Asian Journal of Information Technology (2021 Volume 20)

  • Number of issues per year: 12
  • ISSN: 1682-3915 (Print)
  • ISSN: 1993-5994 (Online)

In Press

Electronic Student Management System for State Schools in Colombo District in Sri Lanka

K.P. Jayasinghe

Consumer Attitude toward Viral Marketing among Generation Z

Nor Ratna Masrom1*, Raja Zuraidah Raja Mohd Rasi 2, Badru At Tamam Daut 2, Irwan Ibrahim 3

COVID-19 Segmentation and Classification from CT scan images

A. A. Hussaini, Abdul. G. Madaki, A.M. Kwami

AN IMPROVED SCALABLE APPROACH TO DETECT BLACKSPOTS ON ROADS USING DBSCAN ALGORITHM

Sathish kumar R

A smartphone-based application for rural Nepal

Milan Tripathi 1, Aysuh Koirala

Feature selection for household Food insecurity classification: wrapper approach

Mersha Nigus, Dorsewamy

THE EFFECTS OF MOBILE LEARNING TO IMPROVE VISUAL LITERATION

Komang Anik Sugiani

A Short Critique on 3D Printing Technology and Its Applications in Emerging Sectors

Swethakartampati

Performance Evaluation of classification Models For Household Income, Consumption and Expenditure Data set

Mersha Nigus

Intelligent Throughput-based Sleep Control Algorithm for the 5G Dense Heterogeneous Cellular Networks

Topside E. Mathonsi1, and Tshimangadzo M. Tshilongamulenzhe

COVID -19: Challenges and opportunities for teachers in building the ICT competencies

Namazov Bakhtiyor Muzapparovich

A REVIEW ON SENTIMENT ANALYSIS: PRACTICE, APPROACH AND APPLICATION

Dr. Ogo Okeke, Amaechi Chinedum

THE CONTRIBUTION AND IMPACT OF VIRTUAL LEARNING IN THE COVID-19 PANDEMIC

Kanakam Siva Rama Prasad, Dr. Ali Akbar Babalal Bagwan,

The Implication of Artificial Intelligence in Fifth Generation Network Implementation

Gizealew Alazie Dagnaw, Sisay Ebabye Tsgie

Implementing Multimedia Information Retrieval Using Memory-Based Collaborative Filtering

Imeh Umoren1, Onukwugha Gilean2 and Juliet Odii3

Inventory Management Application at Wanz Bikerspot Store Web-Based

Himawan Lutfi and Saruni Dwiasnati

PERFORMANCE EVALUATION, ANALYSIS AND DESIGN OF AN INNOVATIVE STRUCTURE TO SECURE THE PAYMENT GATEWAYS USING HYBRID CRYPTOGRAPHY

Anup Bhange, Dr Harsh Mathur

Clustering methods for Big Data Mining: A Survey Paper

Hechmi Shili

Efficient Laptop Rental System

Lahari Bitra, Katyayani Bellamkonda, Jashuva Chukka, Chandra Sekhar Genji, K.Srinivas

WIRELESS SENSOR NETWORKS: A SURVEY ON RECENT DEVELOPMENTS IN SENSORS SECURITY

Dr. A. Kathirvel, Professor and Dr. M. Subramaniam, Professor

The Comparison Between Lofti-Cerveny-Weitz Method and Local Search Genetic Algorithm for Completion of Maximally Diverse Grouping Problem

RZ Abdul Aziz, Areif Apriandi, Riko Herwanto

Improved Particle Swarm Optimization for Virtual Machine Selection in Cloud Datacenter

Madhumala RB

Online Library System to Dr. Richard Pathirana Public Library in Galle area in Sri Lanka

K.P. Jayasinghe

Nuclear Batteries

Faraz Hussain

Information Technology for providing Electronic Identity Card to people who are living in Hambantota District in Sri Lanka

K.P. Jayasinghe

Predictive Model for Likelihood of Survival among Breast cancer Patients using Machine learning techniques

Micheal Ajinaja & Mobolaji Olarinde

Extraction of data from Samsung devices on the basis of different software

Kajal Singh

DESIGN AND IMPLEMENTATION OF CHARCON ALGORITHM TO SOLVE ARABIC DATABASE CHARACTER SET MIGRATION CORRUPTION FOCUS ON: MIGRATING ARABIC DATA TO DIFFERENT CHARACTER SET

Majzoob k. Omer, Adel A. Ahmed, Mojtaba Eltayeb,

A Paper on Comparison between Big Data and IoT

P. Sunanda

Interface Between Employee and Employer based on Android App Development

Karthika S, Vanitha U, Rejina Parvin J, Vigneshwara, Surya, Yogeshraj

BALANCING ENERGY EFFICIENCY USING VIRTUAL BACKBONE SCHEDULING ALGORITHM IN WIRELESS SENSOR NETWORKS

S.Nanthini,Dr.S.Nithya Kalyani,Dr.S.Sudhakar

Novel Technique using Optimal Salp Swarm Based Feature Fusion with Linear Multi K-SVM Classifier on Moving Object Imaging

G. Jemilda S. Baulkani

TEACHERS PERCEPTION OF THE STATUS OF SOCIAL STUDIES EDUCATION IN INFORMATION AND COMMUNICATION TECHNOLOGY DRIVEN SOCIETY

Dr. Ogene A. Oyibe

A fuzzy automated academic supervisor system by using data mining

Amjad Khalil Mohammed, Mohamad-Bassam Kurdy Ph.D

Feasibility and Acceptability of Mobile Graphic-based Reminders to Support Adherence of Tuberculosis Treatment in Developing Countries

Haji Ali Haji and Mwanajuma Bashir Juma

AUTOMATIC ASSESSMENT FOR THE DETECTION OF KNEE EFFUSION USING MAGNETIC RESOURCE IMAGING

Aamir Yousuf Bhat, A. Suhasini

Efficient implementation of NoSQL database

razan hamouda

An overview of Nature-inspired Algorithms applied in Imbalanced dataset classification: Which are the suitable techniques?

Anita Kushwaha, Dr. R.S. Pandey

A Systematic Review of Traditional Clustering Algorithms for Large Datasets

Tanvir Habib Sardar, Zahid Ansari, Asif Afzal

Assessment of Knowledge of Primary School Teachers' about Attention Deficit Hyperactivity Disorder in Basra city

Kadhim Jawad AL Madwah

effecting of internet addiction among secondary school student in basrah city

luay abdulwahid shihab

Comparative Study for Effort Estimation using Different Machine Learning Techniques

Mukesh Kumar, Dr. A. J. Singh

Effort Estimation using Hybridized Machine Learning Techniques for Evaluating Student’s Academic Performance

Mukesh Kumar, Dr. A. J. Singh

Student Performance Prediction in Academic using Data Mining Algorithms

Mukesh Kumar, Dr. A. J. Singh

Optimizing Classification of Spread Spectrum Signals Based on Features Extraction

Haidy S. Fouad, Hend A. Elsayed and Shawkat K. Girgis

Edge Detection Methods in Scientific Cellular Photographs By Means Of Analytical Assessment

haeder talib mahde alahmar

Blockchain with IoT : A new Hope in Agriculture

Mrs.Harsha Patil,Mrs.Kanchan Rathi,Mrs.Malati Tribhuwan

Age-Invariant Face Recognition Using Trigonometric Features

¹ Bilal Ahmad.M ²Kurdy Mohamad-Bassam Ph.D

Survey of research on the use of the artificial neural network to fit crime prediction

