Volume
7, Number 1, (2015)
CONTENTS
An Outsourced image reconstruction in Cloud computing
pp. 1-9
G.S.Arun Kumar and S.Md.Ghouse
Customization of U-Boot for TFTP and Flashloader
pp. 11-19
Siddharth Narayanan and Sameer Kadam
On Demand Security For Personal Health Record In Cloud Computing
pp. 21-28
V. Indhumathi and V. Prakasham
Replica Node Attack Detection Approaches in Static WSNs
pp. 29-38
Geetha C and Ramakrishnan M
A Novel Frame Work For Cloud Computing Security By Using Abe
pp. 39-44
P.Srinivas Kumar and S.Venkateswarlu
Breast Cancer Detection In Data Mining: A Review
pp. 45-48
S. Yuvarani and C. Jothi Venkateswaran
A Survey on Multimedia Analytics using
Big Data Analytics
pp. 49-57
T.V.M. Sairam and B. Thirumala Rao
A Comparative Analysis Of Back
Propagation And Random Forest Algorithm For Character Recognition From
Handwritten Document
pp. 59-66
Amit Verma and Gagandeep kaur
Mining User Profile Exploitation Cluster From Computer Program Logs
pp. 67-73
R.Elankavi, R.Kalaiprasath and R.Udayakumar
Fault Management Strategies For Timely
Detection Of Failures
pp. 75-81
R. Elankavi, R. Kalaiprasath and R. Udayakumar
Dual Band, Dual Slant Polarized
Microstrip Patch Array Antenna
pp. 83-89
R.Kalaiprasath, R.Elankavi and R.Udayakumar
Comparison Of SRLCS With Clustal-W For
Characteristic Longest Common Subsequence In Biosequences
pp. 91-96
R. Kalaiprasath, R. Elankavi and R. Udayakumar