Archive

SR.NO. TITLE AUTHOR(S) PAGES DOWNLOAD
1 Novel Opportunistic Cognitive Relay Network Considering Interference of Primary User Miss. Archana R Gani, Miss. Madhura M R 1 to 5 Download Here
2 A FRAMEWORK: IN-NETWORK AGGREGATION IN WIRELESS SENSOR NETWORKS Ms.Soubhagya S Bijjal, Prof. Shivamurthy R C 1 to 6 Download Here
3 A SURVEY ON SECURE HIGH THROUGHPUT MULTICAST ROUTING IN WIRELESS MESH NETWORK Sowmya Somanath,Prof. Veena Gadad 1 to 4 Download Here
4 SECURE COMMUNICATION IN VANETS USING PRIVACY PRESERVING TECHNIQUE Shruthi.M.H, Shashidhar.V 1 to 3 Download Here
5 ENERGY EFFICIENT AND POSITION BASED ROUTING CONNECTIVITY HOLES IN WSN Mrs. Pavithra N, Mr. Shashidhar.V,Mr. Aruna Kumara.B,Mr.Bharath J 1 to 5 Download Here
6 INTERNET OF THINGS FOR ENERGY MANAGEMENT IN THE HOME POWER SUPPLY Mahesh Hiremth, Prof: Manoranjan Kumar 1 to 5 Download Here
7 Providing Security with Public”Auditing-as-a service (AAS)”Using Fine Grained Dynamic Big data Update Ms. Shivleela, Mr. Madhusudhan Reddy G.R 1 to 5 Download Here
8 MATRIX CALCULATOR FOR EFFECTIVE RESOURCE HANDLING IN TESTING ACTIVITY Shilpa V, Sumitha V.S 1 to 5 Download Here
9 PAVAR: POWER AWARE VAMPIRE ATTACK REDUCTION IN WIRELESS ADHOC SENSOR NETWORK Chaitra. L, Mrs. Shoba. M 1 to 6 Download Here
10 DETECTION AND PREVENTION OF MISDIRECTION ATTACK BY THIRD PARTY MONITORING IN WSN R Sowmya, Mrs. Shoba. M 1 to 4 Download Here
11 SECURITY IN WIRELESS SENSOR NETWORKS AN OVERVIEW CONCEPT Raghavendra S N , Dr.Prof.Suresha 1 to 4 Download Here
12 Multiphase Distributed Network Intrusion Detection and Prevention Framework in Virtual Networking System Archana A. P, Balaji K 1 to 4 Download Here
13 PROVIDING RELIABILITY IN REACTIVE ROUTING FOR WIRELESS SENSOR NETWORKS Mamatha Rani B.M , Prakasha. G 1 to 6 Download Here
14 Source Privacy and Data Authentication using Public Key Cryptography in Wireless Sensor Networks Navya S.N, Balaji K 1 to 2 Download Here
15 DESIGN OF IMPROVED ENERGY EFFICIENT PROTOCOL FOR WIRELESS SENSOR NETWORK Sunil M, Nagaraj M. Lutimath 1 to 4 Download Here
16 DESIGN OF SECURE MULTIPATH AODV PROTOCOL FOR WIRELESS SENSOR NETWORK USING AES ALGORITHM Nagaraj M. Lutimath, Nirvishek Awasthi , Mayank Saurav 1 to 3 Download Here
17 A SECURE AND EFFICIENT INTRUSION DETECTION SYSTEM FOR MANETs AUTHENTICATED USING DIGITAL SIGNATURE Meghana M. R, Mr. Prakasha.G 1 to 5 Download Here
18 AN ENERGY-EFFICIENT, DELAY-AWARE, AND LIFETIME-BALANCING DATA COLLECTION PROTOCOL FOR WIRELESS SENSOR NETWORK Archana M, Himabindu S , Nisarga N 1 to 6 Download Here
19 IMPLEMENTATION OF AODV ROUTING PROTOCOL BASED ON RSA ALGORITHM FOR PREVENTING FALSE DATA INJECTION ATTACK IN WSN Dr.S.Bhargavi ,Swetha T N , Gowthami S 1 to 6 Download Here
20 USING QOS FOR EVALUATING AD HOC ROUTING PROTOCOLS Abhilash D.C, Arun Kumar D.R. 1 to 6 Download Here
21 POWER EFFICIENT AGGREGATION FOR WSN USING NS2 SIMULATIOR Ankita Singh , Dr. Suresha 1 to 6 Download Here
22 SMART STAFF ATTENDANCE SYSTEM THROUGH BLUETOOTH ENABLED DEVICES Manasa.k, Abhilatha P, Mrs.Manjusha 1 to 4 Download Here
23 ENERGY AWARE CLUSTER-BASED HIERARCHICAL ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS Meghana Gowda A V, Parvathi C 1 to 5 Download Here
24 DETECTION OF PROXIMITY MALWARE IN DELAY TOLERANT NETWORKS BASED ON BEHAVIOR MeharAfroz , Bhagya M 1 to 4 Download Here
25 CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN, Kulkarni Varsha 1 to 6 Download Here
26 RETRIEVAL OF TOP-K FILES BY MULTI-KEYWORD USING TRSE SCHEME OVER ENCRYPTED CLOUD DATA Manoj Kumar R , Maria Navin J R 1 to 5 Download Here
27 A SECURE CLOUD COMPUTING BASED FRAMEWORK FOR DATA INFORMATION MANAGEMENT SYSTEM Wahida Banu S, Harish , Nethra S N , Vennela N 1 to 4 Download Here
28 AN EFFICIENT MODEL AND SECURITY FRAMEWORK FOR DATA STORAGE IN MOBILE CLOUD COMPUTING USING RSA ALGORITHM AND HASH FUNCTION. Suresh P , Varun Kumar M N 1 to 4 Download Here
29 AN APPROACH FOR CHECKSUM INTEGRITY OF DATA TRANSMISSION IN A NETWORK Yerriswamy.T , Arathi.B. 1 to 4 Download Here
30 TWITTER SENTIMENT ANALYSIS FOR PRODUCT REVIEWS TO GATHER INFORMATION USING MACHINE LEARNING TECHNIQUE Madhura G K , Prof.Shivamurthy R C 1 to 6 Download Here
31 HANDLING INTERNET TRAFFIC USING BIG DATA ANALYTICS Ranganatha T.G, Narayana H.M 1 to 5 Download Here
32 CLASSIFICATION OF HUMAN ACTIONS USING NON-LINEAR SVM BY EXTRACTING SPATIO TEMPORAL HOG FEATURES WITH CUSTOM DATASET Yashaswini Mahesh, Dr. M. Shivakumar, Dr. H.S.Mohana 1 to 6 Download Here
33 PRISM: ALLOCATION OF RESOURCES IN PHASE-LEVEL USING MAP-REDUCE IN HADOOP Ms.Savitri.D.H , Narayana H.M 1 to 4 Download Here
34 ENHANCING THE PERFORMANCE OF HEED CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORK USING ARTIFICIAL INTELLIGENCE Karthik N V, Dr.Suresha 1 to 6 Download Here
35 CLOUD BASED PEER TO PEER NETWORK FOR ENTERPRISE DATAWAREHOUSE SHARING Basangouda V.K,Aruna M.G 1 to 6 Download Here
36 COST –EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES Chaya.Y.K, Bharathi V Kalmath 1 to 5 Download Here
37 CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTICLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S , Maria Navin J R 1 to 5 Download Here
38 A SMART DATA BACKUP TECHNIQUE IN CLOUD COMPUTING USING SIGNCRYPTION Sridevi .N., Ashwini .A 1 to 6 Download Here
39 AN EFFICIENT POINT TO POINT COMMUNICATION PROTOCOL FOR MOBILE CLOUD COMPUTING Lavanya P J, Suresh 1 to 6 Download Here
40 OPENSTACK TO AVOID VENDOR LOCK IN CLOUD COMPUTING Mrs.Shoba. M ,Rohini Kulkarni, Puneeth Kumar D N 1 to 6 Download Here
41 CLOUD SECURITY FRAMEWORK FOR MULTI-OWNER DATA AUTHENTICATION Hitesh S, P Ramesh Naidu 1 to 5 Download Here
42 REMOTE DIAGNOSIS AND TREATMENT OF PATIENTS BY MEANS OF CLOUD COMPUTING TECHNOLOGY Mrs. Pankaja R , Ms. Areefa Banu , Mr.Shantosh Raj, Ms. Geetha Srikrishna 1 to 6 Download Here
43 BRAIN MORPHOMETRY FOR IMAGE-BASED CLASSIFICATION OF NEURODEGENERATIVE DISEASE Ms.Komala J, Mrs.Sowmyashree C.S 1 to 6 Download Here
44 RECOVERING HDR IMAGE USING DISCRETE WAVELET TRANSFOR Swetha S, Dr .Vivek Maik 1 to 4 Download Here
45 FAST MOTION DEBLURRING USING CONJUGATE GRADIENT BASED MINIMIZATION APPROACH Sukanya M , Dr.Vivek M 1 to 4 Download Here
46 ENCODING STRATEGY FOR at-a-distance IRIS RECOGNITION Vibha S Rao, P Ramesh Naidu 1 to 6 Download Here