Albo jwaid Furqan Abbas

Certain Investigation on Variants of Load Balancing in Big Data Centers Using Meta-Heuristic Algorithms

Dr.S.Sundararjan, Dr.C.R.Sakthivel

Web Application Assessment Tools

Mohamad Swead

AUTOMATED WEARABLE TECHNOLOGY FOR WOMEN SAFETY

Ms.R.Monisha

SECURITY FOR FILE ACCESS USING VISUAL RECOGNITION

SURAJ ESWARAN

Building a security system based on Internet Protocol version 6 Routing Header

Ahmed Khaleel Ibrahim. Shihab1 Asst.prof.dr.nazhat saeed Abdulrazaq2

Effective Test Case Prioritization Using Combination of Diagnosis Matrix & Back Propagation Network

GOVIND VERMA

Robust Kernel Representation for face Recognition

M.Blessy Queen Mary, N.Nirmal Singh, S.G.Sam Stanley

Assessing user satisfaction with university website quality

saeed hasanzadeh nabijan

Secure exam and changing teachers in e-system

Jabbar and Petho

Discussion of the basic types of attacks on stegosystems digital watermarking

Sameer Saud Dakhel , Sadiq Sahip Majeed , Rasha Muhseen Hadi

A Novel Approach to Alzheimer’s disease Stage classification using supervised learning approach

SHAIK BASHEERA, Dr M SATYA SAI RAM

Satellite images encryption Review

Mahmoud A. S. Al-Khasawneh

BOOTSTRAP APPROACH FOR ENVISAGE HEART ATTACK DISEASES USING COMBINE AD-BA ALGORITHM

D.Richard,Dr.R.Mala

Using Mobile Technology in Modem Teaching

Saad

Privacy Preserving Mining of Web Reviews based on Sentiment analysis and fuzzy set

Mostafa A. Nofal, Sahar F. Sabbeh, Khaled M. Fouad

Smart Bus Management System Using IOT

Mr.Jayakumar.S(AP/[SI.G]) Raviteja.S, Yadhu Krishna.P.B, Sushovan Bhattacharya, Adipta Biswas

PREDICTION OF REAL ESTATE USING LASSO ALGORITHM IN BIG DATA

Saranya P, ASHWATI BAGADE

A Review on P&O MPPT Techniques adopted in Grid connected Photvoltaic System for efficient MPP tracking to Improve Power Quality

Kavya. M* and S. Jayalalitha**

Sensors and Navigation Tools for Visually Impaired People to tracking the objects

Dr N.Sudheer Dr S.Hrushi Kesava Raju Dr Nesar Ahmad

Enhanced Security for Cloud Storage using Hybrid Encryption

M.Vedaraj,Dr.M.Vigilson Prem

Fuzzy Logic Decision Fusion in a Fingerprints Based Multimodal Biometric System

Emad Majeed Hameed

A SEMANTIC APPROACH TO EFFICIENT FEATURE SELECTION IN WEB BASED INFORMATION RETRIEVAL USING FIRE FLY HEURISTIC

K. S. Ramanujam, K. David

ACTIVE LEARNING IN CLASSIFICATION OF HYPERSPECTRAL IMAGING

ELAKKIYA R,THILAGAVATHI K,VASUKI A

Predictive Analytics in Big Data: Healthcare Industry (Diabetes Mellitus)

1. Nurul Shazmin Binti Nasaruddin, 2.Suresh Kumar Nagarajan, 3. Blessy Trencia Lincy.S.S

Secure Cross Site Script Analyzer and Monitoring System

aryalakshmi.r ,josmy george

The Study on the Meaning of Playing the Game Based on the Activity Theory

Sahoon Kim

Effects of agro-industrial residues on dual fuel mode in CI engine

M.MATHAN MOHAN

Enhancing Network Lifetime Using Cluster-based methodology in Wireless Sensor Networks

DEVAKI R, VIJAYMEENA MK

Perfromance Evaluation of ARQ and HARQ in Cooperative MIMO

mohammedfarooqhamdi

dsfgdsg

adzSDF

ABOUT CREATING OF THE UNIVERSITY SYSTEM OF CHECKING TEXTS FOR PLAGIARISM

Mustafina A.K., Kalpeeva Zh., Mazhenov A.K., Sabyrzhan A.A.

Copy-move Image Forgery Detection Techniques: A Literature Survey

Hesham Ahmed Alberry, Abdelfatah Hegazy, Gouda i.Salama

An Efficient Encryption-Then-Compression System using Asymmetric Numeral Method

P.Sridevi, Dr. J.Suguna

Parameter Optimization and Efficiency Improvement of Cu(In,Ga)Se2 (CIGS) Solar Cells

Najmodin Shahverdi, Ali Dinarvand, Mohammad Reza Amini

Attribute Based Authentication System using Homomorphic Encryption

Marwan Majeed Nayyef

A WAY TO SECURE THE DATA IN CLOUD DATA STORAGE BY USING CLOUD DATA COMPRESSION MECHANISM

SHEIK SAIDHBI,K.THIRUPATHI RAO

HOW E-FILLING SYSTEM CAN IMPROVE TAXPAYER COMPLIANCE IN RAISING TAX REVENUES

Dyah Purnamasari

Performance Evaluation of Multi-carrier Modulation Techniques for Next Generation Wireless Systems

Dr. (Prof.) Himanshu Monga, Pooja Rani, Silki Baghla

Can IT Industry Merger and Acquisition Effect on Brand Equity of their product/services? A case study from Qatar

Habib Ullah Khan and Mahmood A. Awan

THE INFLUENCE OF INFORMATION TECHNOLOGY AND MANAGER'S COMPETENCE ON THE QUALITY OF ACCOUNTING INFORMATION SYSTEM

Azhar Susanto

A novel approach to compute Steiner point in Graph: application for network design

Shantanu Agrawal, Shashank Bhalotial, Dr.M.B.Chandak

Improving the Performance of Single Core Processor using FPGA’s

M.S.Satyanarayana, Aruna T M , Divyaraj G N

A Novel Approach for Resource Allocation using Swarm on Clouds

HARVINDER SINGH; Dr. ANSHU bHASIN

A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model

Vimal S Dr. Srivatsa S K

A NOVEL TECHNIQUE FOR DETECTION OF SQL INJECTION

Yasser Gomaa , A.A. Abd El- Aziz Hesham Hefny

Bird Sound Identification: An Incisive on Features Used

Simna Rassak

Spell Checker for Khasi Language

Mark Sheridan Nonghuloo, Karthik Krishnamurthi

Textual Document Restructuring Using Frequent Terms and Named Entity

Wael M.S. Yafooz

The study of relationship between EFL teachers teaching context and their attitudes towards computer assisted language learning.

parisa shahlou and cyros izadpanah

TECHNICAL PLANNING IN MOBILE APPLICATION TESTING

1

A STUDY ON COMPLEXITY IN PROGRAMS

Shalu Achamma Sam ,M.Thanusha,Dr.R. Manjula

Steganographic Techniques for High Data Embedding based on LSB and Pixel Property

