Contents IJPAM: Volume 118, No. 8 (2018)

Dr.K.Sumathi, Mrs.N.Selva Lakshmi and Ms.S.Kundhavai
Reviewing the Impact of Smartphone Usage on Academic Performance Among Students of Higher Learning
| download this paper (free) |

Muhammad Muslihudin, Fauzi, Tri Susi Susanti, Sucipto, Andino Maseleno
The Priority of Rural Road Development using Fuzzy Logic based Simple Additive Weighting
| download this paper (free) |

S. Padmapriya and S. Murugan
A Novel Feature Selection Method for Pre-Processing the ASD Dataset
| download this paper (free) |

G.Emayavaramban, S.Ramkumar, A.Amudha and K.Sathesh Kumar
Classification of Hand Gestures Using FFNN and TDNN Networks
| download this paper (free) |

Arun Murugesan and Balamurali Saminathan
Key Management For Secured Group Communication
| download this paper (free) |

Josephine Selle Jeyanathan, P. Jeyashree and A Shenbagavalli
Transform based Classification of Breast Thermograms using Multilayer Perceptron Back Propagation Neural Network
| download this paper (free) |

K. S. Kannan, P. Devabalan, S.Hariharasitaraman and P. Deepa
Some Insights on Grid Computing-A Study Perspective
| download this paper (free) |

S. Anantha Babu and Eswaran Perumal
Wavelet Based Improved Coding Techniques (WBIC) for Grayscale Images using Lossy Compression
| download this paper (free) |

Prof.Kundhavai Santharam,Dr.K.Sumathi and Prof.N.Selvalakshmi
A Meta Analytic View on Suitability of it Based Solution When Commercial Viability of Business is Affected By Disaster
| download this paper (free) |

Dr.P.Shanmugasundaram, Dr. B.Sarojini and N.Rajesh
Information Integration - An Overview on Data Protection and Privacy in Big Data Integration
| download this paper (free) |

A. Cecil Donald, L. Arockiam and K. Suresh
ORBUA: An Effective Data Access Model for MobiCloud Environment
| download this paper (free) |

NagaruruHarshitha, Lingam VenkataRangaSubbaS, GangadasariGeethika Rani and K. Joseph Abraham Sundar
Image Segmentation for Vegetation Images based on Framelet Transform
| download this paper (free) |

Sudarsan Sahoo, J. K. Das and Bapi Debnath
Fault Diagnosis in Rolling Element Bearing Using Filtered Vibration and Acoustic Signal
| download this paper (free) |

Amita Malav and Kalyani Kadam
A Hybrid Approach for Heart Disease Prediction Using Artificial Neural Network and K-means
| download this paper (free) |

T.Mekala and N.Mahendran
Improved Security in Adaptive Steganography Using Game Theory
| download this paper (free) |

M. Adimoolam, M. Sugumaran and R. S. Rajesh
A Novel Efficient Clustering and Secure Data Transmission Model for Spatiotemporal Data in WSN
| download this paper (free) |

Parvathy Ram and Swapna T R
Profiling of Hard Exudates and Microaneurysms to Evaluate the Progress of Diabetic Retinopathy
| download this paper (free) |

Ayisheshim Almaw and Kalyani Kadam
Survey Paper on Crime Prediction using Ensemble Approach
| download this paper (free) |

K. Bhuvaneswari and K.Saravanan
SecureAssociation Rule Mining Using Array Mapping Table
| download this paper (free) |

Sirage Zeynu and Shruti Patil
Survey on Prediction of Chronic Kidney Disease Using Data Mining Classification Techniques and Feature Selection
| download this paper (free) |

P.Shanthi Bala and G.Aghila
SemPER: Semantic Relationships based Reasoning Approach
| download this paper (free) |

Chala Beyene and Pooja Kamat
Survey on Prediction and Analysis the Occurrence of Heart Disease Using Data Mining Techniques
| download this paper (free) |

JMR.Bhonesh Narayani and T. Meyyappan
Eye Iris Boundary Detection from Eye Iris using Edge Identification Model
| download this paper (free) |

