Contents IJPAM: Volume 116, No. 7 (2017)


A. R. Arunachalam
SECURED PRIVACY PRESERVING SHARING AND DATA INTEGRATION IN MOBILE WEB ENVIRONMENTS
| download this paper (free) |


A. R. Arunachalam
SEAMLESS VIDEO COMPOSITION BASED ON TRANSITION HINTS USING VIDEO SYNOPSIS

| download this paper (free) |


B. Sundarraj
DATA MINING TECHNIQUES AND ITS APPLICATIONS
| download this paper (free) |


G. Michael
VEHICULAR CLOUD COMPUTING SECURITY ISSUES AND SOLUTIONS
| download this paper (free) |


R. Karthikeyan
A HOUSING SELECTION METHOD FOR DESIGN, IMPLEMENTATION& EVALUATION FOR WEB BASED RECOMMENDED SYSTEMS
| download this paper (free) |


K. P. Kaliyamurthi
A COMPARISON OF STRENGTHS AND WEAKNESSES FOR ANALYTICAL HIERARCHY PROCESS
| download this paper (free) |


D. Kerana Hanirex
ARCHITECTURE AND SECURITY ISSUES ON INTERNET OF THINGS (IoT)
| download this paper (free) |


K. P. Kaliyamurthie
DOS PRIMARILY BASED ATTACKS IN SERVICE LEVEL PARAMETERS
| download this paper (free) |


M. Sriram
SYNTHESIZING TELEPHONY USING LINEAR-TIME EPISTEMOLOGIES
| download this paper (free) |


K. P. Kaliyamurthie
PERVASIVE, DECENTRALIZED CONFIGURATIONS FOR ACCESS POINTS
| download this paper (free) |


P. Ramya
ALTERATION FRAMEWORK FOR INTEGRATING QUALITY OF SERVICE IN INTERNET REAL-TIME NETWORK
| download this paper (free) |


K. P. Kaliyamurthie
SECURE MOBILE AGENTS COMMUNICATION ON INTRANET
| download this paper (free) |


K. P. Kaliyamurthie
AN RETINA SUPPORT VALIDATION METHOD BY EYE LOCALIZATION
| download this paper (free) |


K. P. Kaliyamurthie
THICK CLIENT WEB APPLICATION PROTOTYPE
| download this paper (free) |


G. Lakshmi Vara Prasad
ARBITRARY ROUTING ALGORITHM FOR TENABLE DATA ASSORTMENT ACCESSED IN WIRELESS SENSOR NETWORKS
| download this paper (free) |


AR. Arunachalam
MULTIFACTOR AUTHENTICATION PROVIDING SECURITY AND PRIVACY IN DISTRIBUTED SYSTEMS
| download this paper (free) |


Kavitha. R
A METHODOLOGY FOR IMPROVING READ-WRITE TECHNOLOGIES FOR DHTS
| download this paper (free) |


Kavitha. R
PERVASIVE SYMMETRIES DECOUPLING CONSISTENT HASHING FROM LINKED LISTS
| download this paper (free) |


B. Sundarraj
ONLINE COMPILER USING ANDROID SMARTPHONES
| download this paper (free) |


S. Pothumani
ANALYSIS OF RAIDIN NEURAL NETWORKS
| download this paper (free) |


J. Sridhar
CLOUD PRIVACY PRESERVING FOR DYNAMIC GROUPS
| download this paper (free) |


J. Sridhar
ENABLING PEOPLE SAFETY IN TRAVEL RECOMMENDATION
| download this paper (free) |


K. SIVARAMAN
WIRELESS SECURITY
| download this paper (free) |


K. SIVARAMAN
DECENTRALIZED SANCTION FOR WEB MILITARY
| download this paper (free) |


B. Sundarraj
A SURVEY ON ONLINE POLLING SYSTEM
| download this paper (free) |


B. Sundarraj
A STUDY ON INFORMATION SECURITY IN CLOUD COMPUTING UTILIZING FULLY HOMOMORPHIC ENCRYPTION TECHNIQUES
| download this paper (free) |


B. Sundarraj
AN EXTENSIVE SURVEY ON DIFFERENT ROUTING PROTOCOLS AND ISSUE IN VANETS
| download this paper (free) |


B. Sundarraj
A SURVEY ON DATA STORAGE SECURITY IN CLOUD COMPUTING
| download this paper (free) |


B. Sundarraj
A COMPARISON OF STUDENTS PERFORMANCE USING DECISION TREES TECHNIQUES
| download this paper (free) |


G. Kavitha
DATA PROTECTION ASPECTS OF THE CIVIC SECURITY INFORMATION INTEROPERABILITY SYSTEM
| download this paper (free) |


G. Kavitha
BIG DATA, CLOUD, WEB OF THINGS, IN HEALTHCARE MONITORING SCHEME
| download this paper (free) |


G. Kavitha
EFFECTUAL EXPLOIT OF DIGITAL IRRIGATE TECNIQUES TO AFFORD CLOUD SAFETY MARKING
| download this paper (free) |


G. Kavitha
A RELATIVE CRAM ON PRIVACY PRESERVING IN HEATH CONCERN BY DATA MINING TECHINQUES
| download this paper (free) |


