through Link Prediction (LP-ABE) in MANET

Gnana Prakasi O.S., Dr. Varalakshmi P. and Janani J.

111-116

----------------------------------------------------------------------------------------------------------------------------------

Indexing and Retrieval of Speech using Perceptual Linear Prediction and Sonogram

R. Thiruvengatanadhan and P. Dhanalakshmi

117-122

----------------------------------------------------------------------------------------------------------------------------------

Intelligent Trust Based Temporal Data Storage and Retrieval Methods for Cloud Databases

Muthurajkumar Sannasy, Vijayalakshmi Muthuswamy and Kannan Arputharaj

123-128

----------------------------------------------------------------------------------------------------------------------------------

Performance Evaluation and Characterization of IO Workload Analysis using Data
Mining Algorithms

N.Krishnamoorthi, Dr.G.K.Kamalam and B.Anitha

129-133

----------------------------------------------------------------------------------------------------------------------------------

Secure Data Sharing in Cloud Storage using KAC with Certificateless Encryption

Anitha R., Pandiyaraju V., Muthurajkumar S., Sai Ramesh L., Rakesh R.

134-138

----------------------------------------------------------------------------------------------------------------------------------

Collision and Transmission Range Based Routing Protocol for VANETs

Kalaivanan S. and Siva Sathya S.

139-144

----------------------------------------------------------------------------------------------------------------------------------

Learning Concepts and Relations for Incremental Ontology Learning

S. Thenmalar, B. Sathiya and Dr. T.V. Geetha

145-149

----------------------------------------------------------------------------------------------------------------------------------

Performance Evaluation of Aodv Routing Protocol Under Black Hole Attack

Dr. K. Selvakumar, N.Malarvizhi and V. Senthil Murugan

150-155

----------------------------------------------------------------------------------------------------------------------------------

A Comparative Study of Two Color Based Image Segmentation for Citrus Recognition

Thendral Amutha, Suhasini Ambalavanan and Anupriya

156-161

----------------------------------------------------------------------------------------------------------------------------------

Multi-Population Group Search Optimizationfor Function Optimization

Joshil Raj, S. SivaSathya and Sebabrata Ghosh

162-166

----------------------------------------------------------------------------------------------------------------------------------

Vision Based Recognition of American Sign Language Numbers using Combined DCTDWT
features and Machine Learning

S. Nagarajan and T.S. Subashini

167-173

----------------------------------------------------------------------------------------------------------------------------------

A Study on Reliable Service Composition Model- Research Issues and Opportunities

G. Nandhini, P.Iyappan, Dr.G. Shanmuga Sundaram, Dr.V. PrasannaVenkatesan

174-179

----------------------------------------------------------------------------------------------------------------------------------

NFR Modeling from Explicit Natural Language Requirements Specification

M. Durgadevi and S. Abirami

180-186

----------------------------------------------------------------------------------------------------------------------------------

A Framework For User Customizable Privacy Preserving Search

R. Padmanaban, Priscilla Valentine, A.Nivetha, A. Aruna

187-191

----------------------------------------------------------------------------------------------------------------------------------

Secure Data Storage Using Decentralized Access Control in Cloud

Jenifer Jayakumar, L. Sairamesh, V. Pandiyaraju, S. Muthurajkumar, R. Rakesh

192-196

----------------------------------------------------------------------------------------------------------------------------------

Clustering of Job Applications using ART Network

Praveen Joe IR and Varalakshmi P

197-203

----------------------------------------------------------------------------------------------------------------------------------

An Empirical Study of Mobility Support in Nested Mobile Networks

V. Sangeetha and Dr. P. Calduwel Newton

204-208

----------------------------------------------------------------------------------------------------------------------------------

Privacy Protection in Personalized Web Search

M. Abinaya and D. Vijay Anand

209-213

----------------------------------------------------------------------------------------------------------------------------------

Lung Tumor Detection Using Pixel Value Matching (PVM) Method

G.Vijaya, A.Suhasini, D. Dravida Selvi

214-220

----------------------------------------------------------------------------------------------------------------------------------

Eaack- A Secure Intrusion Detection System for Manets

Dr. K. Selvakumar, G. Revathi, V. Senthil Murugan

221-226

----------------------------------------------------------------------------------------------------------------------------------