Rasmi .A and M.Mohanapriya

ADDRESSING COLD START PROBLEM WITH TAGS AND KEYWORDS

Karthiga, Sushma,Raju

Acceptance of E-Government Services among Jordanian citizen

Dr.Mohammad Mahmoud Saleem Alzubi and Dr.Yousef A.Baker El-Ebiary

Many studies have scrutinised the benefits of m-learning. Somehow, it is still necessary to comprehend the dissatisfaction of certain learners towards m-learning experience. Thus, this research aims to investigate the factors that might impact the acceptance of m-learning among university students: quality of service, uncertainty avoidance and trust. Portability and access to countless activities are among the advantages of mobile devices, and these foster and ease ubiquitous learning. This study scrutinises the theories and cognitive techniques to offer individualised, motivated and valuable experience of mobile education for transfer to the subsequent word learning and reading comprehension. As surveys and forms are the data sources, the quantitative methodologies are employed. Twenty six (26) items from diverse research domains were constructed in the questionnaire to measure six constructs, and undergraduate and postgraduate students of the university in Jordan were selected as respondents. Two hundred (395) completed questionnaires were obtained. Further, the modified acceptance framework on TAM and IDT theories is adopted to identify the influencing factors of students intention to use m-Learning. Also, eight hypotheses were formulated to analyse the linkages between the factors in the proposed model. Most positive correlation between quality of service, student readiness, trust, compatibility, perceived ease of use, perceived usefulness and behavior intention to use M-Learning by empirical data. This study looks into a timely topic of integrating a mobile device amongst students at higher education in Dubai. Several crucial implications for the students are highlighted in this study. Keyword: Mobile learning, Technology acceptance model, Innovation diffusion theory, quality of service.

Malik Mustafa and Mohammad Mahmoud Saleem Alzubi

Complete Similarity Measure Model for Machine Cell Formation and Costs Minimization of Exceptional Elements

S.Ramesh1, Dr.N.Arunkumar2 and Dr.R.Vijayraj3 1Research Scholar, Mechanical Dept., Anna University, Chennai 600025, India 2Professor, Mechanical Dept., St. Josephs College of Engg., Chennai 600119, India 3Professor, Mechanical Dept., Dhanalakshmi Sr

A study on how to make a secure e-voting protocol for elections

Saeed Beheshtifard

An Optic Disc Detection using Region based Segmentation Technique

U.Satheeshwaran and T.Saravanan

MULTI AGENT SYSTEM BASED TCP USING SEAMLESS INTERNET ACCESS FOR VANET

Dr.B.Sasikumar,Dr.S.K.Purushothaman

Design and implementation of low power robotic mode controller based on Rhombus structure

P Prabhakaran and P Thirumurugan

A Novel Computer Aided Drug Adverse Side Effects Prediction using Extreme Learning Machine

S. Viveka and B. Kalaavathi

REGION BASED LIGHT ABSORPTION TECHNIQUE WITH IMAGE SEGMENTATION FOR TISSUE CLASSIFICATION

G. Maria Dhayana Latha

Optimal Transmission Power Allocation Method of Relay Nodes in Cognitive

Dr.R.Senthil Kumar,Dr.M.Poonguzhali

Novel UAVA with Improved Radiation Characteristics

Marouf Fatima zohra, Meriah sidi mohamed

MINIMUM POWER TEST PATTERN GENERATION FOR BIST APPLICATIONS

Govindaraj Vellingiri and Ramesh Jayabalan

Secure and Efficient Certificateless Sequential Signature Scheme in Group Key Agreement Protocol

P.R.VIJAYALAKSHMI , K. BOMMANNA RAJA

Design of a Variable Boost Inductor and Implementation in a DC-DC Boost Converter

Saravanakumar T#, G.Sainarayanan*, K.Porkumaran^

A Novel Technique for Detection & Isolation of Blackhole Attack

Shivani Vijan and Sandeep Kumar Arora

NOVEL ARCHITERTURE FOR DATA SHUFFLING USING FISHER YATES SHUFFLE ALGORITHM

P.Karthik, Dr.S.SureshKumar

Performance Enhancement With Improved Security an Approach for Formulating RFID as an Itinerary In Promulgating Succour for Object Detection

M. Thurai Pandian, R. Sukumar

K-Level with Buddy Memory Allocation (BMA) Approach for Parallel Workload Scheduling in Cloud

A.KOUSALYA, R.RADHAKRISHNAN

A Hybrid ABC-PSO Based Multi-Polynomial Fuzzy Vault for Multimodal Biometric Cryptosystem

A. Gandhimathi, Dr. Radhamani G

A Homomorphic Crypto System for Electronic Election Schemes

Dr.KannanBalasubramanian, M.Jayanthi

A Novel Approach for Detecting the Bone Cancer and its Stage based on Mean Intensity and Tumor Size

Savadam Balaji, H Khan, Kishor Kumar Reddy C, Anisha P R

Cryptographic Tree and Log File based Secret Sharing Key Management Scheme for Securing Outsourced Data in Cloud

S.Ahamed Ali,Dr.M.Ramakrishnan

Optimal ECC Based Dual Encryption Technique for Data Security in Cloud

Gnanaprakasam T,Dr. Raivkannan A

Enhancement of Deaf Speech in Tamil Language using Proper Distance Measurement between the Normal and Deaf group clusters Deaf Speech Enhancement

NirmalaDevi Jaganathan and BommannaRaja Kanagaraj

Energy Efficient Communications on Network-on-Chip Architectures

J. Kalaivani, B. Vinayagasundaram

ENERGY CONSERVATION � A SOLUTION FOR TAMIL NADU ELECTRICAL POWER SHORTAGE

A. Bhuvanesh, S.T. Jaya Christa, S. Kannan

Maximizing the lifetime of a sensor network and optimizing the Base Station using Non Traditional Optimization

P.Parthiban1, G.Sundararaj2 , P.Maniiarasan3

Multicast Security Issues in RSGM

S.PARTHIBAN, DR.PAUL RODRIGUES

TRANSMISSION EFFICIENT GRID BASED SYNCHRONIZED ROUTING IN WIRELESS SENSOR NETWORKS USING BAYESIAN COMPRESSIVE SENSING

S.DeepaDevasenapathy

An Effective Finger Dorsal Pattern Biometric System Using MBC and SIFT Schemes

Mr. S.Veluchamy1 * and Dr L.R karlmarx2

ascertainment of worm hole and black hole attack in manet by using dowb algorithm

T.pavan kumar

Efficient Denoising of Rician Noisy Magnetic Resonance Brain Images Using Self Similarity Approach and Spatial Filter

Hari Haran.G, Jayachandran.A, Ajith Bosco Raj.T

ANALYSIS OF CLUSTERED POSITIONING FOR INDOOR ENVIRONMENT (CPIE) TO IMPROVE THE NETWORK EFFICIENCY FOR WSN

A.Christy Jeba Malar1 G.Kousalya2 1Department of Information Technology, Sri Krishna College of Technology,Coimbatore-641 042,India a.christyjebamalar@skct.edu.in 2Department of computer Science and Engineering, Coimbatore Institute of Technology,6410

Improved Level-based Trust Aware Routing in Wireless Sensor Networks

MS.M.UDHAYAVANI

A SURVEY ON DATA DEDUPLICATION TECHNIQUES IN CLOUD STORAGE

S.SAMPATH,B.TIRAPATHI REDDY, DR.M.V.P CHANDRA SEKHAR RAO

Design of a multiplier architecture based on LUT and VHBCSE algorithm for FIR filter