Dr. R.K. Kavitha, V. JalajaJayalakshmi and R. Rassika
Collaborative learning in Computer Programming Courses using E-Learning Environments
| download this paper (free) |

P.Santhi and R.Vikram
Implementation Of Classification System Using Density Clustering Based Gray Level Co Occurrence Matrix (DGLCM) For Green Bio Technology
| download this paper (free) |

Kiruthika S and Sakthi P
AUTOMIZED MOLASSES FEED CONTROL USING PROGRAMMABLE LOGIC CONTROLLER
| download this paper (free) |

P.Sakthi and P.Yuvarani
Detection and Removal of Weed between Crops in Agricultural Field using Image Processing
| download this paper (free) |

Yuvarani P and Sakthi P
Optimization Techniques for Lung Cancer Analysis-A Survey
| download this paper (free) |

Saranya vijayan and S.N Geethalakshmi
A Survey on Crack Detection Using Image Processing Techniques and Deep Learning Algorithms
| download this paper (free) |

Ackshaya K and Batri k
Grey Wolf Optimization Based CDMA Crossbar Design
| download this paper (free) |

P.Subhashree and G.Gunasekaran
Enabling Trust and Reputation in AuthenticationMechanismsin distributed cloud
| download this paper (free) |

Sujithra Sankar
Challenges in the Implementation of Free and Open Source Software A Case Study of Spoken Tutorial Project in Kerala, India
| download this paper (free) |

S. Santiago and L. Arockiam
ELT-EAPR: Expected Life Time of Energy Aware Parent Routing for IoT Networks
| download this paper (free) |

Mohseena.AV, Sneha.K, Fepslin AthishMon and K. Suthendran
CTM based Encryption in Steganoraphy
| download this paper (free) |

Fepslin AthishMon, Neethu Narayanan and K. Suthendran
Recognizing Spontaneous Emotion From The Eye Region Under Different Head Poses
| download this paper (free) |

Pooja Prakash.M, Sreeraj.R, Fepslin AthishMon and K. Suthendran
Combined Cryptography And Digital watermarking For Secure Transmission of Medical Images in EHR Systems
| download this paper (free) |

Thulasi Mohan, Shilpa Sudheendran, Fepslin AthishMon and K. Suthendran
Divisioning and Replicating Data in Cloud for Optimal Performance and Security
| download this paper (free) |

M.Karolin, T. Meyyappan and SM.Thamarai
Encryption and Decryption of Color Images using Visual Cryptography
| download this paper (free) |

Chandrasegar Thirumalai and Srivastav Budugutta
Public Key Encryption for SAFE Transfer of One Time Password
| download this paper (free) |

Vijo M. Joy and S. Krishnakumar
Optimal Design of Power Sheduling using Artificial Neural Network in An Isolated Power System
| download this paper (free) |

B.Sarojini and B.Vijayalakshmi
Multi-Image Deblurring For Real-Time Face Recognition System
| download this paper (free) |

Durga S and Amritha P.P
Defensive Coding Framework
| download this paper (free) |

Ashok Kumar Mohan and Nirmala Devi M
A Selective Generation of Hybrid Random Numbers via Android Smart Phones
| download this paper (free) |

R.Hariharan and S.Saran Raj
Study of Online Social Network and OSN Classification Based on Characterization
| download this paper (free) |

Rohan Gupta, Harbhajan Singh, Gurpreet Singh and Amanpreet Kaur
Ant Colony Optimization Algorithm:An Optimized data dissemination scheme for MANETs
| download this paper (free) |

Dr S. Umarani, Dr A. Ambethraja and Dr J. Dhillipan
Design and Extension of Planar Network with Limited P-cycle
| download this paper (free) |

M.C.S.Geetha, I. Elizabeth Shanthi and S. Seetha Raman
A Survey and Analysis on Regression Data Mining Techniques in Agriculture
| download this paper (free) |

Ranjini.A and B.S.E.Zoraida
Energy Knapsack Problem in Smart Grid using Intelligent Fuzzy Reinforcer Genetic Algorithm
| download this paper (free) |