An Efficient Knowledge Discovery Technique to Identify the Product of Interest for Web-buyers

S. Sandhiya and Dr. A. Kannan

227-231

----------------------------------------------------------------------------------------------------------------------------------

Implementation of DSR Protocol using Different Optimization Techniques

Dr. K. Selvakumar, N. Vijayalakshmi, V. Senthil Murugan

232-238

----------------------------------------------------------------------------------------------------------------------------------

An Intelligent Web-Fusion using Mash up Applications Based web-scale probabilistic
knowledge for Complex Operations

B. Gomathi and Dr. P. Sakthivel

239-243

----------------------------------------------------------------------------------------------------------------------------------

Multimodal Biometric Analysis against Spoofing Attacks using Image Quality
Assessment

N. Nandhini and N. Kathirvel

244-249

----------------------------------------------------------------------------------------------------------------------------------

An Ad-Hoc Algorithm For Solar Energy Harvesting In Wireless Sensor Network Nodes

Madhumitha J and Shiv Shankar SSV

250-256

----------------------------------------------------------------------------------------------------------------------------------

An Intelligent Face and Finger Recognition Using Median Filtering

M. Senthil, B. Suganya, M. Keerthy, D. Gayathri

257-262

----------------------------------------------------------------------------------------------------------------------------------

Color Feature Based Image Compression

Dr. R. PRIYA and B. ANUBALA

263-268

----------------------------------------------------------------------------------------------------------------------------------

Detection And Recognition Of Real-Time Indoor Objects Using Sift Features

R. Arunkumar, M. Balasubramanian, G. Vandhana

269-275

----------------------------------------------------------------------------------------------------------------------------------

Credit Risk Assessment Using Genetic Algorithm and Elastic Search

M. Shanmugam, D. Lavanya, T.Aswini, S. Subhasheni

276-281

----------------------------------------------------------------------------------------------------------------------------------

Content Based Image Retrieval Using Perceptual Hashing

N. Puviarasan, R. Bhavani, P. Aruna, M. Sindhiya

282-287

----------------------------------------------------------------------------------------------------------------------------------

An Overview of Data Warehousing and OLAP Technology

E.Rajakumar and Dr. R.Raja

288-296

----------------------------------------------------------------------------------------------------------------------------------

Deduplication In Cloud Backup Services Using Geneic Algorithm For Personal Computing Devices

P Neelaveni, M Vijayalakshmi, K Karthick

297-303

----------------------------------------------------------------------------------------------------------------------------------

Detection of URL Based Attacks Using Reduced Feature Set and Modified C4.5 Algorithm

Rakesh, R., Muthurajkumar, S., SaiRamesh, L., Vijayalakshmi, M., Kannan A.

304-310

----------------------------------------------------------------------------------------------------------------------------------

Optimal Packet Classification Techniques for Performance Enhancement and Intrusion
Detection

Vanthana, G., Muthurajkumar, S., Sairamesh, L., Rakesh, R., Kannan, A.

311-315

----------------------------------------------------------------------------------------------------------------------------------

PROXUM: An Energy Efficient and Privacy - Aware Data Aggregation in
Heterogeneous Wireless Sensor Networks

R.J. Kavitha and Dr. B. Elizabeth Caroline

316-321

----------------------------------------------------------------------------------------------------------------------------------

Human Face Localization Using Normalized RGB Color Space

Richa Mishra and Ravi Subban

322-326

----------------------------------------------------------------------------------------------------------------------------------

Hybrid Malware Detect Memory Mapper in Kernel Centric Virtual Machine

M. Shanmugam, C. Chandni, J. Jennifer, S. Raadhuka

327-330

----------------------------------------------------------------------------------------------------------------------------------

Virtualization Environment for Reporting Logs Using Hyper Monitor Algorithm Technique

S. Anthoniraj, S. Saraswathi, M. Harini

331-337

----------------------------------------------------------------------------------------------------------------------------------

Hyperspectral Image Classification

P. Sathya and Dr. K. Vani

338-343

----------------------------------------------------------------------------------------------------------------------------------

Information Retrieval Using Collaborative Filtering and Item Based Recommendation

S. Renugadevi, T.V. Geetha, N. Murugavel

344-349

----------------------------------------------------------------------------------------------------------------------------------