M. Jenifer Shopana, S.Poorna Lekha

An expert system for diseased plant leaves using adaptive neuro fuzzy classifier

Pitchai Latha 1and Kanthan Muthukannan2

An enhanced Optimization Kernel Approach for Feature Selection and Classification Using Support Vector Machine

S.CHIDAMBARAM, K.G SRINIVASAGAN

Auto-Scaling and Priority Based Scheduling for Improving Efficiency of Cloud System

A.Jegatheesan, Sonikha Prabhakar

STUDY ON POWER REDUCTION USING VARIOUS PEAK TO AVERAGE POWER RATIO TECHNIQUES IN OFDM

V.NANDALAL,S.SOPHIA

DIAGNOSIS OF HEART DISEASE USING NEURAL NETWORKS-COMPARATIVE STUDY OF BAYESIAN REGULARIZATION WITH MULTIPLE REGRESSION MODEL

K.SAI KRISHNASREE, M.R.NARASINGA RAO, K.V.RAJU

Optimal Selection of Feature Extraction Method for PNN Based Automatic Cardiac Arrhythmia Classification

Rekha.R and Vidhyapriya.R

Discovery of Drug Brand Names from the Web

Dr.M.Thangaraj, Mr.Sivagaminathan P.G

Negative Compatibility For Prediction Algorithm (NCAP): Machine Learning Way.

Er. Pritam Ramesh Ahire and Dr. Preeti Mulay

SoHo-Self Organised Hybrid Overlay for P2P live Streaming

Preetha Evangeline.D, Anandhakumar Palanisamy

Performance of Security Algorithm against Malicious Nodes Based Wireless Sensor Network

M. Malathi & S. Jayasree

A Coincered Node Based Localization of Jammers in Wireless Sensor Networks

P.Balamurugan, V.Sharmila and A.Mummoorthy

AN ENERGY EFFICIENT AND BALANCED ROUTING FOR WIRELESS SENSOR NETWORKS

S.R.Menaka , Dr.G.Murugesan

GREAT EVALUATOR:AN AUTOMATED ASSESSMENT SYSTEM FOR EVALUATING REGULAR GRAMMARS IN AUTOMATA THEORY

Madhumitha Ramamurthy, Ilango Krishnamurthi and Stanly Mammen

MR- ANT MINER SYSTEM FOR THE DATA STREAM CLASSIFICATION

S. RAJESH KUMAR, DR. S. MURUGAPPAN

Broadband Analysis of Novel Integrated Antenna for Cognitive Radio Applications

Ms. T.R. Muthu,Dr. A. Thenmozhi

FuzzyPSO Supervisory Control for Robot Dynamics

A.Sathish Kumar,Srivasan Alavandar

Performance analysis of Secured Position based Routing in Mobile Ad hoc networks

Rammyaa.B

A Classification of Chronic Leukemia Using New Extension of K-Means Clustering and EFMM in optoelectronics Based on Digital Microscopic Blood Images

Kalaiselvi Chinnathambi, Dr.R.Asokan

A Novel Flip-flop Based Error Free, Area Efficient and Low Power Pipeline Architecture for Finite Impulse Recursive System

K. Raja S. Saravanan

Improved automotive CAN protocol based on payload reduction and selective bit stuffing

Vinodh Kumar B; Ramesh J

A NON SUBSAMPLED CONTOURLET TRANSFORM FOR DEBLURRING OF NATURAL IMAGES IN PRESENCE OF NOISE

Amudha.J, Sudhakar.R

Enhancement in Channel Equalization using Particle Swarm Optimization Techniques

Diana. D.C, Joy Vasantha Rani. S.P.

A Novel Hybrid High Gain Interleaved Converter Design for BLDC Motor under Dynamic Conditions

4

Simplified Cat Swarm Optimization for Decision Feedback Equalization

Diana. D.C, Joy Vasantha Rani. S.P.

Performance Analysis of MIMO Based ASTM-OFDM System for Indoor Communication

J. Kirubakaran, Dr. G.K.D Prasanna Venkatesan

Delay Tolerant Network Based Internet Services Using Trains

Emir Husni

Genetic Algorithm Assisted Radial Basis Function Neural Network (GA-RBF-NN) based MPPT Controller for Solar PV System Supplying BLDC Motor Drive

R.Anand,Dr.S.Saravanan

SMART TRAFFIC CONTROL FRAMEWORK BASED ON INTERNET OF THINGS USING GENETIC ALGORITHM

Kuppusamy P, Kalaavathy B

A SIMULATED ANNEALING APPROACH FOR MIXED MODEL SEQUENCING TO SOLVE LEVEL SCHEDULING

Senthilkumar R and; Ramkumar A S

A novel technique for Secure routing in wireless sensor networks attacks

m.harini, Dr.v.srikanth

Lossy/Near Lossless Image Compression using Simple Arithmetic Operation with Selective Scan Order

Pasumpon Pandian A, S.N. Sivanandam

A HYBRID CONTOURLET TRANSFORM FOR DEBLURRING AND DENOISING OF COMPUTER TOMOGRAPHY IMAGES

Pasumponpandian A, Rani P, Indradevi M

A study on the strength of green concrete structural elements using foundry sand

D. Pradeep Kumar, P. Eswaramoorthi

An Intelligent Temporal Adaptive Genetic Fuzzy System for Effective Intrusion Detection

Brindha Devi.V,K.L.Shunmughanathan

Region Based Segmentation and Lossless Compression of DICOM Images

C.SENTHILKUMAR, R.K.GNANAMURTHY

Judgement Based Effort Estimation for Software Management: A Survey

Dr.S.Srinivasan,V.Vignaraj Ananth,K.Usharani

RELIABLE DATA DELIVERY IN MANETS USING PGF AND VH SCHEME

M.Sakthivel, M.Ramakrishna

Blocking Probability based Admission Control Technique for QoS Provisioning in WDM networks

M R Senkumar, K Chitra

AN EFFECTIVE VIDEO RECOVERY USING FIRA METHOD

Ms.N.Kalpana,Dr.S.Appavu Alias Balamurugan

Energy Efficient Adaptive Intra Clustering Hierarchical-EEAICH Protocol using Fuzzy Logic for Wireless Sensor Network

Ravuri Daniel, Prof. Kuda Nageswara Rao

A Systematic QoS Provisioning at MAC Layer for Designing & implementation of advanced Routing protocols on Cloud

K.Venkatraman,Dr.G Maria Kalavathy

PERSONALIZED NEWS ARTICLE RECOMMENDATION WITH NOVELTY USING COLLABORATIVE FILTERING BASED ROUGH SET THEORY

K.G.Saranya; Dr.G.Sudha Sadhasivam

ON THE ANALYSIS OF DECOMPOSITION ALGORITHMS FOR MIMO PRECODER DESIGN

1. S. Markkandan, 2. N. Venkateswaran

DESIGN AND ANALYSIS OF LOW POWER DUAL BINARY ML MAP DECODER USING VLSI TECHNOLOGY

S.DIVYA ,Dr.P.MANIRAJ KUMAR

GSR: Geographic Secured Routing using Hashing Algorithms for Node and Message Authentication

