Contents IJPAM: Volume 116, No. 9 (2017)



PRODUCTIVE SOURCE ORGANIZING OF HYBRID NETWORKS USING QUALITY OF SERVICE
Raghupathy.M
| download this paper (free) |

ASSERTIVE TRIAD FOUNDATION FOR WEB DATA ABSTRACTION
Raghupathy.M
| download this paper (free) |

CLOUD ASSISTED MUTUAL INFORMATION WITH DIGITAL TRADEMARK AND USER REPUDIATION
Raghupathy.M
| download this paper (free) |

SOLITUDE GUARDING TESTIMONY SCHEMA FOR VANET
Raghupathy.M
| download this paper (free) |

MULTIPLE FIELD DATA TRIVIAL BASED ON ONTOLOGY
Raghupathy.M
| download this paper (free) |

EFFECTIVELY AGGREGATED MECHANISM FOR WIRELESS NETWORKS BASED ON DYNAMIC SCHEDULING
Raghupathy.M
| download this paper (free) |

AN EXPLORATION OF DATA MINING APPLICATIONS IN BANKING
S.Kavitha
| download this paper (free) |

CONCENTRATE ON CENTRAL CONTROLLER FOR MOBILE CLOUD COMPUTING
S.Kavitha
| download this paper (free) |

DATABASE MANAGEMENT ANDOPTIMIZING
S.Kavitha
| download this paper (free) |

DDOS ATTACK AND DEFENSES
S.Kavitha
| download this paper (free) |

PORTABLE APP DESIGN-MEMORY MANAGEMENT ISSUE
S.Kavitha
| download this paper (free) |

A SEMI-AUTOMATED ROBOT
Areef Syed
| download this paper (free) |

A STUDY ON WEB APPLICATION SECURITY STATE
S. Shelgin
| download this paper (free) |

A COMPARITIVE STUDY ON 5G MOBILE WIRELESS TECHNOLOGY
S. Shelgin
| download this paper (free) |

SECURITY ISSUES IN CLOUD COMPUTING
SR SriVidhya
| download this paper (free) |

THE SECURITY RELATED TO ELECTRONIC MAIL
SR SriVidhya
| download this paper (free) |

WEB LOGIN AUTHENTICATION USING FINGERPRINT RECOGNITION FEATURE
SR SriVidhya
| download this paper (free) |

A NOVEL APPROACH TO PREPROCESSING AND STORAGE IN BIG DATA
SR SriVidhya
| download this paper (free) |

WEB LOGIN AUTHENTICATION USING FINGERPRINT RECOGNITION FEATURE
SR SriVidhya
| download this paper (free) |

PLATFORM TICKET RESERVATION FOR RAILWAYS USING BIOMETRICS
SR SriVidhya
| download this paper (free) |

QUANTUM COMPUTING
C. Rajabhushanam
| download this paper (free) |

OPERATING SCHEME AND ITS SHIELD IN MOBILEPHONE BY UTILIZING ANDROID
G. kavitha
| download this paper (free) |

CONCENTRATE ON RESOURCE ALLOCATION AND CLOUD COMPUTING ENVIRONMENT
Mohammad Aadil Shahreyar
| download this paper (free) |

UNDERSTUDY PERFORMANCE TRACKING USING QUICK RESPONSE CODE
Shabeek abuthahir.S
| download this paper (free) |

A SURVEY ON ACCURACY OF DECISION TREE ALGORITHM
1K.Akhil
| download this paper (free) |

A STUDY ON SECURITY INFORMATION IN BIG DATA ANALYSIS
M.Brahma rao
| download this paper (free) |

A SURVEY ON VISUAL ANALYTICS OF SOCIAL MEDIA DATA
MD. Arshad
| download this paper (free) |

A NOVEL FRAMEWORK: THICK CLIENT WEB APPLICATION PROTOTYPE
Mary Linda. I
| download this paper (free) |

MECHANIZED ATTENDANCE MONITORING SYSTEM UTILIZING ANDROID PLATFORM
Janani.V.D
| download this paper (free) |

HIGHLIGHT ANALYSIS OF SPAMMERS IN SOCIAL NETWORKS WITH ACTIVE HONEYPOTS
Janani.V.D
| download this paper (free) |

INVESTIGATION OF THE SECURITY ISSUES IN SEARCH ENGINE AND PHISH DETECTION USING TEXT CLUSTERING -A PRESERVING MODEL
Janani.V.D
| download this paper (free) |

DATA EXTRACTION FROM SPAM EMAILS UTILIZING STYLISTIC AND SEMANTIC FEATURES TO IDENTIFY SPAMMERS
Janani.V.D
| download this paper (free) |

CONCEPTUAL LEVEL SIMILARITY MEASURE BASED REVIEW SPAM DETECTION ADVERSARIAL SPAM DETECTION USING THE RANDOMIZED HOUGH TRANSFORM-SUPPORT VECTOR MACHINE
Janani.V.D
| download this paper (free) |

CHARACTERIZING PRIVACY LEAKAGE OF PUBLIC WI-FI NETWORKS FOR USERS ON TRAVEL SPAM DETECTION IN SOCIAL BOOKMARKING SYSTEM
Janani.V.D
| download this paper (free) |

AN AUTOMATED MEDICAL REMINDER SYSTEM ENGNEERING USING ARDUINO KIT
D.Jeya Priya
| download this paper (free) |

CIPHER TEXT POLICY-ATTRIBUTE BASED ENCRYPTION (CP-ABE) AND DISRUPTION TOLERANT NETWORKING IN CONFIDENTIAL NETWORKS
K.P.Kaliyamurthie
| download this paper (free) |