Syntactic and Semantic Based Machine Translation from Tamil to English

Dr. S. Lakshmanapandian, K. Saranya, J. Durkadevi

350-353

----------------------------------------------------------------------------------------------------------------------------------

Adaptive Protocol for Energy Efficiency in Clustered Wireless Sensor Networks

Dr. K.Venkatachalapathy, S. Tamilselvan, K. Kavitha

354-359

----------------------------------------------------------------------------------------------------------------------------------

Quantifying Concept Proximity Based on Semantic Measures

R. Sunitha and G. Aghila

360-366

----------------------------------------------------------------------------------------------------------------------------------

Offline Tamil Handwritten Character Recognition Using Statistical Features

M. Antony Robert Raj and S. Abirami

367-374

----------------------------------------------------------------------------------------------------------------------------------

An Efficient Handover Optimization in Wireless Access Networks Using PCF Based
IEEE 802.21 MIH Standards

R.Tamilselvi, C. Hepzibah, Dr. G. Sivaradje

375-380

----------------------------------------------------------------------------------------------------------------------------------

Improved Ultra High Frequency Design of RFID Patch Antenna

Thirumalai, T. and Kashwan, K.R.

381-384

----------------------------------------------------------------------------------------------------------------------------------

Design and Verification of Pervasive System Security

S. Geetha, Dr. J. Madhusudanan, Dr. V. Prasanna Venkatesan, Dr. A. Martin

385-390

----------------------------------------------------------------------------------------------------------------------------------

Efficient Illumination Correction for Camera Captured Image Documents

Saranraj and Venkateswaran

391-396

----------------------------------------------------------------------------------------------------------------------------------

A Novel Cricket Chirping Algorithm for Engineering Optimization Problem

Jonti Deuri and S. Siva Sathya

397-402

----------------------------------------------------------------------------------------------------------------------------------

Content Based Image Search and Retrieval Using Multi Sort Indexing

N. Puviarasan, R. Bhavani, R. Hemavathi

403-408

----------------------------------------------------------------------------------------------------------------------------------

Scale Independent Query Processing using Optimal Access Schema

S. Anuja, M. Monisha Devi, Dr. Radha Senthilkumar

409-415

----------------------------------------------------------------------------------------------------------------------------------

A Survey on Trust Management in Cloud Computing

T. Judgi and Dr. P. Varalakshmi

416-420

----------------------------------------------------------------------------------------------------------------------------------

Review of Security Threats and its Countermeasures in Mobile Adhoc Networks

A. Geetha and Prof. N. Sreenath

421-425

----------------------------------------------------------------------------------------------------------------------------------

A Novel Approach for Converting 2D into 3D Images Using Hough Feature Extraction
Technique

P.S. Ramesh and S. Letitia

426-434

----------------------------------------------------------------------------------------------------------------------------------

Segmentation of Medical Images Based on Probabilistic Markov Random Field Model

P Sophia and N Venkateswaran

435-440

----------------------------------------------------------------------------------------------------------------------------------

Stable Link in VANET using Receiver Based Multicast Routing Protocol

Suganya, R, Saravanan, D, Kumarakrishnan, S, Premkumar, K

441-445

----------------------------------------------------------------------------------------------------------------------------------

A Survey on the Protocols of Vehicular Ad-Hoc Networks

Dr. R. Kalpana, A. Thenmozhi, V. Vijay, G. Siva Subramanian

446-450

----------------------------------------------------------------------------------------------------------------------------------

An Efficient Method to Manage Datasets in Large Database using Clustering Process

Dr. K. Venkatachalapathy, V.S. Thiyagarajan, R. Sumithra

451-457

----------------------------------------------------------------------------------------------------------------------------------

Summarization Based on Product Review using Intrinsic and Extrinsic Domain Relevance

J. Jayabharathy, S. Subathra and B. Srinivasan

458-464

----------------------------------------------------------------------------------------------------------------------------------

Life Time Enhancement of Nodes by Reducing Power Consumption in Cockroach
Network Using DSR – A Survey

Y. Archana and Dr. P. Sivakumar

465-469

----------------------------------------------------------------------------------------------------------------------------------

A Bayesian Gaussian Approach for Video Streaming in Mobile Cloud Computing

Tamizhselvi.S.P. and Vijayalakshmi Muthuswamy

470-477

----------------------------------------------------------------------------------------------------------------------------------