Prathusha Laxmi B, Chilambuchelvan A, Sathya T

Fault-tolerant Trust based Secured Data Aggregation for WSN

J. Jean Justus, A. Chandra Sekar

SECURE MULTICAST ROUTING PROTOCOL IN MANETS USING EFFICIENT ECGDH ALGORITHM

Gopi Arepalli Suresh Babu Erukula

UTILIZATION OF FICTION LITERATURE IN TEACHING AND LEARNING IN PRIMARY SCHOOLS: A CASE STUDY OF TWO PRIMARY SCHOOLS IN NSUKKA, ENUGU STATE NIGERIA

Shir Ushahemba , Margret Ngwuchukwu

An Investigation on Some theorems on K-Path Vertex Cover

S.Satyanarayana,P.Durga Bhavani,K.Vijay Kumar

LATTICE REDUCTION-AIDED INFORMATION PRECODER FOR MULTIUSER COMMUNICATION SYSTEM

1S. Markkandan, 2N. Venkateswaran 1 Department of ECE, Anand Institute of higher Technology, IT Highway, Kazhipattur, Chennai, 603103, India, 2 Department of ECE, SSN College of Engineering, Old Mahabalipuram Road, Kalavakkam, Chennai, 603110, India

DKSM-DHT: Privacy-Preserving Dynamic Key Sharing Model in Distributed Cloud Computing Environment

M.Vinothkumar, Dr.N.Balaji

Solidity Investigation of Microgrid in Islanding Operation

Yuvaraja T, M.Gopinath

A Survey of Feature Extraction Techniques in Content-Based Illicit Image Detection

S.HADI YAGHOUBYAN, MOHD AIZAINI MAAROF, ANAZIDA ZAINAL, MAHDI MAKTABDAR OGHAZ

ECS-PPA: An Efficient Conditional and Secure Privacy-Preserving Authentication Scheme for Vehicular ad hoc network

zahra jazini dorcheh , Mohammad Pourzaferani, Saeed Ayat

Fuzzy Logic Method for Enhancement Fault-Tolerant of Cluster Head In Wireless Sensor Networks Clustering

Farnaz Pakdel 1 and Mansour Esmaeilpour*2

Ontology and Query-Focused Multi-Document Summarization System

K.Yogeswara Rao,P.V.Nageswara Rao

Citizens Engagement in E-participation on E-government Websites through SWAT Model: A Case of Saudi Arabia

Abdullah Alharbi & Kyeong Kang

E-Commerce Adoption Factors Among Palestinian Small and Medium Enterprises: �A Descriptive Study�

FADI HERZALLAH

Verification of AXI Bus Protocol using SystemVerilog

Sundararajan PH,Prof and Dean S.Balaji ,Prof and Dean Dr.H.Khan

ROLE OF RADIO MEDIA AND ITS IMPACT IN COMMUNICATING SCIENCE AND TECHNOLOGY INFORMATION AMONG RURAL WOMEN

Dr.P. Sri Jothi and Dr. M. Neelamalar

A Mobile Smart Finder Application using Bluetooth Location-based Information Technology

Jaejoon Kim

Web Page Block Identification Using Machine Learning Techniques

Neetu Narwal

EFFICIENT TECHNIQUE FOR SECURE TRANSMISSION OF HD VIDEO OVER INTERNET

Roopalakshmi S and K. John Singh

A Formal Model for Antivirus Update Agent System Using PrT Nets

1) Zeynab Bahrami, 2) Ali A. Pouyan

Pixel Level Back-Projected Maximum A Posteriori Super Resolution Technique for Low Quality Surveillance Video Feeds

Fagbola Temitayo Matthew, Olabiyisi Stephen Olatunde, Omidiora Elijah Olusayo

Fibonacci Spiral Search for Block Matching in Video Coding

L.C.Manikandan,R.K.Selvakumar

A New Control strategy to Enhance LVRT for Doubly Fed Induction Generator

K.Gunalan and Dr.C.Sharmeela

Intensifying the Compression Efficiency of Medical Image Sequences Using SSP and BCH

M.Ferni Ukrit, G.R.Suresh

A NOVEL 3D DIGITAL SHEARLET TRANSFORM BASED IMAGE FUSION TECHNIQUE USING MR AND CT IMAGES FOR BRAIN TUMOR DETECTION

G.Thamarai selvi,R.K.Duraisamy

An Improved Cross-Layer Design Optimization for TCP Performance in Wireless Networks

A.Manikandan ,Bala Subadra

Contemporary research on robotics

R. Sonia Priyadarshini, V. Khanna

Statistical Processing of Engine Vibration Signals for Knock Diagnosis

A.Uma Mageswari ,Dr. R.Vinodha

Performance Analysis of UWB Channels in MIMO-OFDM Systems

Dr.C.Venkatesh

Low complexity Demosaicing directly producing YCbCr 4:1:1 output

Dev. R. Newlin

A NOVEL ALGORITHM FOR IMAGE DENOISING USING MODIFIED ADAPTIVE MEDIAN FILTER

K VENKATACHALAM, Dr.E. MOHAN

Hybrid Testing Model for Cloud API testing as a Service

R. Jeba Gazelle and Dr.M.A.Maluk Mohamed

A SECURE AND ADAPTIVE CLUSTER BASED ROUTING(SACBR ) FOR MOBILE AD-HOC NETWORKS

Parkavi.K,Swaminathan.A,Vivekanandan.P

A PRAGMATIC APPROACH TO SECURE DSR PROTOCOL FROM SINKHOLE ATTACK IN AD HOC ENVIRONMENT

Devi. P and A. Kannammal

Enhanced Energy Efficient Associativity-based Routing Protocol

V.Anitha , Akilandeswari Jeyapal , Lakshmi Nair

Factors hindering the implementation of E-learning

Jarikre Amos O., Imoni Otaghogho

A general review of human face detection including combination of ‎neural ‎networks and Haar ‎cascade classifier

Ali Sharifara, Mohd Shafry Mohd Rahim, Yasaman Anisi

A Survey on Hierarchical Cluster Based Routing Protocols for Wireless Multimedia Sensor Networks

G.Kirubasri,N. UmaMaheswari and R. Venkatesh

Unified Patient Information System for Iraqi Hospital

Mohammad Khalaf Rahim

Distinguisher Attack on AES-128 and AES-256 Block Ciphers through Model Based Classification Using Neural Network

K.Vetrivel, Dr.S.P.Shantharajah

Linear and Nonlinear Precoding Techniques for MIMO Broadcast Channel

S.SOBANA1, K.MEENA ALIAS JEYANTHI2 1Associate Professor, ECE Department, P.S.N.A College of Engg., & Tech., Dindigul 2 Professor, ECE Department, P.S.N.A College of Engg., &Tech., Dindigul

Challenges in Spectrum sharing and Issues in User Activity

1.C.SAHAYAKINGSLY,Dr.J.George Chellin Chandran

EFFICIENT DISCRIMINANT COMPONENT ANALYSIS USING SUPPORT VECTOR MACHINE CLASSIFIER ON INVARIANT POSE AND ILLUMINATION FACE IMAGES

