Contents IJPAM: Volume 116, No. 10 (2017)



FINGERPRINT TECHNIQUES
S. Shelgin
| download this paper (free) |


A STUDY ON VULNERABILITY DETECTION OF ATTACKS IN WEB SECURITY
S. Shelgin
| download this paper (free) |


INCLUDING DESIGNS IN ONLINE SHOPPING CLOTHING WEBSITES MANUALLY
A V Allin Geo
| download this paper (free) |


A SURVEY ON NETWORK SECURITY TECHNIQUES
Mr. A.V.Allin geo
| download this paper (free) |


DISTRIBUTED COMPUTING: SECURITY ISSUES AND CHALLENGES
A V ALLIN GEO
| download this paper (free) |


DISCOURSE RECOGNITION WITH DEEP LEARNING
A V ALLIN GEO
| download this paper (free) |


A SURVEY ON MOBILE NETWORK (5G) TECHNOLOGY
A V Allin Geo
| download this paper (free) |


A STUDY ON ANTIVIRUS SECURITY
C.Anuradha
| download this paper (free) |


KERNEL OPERATING SYSTEM: A STUDY
C.Anuradha
| download this paper (free) |


CLOUD COMPUTING APPLICATIONS:A REALISTIC POINT OF VIEW
Dr.AR.Arunachalam
| download this paper (free) |


AN APPLICATION STRUCTURE FOR INTEGRATING WIRELESS SENSOR AND ACTUATOR NETWORKS USING WEB OF THINGS TO CLOUD INTERFACE
Dr.AR.Arunachalam
| download this paper (free) |


MISSION OF SMART CITIES – CONNECTING CITIES AND TO BUILD SMART INDIA
Dr.AR.Arunachalam
| download this paper (free) |


DETECTION AND ERADICATION OF BOTNETS IN ONLINE BANKING TRANSACTIONS USING EARLY SIGNATURE DETECTION METHOD
Dr.AR.Arunachalam
| download this paper (free) |


AN PERCEPTIVEOF PUBLIC-PRIVATE KEY PAIRS
R.Velvizhi
| download this paper (free) |


A PROCEDURAL FOR THE AUGEMENTATION OF BOOLEAN LOGIC
R.Velvizhi
| download this paper (free) |


CLARIFICATION OF WEB SERVICES
R.Velvizhi
| download this paper (free) |


AN APPROACH FOR THE RESPONSIVE OF I/O AUTOMATA
R.Velvizhi
| download this paper (free) |


THE EFFECT OF FLEXIBLE INFORMATION ON E-VOTING TECHNOLOGY
R.Velvizhi
| download this paper (free) |


VERSATILE AGENT BASED MULTI-LAYER SECURITY FRAMEWORK FOR CLOUD DATA CENTER
D.Vimala
| download this paper (free) |


MOBILE LEARNING WITH GOOGLE APP ENGINE
D.Vimala
| download this paper (free) |


SYSTEM FAILURE DETECTION AND DIAGNOSIS BY ANALYZING SYSLOG AND SNS DATA: APPLYING BIG DATA ANALYSIS TO NETWORK OPERATIONS
D.Vimala
| download this paper (free) |


THICK CLIENT WEB APPLICATION PROTOTYPE
Dr.C.Rajabhushanam
| download this paper (free) |


A TRUSTED MANAGEMENT MODEL FOR SAFE CLOUD STORAGE
A V ALLIN GEO
| download this paper (free) |


AN INFORMATION METRICS BASED LOW-RATE DDOS DEFENSE MECHANISM
N.Divya Lakshmi
| download this paper (free) |


SURVEY OF DATA MINING BASED MEDICAL IMAGE CLASSIFICATION AND CONVERSION INTO 2D TO 3D
E.Fathima
| download this paper (free) |


CONSUMER SENTIMENT USING A SELF-ORGANIZING MAP ON SOCIAL MEDIA PROVIDES KNOWLEDGE IN BIO MEDICAL AND HEALTH INFORMATICS
E.Fathima
| download this paper (free) |


ENERGY OPTIMIZATION FOR WIRELESS SENSOR NETWORK THROUGH PRIORITY
J.Sridhar
| download this paper (free) |


DECISIVE LESION DETECTION IN DIGITAL FUNDUS IMAGE
Mr.K.Sivaraman
| download this paper (free) |


ONTOLOGY MATCHING TECHNIQUES USING FOR INFORMATION RETRIEVAL
Dr.K.P.Kaliyamurthie
| download this paper (free) |


"BIOMETRIC CRYPTOSYSTEM
Keerthikha.M.S
| download this paper (free) |


"CELLULAR NETWORK - WI-FI NETWORK ARCHITECTURE
Keerthikha.M.S
| download this paper (free) |


TWEET SARCASM: TWITTER
Keerthikha.M.S
| download this paper (free) |


PRESERVING IDENTIFY THE USER AND PRIVACY OF DATA USINGCLOUD
Keerthikha.M.S
| download this paper (free) |