Centralised and Decentralised Precoding Framework in Multi User-Mimo Wireless
Communication

S. Upasana, S. Markandan, N. Venkateswaran

478-485

----------------------------------------------------------------------------------------------------------------------------------

Applying Vector Space Model for Poetic Emotion Recognition

Sreeja, P.S. and G.S. Mahalaksmi

486-490

----------------------------------------------------------------------------------------------------------------------------------

Centrality Measure Based Classification of Schizophrenia Disorder from Resting State
Functional Magnetic Resonance Images

R. Geetha Ramani and K. Sivaselvi

491-496

----------------------------------------------------------------------------------------------------------------------------------

Classification and Comparison of Ontology Matching Systems

Saruladha, K. and Arthi, J.

497-505

----------------------------------------------------------------------------------------------------------------------------------

Intelligent Texture Feature Extraction and Indexing for MRI Image Retrieval Using
Curvelet and PCA with HTF

Dr. K. Rajakumar, Dr. S. Muttan, G. Deepa, S. Revathy, B. Shanmuga Priya

506-512

----------------------------------------------------------------------------------------------------------------------------------

Enhancement of Gaussian Noise Affected Images Using Modified Threshold Function in
Curvelet Domain

P.M. Shivakumara Swamy and K. Vani

513-517

----------------------------------------------------------------------------------------------------------------------------------

Modified Rock (MROCK) Algorithm for Clustering Categorical Data

Dr. K. Saruladha and P.V. Likhitha

518-524

----------------------------------------------------------------------------------------------------------------------------------

Multimodal Biometric Key Generation for Cryptographic Security using Face and Iris

Balamurugan, G., Dr. K.B. Jayarraman, Arulalan, V., Lokesh, V.

525-530

----------------------------------------------------------------------------------------------------------------------------------

Multimodal Biometric Systems Using Multiscale Transform Based Fusion

S. Anu H. Nair and Dr. P. Aruna

531-538

----------------------------------------------------------------------------------------------------------------------------------

Environmental Sound Classification using Discrete Wavelet Transform

T. Lenin and P. Dhanalakshmi

539-544

----------------------------------------------------------------------------------------------------------------------------------

Language Independent Categorization of Documents Based on the Domain

Hanumanthappa M and Narayana Swamy M

545-548

----------------------------------------------------------------------------------------------------------------------------------

Mining Sentiments and Sequential Rules for Event Prediction

P.G. Preethi and V. Uma

549-554

----------------------------------------------------------------------------------------------------------------------------------

Ontology Assisted Data Mining and Pattern Discovery Approach: A Case Study on
Indian School Education System

Prokriti Roy, S. Siva Sathya, Naveen Kumar

555-560

----------------------------------------------------------------------------------------------------------------------------------

Sign Gesture Representation Using and-Or Tree

D. Narashiman and Dr. T. Mala

561-567

----------------------------------------------------------------------------------------------------------------------------------

New Real Coded Crossover Operators for Genetic Algorithms Based on Incomplete
Dominance and Gene Memory

G. Pavai and T.V. Geetha

568-573

----------------------------------------------------------------------------------------------------------------------------------

The COLLID Based Intrusion Detection System for Detection against DDOS Attacks
using Trust Evaluation

Poongodi, M and S. Bose

574-580

----------------------------------------------------------------------------------------------------------------------------------

Improving Content Personalization through Ant Optimization in E-Learning

Dr. N. Sivakumar, R. Praveena, S. Saranya

581-586

----------------------------------------------------------------------------------------------------------------------------------

Edge Based Video Compression using Modified SOM Approach for Surveillance Services

G. Suresh, P. Epsiba, S. Subathra, N. Kumaratharan

587-592

----------------------------------------------------------------------------------------------------------------------------------

Automatic Survey Template Generation Using Research Relations

G. Manju, S. Deepa, A. Gayathri, M. Suganya, T.V. Geetha

593-599

----------------------------------------------------------------------------------------------------------------------------------

Automatic Retinal Vessel Segmentation through Gabor Filtering, Principal Component
Analysis and Ensemble of Classifiers (C4.5 with Bagging)