R.Rajalakshmi, Dr.M.K.Jeyakumar

MODELING LOCATION BASED DETECTION SYSTEM WITH CO-OPERATIVE AUTHENTICATION IN WSN

Poongodi

A Comparative Analysis on Markov Model (MM), Association Rule Mining (ARM), Association Rule Mining-Statistical Features (ARM-SF), Boosting and Bagging Model(BBM) to Impervious Web Page Prediction

sampath prakasam

Improved Probe Based Admission Control with Mobility Extension for Multicast QoS

I. Sathik Ali, P. Sheik Abdul Khader

INSTANTANEOUS CENTRE OF CURVATURE BASED 2 WHEEL SELF SUPPORTING ROBOT

G.CHINNADURAI

MANAGEMENT OF EFFECTIVE EMERGENCY VEHICLE IN TRAFFIC SYSTEMS

C.Yaashuwanth, K.Priya

Optimized Protocol for Spontaneous Wireless Ad Hoc Networks

Rajeshkumar V

Novel Modified FPCM for Web Log Mining by Removing Global Noise and Web Robots

P.NITHYA,Dr.P.SUMATHI

PWmin and PWmax Transmission Power Assignment Algorithm in Wireless Ad hoc Networks

A.Arivoli and Dr.P.Narayanasamy

Design and implementation of BLDC Motor Drive with Active Power Factor Correction

Shanmugam Sathish Kumar1Dr.Ramachandran Meenakumari2

Clustered Graph Based Reliable Routing Protocol for Variable Velocity Vehicles in VANETS

P.KALEESWARI,A.NOBLE MARY JULIET,DR.VALARMATHI

Simulation of Queuing Model for Electronic Toll Collection Smart Card Systems

V.Sathya & Dr. J.Abdul Samath

Design of Time Efficient Carry Select Adder using FPGA

G. NARMADHA, K. BALASUBADRA

Performance Analysis of Landsat5 Thar Desert Compressed Image Using Wavelets

R.Kousalyadevi & J.Sugnathi

PERFORMANCE ANALYSIS OF LANDSAT5 REMOTE SENSING DATA COMPRESSION TECHNIQUE USED FOR LAND USE AND LAND COVER MAPPING

R.Kousalyadevi & J.Suganthi

Evaluation and Study of Transition Techniques Addressed on IPv4-IPv6

Sheryl Radley,Shalini punithavathani, Indumathi

ADAPTIVE CONTROLLER FOR DRIVE SYSTEM PMSG IN WIND TURBINE

Dr.I.GNANAMBAL*G.BALAJI**M.ABINAYA***

Enhancing Varying Overhead Ad Hoc On Demand Distance Vector With Artificial Ants

BALAJI V Dr.V.DURAISAMY, N.UMAPATHI, S.SUDHA, S.UMA

Visual domain ontology using OWL Lite

Ahmad Adel Abu-Shareha, Mandava Rajeswari

Gaussian Noise removal in images using Symmetrical Fractional Overcomplete Wavelet Transform

V.Jayaraj and K.Aiswarya

Reservation based Performance Enhancement in Cloud

G. Malathy, Dr.Rm. Somasundaram, Dr.K.Duraisamy

Analysis of Cuk Converter Based Wind Energy Conversion System

G.Balaji I.Gnanambal N.Vijayalakshmi

Dynamic Load Balancing Algorithm in Cloud Network using Firefly Algorithm and Fuzzy Logic

1. N.SUSILA 2. Dr.S.CHANDRAMATHI 3. ROHIT KISHORE

An Efficient Copyright Protection Scheme for digital images based on ROI with OPT, SVD and Chaos

P.Murali & Dr. R. Krishnamoorthi

Capacity Improvement in Wireless Networks through detection and prevention of Malicious Data Transmission

D.Sylvia.Dr.B.JothiMohan,Dr.D.Srinivasa Rao

Effective Recommendation Engine formation using DFS and Genetic Approach

J. S. Kanchana

An Effective Image Processing Technique for Finding Brain Tumor Volume

Punal.M.Arabi, Priyanka.E, Ramesh.M

An Improved Detection of Epilepsy EEG Using Multi Wavelet Transform and Modified Effective Extreme Learning Machine

A.S.Muthanantha Murugavel , S.Ramakrishnan

Combined Global Local Specialized Feature Descriptor for Content Based Image Retrieval under Noisy Query

singaravelan.S and murugan.D

Tools and Techniques for Ontology Interoperability: A Survey

R. Lakshmi TUlasi, Dr M.Srinivasa Rao

A Proposed Model for Continuance Acceptance of Hospital EMR based on the Technology Continuance Theory (TCT): a case on Malaysia

Mina Sayyahgilani

MULTI CLUSTER DIMENSIONALPROJECTION ON QUANTUM DISTRIBUTED INTERFERENCE DATA

Arun Shalin.L.V,Dr.K.Prasdh

Acoustic Feature Extraction Methods LPC, LPCC and RASTA-PLP In Speaker Recognition

visalakshi.R

Performance Evaluation of Cross layer Based AODV Protocol Using Multipath Gateway Route Discovery for MANETs

K. Palani, P. Ramamoorthy

WEIGHTED QUANTUM PARTICLE SWARM OPTIMIZATION (WQPSO) AND PSO ALGORITHM TO ASSOCIATION RULE MINING AND CLUSTERING

GOKILA.D, Dr.RAJALAKSHMI.S

Cloud Architecture for the Logistics Business

Niharika Garg

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID SCHEDULING

B.Booba, Dr.T.V.Gopal

MULTIPLE ATTRIBUTES BASED SECURED SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING BLOWFISH ALGORITHM

Rinesh S

Enhancement In Accuracy Metrics Of Energy Levels In Manets

Prof.M.Sakthivel, Dr.V.Palanisamy

NEW APPROACH TO TRUST EVALUATION FOR CLUSTER BASED MANETS

Rajkumar Mylsamy, Subramanian Sankaranarayanan

Improving the Accuracy of the Supervised Learners using Unsupervised based Variable Selection

Danasingh Asir Antony Gnana Singh1 Subramanian Appavu Alias Balamurugan2 Epiphany Jebamalar Leavline 3

Semantically Optimized Ontology Based Code Mining (SOOCM)

Jayasudha.R,Shahul Hammed

A Preemptive Link State Spanning Tree Source Routing Scheme for Opportunistic Data Forwarding in MANET

R.Poonkuzhali , M.Y.Sanavullah, A.Sabari

Multi-secret Semantic Visual Cryptographic Protocol (MSVCP) for Securing Image Communications

A. John Blesswin and Dr. P. Visalakshi

A SURVEY ON SCHEDULING OF RESOURCES IN CLOUD

B.Parkavi, G.Malathy

ONTOLOGY AND HYPER GRAPH BASED DASHBOARDS IN DATA WAREHOUSING SYSTEMS

J GITANJALI

An intelligent VM placement for optimal resource utilization in the cloud computing environment

P. Aruna, S. Vasantha

A BPN BASED PARAMETERIZED PREDICTION METHODOLOGY IN MANETS

P VIGNESHWARAN

Multiplexing Techniques Performance Analysis and Linking to OFDM and MIMO

Karthik.p , Kumaran .g

X-RED: A Dynamic Detection of Clone Attacks in Static Wireless Sensor Networks

Geetha C, Ramakrishnan M

Framework for Personalized Learning System Using Ontology

T. PAKIR MOITHEEN & DR. P. SHEIK ABDUL KHADER

Theoretical Study of Ene-reaction of allylic Grignard reagents

Elahe Rajaeian and Avat (Arman) Taherpour

A metric to assess the performance of mlir systems

sujatha pothula

A Survey on multicast routing protocols and its major security issues in Mobile Ad-hoc Network

