Research & Publications

Research & Publications

Research & Publications
Title of the paperName of the Jornalvolume/IssuePage No.Publish Month/Year
Data security in cloud computing using various Encryption TechniquesInternational Journal of Modern Computer ScienceVolume 4,Issue 3p.p. 163,166June,2016
Enhancing Data Security in cloud Computing based on Blowfish and MD5 cryptographyInternational Journal of Modern Computer Science and ApplicationsVolume No-4,Issue No.5p.p. 12,18September,2016
Automatic Image Registration based on Transform Based Correlation Based Approch -Surveyinternational journal of research in electronics and computer engineeringvol.4,issue249-52June,2016
Image Resigtration based on Geomatrical Transformation Approch using segmentation and Detect the Brain Tumar in MRI Imagesinternational journal of computer science researchvol,4,issue3103-110Sep-16
A Review over the Optimal Vulnerability Detection MethodsInternational Journal of modern Computer Science(IJMCS)Volume 4 Issue 283-86.Apr-16
An Efficient Model for Web Vulnerabilities Detection based on Probabilistic ClassificationInternational Journal of Technology and Computing (IJTC)Volume 2 Issue 8419-422Aug-16
A Unified Approach to Expose Web VulnerabilitiesInternational Conference on Recent Developments in ScienceREDSET-2016(3rd Conference)Oct-16
The Study and Selection of Color Image Segmentation Techniques-SurveyIJRECEVolume 4 Issue 282-85Apr-16
Detection the Retinal Blood Vessel Segmentation Using Edge & K-Mean Clustering TechniquesInternational Journal of Computer Science ResearchVolume 4 Issue 4Dec-16
Measuring the data routing efficacy in Level-2 Leach protocolIEEE3227-3230Oct-16
Review of wireless sensor networksnational conference ptuseptember,2016
Improving energy of modified multilevel leach protocol by triggering random channel selectionIjcnis mecs publishervolume8N12Aug-16
Review on Herachical routing protocols of WSNijtc journalVolume2Aug-16
Comparitive study and Analysis of AODV and OLSR Protocols in Mesh Networksijtc journalVolume 1Oct-15
Performance Metrics of AODV and OLSR in Mesh NetweorksIEEE Confrence3182-3185October,16
Path Selection and Effects of Channel Behaviour in Multi-cast networksIJLTET JournalVolume 7105-112September,2016
Enhancing Performance of Multi-Cast Networks by Implicit Channel Assignmentnational conference ptuSeptember,2016
Overview of SYBIL Attack : Analysis and Detectionijtc journalVolume 1Oct-15
Analysis and Detection of Byzantine Attack in Wireless Sensor NetworkIEEE Confrence3189-3191October,16
Security Protection across Network based Attacks in Mesh NetworksIJLTET JournalVolume 7470-478September,2016
Wireless Mesh Networks and Riskless Connection Modelsnational conference ptuSeptember,2016
Review of IDS System in Large Scale Adhoc Networksijtc journalVolume 1Oct-15
Performace Analysis of Intrusion Detection SystemIEEE Confrence3186-3188October,16
Detecting and Tracking Intruders in Mesh Based NetworksIJLTET JournalVolume 763-68September,2016
Network based Intrusion Detection System or Detecting Anomalynational conference ptuSeptember,2016
Low Cost Robust Inter-Server Authentication for Cloud EnvironmentIEEE
Mitigation of DDoS Attacks in Cloud ComputingIEEE
Mitigation of EDoS Attacks in Cloud ComputingTaylor and Francis
Pattern Analytical Module for EDoS Attack RecognitionIOSRvol. 18, issue 514-20Sep-16
Comparison of Hybrid HOD-GSA, HOD and PSO for the Tuning of Extended Kalman FilterIEEE
A Review on Tuning of Extended Kalman Filter using optimization techniques for state estimationInternational Journal of computer applicationsvol. 145, issue 151-5May,2016
Tuning of Extended Kalman Filter for non-linear state estimationIOSRvol.18, issue 514-19October, 2016
Cost Aware task scheduling with active VM Load eveluationACMNov-16
Load balancing in Tasks using honeybee Behaviour Algorithm in cloud computingIEEE
Energy Aware task Scheduling with Adaptive Clustering method in cloud computing:A reviewTaylor and francsis
Mata-Heuristic hybrid Task Scheduling Mechanism with Weighted Clustering over cloud computingIJMCSAvol.4 ,issue-539-43Sep-16
enhanced TPA scheme to improve access permissions development over cloud architectureIJTC journalvol 2,issue 10508-513october,2016
