1.ADAPTIVE FILE REPLICATION, CONSISTENCY AND POPULARITY MAINTENANCE IN PEER TO PEER SYSTEMS, D.Sivasankari, K.Deepa Thilak. Download Abstract

2.HIGH CAPACITY 2D COLOR BARCODES USING DOT ORIENTATION AND COLOR SEPARABILITY, Varsha Philip , V.Pandimurugan. Download Abstract

3.AN EFFICIENT SLCA FOR A TICKET BASED SECURITY ARCHITECTURE IN WIRELESS MESH NETWORK, B. Jayalakshmi, R. Regan. Download

4.DISCOVERY OF NEIGHBOR IN A SECURE WAY IN A MULTIHOP WIRELESS NETWORK, Angel C. Dhas, Margret Johnson. Download Abstract

5.REDUCTION OF LEAKAGE OF RESEARCH ORIENTED DATA, Julin geevarghese, M.N Sushmitha. Download Abstract

6.MAPS: A SOFTWARE TOOL FOR MOBILE AGENT TO PROVIDE PLATFORM SECURITY IN DISTRIBUTED SYSTEM USING DIGITAL SIGNATURE ,Sriprathha Balasundaram. Download Abstract

7.E-CARDIAC ANALYZER WITH MULTITOUCH ZOOM, RECORD-PLAYBACK AND SMS ALERT ,Imayavarma.M. Download Abstract

8.DEVELOPMENT OF VISION SYSTEM FOR REMOTELY OPERATED FRUIT HARVESTING AGRICULTURAL ROBOT, D.Vignesh Shankar, T.Dineshkumar . Download Abstract

9.POWER AWARE AUDIO STEGANOGRAPHY BASED ON LSBMR ALGORITHM, Sharmila.B, Shanthakumari.R. Download Abstract

10.NAVICANE: TALKING NAVIGATION CANE WITH PORTABLE BRAILLE NOTETAKER FOR VISUALLY IMPAIRED PERSON, Mohan.B. Download Abstract

11.OCEAN WAVE MONITORING USING COACTIVE NEURO-FUZZY INFERENCE SYSTEM, P.Dhanapriya, Prof. M.Umadevi. Download Abstract

12.PROVIDING SECURITY FOR THE INFORMATION THROUGH IMPLICT PASSWORD AUTHENTICATION SYSTEM , Lathapriyanka.A, S.Vasu. Download Abstract

13.FINGERPRINT MINUTIAE TO IMPROVE MINUTIAE-MATCHING ACCURACY, Gnana Arun Johnson J. Download Abstract

14.QoS ROUTING IN SHADOW FADING ENVIRONMENTS IN MANETs, Deepa.M, Asokan.R . Download Abstract

15.OPTIMIZED ROUTING SCHEME IN INTERMITTENTLY CONNECTED MOBILE NETWORKS ,Ponkaviya.E.T, Poongodi.C. Download Abstract

16.DIAGNOSTIC ACCURACY OF THE COMA AND IMPAIRED CONSCIOUSNESS: A PRACTICAL SCALE ,S.Sindhuja, F.W.Jesudas. Download Abstract

17.DESIGN OF TICKET MANAGEMENT SYSTEM USING RFID AND GPS TECHNOLOGY IN PUBLIC TRANSPORT NETWORK, Ms.R. Kiruthika, Dr. M.Sundarambal. Download Abstract

18.PRESERVING PRIVACY OF DATA DURING RECORD LINKAGE IN HETEROGENEOUS DATABASES, Celia beryl Philips, M.N.Sushmitha. Download Abstract

19.COMPARISON OF VARIOUS CONCURRENT PROGRAMMING LANGUAGES: A SURVEY ,Swargha K, Dr Paul Rodrigues. Download Abstract

20.SHELTERED HYBRID RANGE QUERY FRAMEWORK IN TIERED SENSOR NETWORK ,Se.Nerthikaa. Download Abstract

21.A UNIFIED SOLUTION FOR ALL TOP-K AND REVERSE TOP-K QUERIES, Sandeep kumar.G, V. Deepa, M. Roberts Masillamani. Download Abstract

22.AVOIDING BYZANTINE FAILURES USING TRUSTED MULTICAST ORDERING SERVICE, Kiruba Wesley, D.Rajalakshmi. Download Abstract

23.OPINION MINING USING LEXICAL BASED SEMANTIC ORIENTATION OF ONLINE REVIEWS, L.Srisubha, Sp.Nithyakalyani, Rm.Chandrasekaran. Download Abstract

24.DESIGN AND IMPLEMENTATION OF INDUSTRIAL SERVICE MONITORING AND CONTROL SYSTEM USING ANDROID PLATFORM, Shilpee Chattopadhyay, M Roberts Masillamani. Download Abstract

25.REGION OF NON-INTEREST BASED MEDICAL IMAGE WATERMARKING ,N.Sophia Sindhuja, C.Vinoth Kumar. Download Abstract

26.A NOVEL INDEX FOR QUERY PROCESSING IN GEOGRAPHIC INFORMATION RETRIEVAL, A.Bharathi, G.Koteswari, Dr. A.M Natarajan. Download Abstract

27.OPTIMAL CLUSTER HEAD SELECTION FOR ENERGY MINIMIZATION IN WIRELESS NETWORKS, T.Saranya , A.Karthikeyan. Download Abstract

28.EXPERT SYSTEM FOR INSECT PESTS OF AGRICULTURAL CROPS, H. Ravisankar, U. Sreedhar. Download Abstract

29.SPAM DETECTION AND ELIMINATION OF COLLOQUIAL TERMS IN MINING OPINION FROM SOCIAL MEDIA NETWORK, Siva Krishna Kumar.E, Pandiyaraju.V, Abirami.S. Download Abstract

30.A PROFICIENT DATE-TIME CONSTRAINT HIERARCHICAL KEY ASSIGNMENT SCHEME FOR MOBILE AGENTS ,Rekha .R, Marikkannu .P. Download Abstract

31.TO HANDLING LINK ASYMMETRY FOR WIRELESS MESH ACCESS NETWORKS USING A CROSS-LAYER APPROACH, K.Thenmozhi,S.Shahul hammed. Download Abstract

32.A DYNAMIC FLOW CONTROL PROTOCOL FOR HIGH SPEED DATA TRANSFER,Ashok. I. Karjigi. Download Abstract

33.A DATA MINING APPROACH FOR SECURE NETWORKS BY DETECTING INTRUSIONS ,Dhivya D T , Anitha J. Download Abstract

34.DESIGN AND IMPLEMENTATION OF INTELLIGENT TRAFFIC CONTROLLER SYSTEM, Benuvel GnanaKirubakaran.Jv, Anand. G. Download Abstract

35.INTEGRATION of SOUND in GRAPHICAL PASSWORD AUTHENTICATION SYSTEM, Ashok kumar N, H.Venugopal, M.Siddappa. Download Abstract

1 2