NETWORK MONITORING IN SDN ON CLOUD ENVIRONMENT
K.P.Kaliyamurthie
| download this paper (free) |

ENCRYPTED CLOUD DATA AND EFFICIENT KEYWORD SEARCH
K.P.Kaliyamurthie
| download this paper (free) |

A SMART PHONE-BASED POCKET FALL ACCIDENT DETECTION, POSITIONING AND RESCUE SYSTEM
K.P.Kaliyamurthie
| download this paper (free) |

ANDROID APPLICATION FOR DETECTING MALWARES IN SMARTPHONE APPS
K.P.Kaliyamurthie
| download this paper (free) |

FAST KEYWORD SEARCH USING SEARCHABLE PUBLIC KEY CIPHERTEXT WITH HIDDEN STRUCTURE
K.P.Kaliyamurthie
| download this paper (free) |

IMPACTS OF AMBIENT AIR QUALITY DATA ANALYSIS IN URBAN AND INDUSTRIAL AREA HELPS IN POLICY MAKING
R.Velvizhi
| download this paper (free) |

SUPERIOR HTTP PROXY CASHING SERVER
R.Velvizhi
| download this paper (free) |

KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) DATA SHARING VIA CLOUD STORAGE
R.Velvizhi
| download this paper (free) |

HYBRID COLLABORATIVE AND CONTENT BASED RECOMMENDATION FOR WEB SERVICES BY PROBABILISTIC MODEL
R.Velvizhi
| download this paper (free) |

DATA LEAKAGE IN CLOUD COMPUTING
G.Michael
| download this paper (free) |

ANALYSIS OF VARIOUS DATA MINING CLUSTERING ALGORITHMS
N.Priya
| download this paper (free) |

LI-FI SCIENCE TRANSMISSION OF KNOWLEDGE BY WAY OF LIGHT
N.Priya
| download this paper (free) |

ANALYSING STORAGE AND PROCESSING IN ENHANCED CLOUD COMPUTING WITH HADOOP
N.Priya
| download this paper (free) |

A NOVEL APPROACHOF HYBRID CLOUD
N.Priya
| download this paper (free) |

ANALYSIS OF DATA MINING USING SOCIAL NETWORK
N.Priya
| download this paper (free) |

MERGING OF E-COMMERCE AND E-MARKET-A NOVEL APPROACH
N.Priya
| download this paper (free) |

COMPARATIVE OBSERVATION AND PERFORMANCE ANALYSIS OF MULTIPLE ALGORITHMS ON IRIS DATA
Dr.C.Nalini
| download this paper (free) |

ANALYSIS OF MAC PROTOCOLS IN WIRELESS SENSOR NETWORKS
S.Pothumani
| download this paper (free) |

LIVE STREAMING AND SHARING FOR SOCIAL MEDIA CONTENT DISTRIBUTION
R.KAVITHA
| download this paper (free) |

SOLUTIONS FOR CARRYING ANALYTICS ON BIGDATA AND CLOUD
R.kavitha
| download this paper (free) |

INPATIENT MONITORING FOR HEALTHCARE DATA USING WIRELESS SENSOR NETWORK
R.kavitha
| download this paper (free) |

SECURITY ISSUES, THREATS IN DATA AND THEIR ANSWER IN DISTRIBUTED COMPUTING
R.kavitha
| download this paper (free) |

IMPLEMNTATION OF ROBOT VISION TECHNOLOGY TO CLOSED CIRCUIT TELEVISION
R.kavitha
| download this paper (free) |

DISSEMINATED THROUGHPUT OPTIMIZATION IN WIRELESS SENSOR NETWORKS
J.Selvapriya
| download this paper (free) |

ENHANCED DECENTRALIZED SCHEDULING FOR FAIR RESOURCE ALLOCATION IN WIRELESS NETWORKS
J.Selvapriya
| download this paper (free) |

IMAGE SEARCH AND RETRIEVAL USING CUSTOMIZED METHOD
J.Selvapriya
| download this paper (free) |

IMPELLED APPROACH FOR TRAFFIC MANAGEMENT IN ADHOC NETWORK
J.Selvapriya
| download this paper (free) |

LEADER RACE IN MANETS FOR SECURE STEERING
J.Selvapriya
| download this paper (free) |

EFFECTIVE IMPLEMENTATION OF AUTHENTICATION APPROACH FOR ADHOC NETWORKS
J.Selvapriya
| download this paper (free) |

A SURVEY ON SECURITY ISSUES FACED BY CLOUD DATA OWNERS
K.Shanmugapriya
| download this paper (free) |

AN EFFECTIVE MEASURE FOR RETRIEVAL OF PATTERNS USING CLUSTERING TECHNIQUES
K.Shanmugapriya
| download this paper (free) |

A CUSTOMIZED TRAVEL SUCCESSION DESIGNS IN MULTI-SOURCE BIG SOCIAL MEDIA
K.Shanmugapriya
| download this paper (free) |

EXTRACTION-BASED TEXT MINING TECHNIQUES FOR FLAW VERDICT OF RAILWAY SYSTEMS
K.Shanmugapriya
| download this paper (free) |

RESOURCE ALLOCATION IN A MULTI-TENANT CLOUD COMPUTING ENVIRONMENT
K.Shanmugapriya
| download this paper (free) |

OPINION MINING & MACHINE LEARNING TECHNIQUES FOR COMPUTING USER FEEDBACK OR REVIEWS
K.Shanmugapriya
| download this paper (free) |

A CRAM ON BLUEJACKING BY OBEX (OBJECT EXCHANGE)
s. Shelgin
| download this paper (free) |

IDENTIFYING CREDIT CARD FRAUD USING BIOMETRIC FINGERPRINT TECHNIQUES
s. Shelgin
| download this paper (free) |