Tuesday, August 11, 2020 Home   | Search
Table of Contents
Journal: Australian Journal of Basic and Applied Sciences
Volume: 10 Issue: S2 Day: 0 Month: 0 Year: 2016

Article ID:55555302
Page: 1-8, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Study of K-Anonymization Level with Respect to Information Loss
K.AbrarAhmed; H.Abdul Rauf ; A. rajesh
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555303
Page: 9-17, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Feature Selection Technique Based on Neuro-Fuzzy-Rough Set for Cancer Classification Using Gene Expression Data
S.Gilbert Nancy; S. Appavu Alias Balamurugan
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555304
Page: 18-26, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Trust Based Ciphertext Policy Attribute Based Encryption Techniques for Decentralized Disruption Tolerant Networks
Elumalaivasan P.; Kulothungan K.; Ganapathy Sannasi; Kannan Arputharaj
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555305
Page: 27-36, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
A Comprehensive Survey on Gesture Based Authentication Schemes in Smart Phones
S. Milton Ganesh; P. Vijayakumar ; L. Jegatha Deborah
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555306
Page: 37-43, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
A Review on Attacks and Security Approaches in Mobile Agent Technology
Adri Jovin J.J. ; Marikkannan M
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555307
Page: 44-51, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
A Mathematical Modelling for Quality Based Ultrasound Breast Cancer Image Using Colour Properties
V. Mary Kiruba Rani; S.S. Dhenakran ; A. Heber David
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555308
Page: 52-59, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Content-Based Federated Job Scheduling Algorithm in Cloud Computing
Dinesh Komarasamy; Vijayalakshmi Muthuswamy
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555309
Page: 60-66, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Scene Change Detection Approaches over UT Interaction Dataset
Mithun Chakaravarrti; Mithul Mathivanan; G.S. Mahalakshmi; J. Betina Antony; S. Sendhilkumar
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555310
Page: 67-74, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Classification on Survival Rate of Ebola Patients Using Bigdata
Jemimah C.; Lilly Sheeba S.; Beulah Jayakumari R ; Vijayakumar A
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555311
Page: 75-79, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Detecting Phishing Urls Using Particle Swarm Optimization
Pradeepthi K.V. ; Kannan A
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555312
Page: 80-84, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Detection of DDoS Attack Using Traceback Technique
M. Vimal Chander; Jayashree Padmanabhan; A. Ayyasamy; B. Persis Urbana Ivy
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555313
Page: 85-88, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Computerized Object Recognition System Using Undecimated Wavelet Transform and Nearest Neighbour Classifier
P. Elakkiya; S. Audithan; K. Raja; G. Kannan
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555314
Page: 89-92, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Facial Expression Recognition System Using Local Texture Features of contourlet Transformation
R. Suresh; S. Audithan; G. Kannan; K. Raja
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555315
Page: 93-96, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Frequency Domain Approaches for Breast Cancer Diagnosis
B. Kiran Bala; S. Audithan; G. Kannan; K. Raja
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555316
Page: 97-102, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Entrusting Legitimate-Nodes with Routing Load in Mobile Ad Hoc Networks
Anitha Veerasamy; Srinivasa Rao Madane
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555317
Page: 103-109, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Offline Tamil Handwritten Character Recognition Using Statistical Based Quad Tree
M. Antony Robert Raj; S. Abirami
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555318
Page: 110-113, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
A Mobile Cloud Application for Bus Tracking System
Vijayalakshmi Muthuswamy; S.sandhya; S. Preethi; M.c.ponni
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555319
Page: 114-124, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Secure and Scattered Data Sighting and Dissemination in Wireless Sensor Networks
G. Murugadass; P. Sivakumar; R. Manikandan
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555320
Page: 125-132, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
An Intelligent Phrase Extraction Approach from Social Networks for User Classification
Anand Kannan; Anitha Kathirvel; Siddharth Madan; Pradeep Peirisand Weherage; Henrik Sjöström; Jason Murphy
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555321
Page: 133-140, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Pattern Recognition in Digital Images Using Multiclass SVM and Back Propagation Neural Network-A Comparative Study
P. Pandi Selvi; T. Meyyappan
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555322
Page: 141-149, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Disease Information Extraction from Healthcare Records Using CTA Matrix
L. Sathish Kumar; A. Padmapriya
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555323
Page: 150-155, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