R. Geetha Ramani and Lakshmi Balasubramanian

600-606

----------------------------------------------------------------------------------------------------------------------------------

Cross Layer Based Anomaly Intrusion Detection In Wireless Sensor Network

V. Srinivasan and M. Vidhya

607-613

----------------------------------------------------------------------------------------------------------------------------------

Pre-Processing and Analyzing Web Logs for Web Analytics to Improve Web
Organization

S. Uma Maheswari and Prof. Dr. S.K. Srivatsa

614-620

----------------------------------------------------------------------------------------------------------------------------------

Road Map Approach for Sensor Network Assisted Navigation in Dynamic
Environments

G. Santhi and R. Kavitha Kumar

621-626

----------------------------------------------------------------------------------------------------------------------------------

Automatic Detection of Diabetic Retinopathy Based on Color Segmentation

Manju, A. and Kamalapriya, D.

627-632

----------------------------------------------------------------------------------------------------------------------------------

A Novel Medical Support System for the Social Ecology of Cervical Cancer: A Research
to Resolve the Challenges in Pap Smear Screening and Prediction at Firm Proportion

Mrs. R. Vidya and Dr. G.M. Nasira

633-638

----------------------------------------------------------------------------------------------------------------------------------

Automatic Ontology Construction Through Decision Tree Classification Techniques

R. Geetha Ramani and S. Siva Sankari

639-644

----------------------------------------------------------------------------------------------------------------------------------

Optimal Clustering Architecture to Maximize Sensor Network Lifetime

G.Sangeeth Kumar (PG Scholar), Dr.R.Thangarajan (Professor & Head) and K.Lalitha
(Assistant Professor)

645-650

----------------------------------------------------------------------------------------------------------------------------------

File Deduplication using Genetic Programming for Efficient Cloud Storage

Santhi Baskaran and G. Madhubala

651-660

----------------------------------------------------------------------------------------------------------------------------------

Maximizing Network Life Time And Enhancing The Security In Manet Using Zrp Protocol

C.P. Darani and A. Saranya

661-668

----------------------------------------------------------------------------------------------------------------------------------

Design Of Context-Aware Interactive Voice Response System

Dr. Thirumaran M., Subham Soni, Gayathry @ Brendha G.

669-675

----------------------------------------------------------------------------------------------------------------------------------

Age Estimation In Facial Images Using Angular Classification Technique

A Deepa and DrT. Sasipraba

676-682

----------------------------------------------------------------------------------------------------------------------------------

Semantic Context Aware Authorization for Securing Data in Cloud

Auxilia M and Dr.K. Raja

683-688

----------------------------------------------------------------------------------------------------------------------------------

Stamping Layout Evaluation using Multi-Criteria Decision Analysis

Senthil. S and V.M. Gokulnath

689-693

----------------------------------------------------------------------------------------------------------------------------------

Iris Identification Based On Appearance Based Approaches – A Survey

Ravi Subban and N.Susitha

694-700

----------------------------------------------------------------------------------------------------------------------------------

Improving End To End Reliability And Latency Through Eqgor In Wsn

Dr. R.Saminathan and S. Indhumathi

701-707

----------------------------------------------------------------------------------------------------------------------------------

Verification of Soii Architecture Using Colored Petri Nets

Punitha Devi C., Dr. V. Prasanna Venkatesan, Diwahar S. and Meiappane A

708-715

----------------------------------------------------------------------------------------------------------------------------------

Preventing Selfish Node Behaviors in MANETs Through Hierarchical ARM

Dr.R. Saminathan and C. Jenithamary

716-721

----------------------------------------------------------------------------------------------------------------------------------

A Tamper-Proof Log Architecture for Cloud Forensics

Geetha V., Udaya Ponni N.M., Devagi T.C. and Nandhini Priya M.

722-727

----------------------------------------------------------------------------------------------------------------------------------

A Generic 3-D Assisted Face Recognition Framework using Neural Network Architecture

R. Geetha Ramani, Tharun Niranjan G, Navin Ranga Eshwar U, Vishak Ayappan

728-732

----------------------------------------------------------------------------------------------------------------------------------

Speaker Segmentation Using Mfcc And Aann

M. Elakkiya and P. Dhanalakshmi

733-736

----------------------------------------------------------------------------------------------------------------------------------

 
 
© 2007, AENSI Publications