International Journal of Applied Engineering Research (IJAER)

 

 

 

Volume 10, Number 82 (2015)   Special Issues

 

CONTENTS

 

 

RESEMBLANCE SEARCH THROUGH SECURE KNN AND LSH IN CLOUD
pp.1-7
G Reddy Rani and G Reddy Rani

IMPROVED APRIORI ALGORITHM USING GENETIC ALGORITHM FOR ITEMSET MINING
pp.8-12
D. Ashok Kumar and T. A. usha

CLOUD SECURITY ALGORITHMS A SURVEY
pp.13-18
D.I. George Amalarethinam and H.M. Leena

AN ALGORITHMIC APPROACH WITH HBMO TO EFFICIENT DATA PREDICTION USING ARTIFICIAL NEURAL NETWORK
pp.19-23
T. Chakravarthi and k.kalyani

Prediction of Diabetes mellitus using Data Mining Techniques: A Survey
pp.24-31
D.I.George Amalarethinam and N.Aswin Vignesh

Analysis of Measuring the Complexity of Advice using a Cognitive Approach
pp.32-37
G.Arockia Sahaya Sheela, A.Aloysius and K.R.Martin

A Survey on Big Data Analytics
pp.38-42
R. Vanathi and A. Shaik Abdul Khadir

Intelligent Agent for Network Monitoring
pp.43-47
B.Murali and T.N.Ravi

Extended Load Shared Ant Colony Optimization for Meta Task Scheduling in Grid Computing
pp.48-54
T.Kokilavani and D.I. George Amalarethinam

A Predictive Model to Forecast and Pre-Treat Diabetes Mellitus using Clinical Big Data in Cloud
pp.55-59
Shantha Mary Joshitta and L. Arockiam

Challenges In Cloud Computing Security
pp.60-64
Lalu P.George and D.I. George Amalarethinam

ENHANCED ELLIPTICAL CURVE CRYPTOGRAPHY BASED PKI FOR SECURE DATA STORAGE IN A CLOUD
pp.65-71
B.Rex Cyril and S.Britto Ramesh Kumar

Software Reliability Growth Model based on Order Statistics of Lehmann-Type Laplace Distribution-Type II
pp.72-78
V.S.Akilandeswari and V.Saavithri

Intelligent Ranking Of Cardio Vascular Disease Among Indian Patients
pp.79-83
M.SHOBEETHA and A.SHAIK ABDUL KHADIR

Fuzzy Logic Decision Based Effective Adaptive Median Filter for Removing High Density Impulse Noises in Digital Images
pp.84-90
S. Abdul Saleem and T. Abdul Razak

Validation of Cognitive Weighted Method Hiding Factor Complexity Metric
pp.91-96
Francis Thamburaj and A. Aloysius

The Performance Comparison of Spatial Filtering based on the Full Reference Image Quality Measures PSNR, RMSE, MSSIM and UIQI in Medical Image Improvement
pp.97-102
A.R.Jasmine Begum and T. Abdul Razak

A SURVEY ON MEDICAL APPLICATION USING CLOUD COMPUTING
pp.103-108
T.NALINI and A.SHAIK ABDUL KHADIR

A Novel Approach to build Smart Phone based Wireless sensor Networks for Social Wellbeing
pp.109-115
Wilson Thomas and E. Madhusudhana Reddy

GREEN CLOUD TECHNIQUE:A SURVEY
pp.116-121
Helen Anderson Akpan and Rebecca JeyaVadhanam

Improving the Reliability of data transfer against sinkhole in Wireless Sensor Networks a Review
pp.122-125
M.S.Nidhya and R.Chinnaiyan

A Dynamic Two Stage Authentication Framework to Enhance Security in Public EduCloud
pp.126-131
G. Kumaresan, N. Veeraragavan and L. Arockiam

An experiment report on identifying disease patterns for Healthcare System based on Data Mining
pp.132-136
J.Anitha Arockia Rani and S.Baskaran

