Printer Friendly

Articles from Advances in Natural and Applied Sciences (May 1, 2016)

1-37 out of 37 article(s)
Title Author Type Words
A cluster based self adaptive mapreduce scheduling algorithm in hadoop. Thangaselvi, R.; Aruna, R.; AnanthaBabu, S. 2732
A collaborative filtering approach for service based recommender systems using big data. Deepika, P.; Raman, G.R. Anantha 2018
Adaptive modeling on satellite image processing information extraction using knowledge fusion mining. Jayasowbaghyam, E.; Nithya, K. 3173
An EEG-based accurate biometric identification using back propagation network. Vinothini, V.; Premnath, G. 1494
An efficient business intelligence tool it asset management and maintenance system using Ibm Maximo 7.5 intelligent suite. Aravinth, S.S.; Vanitha, N.; Mangaiyarkarasi, M.; Menagadevi, R.; Menaka, S. 1141
An efficient proxy re-signature technique for preserving data integrity in cloud. Nithya, M.; Thahamina, S.R.; Sandhiya, M. 2357
Analysis of decentralized on demand cross layer in cognitive radio ad hoc network. Janani, A. Sri; James, K. Immanuvel Arokia 4961
Analyzing the risk of diabetes mellitus using patient EMR by association rule mining. Bhuvaneshwari, C.; Sangeetha, A.; Vijayakumar, K.; Kumaresan, A. 2169
Application of L-NAM speech in voice analyser. Kumaresan, A.; Selvaraj, P.; Mohanraj, S.; Mohankumar, N.; Anand, M. Suresh 3494
Cipher text-policy Abe scheme with efficient verifiable outsourced decryption. Sowmya, J.; Sharavanan, S.; Balajee R.M. 4025
Comparison of computer aided diagnostic system for wireless capsule endoscopy images using various filters. Elamathi, P.; Sundaram, P. Shanmuga; Santhiyakumari, N. 2365
Comprehensive survey on semantic web service discovery and composition. Venkatachalam, K.; Karthikeyan, N.K.; Kannimuthu, S. 4936
Data cleansing using automated extraction tools. Rajarajeswari, S.; Somasundaram, K. 4553
Data prediction in hierarchy using wireless sensor network. Durga, Devi D.; Vinothini, S.; Gayathri, R.; Archana, S.; Kumaresan, A. 1758
Deadline and dynamic slot allocation for mapreduce clusters. Janani, S.; Raman, G.R. Anantha 3805
Detection of isolation attack using OLSR protocol on MANET. Iswarya, G. Devi; Iakshmipriya, V.; Senthil, M.; Kumaresan, A. 1887
Efficient utilization of cluster resources using Hfsp size based scheduling. Gayathri, R.; Devi, D. Durga; Vinothini, S.; Baskar, K.; Kumaresan, A. 1768
Enhanced security mechanism using multistep authentication for PHR in cloud. Vidya, S.; Abirami, S. Sakthi; Priya, G.D. Sathya 2783
Enhancing utility and privacy using t-closeness for multiple sensitive attributes. Saraswathi, S.; Thirukumar, K. 3736
Finding experts in collaborative environment for gaining better knowledge. Sangeetha, A.; Bhuvaneshwari, C.; Selvaraj, P.; Kumaresan, A.; Vijayakumar, K. Report 1788
Human disaster avoidance using virtually controlled robotic arm. Vinothini, S.; Gayathri, R.; Devi, D. Durga; Kumaresan, A.; Vijayakumar, K. 2242
Intelligent information extractor mechanism and validating image in electrocardiographic data. Suganthi, T.; Karthikeyan, R. 2720
Localization with mobile anchor points using wireless sensor networks. Savitha, V.; Khanna, M. Rajesh 2542
Monoidal norm based propositional fuzzy technique in data leak detection. Rajasekar, M.; Rao, K. Joshua Babu; Prabakar, M. 2907
Multiple secret keys based security for vehicular Adhoc network. Priya, V. Lakshmi; Iswarya, G. Devi; Senthil, M.; Kumaresan, A. 1749
Multiview face tracking in videos using clustering and tracklet linking technique. Yoganand, A. Vivek; Silviya, S.H. Annie 2444
Power efficient algorithm for energy harvesting in sensor networks. Britta, V.C. Edwin; Insozhan, N. 2753
Protocol based verification and authentication for multi-tasking server in DUOS system. Sridevi; Kumar, Ganesh 3273
Quantitative prespective transaction of keys based service providers when encryption occurs. Banu, A. Nazreen; Sushanthi, A.; Vinod, S. 1750
Recognition and translation of sign language using SVM. Anand, M. Suresh; Mohanraj, S.; Selvaraj, P.; Kumar, K. Vijaya; Kumaresan, A. 2274
Reduction of code reuse attacks using code randomization and recursive traversal algorithm. Priya, K. Krishna; Murugeswari, P. 3671
Secure data and network traceability for performance expansion. Sugirtha S. Bala; Thangaraj S. John Justin; Priya M. Jeya 2342
Secure multi owner data sharing with virtual password mechanism in cloud. Sujitha R.; Sharavanan, S; Thangadurai, K.; Balajee, R.M. 2810
Self-adjustable MapReduce slot configurations for Hadoop clusters. Ramarajpandiyan, P.; Dharmaraj, R. 3553
To secure a big data in cloud using data integrity protection. Priya M. Jeya; Rengarajan, A.; Sugirtha S. Bala 3654
Twin cloud deduplication scheme based on user's privileges. Karthikaiselvi, S.; Dharmaraj, R. 3217
Wireless communication security through symbol obfuscation in physical layer. Niranjani, S.; Nirmalan, R. 1849

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters