IJARSE (ISSN: 2319-8354)

Volume No.06, Issue No. 12, December 2017

 Article # Article Title & Authors  

1.


PUBLICLY VERIFIABLE INNER PRODUCT EVALUATION OVER OUTSOURCED DATA STREAMS UNDER MULTIPLE KEYS  (Page: 01-10)
Abhilash Karnati, Sri .Dr. Bhaludra Raveendranadh Singh
|PDF

2.


SECUERE ALGORITHM FOR CLOUD COMPUTING AND ITS APPLICATIONS  (Page: 11-19)
N.ASHWINI, T.RAMYASRI
|PDF

3.


USING HASHTAG GRAPH BASED TOPIC MODEL TO CONNECT SEMANTICALLY RELATED WORDS WITH OUT CO-OCCURANCE IN MICROBLOGS  (Page: 20-29)
CHENNA RACHANA, A.GEETHA
|PDF

4.


CONNECTING SOCIAL MEDIA TO E-COMMERCE CLOUD START PRODUCT RECOMMENDATION USING MICROBLOGGING INFORMATION  (Page: 30-35)
Durgam Pavani, Sri .Dr. Bhaludra Raveendranadh Singh
|PDF

5.


Twin-circumstance Data access management with capable revocation for Multi-authority cloud storage system  (Page: 36-42)
M.Dheeraj, Mr.T.Sravan Kumar
|PDF

6.


CLOUD ARMOR SUPPORTING REPUTATION BASED TRUST MANAGEMENT FOR CLOUD SERVICES  (Page: 43-51)
G.Sahithi, L.Kiran Kumar Reddy
|PDF

7.


DETECTING NODE FAILURES IN MOBILE WIRELESS NETWORKS A PROBABLISTIC APPROCH  (Page: 52-58)
G.Vani, A.Mahesh
|PDF

8.


NEW FRAMEWORK FOR REVERSIBLE DATA HIDING IN ENCRYPTED DOMAIN  (Page: 59-67)
J.Nikitha, A.Mahesh
|PDF

9.


Efficient Encrypted data search as a mobile cloud service (ENDAS)  (Page: 68-75)
M.Nikitha, Mr. R.Dasharathm ,T.Sravan Kumar
|PDF

10.


A USER-CENTRIC DATA SECURE CREATION SCHEME IN CLOUD COMPUTING  (Page: 76-84)
M.Shusheela, L.Kiran Kumar Reddy
|PDF

11.


SECURE DATA DEDUPLICATION WITH DYNAMIC OWNERSHIP MANAGEMENT IN CLOUD STORAGE  (Page: 85-91)
P.Pranathi, A.Geetha
|PDF

12.


Fountain Codes With Non-uniform Selection Distributions Through Feedback  (Page: 92-97)
V.Shilpa, A.Mahesh
|PDF

13.


EXPERIMENTAL STUDY OF FINGERPRINT VERIFICATION USING MINUTIAE POINT MATCHING  (Page: 98-108)
Ginne M James
|PDF

14.


Requirements Priority Algorithm to Improve the Efficiency of the Requirements Traceability  (Page: 109-116)
Swathine. K,Dr. N. Sumathi
|PDF

15.


THE CHALLENGES OF SENTIMENT ANALYSIS ON SOCIAL WEB COMMUNITIES  (Page: 117-125)
Osamah A.M Ghaleb & Anna Saro Vijendran
|PDF

16.


WORKING PRINCIPLES OF RASPBERRY PI AND ARDUINO UNO IN WINDOWS  (Page: 126-136)
S.Govardhini, G.Sumalatha
|PDF

17.


A Session based Secured Communication for inter-networking environment in VANETs  (Page: 137-147)
R.Jeevitha, Dr.N.Sudha Bhuvaneswari
|PDF

18.


A REVIEW ON GENERATIVE CONVERSATIONAL MODEL  (Page: 148-152)
Enza Varghese, Prof. M T Rajappan Pillai
|PDF

19.


JOURNEY OF miRNA TARGET PREDICTION THROUGH MACHINE LEARNING APPROACH: A REVIEW  (Page: 153-156)
Shaina Paulson, Joythis T.S
|PDF

20.


A SURVEY ON PREDICTION OF CARDIO VASCULAR DISEASESUSING DATA MINING TECHNIQUES  (Page: 157-165)
Vignesh Kumar K, Dr N.Sumathi
|PDF

21.