DECOY METHOD ON VARIOUS ENVIRONMENTS – A SURVEY
S.Pothumani
| download this paper (free) |


AN APPLICATION ON BILLING SYSYTEM IN ANDROID SMART PHONE IN CODE BASED TECHNIQUES
R.Karthikeyan
| download this paper (free) |


FUZZY, PROBABILISTIC ALGORITHMS FOR ONLINE CLUSTERING ALGORITHMS
R. Kavitha
| download this paper (free) |


DECONSTRUCTING EVOLUTIONARY PROGRAMMING USING GHAT
R. Kavitha
| download this paper (free) |


A DEVELOPMENT OF IPV4 WITH SKILTY APPROACH
R. Kavitha
| download this paper (free) |


DECOUPLING BYZANTINE FAULT TOLERANCE FROM MULTI-PROCESSORS IN I/O AUTOMATA
R. Kavitha
| download this paper (free) |


TWEET SARCASM: PEEP
P.Ramya
| download this paper (free) |


ARTIFICIAL INTELLIGENCE AND ROBOTICS SYNERGY
M. Sriram
| download this paper (free) |


MULTI-USER SCHNORR SECURITY IN NEXT GENERATION
B.Sundarraj
| download this paper (free) |


PREVENTION OF NODE IN WIRELESS NETWORK USING WATCHDOG METHOD
R.Velvizhi
| download this paper (free) |


MULTI-USER SCHNORR SECURITY IN NEXT GENERATION
B.Sundarraj
| download this paper (free) |


ARTIFICIAL INTELLIGENCE AND ROBOTICS SYNERGY
M. Sriram
| download this paper (free) |


AN APPLICATION ON BILLING SYSYTEM IN ANDROID SMART PHONE IN CODE BASED TECHNIQUES
R.Karthikeyan
| download this paper (free) |


THE CLOUD COMPUTING SYSTEM FOR PREVENTION OF DATA DUPLICATION AND MULTICOPY POSSESSION
Megala D
| download this paper (free) |


MICROARRAY GENE EXPRESSION ANALYSIS USING GENETIC ALGORITHM
Dr.C.Nalini
| download this paper (free) |


A STUDY ON PRIVACY PRESERVING TECHNIQUES IN BIG DATA ANALYTICS
Dr.C.Nalini
| download this paper (free) |


TWEET SARCASM: TWITTER
Keerthikha.M.S
| download this paper (free) |


Secure and Efficient Multi-Secret Image Sharing Scheme based on Boolean Operations and Elliptic Curve Cryptography
K.Shankar
| download this paper (free) |


A Modified Symmetric Key Cryptography Method for Secure Data Transmission
Dr. M. Ilayaraja
| download this paper (free) |


Optimal Radial Basis Neural Network (ORB-NN) For Effective Classification of Clouds in Satellite Images with Features
Dr. G. Devika
| download this paper (free) |


Classification of Arabic text corpus using enhanced fuzzy c means algorithm
Dr.Ashit kumar dutta
| download this paper (free) |


Impact of Black Hole Attack on Cluster Based Multicast in Mobile Ad Hoc Network
Pandi Selvam Raman
| download this paper (free) |


IMPACT OF INFORMATION COMMUNICATION AND TECHNOLOGY INTEGRATION ON STRESS &COGNITIVE LOAD
T.SARAVANAN
| download this paper (free) |


PROTECTION OF RING MICROGRIDS BY HIGHIMPEDANCEFAULT DETECTION AND NON-INTRUSIVE LOADMONITORING
R. Jenin Prabhu
| download this paper (free) |


Real-time Safety Measures in railways using Sensor networks
S.Natarajan
| download this paper (free) |


The General Analysis of Proactive Protocols DSDV, FSR and WRP
Dr. V. Umadevi
| download this paper (free) |


Dynamic Analysis of Power Loss Minimization and Voltage Profile Enhancement Using UPFC Device
S.Natarajan
| download this paper (free) |


Cost effective system for automatic unmanned level crossing system using wireless communication
S.Natarajan
| download this paper (free) |


Performance Evaluation of Model Predictive Control for a Water Bath Temperature System Based on its Integer and Non-integer Order Models
Abdul Wahid Nasir
| download this paper (free) |


IMC based load frequency control of power system via reduced model order
Idamakanti Kasireddy
| download this paper (free) |


A Light Weight Hop Count Based Link Failure Detection Protocol in Wireless Sensor Networks
E. Anna Devi
| download this paper (free) |


A NOVEL MULTI-LEVEL AUTHENTICATION SYSTEM USING TRIGON AND HYPER CHAOTIC LORENZ SYSTEM FOR SECURED COMMUNICATION
U. Latha
| download this paper (free) |


The Enhanced Network Architecture,Route discovery and Data Transmission of AODV
Dr.RamalingamSugumar
| download this paper (free) |


An Efficient Framework to Detect Cracks in Rail Tracks Using Neural Network Classifier
R. Manikandan
| download this paper (free) |


A State-of-the-Art Survey on MANET Protocols
Dr.V.Uma Devi
| download this paper (free) |