|
Security of Honey pots Computing - S.Jancy Shylah, Dr.T.Geetha |
|
Insider Collusion Distinguish Using Intrusion Detection Techniques - MALATHI, Ms. M. MALATHI |
|
A Survey On: De-Duplication With Security On Various Technologies - K.Uma, Mr.E.Jayabalan |
|
Collaborative-Frequent Itemset Mining of Big Data Using Mapreduce Framework - A.PADMAPRIYA, R. VENKATACHALAM |
|
Image Classification Using Convolutional Neural Network - S. Adityajayaramarajan, S. Harinee Vibishikaa, Dr.K.C. Rajeswari |
|
A Survey on Enhancement Cloud Portability with Basic Utility - Mr.S. Ananth, Mrs.K.Radha, Miss.S. Sowndarya, Miss.M. Shyamala |
|
Smart Shopping System By Using Li-Fi Technology In Supermarkets - K. Santhoshkumar, R. Sudha, M. Umamaheswari |
|
Virtual Machine Consolidation for Data Center with SLA and Energy Efficiency in Cloud Computing - S.R JeyaPraveena, Dr.P.Keerthika, Dr.P.Suresh |
|
A SURVEY ON IMPROVED ENERGY EFFICIENT VM ALLOCATION ALGORITHMS IN CLOUD COMPUTING - T. THILAGAM, M. MALATHI |
|
SURVEY ON GATEWAY SELECTION TECHNIQUES IN WIRELESS AD HOC NETWORK - S. Usha, S.Sathish |
|
Tracing Neli Kolam Patterns - Haribalaji, Deepa, Ramya |
|
CLOUD COMPUTING REPERCUSSION ON SCANNER DEVELOPMENT - K.ABINAYA, AARTHI |
|
OPTIMIZATION ROUTING ALGORITHMS FOR MOBILE AD HOC NETWORK - S.Vasanthakumari, S.Sathish |
|
IMAGE ACQUISITION OF WEED AND SPRAYING HERBICIDE BY USING ARDUINO - C.Hari prabha, G.Hemalatha, T.Kanagamani, K.Kaviya |
|
A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS - M Jansirani, R Venkatachalam |