NANOTECHNOLOGY – BENEFITS and APPLICATIONS  (Page: 166-175)
Ms. R.Hemalatha, Ms. Priya Hari
|PDF

22.


A STUDY ON HYPERTENSIVE DISORDERS IN PREGNANCY USING DATA MINING TECHNIQUES  (Page: 176-178)
Neethu Mathew
|PDF

23.


A REVIEW ON IMAGE MINING BASED OBJECT IDENTIFICATION AND TAGGING  (Page: 179-181)
Laya K Roy
|PDF

24.


Network Anomaly Detection: Methods and Tools  (Page: 182-191)
Y.S.Kalai Vani, E.K.Radhika
|PDF

25.


A Survey on Collaborative Learning Framework Using Cloud Computing  (Page: 192-200)
Mrs.M.Thenmozhi , Dr.Anna Saro Vijendran
|PDF

26.


An Improved Sampling Algorithm for Imbalanced Data Sets in the context of Ordinal Classification  (Page: 201-209)
D.Dhanalakshmi, Dr.Anna Saro Vijendran
|PDF

27.


Universal Object Interaction (UOI)  (Page: 210-217)
Ms. Priya Hari & Ms. R. Hemalatha
|PDF

28.


A REVIEW BRAIN TUMOR DETECTION USING DATA MINING TECHNIQUES  (Page: 218-221)
Keerthana T K
|PDF

29.


A Comparative Study of Segmentation and Classification Techniques in WBC  (Page: 222-227)
Riya Roy, Swapna B Sasi
|PDF

30.


AN AUTOMATED CLASSIFICATION OF EMAIL CONTENTS BASED ON SEMANTIC MINING  (Page: 228-239)
S.Divya, Dr.G.Maria Priscilla
|PDF

31.


NETWORK SECURITY  (Page: 240-242)
C.Sunitha, Lavanya.S, Subasri.K
|PDF

32.


A SECURE EFFICIENT AND LIGHTWEIGHT ENCRYPTED DATA MATCHING TECHNIQUE FOR MULTI KEYWORD SEARCH IN THE CLOUD  (Page: 243-253)
V.Muthu Lakshmi ,Dr.N.Sumathi
|PDF

33.


A Novel Hybrid Video Codec Scheme Using DWT-DCT Algorithm to Achieve High Degree Video Compression  (Page: 254-261)
Kavitha P , Dr. Anna Saro Vijendren
|PDF

34.


OVERVIEW OF CLOUD COMPUTING  (Page: 262-267)
K.Dhana Priya Dharsini , Muhammed Shafi Subash.k
|PDF

35.


A KEY AGGREGATION BASED SIGNATURE GENERATION TOWARDS DATA ACCESS AND REVOCATION TO ELECTRONIC HEALTH RECORD IN THE CLOUD SERVERS  (Page: 268-276)
V.Ramya and Dr.S.Thavamani
|PDF

36.


MULTI-OBJECT TRACKING USING STGMM_KLT METHOD  (Page: 277-284)
S.Sathyanarayanan, Dr. Anna Saro Vijendran
|PDF

37.


SENTIMENTAL ANALYSIS TEXT MINING USING FOR SOCIAL MEDIA  (Page: 285-296)
Mr. M. Yuvaraja, Dr. S. Thavamani
|PDF

38.


A STUDY ON APPLICATIONS AND CHALLENGES IN VEHICULAR AD-HOC NETWORKS (VANETs)  (Page: 297-305)
Ch. V. Raghavendran, G. Naga Satish, P. Suresh Varma
|PDF

39.


A LITERARY SURVEY ON TEXTMINING APPLICATIONS AND TECHNIQUES  (Page: 306-312)
Dr. E. Mary shyla , S. Keerthana
|PDF

40.


A SURVEY ONMOBILE OPERATING SYSTEM AND MOBILE NETWORKS  (Page: 313-321)
VIGNESH KUMAR K, NAGARAJAN R
|PDF

41.


A Survey on Insider Threats Security in Wireless Ad-Hoc Networks  (Page: 322-327)
T.Vadivu, Dr.D.Radha Damadoram
|PDF

42.


EFFICIENT NEAR-OPTIMAL TASK ALLOCATION FOR PIGGYBACK CROWDSENSING  (Page: 328-337)
S.NITHYA , Dr.C.DEEPA
|PDF

43.