Review of third party authentication model for securing user space in cloud computingijrecevol 4,issue 275-77april,2016
Data security in cloud computing using various Encryption TechniquesInternational Journal of Modern Computer ScienceVolume 4,Issue 3p.p. 163,166June,2016
Enhancing Data Security in cloud Computing based on Blowfish and MD5 cryptographyInternational Journal of Modern Computer Science and ApplicationsVolume No-4,Issue No.5p.p. 12,18September,2016
Automatic Image Registration based on Transform Based Correlation Based Approch -Surveyinternational journal of research in electronics and computer engineeringvol.4,issue249-52June,2016
Image Resigtration based on Geomatrical Transformation Approch using segmentation and Detect the Brain Tumar in MRI Imagesinternational journal of computer science researchvol,4,issue3103-110Sep-16
A Review over the Optimal Vulnerability Detection MethodsInternational Journal of modern Computer Science(IJMCS)Volume 4 Issue 283-86.Apr-16
An Efficient Model for Web Vulnerabilities Detection based on Probabilistic ClassificationInternational Journal of Technology and Computing (IJTC)Volume 2 Issue 8419-422Aug-16
A Unified Approach to Expose Web VulnerabilitiesInternational Conference on Recent Developments in ScienceREDSET-2016(3rd Conference)Oct-16
The Study and Selection of Color Image Segmentation Techniques-SurveyIJRECEVolume 4 Issue 282-85Apr-16
Detection the Retinal Blood Vessel Segmentation Using Edge & K-Mean Clustering TechniquesInternational Journal of Computer Science ResearchVolume 4 Issue 4Dec-16
Measuring the data routing efficacy in Level-2 Leach protocolIEEE3227-3230Oct-16
Review of wireless sensor networksnational conference ptuseptember,2016
Improving energy of modified multilevel leach protocol by triggering random channel selectionIjcnis mecs publishervolume8N12Aug-16
Review on Herachical routing protocols of WSNijtc journalVolume2Aug-16
Comparitive study and Analysis of AODV and OLSR Protocols in Mesh Networksijtc journalVolume 1Oct-15
Performance Metrics of AODV and OLSR in Mesh NetweorksIEEE Confrence3182-3185October,16
Path Selection and Effects of Channel Behaviour in Multi-cast networksIJLTET JournalVolume 7105-112September,2016
Enhancing Performance of Multi-Cast Networks by Implicit Channel Assignmentnational conference ptuSeptember,2016
Overview of SYBIL Attack : Analysis and Detectionijtc journalVolume 1Oct-15
Analysis and Detection of Byzantine Attack in Wireless Sensor NetworkIEEE Confrence3189-3191October,16
Security Protection across Network based Attacks in Mesh NetworksIJLTET JournalVolume 7470-478September,2016
Wireless Mesh Networks and Riskless Connection Modelsnational conference ptuSeptember,2016
Review of IDS System in Large Scale Adhoc Networksijtc journalVolume 1Oct-15
Performace Analysis of Intrusion Detection SystemIEEE Confrence3186-3188October,16
Detecting and Tracking Intruders in Mesh Based NetworksIJLTET JournalVolume 763-68September,2016
Network based Intrusion Detection System or Detecting Anomalynational conference ptuSeptember,2016
Low Cost Robust Inter-Server Authentication for Cloud EnvironmentIEEE
Mitigation of DDoS Attacks in Cloud ComputingIEEE
Mitigation of EDoS Attacks in Cloud ComputingTaylor and Francis
Pattern Analytical Module for EDoS Attack RecognitionIOSRvol. 18, issue 514-20Sep-16
Comparison of Hybrid HOD-GSA, HOD and PSO for the Tuning of Extended Kalman FilterIEEE
A Review on Tuning of Extended Kalman Filter using optimization techniques for state estimationInternational Journal of computer applicationsvol. 145, issue 151-5May,2016
Tuning of Extended Kalman Filter for non-linear state estimationIOSRvol.18, issue 514-19October, 2016
Cost Aware task scheduling with active VM Load eveluationACMNov-16
Load balancing in Tasks using honeybee Behaviour Algorithm in cloud computingIEEE
Energy Aware task Scheduling with Adaptive Clustering method in cloud computing:A reviewTaylor and francsis
Mata-Heuristic hybrid Task Scheduling Mechanism with Weighted Clustering over cloud computingIJMCSAvol.4 ,issue-539-43Sep-16
enhanced TPA scheme to improve access permissions development over cloud architectureIJTC journalvol 2,issue 10508-513october,2016
Review of third party authentication model for securing user space in cloud computingijrecevol 4,issue 275-77april,2016

PAY FEE ONLINE