1. Application Of Linear And Non Linear Automata Rules In Cryptography For Improved Security Of Transmitted Data
S. AMIRTHALINGAM, DR. K. LATHA
2. Enabling Privacy 2. Autonomous Agrobot for Rice Cultivation Encrypted Cloud Data Using Apriori Algorithm
S. JAVID AHAMED
3. A Noval Approach of Geofencing and Geo Tagging System Based Sea Border Identification Using Embedded System
S. MOHAN
4. Clustering On Special Data Sets Using Extended Linked Clustering - A review
K. LAKSHMAIAH, DR. S. MURALIKRISHNA, DR. B. ESWARA REDDY
5. Automatic Classification of Pap Smear Cervical Cell
S. ATHINARAYANAN, R.KAVITHA, DR.M.V.SRINATH
6. Virtual Machines And Cloud In Dynamic Resources
B. SAI SUGANYA, S.ATHINARAYANAN
7. Web Data Extraction Using Clustering Techniques
VENKATA KISHORE.KONKI AND SAMEERGOGINENI
8. Emerging Trends In Design Of Low Power High Speed Level Shifters In VLSI Design
G.SRINIVASULU, DR. K. VENKATARAMANAIAH, DR. K. PADMAPRIYA
9. Analysis of Mechanical And Thermal Fatigue Failures of Piston Heads And Other Critical Parts of IC Engines - Issues and Challenges
DR.N.V.V.S. SUDHEER, M. MARUTHI RAO
10. A Low Complexity Impulse Radio Based UWB Transceiver Model
U . MAHESHWARAN
11. Study of turbo decoding techniques
N . UDAYA BALAN
12. Reliability Prediction and Estimation of a Safety Critical System Using Airs
G . CHITRA DEVI
13. Investigation in Single Document Summarization
L.R HARIHARAN, L.RADIKA
14. Failure Mode Effect Mode Analysis
R. MURUGAPPAN
15. Application of Rough Set
D . RAJKUMAR, GNASEKAR.I
16. Data Mining Techniques For Teaching Result Analysis
P . SUBRAMANIAN
17. Mutual Information - Based Node Ordering in the K2 Algorithm
MOHAMMED SANAFOR
18. Novel Algorithm for Mining High Utility
S. SHANKER
19. An ontology based corporate knowledge
M . KAMARAJAN
20. Incorporating Varying Requirement Prioreities and Costs in Test Case Prioritization
L. RAMASWAMY, RAJKUMAR