STAR: A Secure Trust and Anonymous Routing Scheme forDetecting and Preventing Self-Seeking and Malicious Mobile Nodes in MANET  (Page: 338-349)
C DANIEL NESA KUMAR, Dr. V. SARAVANAN
|PDF

44.


Pattern Recognition using Mixture of Experts - A Review  (Page: 350-356)
Pramod P Nair
|PDF

45.


SCRUTINY THE SUSCEPTIBILITY IN BIOMETRICS  (Page: 357-365)
JayanthiVagini K ,Manimekalai M
|PDF

46.


An Overview of Glaucoma Segmentation using Watershed Transformation  (Page: 366-371)
A.Senthilkumar, Dr.D.Hariprasath
|PDF

47.


NETWORK ON CHIP OF RECONFIGURABLE ROUTER TECHNIQUE BASED ON FPGA  (Page: 372-377)
M.Thamarai Selvan , Dr.N.Pasupathy
|PDF

48.


A SURVEY ON DATA SECURITY IN CLOUD COMPUTING  (Page: 378-383)
N.Karunya, Dr.T.Deepa
|PDF

49.


A SURVEY PAPER ON CLOUD COMPUTING  (Page: 384-391)
N. Dhivya, Dr.S.Vijayalakshmi
|PDF

50.


A Study on Child Neglect and Preventive Measures: A Review  (Page: 392-398)
Dr. R Khanchana,N. Marlinah, J. Sivaranjani
|PDF

51.


A LITERARY SURVEY ON SECURITY ISSUES ANDTHREATS IN MOBILE COMPUTING  (Page: 399-406)
Reshmi.R,Dr.G.Satyavathy
|PDF

52.


A SURVEY ON BIG DATA BASED VEHICLE TRAFFIC FLOW PREDICTION USING DEEP LEARNING ALGORITHMS  (Page: 407-418)
S.Narmadha, Dr.V.Vijaya Kumar
|PDF

53.


Mobile Application Analysis and Classification Using Data Mining -A Survey  (Page: 419-426)
J. Jeyaboopathiraja, Dr.G. Maria Priscilla
|PDF

54.


A Comparative Survey on Traffic Analysis for Mobile Ad Hoc Network (MANET) Routing Protocol with Soft Computing Techniques  (Page: 427-447)
Niyaz Hussain A M J ,Dr G Maria Priscilla
|PDF

55.


MOBILE AD HOC NETWORKS: ROUTING PROTOCOLS, ISSUES IN ROUTING PROTOCOLS AND ITS APPLICATIONS  (Page: 448-454)
C. Sunitha, B.Asha Priya, V.A. Dhanya
|PDF

56.


"A STUDY ON GRAPH THROUGH AN ICT TOOL GEOGEBRA FOR THE COURSE SECOND YEAR DIPLOMA IN ELEMENTARY EDUCATION OF TAMIL NADU STATE BOARD. "  (Page: 455-462)
Mr.P.Charles Paul, Mr.G.Thulasi , Mr.J.Manikandan
|PDF

57.


AN ANALYTICAL STUDY ON VARIOUS DATA MINING METHODOLOGIES ON SOCIAL MEDIA APPLICATIONS  (Page: 463-474)
M. Selvapriya, Dr.P. Kalyani
|PDF

58.


Spam Detection in Email using Bayesian Classifier and support vector machine  (Page: 475-479)
Sumathi.k , . Dr.Radha Damodaran.,
|PDF

59.


A SURVEY ON CLOUD COMPUTING APPLICATIONS  (Page: 480-487)
Ms. P. Monika, Dr. G. Kalpana
|PDF

60.


REVIEW ON MANET BASEDEMERGENCY COMMUNICATIONFOR NATURAL DISASTER  (Page: 488-493)
Dr.D.Anitha,A.Mythili,L.Pradeepa
|PDF

61.


SURVEY ON MUTATION TESTING COST REDUCTION METHODS  (Page: 494-501)
Mrs.R.Shobana,Dr.G.Maria Prisicilla
|PDF

62.


Big Social Networks: Practical Analysis and Modeling of the ActivityDilemmas  (Page: 502-513)
GameilSaadHamzh Ali ,Dr.A.Nithya
|PDF

63.


Distributed Intelligent Intrusion Detection System  (Page: 514-519)
Mrs. J.Joselin Assistant Professor , Mr. A.Mohammed Yasin ,Mr. M.Ashiq
|PDF

64.


A Study on Content Based Image Retrieval using Texture Features and Security Analysis  (Page: 520-526)
Prof. U.Sinthuja, Prof. A.Meena
|PDF

65.


