International Journal of Computer Techniques
IJCT -Volume 2, Issue 2 / March - April 2015
S.No
|
Title/Author Name
|
Page No
|
1
|
An Efficient Approach for Data Sharing in Cloud Computing Using Digital Signature
-Elayaraja.D,J.Caroline EL Fiorenza(Assistant Professor)
|
1-6 |
2
|
Envisage The Lung Tumor Evolution In PET-CT Images During Radiotherapy
-M.Indra,G.Hariharan
|
7-11 |
3
|
NEO WSN: Network Lifetime Enhancement with OSPFV3 Authentication Scheme in Wireless Sensor Networks
-Hema M, Natchadalingam R
|
12-19 |
4
|
Role of Mobile Cloud Applications and Challenges in BYOD
-P.Soumya Sree Laxmi, K.Kala Bharathi,CH.Mary Pushpa
|
20-22 |
5
|
Service Delegating Log Management-For Secure Logging In Cloud Environment
-B.Sudha,Mr.S.ArunKumar
|
23-29 |
6
|
Privacy Enhancing and Protected Distributed of Personal Health Record Using ABE
-Vijayakumar K,S.Sivamohan,(Assistant Professor)
|
30-35 |
7
|
Proficient Approach of Data Integrity Protection in Cloud Storage Using Regenerating Code
- Karthik N, S.Sivamohan
|
36-39 |
8
|
Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
- Siva Ramakrishnan S,Vinoth Kumar P
|
40-44 |
9
|
Study of Symmetric key Cryptography Algorithms
- Rejani.R Deepu,V. Krishnan
|
45-50 |
10
|
Bundle Security Protocol of Space DTNs Using Cryptographic Algorithm
- E.Mukundhan,R.Veeramani
|
51-54 |
11
|
Enabling Data Privacy and Data Confidentiality on Database
- Vinodh Kumar.J, Sivamohan.S
|
55-59 |
12
|
Captcha as Graphical Password Using Carp Technique
- Mr.T.Kumesh(Assistant Professor), Amala Rani.S
|
60-65 |
13
|
Privacy Preserving Health Monitoring Data Using a Proxy Re-encryption
- Lakshmipriya.V, Praveena.V(Assistant Professor)
|
66-71 |
14
|
Honey Pot Based Network Architecture For Key loggers Detection
- Ms.C.Sathya, Mr.R.B.Saroo Raj
|
72-80 |
15
|
Lung Segmentation for Tuberculosis by Using Active Appearance Model (AAM) In Chest Radiographs
- S.Syeda Khatija kubra,P.murugan
|
81-86 |
16
|
Hashing Heterogeneity Aware Dynamic Capacity Provisioning in the Cloud
- Vinoth Kumar.P,Sujitha.M
|
87-90 |
17
|
A Customized Filter to apply on Online Social Network (OSN) user walls
- Priya.K, Mr.R.Jayaraj (Asst. Professor)
|
91-95 |
18
|
Dynamic Resource Recovery in Grid
- Malika.K.S, MRS.V.Elavarasi)
|
96-102 |
19
|
Intellect Face Recognition With Structurally Measures Hankel Matrix Decomposition
- Ramkumar.G, S.P Maniraj (Assistant Professor)
|
103-108 |
20
|
IMPROVING THE ATTACK DETECTION ACCURACY USING HLA IN WIRELESS AD HOC NETWORK
- Veeramani.R(Assistant Professor), Sindhu Bharathy.B
|
109-113 |
21
|
Context Representation and Maximize Power Efficiency in Mobile Sensing
- S.N.Nandhini, Mr.R. Septemberian Issac
|
114-120 |
22
|
Adjustment of the Force Transmissibility of a SDOF Vibrating System; Part II: Fraction Transmissibility
- Galal Ali Hassaan
|
121-127 |
23
|
An Improved Search Algorithm for Resource Allocation in Cloud Databases
- Radhya Sahal, Sherif M. Khattab, Fatma A. Omara
|
128-141 |
24
|
DynMR: A Dynamic Slot Allocation Framework for MapReduce Clusters in Big Data Management using DHSA and SEPB
- Anil Sagar T, Ramakrishna V Moni
|
142-155 |
25
|
Authentication With Enhanced Privacy Using File Stream Sequencing Technique
- Manikandan.R, R.J.Poovaraghan
|
156-162 |
26
|
Voice morphing
- Ms.P V Gujarathi , Mrs.S S Dinde
|
163-165 |
27
|
Using Image Processing for Detecting Defects in Printed Circuit Board
- Sonal D Kalro, Meghashree B S, Prathiksha B G, Suhasini A,Dr.H D Phaneendra
|
166-169 |
28
|
Tuning Condition Modification of Damped and Un-damped Adaptive Vibration Absorber
- Mohammed Abdel-Hafiz, Galal Ali Hassaan
|
170-175 |
29
|
On Confidentiality of Encrypted Voice Telephony
- K.R.Srividya
|
176-186 |