R. Regan, J. Martin Leo Manickam, D. Muruganandam

Efficient Multipath Routing Tree based Energy Minimization in Wireless Sensor Networks

N.Suma and Dr.T.Purusothaman

LEAN APPROACH IN MODULATOR VALVE MANUFACTURING THROUGH VALUE STREAM MAPPING

K.P.Paranitharan * , T.Ramesh Babu, A.Syath Abuthakeer, A.Pal Pandi

VIDEO STREAMING: SINGLE AND COMPOUND REPORT TRANSCODING METHOD

S.Vetrivel ,Dr G.Athisha

AN AREA EFFICIENT WEIGHTING COEFFICIENT GENERATION ARCHITECTURE FOR POLYNOMIAL CONVOLUTION INTERPOLATION

C. JOHN MOSES, Dr. D. SELVATHI

Performance Analysis of Recent Histogram Based Techniques for Image Contrast Enhancement

V.Magudeeswaran and C.G.Ravichandran

Design of Novel Security Architecture for MANET for Trusting and Authentication

J.Chandra Sekhar Dr.R.Sivaramprasad

SEMANTIC CLASSIFICATION AND REGION GROWING OF BRAIN MRI USING CANFIS MODEL FOR TUMOR IDENTIFICATION

K.Selva Bhuvaneswari

A TECHNIQUE TO PARALLELIZE NETWORK INTRUSION DETECTION USING MULTICORE NETWORK PROCESSORS

MR. M. RAVICHANDRAN, DR. C.S. RAVICHANDRAN

Review on Mobile Commerce in Electronic Commerce

Wong. Lun, Raed. Alsaqour, Hothefa. Shaker

FACE RECOGNITION USING RELATIONSHIP LEARNING BASED SUPER RESOLUTION ALGORITHM

C SenthilSingh , M.Manikandan

EFFECTIVE FACE RECOGNITION THROUGH COLOR LOCAL TEXTURE FEATURES

Arathy.V , Dr.P.Srinivasa Babu

An automatic detection of E-BANKING Phishing web pages with NEFCLASS BACK PROPAGATION

Malathi.P,Dr.P.Vivekanandan

RECOGNITION OF FACE IMAGES THROUGH THE FUSION APPROACH

Arathy.V , Dr.P.Srinivasa Babu

An Overview of Pixel domain and Wavelet domain filters for Video denoising

Ms.V.Sasikala, Dr.N.umamaheswari,Dr.R.Venkatesh

A New Text Mining Approach in Search Technology

B.SunilSrinivas, P.N. Santosh Kumar, Dr.A.Govardhan, Dr.C.Sunil Kumar

Exploring on Budget constraint scheduling algorithms in Grid Computing

I. Stephie Rachel , S.Devi priya

Unified Power Quality Conditioner with Fuzzy Logic, Neural Network and Neuro Fuzzy Controllers for Power Quality Improvement

D. Rajasekaran, Subhransu Sekhar Dash

A SECURE AUTHENTICATION FRAMEWORK FOR MOBILE ADHOC NETWORKS

E.A>Mary Anita

A Comparative Study of Online Joining Approaches based on Memory Flushing Patterns

Pratik Patel and Raksha

PALM PRINT TEXTURE RECOGNITION USING CONNECTED-SECTION MORPHOLOGICAL SEGMENTATION

Mrs. A.KANCHANA,Dr.S.ARUMUGAM

A SURVEY ON FPGA IMPLEMENTATION OF MEDICAL IMAGE REGISTRATION

C. JOHN MOSES, Dr. D. SELVATHI

Preprocessing and Generation of Association Rules for Bone Marrow Analysis Data of Haematology for Acute Myeloid Leukemia

D.Minnie, S.Srinivasan

Text Document Clustering with Flocking Algorithm using Specific Crimes Judgment Corpus

S.Vijayalakshmi, Dr.D.Manimegalai

Using crowdsourcing system for creating site-specific statistical machine translation engine

Alexander Kalinin, George Savchenko

Multicast QoS Provisioning under Enhanced Admission Control for Multicast

I. Sathik Ali, Dr. P. Sheik Abdul Khader

Optimal Heterogeneous Network Selection Based on Estimation of Network Quality Factor (NQF)

Bhuvaneswari MARIAPPAN and Shanmugalakshmi RAMACHANDRAN

bacteria foraging optimization algorithm for dynamic shortest path routing problem in mobile adhoc network

S.Mangaiarkarasi

Cornbach Alpha Coefficient based trust model for Routing in MANET

S. Pariselvam, Dr. R.M.S. Parvathi

Traffic Based Random Deployment of Relay Nodes in Wireless Sensor Networks

K. Ramalakshmi, Dr.K. Thanushkodi

Synonym Based Duplicate Record Detection

Amshakala.K and Dr.Nedunchezhian.R

A Secure and Fault-Tolerant Routing Protocol Based on GDDA and HLUA

A. Gopi Saminathan, Dr.S. Karthik

Website Quality Assessment Model (WQAM) for Developing Efficient E-Learning Framework- A Novel Approach

R.Jayakumar, Dr. Banbehari Mukhopadhyay

TOLERANCE BASED ADAPTABLE FRAMEWORK FOR PROFICIENT MASSIVE DATA MINING IN WIRELESS SENSOR NETWORKS

J. Nagaraj, Dr.G.M. Kadhar Nawaz Ph.D

GPS Based Guiding System for a Small Car

Loay E. George, Mamon J. Mohammed

C-mac: an efficient energy postulate based on energy cost modeling in wireless sensor network

M. Preetha, Dr.B. Parvathavarthini

A Methodological Survey on Load Balancing Techniques in Cloud Computing

P. Mohamed Shameem, R.S. Shaji

A noise reduction approach for Speech Signal based on Steins unbiased risk estimate

S.Karthikeyan, P.Ganesh Kumar, K.Saran

THE APPLICATION OF KNOWLEDGE MANAGEMENT IN CONSTRUCTION ORGANIZATION IN NIGERIA

KASIMU M. A1; ROSLAN AMIRUDDIN2; FADHLIN ABDULLAH3

The SQL Injection Attack Detection and Prevention by Classification and Analysis

V.Nithya, S. Lakshmana Pandian , R.Regan

Corpus Callosum Classification Using Case Based Reasoning and Genetic Classifier for the Prediction of Epilepsy from 2D Medical Images

Tamije Selvy P, Palanisamy V, Elakkiya S

Segmentation of CSF in MRI Brain Images Using Optimized Clustering Methods

P.Tamije Selvy, Dr.V.Palanisamy, M.Sri Radhai

A COMPREHENSIVE REVIEW OF ENGINEERING EDUCATION QUALITY MANAGEMENT PERSPECTIVE

A. Pal Pandi P.V. Rajendra Sethupathi 2

Social Engineering in Phishing Attacks in the Eastern Province of Saudi Arabia

Mr. Zafar Kazimi, Dr. Jaafar Al Ghazo

SECURED ANT COLONY OPTIMIZATION ROUTING FOR WIRELESS NETWORK

D.SRINATH, J.JANET

ENHANCING INTRUSION DETECTION USING LAYERED APPROACH WITH PCA

B.Ben Sujitha & Dr.V.Kavitha

Development of Energy Based Dynamic Routing Scheme (EBDRS) For Delay Tolerant Sensor Networks