"Capitulation of Machine Learning Techniques for Detection of Auto immune Thyroiditis "  (Page: 527-531)
S.Sathyapriya ,Dr.D.Anitha
|PDF

66.


A SURVEY ON USE OF DATA MINING METHODS TECHNIQUES AND APPLICATION  (Page: 532-539)
K.Prema,A.Kumar Kombaiya
|PDF

67.


EVALUATION OF SPECKLE REDUCTION FILTERING TECHNIQUES ON SAR IMAGES  (Page: 540-549)
V.Sudha, Dr.Anna Saro Vijendran
|PDF

68.


AN EFFICIENT FUZZY BASED INTRUSION DETECTION SYSTEM IN MANET  (Page: 550-559)
D. Nethra Pingala Suthishni, Dr. G. P. Ramesh Kumar
|PDF

69.


Survey on MANET Routing Protocols for Secure Data Transmission  (Page: 560-573)
A.Kavitha, Dr.V.S.Meenakshi
|PDF

70.


A SURVEY ON DISEASE IDENTIFICATION AND BLOOD VESSEL SEGMENTATION IN HUMAN RETINAL IMAGES  (Page: 574-585)
K.Geethalakshmi , Dr.V.S.Meenakshi
|PDF

71.


Implication of Quantum Chemical Methods in Future Storage Devices-Molecular Quantum Dot Cellular Automata  (Page: 586-593)
Dr.H.Umamahesvari
|PDF

72.


END-TO-END DELAY MODELING WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs  (Page: 594-605)
Mrs.V.S.Lavanya, Ms.S.Sudha
|PDF

73.


Design of Low cost Smart Health Suit for an application of Internet of Things Integration Platform on Modern Health Care System  (Page: 606-616)
TarakDas, Navoneel Jana, Tapas Kumar Dawn
|PDF

74.


SECURE BASED ROUTING PROTOCOL TO PREVENT MALICIOUS ACTIVITIES IN WIRELESS SENSOR NETWORKS  (Page: 617-630)
Authors: A. Sunil Samson, Dr. N. Sumathi
|PDF

75.


ANALYSIS OF SECURITY ALGORITHMS IN CLOUD  (Page: 631-641)
M.Sasikala, Dr. V. Anuratha
|PDF

76.


Overview of Fuzzy Clustering Algorithm on Hadoop Map Reduce Computing  (Page: 642-647)
Mrs. C.Sunitha , Ms. I.Jeevitha
|PDF

77.


ENERGY, DELAY AND PRIORITY AWARE DATA TRANSMISSION IN WIRELESS SENSOR NETWORK UNDER RELAIBLE NETWORK FORMATION CONSTRAINTS IN CLOUD COMPUTING  (Page: 648-655)
Mr. S. Prahadeeshwaran , Dr. G. Maria Priscilla
|PDF

78.


Intelligent door for security by Jarvis to Control Internet of Things in cctv in sensitive places  (Page: 656-660)
Boshra mubarak abdalla,Dr.G. Maria Priscilla
|PDF

79.


DEVELOPING A FACE RECOGNITION SYSTEM USING CONVOLUTIONAL NEURAL NETWORK AND RASPBERRY PI INCLUDING FACIAL EXPRESSION  (Page: 661-673)
C.R Vimal Chand, Dr.G.P Ramesh Kumar
|PDF

80.


Drug Encryption using Power of Graph  (Page: 674-681)
K. Karthika
|PDF

81.


A System for Monitoring the Electricity Sub-Station using Internet of Things  (Page: 682-690)
Dr.P.B.Pankajavalli, Mr.G.S.Karthick, Mr.M.Sridhar, Mr.A.Muniyappan
|PDF

82.


NETWORK SECURITY AND CRYPTOGRAPHY  (Page: 691-698)
Mohanraj.S
|PDF

83.


A comprehensive study of Email Spam Botent Detection for Mobile Phones  (Page: 699-701)
Mr.Madhu Placheri,Dr.RadhaDamodharam
|PDF

84.


WORK ALLOCATION STRATEGIES IN AN ORGANIZATION – AN ARTIFICIAL AGENT SOCIETIES APPROACH  (Page: 702-710)
Swapandeep Kaur, Harjot Kaur
|PDF

85.