Discovering a Solution for Web Hubs using Candidate Transaction Rank Algorithm
pp.137-142
Srinaganya.G. and J.G.R.Sathiaseelan

AN EFFICIENT SEMANTIC SIMILARITY BASED EXTRACTION OF LEXICAL DATA USING PATTERN MATCHING MODEL
pp.143-153
Elavarasan. N, LakshmiPraba. M, Anand Kumar. P and Elamaran.E

Data Mining Approaches For Principle Component Analysis
pp.154-160
Elavarasan. N, LakshmiPraba. M, Anand Kumar. P and Elamaran .E

A NOVEL COMPUTATIONAL APPROACH FOR HAAR WAVELET TRANSFORM TO COMPRESS GRAY SCALE IMAGES
pp.161-167
S.Vimala and P.Uma

SPBHCMA: A Secured Priority Based Health Care Monitoring Algorithm for Body Area Networks
pp.168-172
V. Sethupathi and E. George Dharma Prakash Raj

A Comprehensive Study of Cloud Computing and its Research Issues
pp.173-175
S.Vimala and V.Nisha

MRImgEncA- Analysis and Enhancement of speed and security in Public key Cryptography for image file
pp.176-181
D.I.George Amalarethinam, J.Sai Geetha and K.Mani

An Analysis of Autism Dataset using Artificial Neural Networks
pp.182-186
M.S. Mythili and A.R. Mohamed Shanavas

Traceability and Batch Auditing in Shared Provable Data Control in Multi-Cloud Storage
pp.187-190
S.Shaajitha Banu and K.Gokulraj

Analysis of Student Performance Based On Personality and Informal Learning Using Data Mining Classification Techniques
pp.191-199
A.HENDRY RICHARD

Biometric Templates Security Using Visual Cryptography
pp.200-204
A. Shaik Abdul Khadir and G Kanimozhi

Performance Analysis for Diabetes Diagnosis using Open Source Tools
pp.205-207
N.Vanitha

A Comparative Study on Traditional and Virtual Classrooms
pp.210-215
J. Carmelete Silviya and Edel Josephine Rajakumari

DAG based Dynamic Task Scheduling in Heterogeneous System
pp.216-222
A. Maria Josphin and D.I.GeorgeAmalarathinam

Fast and Effective Real Time Sentiment Analysis on Streaming Big Data using Distributed Caching Techniques
pp.223-228
D.I. George Amalarethinam and V. Jude Nirmal

A Recommendation Method for Travel Package in Mixed Approach
pp.229-235
V.Lakshmi Ganesh Kumar and E.Madhusudhana Reddy

Ensuring Data Integrity Auditing for Secure Cloud Storage in Distributed Services
pp.236-240
D.I.George Amalarethinam and Salvia Horne

Regmentation:Image Registration for Segmentation Using Third Order Edge Mask and Bidirectional Labeling Scheme
pp.241-246
G.J.Joyce Mary and A.Rijuvana Begum

Issues and Challenges hampering the evolution of IoT big data analytics
pp.247-251
I.Priya Stella Mary and L. Arockiam

ENERGY EFFICIENT TARGET TRACKING AND DATA COLLECTION IN WIRELESS SENSOR NETWORK
pp.252-261
V.Jayaraj, U.Durai and V.Mathimalar

A Survey on Meta Task Scheduling in Cloud Computing
pp.262-266
D.I. George Amalarethinam and S.Kavitha

Scheduling Framework for Regular Scientific Workflows in Cloud
pp.267-271
D.I. George Amalarethinam and T. Lucia Agnes Beena

eDSSuMRT- ENSURED DATA SECURITY STRATEGY USING MATRIX RANDOM TRAVERSAL IN CLOUD STORAGE ENVIRONMENT
pp.272-279
D.I.George Amalarethinam and B.FathimaMary