Dr.R.Kanthavel, R.Dhaya , Shirin Ayisha Maryam

Machine Translation using Mutiplexed PDT for Chatting Slang

Rina Damdoo

MANET with Q Routing Protocol

Prof Rahul Desai, Prof B P Patil

OpteLoc: An optimal energy consumption model for localization in wireless sensor network using multi-hop cluster routing and discrete power control

M.Vasim babu,A.V.Ramprasad

Secure Authentication Technique For Localization In WirelessSensor Networks

Mr.P. S. Velumani,Dr.S.Murugappan

An Extensive Literature Review on CLIR and MT activities in India

kumar sourabh

An MPLS based Load Balancing Technique for VoIP flows

J.Faritha Banu and V.Ramachandran

CONTENT-BASED VIDEO STREAMING USING NS2- DESIGN AND SIMULATION

sankar.p and chellamuthu.c

Performance evaluation of chaotic encryption technique

Ancy Mariam Babu and K. John Singh

Web Based Management for Online Finance System

Maria Akther , Md. Kaiser Ahmed , Md. Zahid Hasan

Investigation on IRIS recognition system adopting cryptographic techniques

Selvamuthukumaran.S, Ramkumar.T,Hariharan.S

Investigating Dynamics of Software Project Quality under Requirement Volatility Patterns

Rahul Thakurta

Knowledge Distribution in Multi Agent Systems

William J. Teahan, Nidal A. Al-Dmour, Peter G. Tuff

Simulating Camel-Vehicle Accidents Avoidance System

Khaled Ragab

Empirical Evaluation of the End User Attitude (EUA) Toward Use of Information Technology

Ali Asgari, Mohsen Zargham

Load Balancing in Peer-to-Peer System Using Fuzzy Clustering

.S.Dixit, Rupali Bhardwaj,Anil Upadhyay

Binary Validation as Segmentation for Cursive Handwriting Recognition

Hong Lee

Industrial Espionage as a Method of Technology Transfer and How to Prevent It

Hessam Zandhessami, Pouya Majd Pezeshki, Abolfazl Moradian

Comutational Performance Of GRNN in Weather Forecasting

1Tiruvenkadam Santhanam and A.C. Subhajini

Internet Penetration and Diffusion in Nigeria: Prospects and Bottlenecks

AO Agbakwuru, EA Ukwandu and Iro Sylvanus

An Effective Classification Technique for Microarray Gene Expression by Blending of LPP and SVM

J. Jacinth Salome and R.M.Suresh

Additive White Gaussian Noise Removal Using Viterbi Algorithm

M.Sreedevi1and P.Jenopaul2

Morphological Filtering and Structural Coding Analysis of an Image

M.Sreedevi1, P.Jenopaul2

An Efficient Image Segmentation Using Hough Transformation

M.sreedevi1,P.Jeno Paul 2

The Information Value of Traditional Tiv Music and Dance in the Age of Modern Communication Technologies

Jude Terna Kur, PhD & Nicholas Sesugh Iwokwagh, PhD

EXTRACTING WEB USER PROFILES USING H - UNC CLUSTERING

Karthikeyan.S,hakkeem.M

Study on Factors Influencing Selection and Implementation of ERP systems

Dr. Nasina Jigeesh

COMPUTER-ASSISTED PROGRAMMED INSTRUCTION REVISITED: A STUDY ON TEACHING TYPEWRITING IN NIGERIAN HIGHER INSTITUTION

Alaba Olaoluwakotansibe Agbatogun; Peter Ayo Ajelabi, Ph.D; Lawunmi, M. Oyewusi, Ph.D; Juliet Inegbedion

A Review of Some Issues and Challenges in Current Agent-Based Distributed Association Rule Mining

Ogunde A. O. , Folorunso O., Sodiya A. S. and Ogunleye G. O.

Improved IP Trace Back Using Pre-Shared Key Authentication Mechanism

Jeevaa Katiravan

Implementation Issues in Online Voting

Kalaichelvi V and RM.Chandrasekaran

Study on the effect of Video Traffic on responsive flows using queue management algorithms

Sankar.P and Chellamuthu.C

A Constructivist Model for the Technological Enhancement of University Materials

Gholam Reza Zarei

An Enhanced Packet Retransmission Method for Improving TCP-Aware Source Routing in Mobile Ad-Hoc Network

Kannan.S

Effect of Coding Schemes with Clipping and Filtering Method to Reduce PAPR on the Performance of OFDM System over Noisy Channels

Md. Zahid Hasan

Computer Approach to Analysis and Solution of Graphical Problems in Mathematics

ABASS Olalere A., FATADE Olufemi A., ARIGBABU Abayomi A. & LONGE Olumide B.

A Comparative Study of Bagging, boosting and c4.5: The recent improvements in decision tree learning algorithm

Subrata Pramanik, Utpala Nanda Chowdhury, Bimal Kumar Pramanik and Md. Nazmul Huda

Modified ID-Based Public key Cryptosystem using Double Discrete Logarithm Problem

Chandrashekhar Meshram

Design of Operational Software for Investigation and Intelligence Department of Nigeria Police Force

A.O Ajibulu, O.V Omolafe

Biometric Authentication System using Non-Linear Chaos

A.Senthil Arumugam

INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCE SUPPORT AVAILABILITY, UTILISATION AND PROFICIENCY SKILLS AMONG UNIVERSITY LIBRARIES:THE LAGOS STATE UNIVERSIY EXPERIENCE

1AINA, A.J., 1ADIGUN, J.O., TAIWO, and OGUNDIPE, T .C

Infrared Security alarming system

Kh. asaduzzaman, M. Nazrul Islam and Mahbubul Hoq

Discovery of Maximal Contiguous Sequence Patterns with Priority in Web Logs

M.THILAGU and R.NADARAJAN

Analysis of Availability and Reliability for Repairable Parallel Systems with Different Failure Rates

M. A. El-Damcese, N. S. Temraz

Clustering and Classification of Gene Expression Profiles of Microarray Data Using Statistical and Machine Learning Techniques

M.Hemalatha,Vivekanandan and Edwin robbert

Ontology-Based Query in Heterogeneous & Distributed Data Sources

NAJOOD AL-GHAMDI, MOSTAFA SALEH, FATHY EASSA

Construction and Count of Balanced Algebraic Immune Boolean Functions with Lobanov's Bound of Nonlinearity

Qian-Qiong Wu and Ming Duan

Development of a one touch information relay system for distress calls-Digital circuit design.

O.O.Fagbohun,F.O. Edeko

A Survey of Routing instability with IP Spoofing on the Internet

D. Srinath, J. Janet and Jose Anand

An Ellipsoidal 3D Shape Representation and Wavelet Transform Feature Descriptor for 3D Shape Retrieval

Asma Khatun, Prof. Wang Yin Chai, Md. Rabiul Islam

Developing a Maintainability Metric for Inner Classes

Sim Hui Tee

A Web-Based Face Recognition System Using Mobile Agent Technology

Md. Geaur Rahman, Somlal Das, A. R. S. Ahmed Siddique and Md. Khademul Islam Molla

Developing an Agent-Mediated E-Commerce Environment for the Mobile Shopper

Md. Geaur Rahman, A. R. S. Ahmed Siddique, Somlal Das, A. K. M. Akhtar Hossain and Md. Khademul Islam Molla

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved