Cloud-Based Development of Smart and Connected Data in Healthcare Application S.Naisha Sultana, Gandikota Ramu and B.Eswara Reddy, JNTUA College of Engineering, India
Management of Context-Aware Software Resources Deployed in a Cloud Environment For Improving Quality of Mobile Cloud Services Sohame Mohammadi, Kamran Zamanifar and Sayed Mehran Sharafi, Islamic Azad University, Iran
Scalable Frequent Itemset Mining Using Heterogeneous Computing : parApriori Algorithm V.B.Nikam and B B.Meshram, Veermata Jijabai Technological Institute, India
On the Fly Porn Video Blocking Using Distributed Multi-Gpu and Data Mining Approach Urvesh Devani, Valmik B. Nikam and B.B. Meshram, Veermata Jijabai Technological Institute, India
A Novel Way of Integrating Voice Recognition and one Time Passwords to Prevent Password Phishing Attacks K Marimuthu, D Ganesh Gopal, Harshita Mehta, Aditya Rajan and P Boominathan, VIT University, India
Review on Mobile Threats and Detection Techniques Lovi Dua and Divya Bansal, PEC University of Technology, India
Lock-Free Parallel Access Collections Bruce P. Lester, Maharishi University of Management, USA
Spectrum Requirement Estimation for IMT Systems in Developing Countries Md Sohel Rana and Een-Kee Hong, Kyung Hee University, Republic of Korea
Derivative Threshold Actuation for Single Phase Wormhole Detection With Reduced False Alarm Rate K.Aathi Dharshini1, C.Susil Kumar2 E.Babu Thirumangai Alwar3, 1,2Velammal College of Engineering & Technology, India and 3Hindusthan Institute of Technology, India
Implementing Database Lookup Method in Mobile Wimax for Location Management Area Based Mbs Zone S.Sivaranjani1, T.S.Supriya2 and B.Sridevi3, 1Theni Kammavar Sangam College of Technology, India, 2SCAD Institute of Technology, India and 3Velammal College of Engineering & Technology, India
An Effective Search on Web Log from Most Popular Downloaded Content Brindha.S and Sabarinathan.P, Pavendar Bharathidasan College of Engineering and Technology, India
Robust Encryption Algorithm Based Sht in Wireless Sensor Networks
Uma.G and Sriram.G, Parisutham Institute of Technology, India
Multilevel Priority Packet Scheduling Scheme for Wireless Networks R.Arasa Kumar and K.Madhu Varshini, Velammal College of Engineering and Technology, India
Crypto Multi Tenant: An Environment of Secure Computing Using Cloud Sql Parul Kashyap and Rahul Singh, Shri Ramswaroop Memorial College of Engineering and Management, India
Survey: Comparison Estimation of Various Routing Protocols in Mobile Ad-Hoc Network Priyanshu and Ashish Kumar Maurya, Shri Ramswaroop Memorial University, India