A Filter-based Feature Selection using Information Gain with Median Based Discretization for Naive Bayesian Classifier
pp.280-285
K.Mani and P.Kalpana

Parallel Prediction Model for Big Data using MapReduce Programming Model
pp.286-291

B.Arputhamary and L. Arockiam

Autoconfig algorithm: Result analysis using test point method
pp.292-295

Abdul Rauf EM and E.Madhusudhana Reddy

Improving the Speed of Scalar Point Multiplication in Elliptic Curve Cryptography Using 1s Complement
pp.296-301
K. Mani and M. Viswambari

Extemporization of Business Strategies using Apriori based on Import and Export Patterns with Quantities
pp.302-306
K.Mani and R.Akila

A SECURITY FRAMEWORK FOR SOCIAL NETWORK SERVICES
pp.307-314
S. Thiraviya Regina Rajam and S. Britto Ramesh Kumar

HAADAS : An enhanced approach for Re-allocation of Fragments in Peer-to-Peer Distributed Databases
pp.315-320
D.I. George Amalarethinam and C. Balakrishnan

RankingComponents in various Cloud Model for Cloud Migration: A Survey
pp.321-327
T. Karthikeyan and T. Nandhini

A Review on Recognition and Classification of Ancient Scripts in Stone Inscriptions Using Image Segmentation Techniques
pp.328-332
S. Sundareswari and I. Kaspar Raj

Enhancing Security in PublicKey Algorithms using SCRZE Approach
pp.333-337
K Mani and R. Mahendran

MULTI DIMENSIONAL QUALITY ATTRIBUTES APPROACHES FOR ADAPTING COMPONENT-BASED SYSTEMS
pp.338-342
Saradha. R and Mary Jesintha.X

A Review Of Mining Frequent Patterns
pp.343-349
Ramah Sivakumar and J.G.R.Sathiaseelan

Enhancing Security in Cryptographic Algorithms Based on IENCCRS Scheme
pp.350-354
K.Mani and A.Devi

Virtual machine Migration based on greedy Knapsack algorithm for optimization in Cloud computing
pp.355-358
J.MadhuPriya

Implementation of KM Framework for Social Networking Web-pages
pp.359-362
Rajesh D and K.David

Critical Task First Algorithm for Scheduling Parallel Applications in Grid Environment
pp.363-373
D.I.George, P.Muthulakshmi and Ignatius Stanis Santosh.G

Dependency Analysis for Component Based Systems using Graphs
pp.374-379
D.I.George Amalarethinam and P.H. Maitheen Shahul Hameed

SEFM Secure Enterprise Fence Monitoring on the Cloud
pp.380-387
Thiruchendhil Arasu and E.George Dharma Prakash Raj

Text Mining In Big Data Analytics - Survey
pp.388-393
R.Merlin Packiam and Sinthu Janita Prakash

A Survey on Task Scheduling Algorithms in Cloud Computing Environment
pp.394-400
H.Krishnaveni and V.Sinthu Janita Prakash

Algorithm for Managing Uncertainty in Job and Data Aware Scheduling in Grid Computing
pp.401-408
G.Kalpana and D.I.George Amalarethinam

An EMPRICAL REVIEW ON ENHANCING THE ROBUSTNESS OF MULTIRESOLUTION WATERMARKING
pp.409-414
S.Selvam, S.Thabasu Kannan and S.Pragatheswaran

A NEW TECHNIQUE FOR COLOR-BASED IMAGE RETRIEVAL SYSTEM USING HISTOGRAM
pp.415-421
S.Selvam, S.Thabasu Kannan and P.K.Hari Hara Prabu

A Novel Method for Representing User Activities in a Smart Environment
pp.422-427
H. Karamath Ali and D. I. George Amalarethinam

AUGMENT THE SECURITY IN MANET USING QOS - DHT A NOVEL KEY SHARING PROTOCOL
pp.428-435
P.Rajeswari and T.N.Ravi and A.Bhuvaneswari

