International Journal of Computer Science and Engineering Communications

List of Articles 2016

Volume 4, Issue 1

PAPER ID
TITLES
V4I112651271
Traffic Avoidance in VANET using Ant Colony Optimization
Author(s):  K.Sivakumar,C.Chandrasekar
V4I112721276
Modeling an Enhanced Deterministic Complex Packet Filter: Integrated Defense Mechanisms with SDMS
Author(s):  J.Karthikeyan,M.Vignesh
V4I112771280
A Survey on Lossless and Lossy Data Compression Methods
Author(s):  K.A.Ramya, M.Pushpa
V4I112841289
Efficient Data Communication and Frequency Reuse in MANET
Author(s):  V.Sangeetha,R.Prabu
V4I112901293
Hybrid Based Resource Reservation in the Cloud for Media Streaming Application
Author(s):  J.Mohana

Volume 4, Issue 2

V4I212941300
RBCAST: An Efficient Data Dissemination Technique to Reduce Broadcast Storm Problem In Vehicular AD-HOC Network
Author(s):  B.Tina Sherin, Dr.P.Calduwel Newton
V4I213011306
Anonymization with MapReduce for Scalable BigData Privacy Preservation in Cloud
Author(s):  Selvi.U, Selvaprabu.D, Dinakaran M, AnandaKumar.S
V4I213071310
A Comparative Study on Pattern Based Image Steganography
Author(s):  Sumathy Kingslin,R. Anusuya
V4I213111313
Analysis of Data Mining Techniques for Agriculture Data
Author(s):  E.Manjula, S.Djodiltachoumy
V4I213141318
Monitoring Network Traffic Based on Mapreduce in Simplified Data Processing Using Intrusion Detection System
Author(s):  Sukanya.D, Parvathi.S, Kumaresan.A, Soniya.N
V4I213191322
A Fast Clustering Feature Based on Subselection Algorithm in Big Data using Fidoop
Author(s):  Yogeshwari.R, Vasantharaj.K, Kumaresan.A, Suganya.C
V4I213291336
Phishing Attack Prevention in Corporate Companies for Internet Voting with Secure Authentication
Author(s):  Nisha.S, A.Neela Madheswari
V4I213371342
Enhanced Dynamic Multi-Keyword Rank Scheme using top Key over Encrypted Cloud Data
Author(s):  M.Gomathi, D.Seenivasan
V4I213431350
Adapting Keyword Recommendation Approach to Folksonomies in Edu-AREA Using Hierarchical Classification
Author(s):  R.Akil Sindhu, R.Manicka Chezian

Volume 4, Special Issue 2

V4SI213511358
Greenbot: A Solar Autonomous Robot to Uproot Weeds in a Grape Field
Author(s):  Dr. M. Sujaritha, Mahesh Lakshminarasimhan, Colin Jude Fernandez, Mahesh Chandran
V4SI213591365
Grouped Clock Gated Flip-Flop Array for Low Power Applications
Author(s):  A.Boobalan, V.Meenakshi
V4SI213661371
Mining of Compact and Lossless High Utility Itemset Using Systolic Tree
Author(s):  R.T.Yamine, Dr.N.S.Nithya
V4SI213721377
Optimized Clustering Mechanism for Qos Aware Route Discovery in Manet
Author(s):  V.Kalaiyarasi, Dr.M.Tamilarasi
V4SI213781383
Analyzing the User Profile Linkage across Different Social Network Platforms
Author(s):  S.Monika, C.Anand,R.K.Gnanamurthy
V4SI213841387
Safe and Distributed Data Sharing in Wireless Sensor Network by Using Revocation Process
Author(s):  A. Sasikala, K. Kumaresan
V4SI213881392
Pattern Image Technique for Data Hiding via Message Bits Stream
Author(s):  B.Thenmozhi, J.Santhosh, A.R.Surendheran
V4SI213931396
Adaptive Packet Transmission in Smart Grid to Minimize the Message Delay
Author(s):  K.Suganya, A.Mummoorthy
V4SI213971401
Predictive Analysis in Agriculture to Improve the Crop Productivity using ZeroR Algorithm
Author(s):  T.Rajasekaran, P.Jayasheelan, K.R. Sri Preethaa
V4SI214021409
Decision Tree and Forensic Methodology for Detecting and Preventing Internal Attackers
Author(s):  M.Jayamagarajothi, P. Murugeswari
V4SI214101414
Averting Intruder Attack on Social Network by Data Sanitization
Author(s):  D.Dhivya, R.Venkadeshan

Volume 4, Issue 3

V4I314151418
Latency Reduction in Zigbee by the Hybrid Combination of STR and Steiner Tree
Author(s):  Nanduja.R, Owaise Ahmed.A, Kumaresan.A, Yogeshwari.R
V4I314191422
Implementation of H.264/MPEG-4 Advanced Video Coding Standard
Author(s):  A.Princy, C.Sridhar
V4I314231427
A Reduction of Online Execution Time with Sparql Query Method on Mapreduce for Bigdata Applications
Author(s):  Suganya.C, Raji.V, Kumaresan.A, Nanduja.R