K.Saranya and S.Jayanthy
Machine Learning Techniques for Onto-based Emotional Classification of Text
| download this paper (free) |

S. Rajeswari, K. Suthendran and K. Rajakumar
A Smart Agricultural Model by Integrating IoT, Mobile and Cloud-based Big Data Analytics
| download this paper (free) |

S. Karolin Mary, D. Mohanapriya and K. Mahesh
Sequential Pixel Text Detector: A Cohesive Framework for Text Detection and Recognition in Video
| download this paper (free) |

G.S.Nandakumar, V.Sudha and D.Aswini
Fault Detection in Overhead Power Transmission
| download this paper (free) |

P.T.Sivagurunathan, P.Ramakrishnan, N.Sathishkumar and V.Kavitha
A survey on Wearable health Sensor-Based System Design
| download this paper (free) |

S. Pradeep and K.Ribana
Modeling of Reduction of Memory in Video Processing
| download this paper (free) |

Kaarthik K and Vivek C
Weed Remover In Agricultural Field Through Image Processing
| download this paper (free) |

L. RAMESH and T.ABIRAMI
Segmentation of Liver Images Based on Optimization Method
| download this paper (free) |

V. Keralshalini and M. Annakamatchi
Low Profile- Frequency Reconfigurable Triple Band Antenna for WLAN/Wi-Fi/WIMAX Wireless Applications
| download this paper (free) |

B.NANDHINI and P.NITHYA
CAROTID ARTERY LUMEN RECOGNITION IN ULTRASOUND B-MODE IMAGES
| download this paper (free) |

N.Mahendran and T.Mekala
A Survey: Sentiment Analysis Using Machine Learning Techniques for Social Media Analytics
| download this paper (free) |

N.Gayathri and K.Mahesh
A SYSTEMATIC STUDY ON VIDEO INDEXING
| download this paper (free) |

P.Saranya and M.Vanitha
User Authorization with Encrypted Visual Cryptography Using High Definition Images
| download this paper (free) |

Kirubakaran R, Bharathipriya C, Francis Jency X and Mano Prathibhan C
Statistics based Load Evaluation in Web Applications using Fuzzy Logic and Dynamic Track Bots
| download this paper (free) |

S.Amuthameena and B. Balraj
Implementation and Study of Conventional Surface Sliding Mode Controller for an Interacting Level System
| download this paper (free) |

V.Prabhu, T.S Srinivasan and T.S Balaji
MODELLING OF ADAPTIVE SPEED CONTROL AND AUTO CALIBRATION OF SENSOR IN AUTOMOTIVE SYSTEM
| download this paper (free) |

R. Sujatha and V.Keerthana
Secure Data Access Control System in IOV Environments
| download this paper (free) |

M.Murugesan and A.Kalaiyarasi
Secure Data Compression Scheme in Cloud Environments With Backup Recovery Scheme
| download this paper (free) |

S.Thilagamani and V.Manochitra
An Intelligent Region-Based Method for Detecting Objects from Natural Images
| download this paper (free) |

A.Lalithambikai and M.Vanitha
An Efficient Technique for Cryptography with Enhanced Key Security
| download this paper (free) |

S.Karkuzhali and D. Manimegalai
Microanaurysms Identification using Computational Intelligence approach in Two Dimensional Fundus Images for detection of Diabetic Retinopathy
| download this paper (free) |

P.Ananthi, K.Rajalakshmi and K.Mahesh
Efficient Data Hiding for MPEG-4 using Extended Prediction Algorithm
| download this paper (free) |

P.Santhi and S.Kiruthika
Lung Based Disease Prediction Using Lobe Segementation Based on Neural Networks
| download this paper (free) |

N.Krishnaveni and Sudhakar Periyasamy
Image Steganography using LSB Embedding with Chaos
| download this paper (free) |

R.Suganya, R.Suganya and V.Palanisamy
A Survey on Security Methodologies in E-Voting System
| download this paper (free) |