G. Kavitha
A REASSESS PAPER ON RATIONALE FRAMEWORKING ANDROID TELEPHONES
| download this paper (free) |


Mohammed Aabid
EXAMINATION OF QUANTUM COMPUTING USING HAMILTON'S PROBLEM
| download this paper (free) |


Mary Linda. I
A STUDY OFFRAMEWORK AS A SERVICE (IAAS) IN CLOUD COMPUTING
| download this paper (free) |


Mary Linda. I
CLOUD COMPUTING SECURITY THREATS RELATED WITH BIG DATA
| download this paper (free) |


Mary Linda. I
STUDY OF ROUTING ALGORITHMS AND ATTACKS ON ROUTING PROTOCOLS IN MANET
| download this paper (free) |


Mary Linda. I
DIGITAL FORENSICS AND IMAGE FORGERY TO PREVENT CYBER ATTACK
| download this paper (free) |


Jeya Priya D
CONGESTION CONTROL IN DATACENTER NETWORK USING ICTCP ALGORITHM
| download this paper (free) |


K. Sivaraman
A RESEARCH ON SECURE SHELL (SSH) PROTOCOL
| download this paper (free) |


K. Sivaraman
COMPARISION STUDY OF RSA AND DSA ALGORITHM IN MOBILE CLOUD COMPUTING
| download this paper (free) |


K. Sivaraman
UMBITIOUS HEALTHWARE CONDITION ON ANDRIOD MOBILE DEVICE
| download this paper (free) |


R. Karthikeyan
A STUDIES ON GAMMING TECHNIQUE BY USING WEB SERVICE AND FOSSE
| download this paper (free) |


R. Karthikeyan
A STUDIES ON AUTHENTICATED ALGORITHMS BY PSEUDORANDOM MODALITIES
| download this paper (free) |


R. Karthikeyan
AN EVOLUTION OF AUTONOMOUS SYMMETRIES BY USING WEB SERVICES
| download this paper (free) |


R. Karthikeyan
A STUDIES ON LOCATION IDENTITY BASED HARMFUL BY USING INFORMATION RETRIEVAL SYSTEMS
| download this paper (free) |


R. Karthikeyan
STUDIES ON CONTEXT FREE GRAMMAR BY USING PUBLIC KEY PAIRS
| download this paper (free) |


R. Karthikeyan
THE INFLUENCE OF STENOGRAPHER ALGORITHM FOR SIMULATED ANNEALING ON ROBOTICS
| download this paper (free) |


M. S. Keerthikha
CYBER ATTACK DETECTION METHODS – SYSTEMS
| download this paper (free) |


G. Michael
DESIGN AND IMPLEMENTATION OF A SECURE CAMPUS NETWORK
| download this paper (free) |


G. Michael
A STUDY ONPROTECTION OF MOBILE DEVICES NETWORK AND COMMUNICATION
| download this paper (free) |


G. Michael
STUDIES ON MALICIOUS SOFTWARE
| download this paper (free) |


G. Michael
GREEN CLOUD LEVERAGES THE PROGRESSIVE LIVE SIMULATED DEVICE MOVEMENT TECHNOLOGY
| download this paper (free) |


C. Nalini
A COMPARATIVE STUDY ON DIFFERENT TECHNIQUES USED FOR FINGER – VEIN AUTHENTICATION
| download this paper (free) |


C. Nalini
EFFICIENT DATA ACCESS THROUGH SECURE SEARCHING TECHNIQUES IN CLOUD STORAGE
| download this paper (free) |


C. Nalini
ACADEMIC SOCIAL NETWORK DATASET APPLYING VARIOUS METRICS FOR MEASURING AUTHOR’S CONTRIBUTION
| download this paper (free) |


C. Nalini
AN ALLOWANCE OF INDISCRIMINATE PROPAGATION OF PACKETS IN WSN
| download this paper (free) |


C. Nalini
AN ALLOWANCE OF INDISCRIMINATE PROPAGATION OF PACKETS IN WSN
| download this paper (free) |


P. Nandhini
SECURITY FOR COMPUTER ORGANIZE DATABASE ASSAULTS FROM THREATS AND HACKERS
| download this paper (free) |


P. Nandhini
FAULT-TOLERANT QUALITY USING DISTRIBUTED CLUSTER BASED IN MOBILE ADHOC NETWORKS
| download this paper (free) |


P. Nandhini
MOBILE ADHOC NETWORKS: SECURITY AND QUALITY OF SERVICES
| download this paper (free) |


P. Nandhini
LIGHTING AUTOMATION IN THE THROUGH THE INTEGRATION OF DALI WITH WIRELESS SENSOR NETWORKS
| download this paper (free) |


P. Nandhini
REST SCHEDULING FOR CRITICAL EVENT MONITORING
| download this paper (free) |


S. Pothumani
STUDY ON APPLE ICLOUD
| download this paper (free) |


S. Pothumani
PRIVACY AND SECURITY WEAKNESSES OF VIRTUAL BANKING
| download this paper (free) |


S. Pothumani
REVIEW OF MONITORING WEB TRAFFIC
| download this paper (free) |


S. Pothumani
ANALYSIS OF WEBSITE DESIGN AND USER INTERACTION
| download this paper (free) |


R. Kavitha
HELMET MOUNTED HEADS-UP DISPLAY A RIDER ASSISTANCE SMART HELMET FOR EVERYONE
| download this paper (free) |