skip navigation
International Journal of Advance and Innovative Research
Volume 6, Issue 2 (XI) : April – June 2019
Sr. No Contents Page No
1 A study on Teaching Techniques used for the analysis of the Autistic Children using Data Mining technique
R. Subalakshmi
1 – 6
2 AUMENTING SMART WATER MANAGEMENT SYSTEM USING RASPBERRY PI IOT
Dr. T. Thiruvenkadam, Rajkamal and Dr. S. Sasikala
7 – 10
3 FISHERMAN BORDER SECURITY EMPOWERED with iot ARDUINO BASED BOAT
Dr. K. M. Sharavana Raju, Dr. S. Sasikala and Nisha. S
11 – 14
4 LOAD BALANCING USING SLEEP SCHEDULING ALGORITHM IN MANET
M. Hemalatha and Dr. S. Mohanapriya
15 – 22
5 A STUDY ABOUT MULTI FACTOR AUTHENTICATION SYSTEM OF OTP AND BIOMETRIC
Dr. V. Kavitha and S. Subhasini and B. Sathyabama
23 – 26
6 WAVELET TRANSFORM TECHNIQUE FOR MAMMOGRAM IMAGE ENHANCEMENT
Dr. N. Revathy, T. Guhan, Dr. T. A. Sangeetha and Dr. V. Kavitha
27 – 31
7 Palm print Authentication for Biometric Privacy using Visual Cryptography
Dr. M. Suganya and Dr. R. Padmapriya
32 – 36
8 Secure incorporate of IoT and Cloud Computing
S. Subhasini, Dr. V. Kavitha and B. Satyabama
37 – 40
9 A DELAY-TOLERANT SECURITY FRAMEWORK FOR MOBILE DATA COLLECTION
Pannerselvam, V. Liyandernoyalraj and Dr. N. Revathy
41 – 47
10 SECURE AND IDENTIFY HACKING IN ROUTING SYSTEM
M. Logesh and A. Kriuthika
48 – 51
11 BAGGAGE TRACKING BEHAVIOR BY RFID AND IOT
S. Saranya, P. Deepika, Dr. S. Sasikala and S. Geethamani
52 – 55
12 BLOCKADE OF MALEVOLENT TWITTER APPLICATIONS
Lavanyaa M, Nandhini P. S, Nitin karthik S and P. Sugantha Priyadharshini
56 – 58
13 Review on Open Source Technologies and prospects
Selvamohan Thangavel and P. Menaka
59 – 64
14 An Interactive Study of Big Data Technologies in Health Care with Machine Learning Algorithms
Parimala S and Dr. P. Senthil Vadivu
65 – 67
15 SCHOOL AND COLLEGE FAILURE STUDENTS DROPOUT SYSTEM PREDICTION BASED ON ANN AND MKNN ALGORITHM USING DATA MINING TECHNIQUES
T. Kavipriya and N. Kumar
68 – 75
16 Message Transfer carried out through digital Watermarking in Defence
Dr. N. Revathy, T. Guhan and M. Sherlyn Sandhya
76 – 80
17 Hybrid Algorithm Based on WOA and CSA for Solving Data Clustering
M. Amalmary and Dr. A. Prakash
81 – 85
18 A BAT OPTIMIZATION BASED QoS ROUTING FOR WIRELESS SENSOR NETWORKs (WSNs)
N. Senthil Kumar and Dr. N. Revathy
86 – 92
19 THE Secure Distributed Cloud Storage
P. Deepika, S. Saranya and Richard Benjamin M
93 – 96
20 SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Anithaa Dheve S and Geethamani G. S
97 – 101
21 Optimization of Energy Consumption Using Load sharing In Clustered Networks
G. Priyanka
102 – 107
22 A DYNAMIC POPULARITY AWARE REPLICATION STRATEGY WITH PARALLEL DOWNLOAD SCHEME IN CLOUD ENVIRONMENTS
V. Jansirani and G. S. Geethamani
108 – 110
23 Privacy-Preserving Public Auditing for Secure Cloud Storage
Raj Dharaniya V and Marrynal S Eastaff
111 – 115
24 CLOUD COMPUTING:  SECURITY ISSUES
N. Sanooj and G. Sivabrindha
116 – 120
25 Internet Usage Control Using Access Control Techniques
Sabatini Judis Nivya and Marrynal S Eastaff
121 – 125
26 Student’s Feedback System
Dr. V. Kavitha, P. Hemashree and Ram Kumar
126 – 130
27 Review on Analysis of Routing Algorithms for Wireless Sensor Networks
M. Prakasam and M. Jhanani
131 – 134
28 24/7 LIVE PATIENT HEALTH TRACKING SYSTEM USING IOT PROTOCOL
S. Lakshmipriya
135 – 136
29 PREDICTION OF STUDENT PERFORMANCE IN INTERVIEW USING KNOWLEDGE DISCOVERY TECHNIQUE
S. Balaji, B. Saranya and S. Suhashine
137 – 140
30 EmpoWEring BIG DATA ANALYTICS FOR INDUSTRIAL TYPE–TELECOMTOWER UTLIZATION SCRUTINY
Teklay Teklu, S. Balaji and Dr. S. Sasikala
141 – 145
31 AUTOMATIC LICENSE PLATE REGONITION FOR TOLL -E COLLECTION
P. Lalitha, S. Aravind, S. Ramya and V. Rajkumar
146 – 149
32 SECURITY AND ANTI-THEFT APPLICATION
Jenaker R and Dr. Rangaraj R
150 – 151
33 AUGMENTING BIG DATA ANALYTICS IN MOVIE RATING SCRUTINY
Dr. S. Sasikala, D.Vijayakumar, S. Aravind, A. S. Aghilan and P. Kiruthik Roshan
152 - 157
34 A REVIEW ON ASSORTMENT OF DATA MINING APPLICATIONS
R. Subalakshmi
158 – 160
35 Anomaly Detection via Online Over-Sampling Principal Component Analysis
Sivabhalan and Marrynal S Eastaff
161 – 165
36 FLEET MANAGEMENT SYSTEM
K. Rajathi and Dr. V. Saravanan
166 – 171
37 BOUNDLESS DYNAMIC VIDEO STREAMING FROM MOBILE DEVICES USING CLOUD AS A VIRTUAL   SERVICE PROVIDER
P. Jayasree and Dr. V. Saravanan
172 – 178
38 Modern Trends in Artificial Intelligence
Gowri A
179 – 183
39 Novel Archetype for Sentiment Mining using Big Data
A. Raja and Dr. S. Prema
184 – 186
40 SECURED TECNIQUES OF DATA ANONYMIZATION FOR SECLUSION PRESERVATION
S. Saranya and K. Nandini
187 – 190
41 AN IOT BASED SMART HEALTH MONITORING SYSTEM
Dr. S. Sasikala, M. Selvapriya and Pandiyarajan
191 – 196
42 A COMPARITIVE ANALYSIS OF DSR AND AODV ROUTING PROTOCOL IN MOBILE ADHOC NETWORK
S. Sasikala
197 – 202
43 CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD
M. Surendhar and G. Sivabrindha
203 - 207

Volume 6, Issue 2 (XI) : April – June 2019