I-Tee-An Image Encryption Algorithm Based on Multilevel Encryption using a Randomly Generated Bitmap Image
Kanagaraj Narayanasamy; Padmapriya Arumugam
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555324
Page: 156-161, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Resource Provisioning Algorithmsin Mobile Cloud Computing-Survey
Shanthi Thangam M; Vijayalakshmi M; Manju Precillah M
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555325
Page: 162-170, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
A Novel Approach for Entropy Based Invisible Watermarking Algorithm for Digital Images Using DWT
M.Veni; T.Meyyappan
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555326
Page: 171-175, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
CEKD: Computationally Efficient Key Distribution Scheme for Vehicular Ad-Hoc Networks
M. Azees; P.vijayakumar
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555327
Page: 176-180, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Person Identification Using Gait Signatures in a Smart Classroom
Gengashree P; Hima Bindhu S; Abirami S; Sivarathinabala M
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555328
Page: 181-185, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Ambience Monitoring System for Hatchery Units
A.S.Anakath; R. Kannadasan; N. Prabakaran; A. Krishnamoorthy; K.naresh; G. Sivashanmugam
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555329
Page: 186-191, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Rfid Based Automatic Parking System
R.Kannadasan; A.Krishnamoorthy; N.prabakaran; K.naresh; V.vijayarajan; G.sivashanmugam
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555330
Page: 192-198, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Cross Domain Sentiment Classification by Extracting best Opinion Features
P. Sanju; T.t.mirnalinee
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555331
Page: 199-211, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
System of Systems for Observation and Response in Quality-Of-Service for Cloud Computing Environments
R.Manikandan; L.Jegatha Deborah; N.arul P.Ashok Kumar; A.Renga Rajan
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555332
Page: 212-223, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Priority Based Hybrid Distance Vector Routing Protocol in Manet
V.Sameswari; E.Ramaraj
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555333
Page: 224-233, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Progressive Path Analysis Using Optimized Discrete and Continuous Average Semantic Filters
Balaji A; S. Sendhilkumar; G.S. Mahalakshmi
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555334
Page: 234-239, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Domain Based Named Entity Recognition Using Naive Bayes Classification
G.S. Mahalakshmi; Betina Antony J; Akshaya Kumar; Bagawathi Roshini S
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555335
Page: 240-249, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Representing Modified co-Authorship Networks Using Power Graphs
V. Vasanthakumar; S. Sendhilkumar; G.S. Mahalakshmi
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555336
Page: 250-261, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Tree Based Space Partition of Trajectory Pattern Mining for Frequent Item Sets
P.Geetha; E. Ramaraj
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555337
Page: 262-266, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Software Performance Testing Using Dynamic Load Generation in Cloud Environment
K.Mohanram; T.T. Mirnalinee
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555338
Page: 267-272, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Predicting Energy Consumption and Analysis of Energy Demand, Economic Growth of India
K. Latha; S.mohan
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555339
Page: 273-276, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Ranking of Vehicular Webpages Based on its Features in Social Bookmarking
G. David Raj; R.L. Jasmine; G.V. Uma
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555340
Page: 277-282, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
A Novel Method for Music Retrieval Using Chord Progression
R.L. Jasmine; G. David RAJ; G.V. Uma
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555341
Page: 283-289, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Energy Aware Deforestation Monitoring System
K.Latha; S.Sathish Kumar
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555342
Page: 290-296, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Efficient and Enhanced Visual Cryptographic Schemes in Biometric Applications
Anandhi; M.S.Josephine
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555343
Page: 297-306, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
An Efficient Image Encryption Method Based on Improved Cipher Block Chaining in Cloud Computing as a Security Service
J. Mahalakshmi; K.kuppusamy
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555344
Page: 307-314, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
An Energy-Efficient Tree-Based Approach for Optimal Virtual Machine Placement in Cloud Environment
R.Kanniga Devi; G.murugaboopathi
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  | 

Article ID:55555345
Page: 315-319, DOI: Null , Data Source: [DB_TOC] , Created on: [12/17/2016 11:57:00 PM] , Last Modified on :7/11/2017 12:12:00 PM
Trusted Multi-Owner Data Sharing among Dynamic Users in Public Cloud
L.SaiRamesh; S. Sabena; K.thangaramya; K.kulothungan
Abstract(J-Gate) | ABSTRACT-HTML  | FULLTEXT-PDF  |