ஆய்வுக் கட்டுரை
Sustaining Isolation Security for Preserving User’s Seclusion in Web Search Engines
Secure Data Storage using Decentralized Access Control with Anonymous Authentication Using Cloud
Log Linear Model for String Transformation Using Large Data Sets
A Progressive Approach to Enhance Lifetime for Barrier Coverage in Wireless Sensor Network
Literature Survey on Mobile Q&A System in the Cloud Based Environment
Cloud Computing:Ultimate Home of All Computing Resources
Spectral Characteristics of Uniform Fiber Bragg Grating With Different Grating Length and Refractive Index Variation
Scanning Severe Motion Blur Level in Barcode Images Using Image Blur Estimation Scheme
Fingerprint Image Enhancement Algorithm and Performance Evaluation
WBC Segmentation Using Morphological Operation and SMMT Operator - A Review
Integrated Topology Control and Routing Problem in Cluster-Based Wireless Sensor Networks
Recognition of Novel Variance Parameters Using Taguchi Loss Function in MANET
Neuro Fuzzy Classifier for Image Retrieval
Facial Expression and Visual Speech Based Person Authentication Using Local Binary Pattern Histogram
A Review on Model Based Neuromuscular Blockade Control System with Injector
Zigbee Sensor Network Integrated with 4G Using Tree Routing for IoT Applications
An Investigation on Gesture Analysis and Geometric Features Extraction
A Literature Review on Variation in Text and Different methods for Text Detection in Images and Videos
Implementation of a Wireless Gesture Controlled Robotic Arm
Periocular and Iris Feature Encoding - A Survey
Ensembles of First Order Logical Decision Trees for Imbalanced Classification Problems
Different Syntactic Methods and Clustering For Web Service Integration
Smart Phone Controlled Robot Using ATMEGA328 Microcontroller
A Novel Collective Neighbor Clustering in High Dimensional Data
Generic Lossless Visible Watermarking: A Review
An Overview of Content Recommendation Methods
A Survey on Preserving State of Location Privacy in Geo Social Application
A Literature Review on Different models for Human and Vehicle Tracking
Building a Tool to Extract Data from Users and Potential Users of E-Government
Building a tool to extract data from users and potential users of e-government
Software Development Risk Aspects and Success Frequency on Spiral and Agile Model
Randomly Directed Exploration Protocol for Clone Detection in Wireless Sensor Networks
Adaptive Intelligent Traffic Control System using PLC
Review of Logo Matching & Recognition System Based On Context Dependency
Application of Genetic Algorithm in Communication Network Security
Empirical Study of Motion Planning in Robotic Control Model
Bioinformatics Based Analysis of Microarrays in Human Bipolar Disorder
Safety Platform of Traffic in Cloud Computing Environment
Future Trends of Cloud Computing Security: An Extensive Investigation
Certain Investigations on Evolution of Approaches for Cloud Computing Security
Strategies Developed for Effective Discovery of Dependencies: A State-of-the-Art Survey
Further More Investigations on Evolution of Approaches for Cloud Security
Detailed Investigation on Strategies Developed for Effective Discovery of Matching Dependencies
Further Investigations on Methods Developed for Preserving Privacy of Computational Grids
A Survey on Decentralized Access Control Strategies for Data Stored in Clouds
Survey on Security on Cloud Computing by Trusted Computer Strategy
Further Investigations on Strategies Developed for Efficient Discovery of Matching Dependencies
Further Investigations on Evolution of Approaches Developed For Database Security
Certain Investigations on Anonymous Authentication Mechanisms for Data Stored in Clouds
Evolution of Cloud Computing: A State-ofthe- Art Survey
Certain Investigations on Methods Developed for Efficient Discovery of Matching Dependencies
Investigations on Evolution of Approaches Developed for Data Privacy
Security in Cloud Computing using Cryptographic Algorithms
Performance Analysis of Local Adaptive Real Oriented Dual Tree Wavelet Transform in Image Processing
Support Vector Machine Neural Network Based Optimal Binary Classifier for Diabetic Retinopathy
A New Cloud Paradigm: Data Protection as a Service (DPASS)
A Survey on Detecting Brain Tumorinmri Images Using Image Processing Techniques
Developing Use Cases and State Transition Models for Effective Protection of Electronic Health Records (EHRs) in Cloud
Performance Evaluation of Dynamic Networks Using EQOS Protocol
A User’s Feedback Relevant Dynamic Query Forms for Database Queries
An Enriched Privacy Protection in Personalized Web Search
A Survey on Various Manet Routing Protocols Based on Anonymous Communication
Comparative Analysis on Road Extraction from Liss IV Near-Infrared Band Using Genetic Algorithm and Active Contour Model
A Survey on Feature Based Image Retrieval Using Classification and Relevance Feedback Techniques
Entity Relationship Looming of Efficient Protection Strategies to Preserve Privacy of Personal Health Records (PHRs) in Cloud
Sequence Flow Modelling for Efficient Protection of Personal Health Records (PHRs) in Cloud
A Novel Activity Flow Model for Effective Protection of Electronic Health Records (EHRs) in Cloud
Data Flow Modelling for Effective Protection of Electronic Health Records (EHRs) in Cloud
Enhancing the Search Result for User Query Using Iterative User Feedback
Web Vulnerabilities Caused By Social Media Web Service Integration
Review on Steganography and BPCS Technology in Steganography for Increasing Data Embedding Capacity
Assessment of Electronic Medical Record Applications: An Overview for Powerful EMR Estimation
A Survey on Feature Extraction Techniques
War Field Robot Controlled By Android Phone
Application of Data Mining and CRM in Banking Sector Medical Insurance
Secured and Robust Dual Image Steganography: A Survey
Obstacle Avoidance Using Stereo Vision: A Survey
Text Extraction from Natural Scene Images and Conversion to Audio in Smart Phone Applications
A Complete Gain Knowledge on Cloud Computing
An Efficient AODV-Based Algorithm for Small Area MANETS
Improved Protection Using Self-Recognized Image
மேலும் பார்க்க