P.Abirami, R.Anandha Jothi and V.Palanisamy
A Survey on Biometric E-Voting System Using Retina
| download this paper (free) |

M.Ramesh and K. Mahesh
Significance of various Video Classification Techniques and Methods: A Retrospective
| download this paper (free) |

M.Paranthaman and S.Palanivel rajan
Design of Dual Band Circular Patch Antenna for Medical Imaging
| download this paper (free) |

A.Dinesh Kumar, R.Pandi Selvam and K.Sathesh Kumar
Review on Prediction Algorithms in Educational Data Mining
| download this paper (free) |

J. Murugachandravel and S. Anand
Wavelet Based Image Enhancement using Two Stage Adaptive Histogram Equalization
| download this paper (free) |

E.Dinesh and S.M.Ramesh
Individual Identification Based on Dorsal Palm Blood Vessel Pattern by Texture QualityE
| download this paper (free) |

M.S.Saranya and N.Jayaveeran
Neuro – Ant Colony Algorithm – An Advanced Data Mining Technique for Knowledge Discovery from Structured Data
| download this paper (free) |

V.Neethidevan and G.Chandrasekaran
Database Testing using Selenium Web Driver – A Case Study
| download this paper (free) |

S.Kalaiselvi, R.Anandha Jothi and V.Palanisamy
Biometric Security with Iris Recognition Techniques: A Review
| download this paper (free) |

M. Muthugurupackiam and K. Kuppusamy
Ripple Wavelet-Rank Based Splitting Trees Method (RWRBST) for Quick Image Compression
| download this paper (free) |

C. Selvarathi and A.Selvi
Face Tracking Algorithm for Tracking Target in WSN
| download this paper (free) |

S.Arockia Asha Subitha and M.Vanitha
An Overview of Aggregative Key for Security Model On Cloud Storage
| download this paper (free) |

R. Kanimozhi and K.Saravanan
LAPRAS and MILOTIC- Innovative algorithms for Privacy Preserving Utility Mining
| download this paper (free) |

S.Kanimozhi and B.Padmini Devi
A Novel Approach for Deep Learning Techniques Using Information Retrieval from Bigdata
| download this paper (free) |

Navin Dhinnesh A D C and Sundareswaran N
Light Fidelity- The Future
| download this paper (free) |

G.Mohana Prabha
AUTOMATIC HEALTH MONITORING SYSTEM USING RASPBERRY PI
| download this paper (free) |

E.Balraj and D.Maalini
A SURVEY ON PREDICTING STUDENT DROPOUT ANALYSIS USING DATA MINING ALGORITHMS
| download this paper (free) |

M.Suryakala, K.Rajalakshmi and K.Mahesh
A Systematic Study on Various Multimedia Compression and its techniques
| download this paper (free) |

Fareen Farzana A.H and S.Neduncheliyan
Multi-objective Artificial Bee Colony based Routing in Mobile Wireless Sensor Network
| download this paper (free) |

K.Rajeswari and S.Neduncheliyan
Gravitational Search Algorithm based Fault Tolerance in Wireless Sensor Network
| download this paper (free) |

Mahalakshmi.A, Mohanavalli.M and Raja Sankari.V.M
PC Based Audiometer using LabView
| download this paper (free) |

K.Kathirvel, C.Ramachandran and N.Sivarathy
A Survey on IDs Using Clustering Techniques in Data Mining
| download this paper (free) |

J. Kamalakumari and M.Vanitha
Recognizing Heterogeneous Faces– A Study
| download this paper (free) |

P.Sumathi and Dr.S.B.Inayath Ahamed, Dr.V.Kumaravel
Predicting Entrepreneurial Intention among College Students in Virudhunagar DistrictP
| download this paper (free) |

S.Sundareswari and I.Kaspar Raj
A Comparative Study of Image Filtering Techniques for Stone Inscriptions
| download this paper (free) |

R. Dharmarajan and V. Thiagarasu
Proposed Ant Gain Feature selection and Classification Framework for Intrusion Detection System
| download this paper (free) |