Enhancing the Precision of Missing Data Imputation Using DarbouX variate - Naïve Bayesian Classifier  (Page: 711-721)
A.Finny Belwin , Dr.G.P. Ramesh Kumar
|PDF

86.


Survey on User Response Prediction Models and Metrics in Computational Advertising  (Page: 722-729)
Avila Clemenshia P, Dr. Kalyani P
|PDF

87.


Neural Networks in the context of stem cell therapy, health and disease diagnosis.  (Page: 730-732)
Mohd Ishaq Dar , Parvaiz Ahmad Dar and Aarif Ali
|PDF

88.


Analysis of Machine Learning Algorithms Performance for Real World Concept  (Page: 733-740)
Kostandina Veljanovska
|PDF

89.


Building Keypoint Matching by iteration and Global Information for Identification of Mammogram Type Based on Feature Extraction  (Page: 741-748)
M.Praneesh, R. Janarthanan
|PDF

90.


APPLICATION OF GA, PSO AND PSO-BFGS FOR THE INVERSE ESTIMATION PROBLEM  (Page: 749-761)
Vishweshwara P S, Gnanasekaran N and Arun M
|PDF

91.


A STUDY ON WIRELESS SENSOR NETWORK CHARACTERISTICS AND SECURITY CHALLENGES  (Page: 762-769)
D.Sudhakar , Dr.V.S.Meenakshi
|PDF

92.


CLINICAL HEALTH RISK PREDICTION OF CHRONIC DISEASES FROM SEQUENTIAL PATTERN MINING  (Page: 770-774)
Mr JAYA PRAKASH K, Mr. M. CHANDRAKUMAR,
|PDF

93.


Nitrogen content and uptake in leaves and stem of common bean (Phaseolus vulgaris L.) as influenced by application of various biofertilizers with different levels of phosphorus under intercropping system  (Page: 775-780)
M.Hussain Dar, R.Groach, S.M.Razvi
|PDF

94.


Chemical derivatisation of α-santonin for the synthesis of triazole derivatives and their evaluation for B and T lymphocyte proliferation for immunosuppressive activity.  (Page: 781-781)
Nisar A Dangrooab, P L Sangwana
|PDF

95.


A Comprehensive Analysis on Preprocessing andClassification Techniques in Data Mining for Predicting Liver Disorder from USA Liver Patients Data  (Page: 782-786)
P.LauraJuliet Dr.P.R.Tamilselvi
|PDF

96.


Reflections of Individual Differences on Students’ Personal Development Plans  (Page: 787-791)
Mahesh Kumar, Vishal
|PDF

97.


Implementation of 32 Bit Fixed Point Arithmetic Logic Unit (ALU), on FPGA using VHDL  (Page: 792-803)
Neelesh Kumar Kachhwaha, Prof.Sunil Shah
|PDF

98.


A COMPARITIVE STUDY OF IMAGE DENOISING TECHNIQUES  (Page: 804-814)
K.Indupriya, Dr. G. P. Ramesh Kumar
|PDF

99.


SURVEY ON WEB CONTENTS, WEB MINING AND PAGE RANKING  (Page: 815-819)
V.Jayashree, Dr.N.Sumathi
|PDF

100.


Survey of ACO and PSO based Secure Routing protocols for Wireless networks  (Page: 820-832)
Pushpa Lakshmi R , Lavanya P, Bhuvaneshwari S
|PDF

101.


A Novel Ratio Based Approach on Weighted Frost Filter to Reduce Quantum Noise for Efficient Restoration of Digital Breast Mammograms  (Page: 833-842)
Mr. P. Jayaseelan, Mr. J. Parthasarathi
|PDF

102.


Impact of heavy metals of soil on public health  (Page: 843-848)
Mrs. Iccha Gupta ,Miss. Smriti Jain, Mrs. Varsha Joshi
|PDF

103.


IMPACT OF PESTICIDE ON SOIL, PLANTS AND HUMAN HEALTH  (Page: 849-855)
Miss. Smriti Jain , Mrs. Varsha Joshi, Mrs. Iccha Gupta
|PDF

104.


Spectrophotometric determination of pesticide from water bodies using some bio absorbents  (Page: 856-861)
Mrs. Varsha Joshi , Miss. Smriti Jain, Mrs. Iccha Gupta
|PDF

105.


Optimizing Inventory Policy for Seasonal Products with Trade Credit and Price Discounts for Shelf Life items and Backorders  (Page: 862-875)
Rahul Kumar Pandey, Bindu Vaish
|PDF