Entropy Based Image Retrieval Method for Retrieving the images and Feature Based Image Recovery Method for Extracting the Features via Image Gathering and Reclamation using Image Mining Procedures
pp.436-443
K.Saraswathi and V.Ganesh Babu

HUDDLING ANALYSIS PROCEEDING MRI IMAGES INTENSE IKM
pp.444-451
S.DIVYA and A.R.MOHAMED SHANAVAS

A technical review on Clustering Techniques
pp.452-456
R . GOVINDARAJ and T. N. Ravi

Hybrid Flow Shop Scheduling Problem with Preventive Maintenance as Constraints: A Discrete Firefly Algorithm Approach
pp.457-464
A. Delphin Carolina Rani and B.S.E. Zoraida

An Enhanced AODV Routing Protocol for Wireless Sensor Network using NS2.34
pp.465-471
J.Daniel Mano and S.Sathappan

Issues and Perspectives on Road Traffic Signal Control Systems and Methodologies
pp.472-476
V.C.Maha Vishnu and M.Rajalakshmi

Distance Based Approach for Data Clustering Problems Using Hybrid K-means++ and Improved Fuzzy c-means Algorithm
pp.477-483
O.A. Mohamed Jafar and R. Sivakumar

Confidentiality Framework to Enhance Data Security in Public Cloud Storage
pp.484-488
S. Arul Oli and L. Arockiam

Proposed Architecture for Secure Distributed Data Transaction Management in Cloud Environment
pp.489-497
J.Antony John Prabu and S Britto Ramesh Kumar

FSBIR: Fuzzy Implemented Semantic Based Information Retrieval Algorithm using Query Expansion
pp.498-502
R. Thamarai Selvi and E. George Dharma Prakash Raj

Market Basket Analysis in Association Rule Mining Based on Frequent Itemset
pp.503-507
M.Sathya and K.Thangadurai

Dynamic Triangular Vision and Optimized Slant Selection Protocol for Mobile Ad Hoc Networks
pp.508-514
M.Anandhi and T.N.Ravi

A Study and Exploration of Privacy Preserving Distributed Data Mining Rules
pp.515-522
J.Preethy and R.Hemalatha

Enhanced Swarm Based Feature Selection for Clustering Gene Expression Data
pp.523-527
P. K. Nizar Banu and S. Andrews

Security Issues in Internet of Things using Next Generation Mobile Networks
pp.528-531
George Gabriel Richard Roy and Britto Ramesh Kumar

LEARNING BEHAVIOR ANALYSIS USING DATA MINING TECHNIQUES
pp.532-537
I.Carol and S.Britto Ramesh Kumar

AGGRANDIZING AUTHORIZATION BY ENHANCING TRUST USING FUZZY LOGIC IN CLOUD ENVIRONMENT
pp.538-542
J.Persis Jessintha and R.Anbuselvi

Internet of Things (IoT) Architecture for Smart Services
pp.543-548
Vimal Jerald. A, Daisy Premila Bai. T and Albert Rabara. S

Human Face Recognition System (HFRS) using K Nearest Neighbor (KNN) and Hierarchical Agglomerative Clustering (HAC)
pp.549-553
A. Vijaya Kumar and R. Ponnusamy

A Multi-Layered Secured Framework for Context-Aware Web Services in Health Care Industries
pp.554-560
P.Joseph Charles and S. Britto Ramesh Kumar

Prediction of Defects in Defects Reduction A Brief Study
pp.561-564
K. DAVID and R.ANAND

A Novel Algorithm for Handling Missing Values Based on Decision Attribute
pp.565-569
J. Hajiram Beevi and M. Nazreen Banu

Comparative Analysis of Decision Tree Classifiers for Machine Learning of Chronic Kidney Disease
pp.570-576
L.Jerlin Rubini and P.Eswaran

Artificial Intelligence based Cyber Defense
pp.577-585
S. Senthil Kumar and T. N. Ravi