47 MULTI- PERSPECTIVE AND MULTI- POSITION VARIATION PROBLEM ESPIAL IN HUMAN IMAGES BY PIECE-WORK LINEAR SUPPORT VECTOR MACHINE ASHA B, MANJULA B K 1 to 5 Download Here
48 A REAL TIME MEMORY SLOT UTILIZATION DESIGN FOR MAPREDUCE MEMORY CLUSTERS Suma R , Vinay T R , Byre Gowda B K 1 to 6 Download Here
49 MODULAR FAMEWORK FOR BUILDING MOBILE APPLICATION DEVELOPMENT USING WEB TECHNOLOGIES Mr. Ashim G C, Mrs. Vijaya Lakshmi K, Ms. Ayushi Sonnet, Ms. Tanya Singh 1 to 5 Download Here
50 DIGITAL WATERMARKING TO PROVIDE COPYRIGHT PROTECTION FOR DIGITAL IMAGES ON MOBILE DEVICES Sanchitn.V, Dr. H.N. Praksash 1 to 6 Download Here
51 ACTIVE VISUAL SEGMENTATION Wahida Banu S, Vijayalakshmi K 1 to 6 Download Here
52 AN IMAGE STEGANOGRAPHY BASED ON LOGISTIC CHAOTIC MAP IN SPATIAL DOMAIN Dr.S.Bhargavi , Shobha .M.J , Swetha.T.N , Pushpa.M.J 1 to 6 Download Here
53 AN EFFECIENT STEGANOGRAPHIC METHOD FOR GENERATING STEGO IMAGE BASED ON RSA ALGORITHM AND HASH LSB TECHNIQUE Dr.S.Bhargavi, Anughna.N., Swetha.T.N 1 to 5 Download Here
54 THINK GREEN TO DRIVE GREEN COMPUTING Rashmi R ,G Dilip Maruthi ,Keerthi Galagali 1 to 3 Download Here
55 E-GOVERNANCE SYSTEM USING SOCIAL NETWORKING Sandhya B R , Ashish Maithani, Ankush Jain 1 to 6 Download Here
56 IMPLEMENTATION OF RFB PROTOCOL AND THREAD BEHAVIOR-BASED MEMORY MANAGEMENT FRAMEWORK TO IMPROVE THE PERFORMANCE OF ANDROID SMART PHONE Satyanaryana.M.S , Deepa K Pattan 1 to 5 Download Here
57 FUZZY LOGIC BASED SORTING AND GRADING OF FRUITS Shona M , Sandhya B R, Arathi B N , Madhurani M S 1 to 6 Download Here
58 HAP-E ANDROID MOBILE PLATFORM USED FOR PERSONAL SAFETY Mrs. Pankaja R , Mr. Shantosh Raj , Ms. Areefa Banu , Ms. Geetha Srikrishna 1 to 6 Download Here
59 MONGODB AS A SERVICE ON CLOUD USING NODE.JS Deepak Bhardwaj A ,Sandeep N. P, Manoj Kumar M,Santhosh S V 1 to 4 Download Here
60 MERKLE HASH TREE BASED SECURE PROTOCOL FOR DATA DISCOVERY AND DISSEMINATION IN DISTRIBUTED WIRELESS SENSOR NETWORKS Rekha V Kotennavar, Dattathreya 1 to 6 Download Here
61 A Review on Various Fragmentation attacks due to Manipulating IPv6 Extension Headers Deepthi M R , Mrs. Srividya B V 1 to 5 Download Here
62 HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW Aejaz Ahmed, H C Sateesh Kumar 1 to 5 Download Here
63 A HEURISTIC APPROACH FOR EFFICIENT TREE BASED ROUTING IN WSN USING CLUSTERS Shruthi Jai C.M, Srinivasa G 1 to 6 Download Here
64 Energy Efficient Routing Protocol with Secure Hash Algorithm for Multi Hop WSN C.V.Swathi, Mrs.Nagarathna 1 to 5 Download Here
65 FPGA: IMPLEMENTATION OF ASSOCIATION RULES IN WEB USAGE MINING Srinivasa G, Archana M, Manoj Kumar M 1 to 6 Download Here
66 LARGE-SCALE HISTOPATHOLOGICAL IMAGE ANALYSIS USING HASHING-BASED IMAGE RETRIEVAL Shruthi S, Prof. Harish H K 1 to 6 Download Here
67 PICWORDS: AN AUTOMATIC IMAGE RENDERING APPROACH BY PACKING KEYWORDS MONIKA Y S, SRINIVASA G 1 to 5 Download Here
68 EVALUATION OF DSDV ROUTING PROTOCOL IN WSN USING NS2 SIMULATOR Mamatha Bai B G, Dr. Suresha 1 to 7 Download Here
69 THE MOTION AND ACTIVITY RECOGNITION USING 3DTEMPORAL TEMPLATE Komala S , Arun Kumar D R 1 to 7 Download Here