Cloud Computing in Higher Education
pp.586-591
G.Sobers Smiles David and R.Anbuselvi

Educational Data Mining Using SCORM Specifications on Learning Management System.
pp.592-600
Zameer Gulzar, A. Anny Leema and A.Salman Ayaz

DESIGN OF A WIRELESS TRANSFER FOR A SECURE SIGNAL OF SENDER AND RECEIVER SYSTEM THROUGH THE NETWORK
pp.601-605
R.DURGA and P.SUDHAKAR

A Study on Biometric Iris Recognition System.
pp.606-612
K.Saminathan, T.Chakravarthy and M.Chithra Devi

GLCM Inertia Based Ultrasound Image Enhancement
pp.613-617
P.Shanmugavadivu and A.Shanthasheela

A Study on Big Data Storage Tools and its Specifications
pp.618-625
M. Durairaj and A. Alagu Karthikeyan

Secure Data Forwarding using Proxy based Cloud Re-Encryption Scheme
pp.626-628
V. Sobana Devi and G. Ravi

Building Numerical Clusters Using Multidimensional Spherical Equation
pp.629-634
A. Joy Christy and S. Hari Ganesh

An Improved Anisotropic Diffusion of Rate Control Algorithm Approach for H.264/AVC
pp.635-639
M.Arrivukannamma and J.G.R.Sathiaseelan

Incorporating the Services of Mobile Technology to Meet the Demand of Medical Emergencies Smart Blood Donors Management and Mapping System
pp.640-643
A.Jenita Mary, A.Subashini and Ignatius Stanis Santosh.G

Challenges and Solutions of Smart Communication in VANET: A Survey
pp.644-648
Pragasa Mary and D. Pugazhenthi

Big Data: An Analysis and Survey of Past Decade
pp.649-654
S. Roshnara Banu, D. Saraswathi F. Jeno Sandana Brina Rouvier and R. Priya

Customer Churn Prediction Using Hybrid Support Vector Machine in Telecommunication Industry
pp.655-662
S.Induja and V.P.Eswaramoorthy

An Empirical Study on Sensor Nodes to Increase the Energy in Wireless Sensor Networks using Directed Diffusion Technique
pp.663-666
P. KARTHIKEYANI and P.Arul

Analysing Students Performance Using Educational Data Mining Methods
pp.667-671
S. Lakshmi Prabha and A.R.Mohamed Shanavas

High Secure HDWT based Image Steganography and Genetic algorithm based chaotic Encryption
pp.672-678
G.Sudha devi and K.Thangadurai

AN IMPROVISED RUN LENGTH ENCODING BASED DNA SEQUENCE COMPRESSOR
pp.679-683
Panneer Arokiaraj S, Robert L and Arunachalaprabu G

A Novel Support Vector Machine Based Image Mining Framework with Relevance Feedback to Diagnosis MRI Brain Tumor
pp.684-692
M.Arthi and V.P.Eswaramurthy

A Novel Privacy-Preserving Patient-Centric Clinical Decision Support System Based On Enhanced Least Square Support Vector Machine
pp.693-698
M.sathya and R.Hemalatha

Vibrant Ambient Intelligence with Modified Edge based Greedy Routing Approach
pp.699-704
T. Karthikeyan and V. Rajasekaran

MAXRG : MAXIMIZATION OF RESOURCE UTILIZATION FOR GRID COMPUTING ENVIRONMENT
pp.705-710
S. Vaaheedha Kfatheen and M. Nazreen Banu

Visual Cryptography and Stegnography for Data Hiding in image to avoid Bot attack
pp.711-713
Diana Judith.I and G.J.Joyce Mary

 

An Empirical validation of Effort Estimation Techniques
pp.714-718
V.Jayaraj, N.A.Bhaskaran and S.Hemalatha

 

[UP]

 

 

 All rights are reserved with Research India Publications                             Home  Journals  Contact