| Home | Journals | Special Issues | Conferences | Contact us |


ANAS Volume 8, Number 16: EEICC Special 4 2014 for Computer Science

----------------------------------------------------------------------------------------------------------------------------------

Gleaming System – A Resourceful System Designed to Maximize the Utilization of
Cloud Infrastructure by Scheduling the Heterogeneous Workloads

P.Amudhavalli and Dr.A.Chandrasekar

1-7

----------------------------------------------------------------------------------------------------------------------------------

An Effectual Routing Protocol for In-Network Aggregation in Wireless Sensor Networks

P.Thirumoorthy and Dr. N. K.Karthikeyan

8-14

----------------------------------------------------------------------------------------------------------------------------------

Abnormal Behavior Recognition in Infrared Imagery Based on Daubechies Wavelets

Dr. Ramar Kadarkaraiyandi, Dr. Velayutham Ramakrishnan, Prof. Selvarathy Thirumani and Mr. Sathish
Vetrivel

15-20

----------------------------------------------------------------------------------------------------------------------------------

ELRT: Improved Packet delivery ratio using Enhanced Link Residual Time in VANET

Karthikeyan L, Selvakumar S and Balasubramani S

21-24

----------------------------------------------------------------------------------------------------------------------------------

A Chronological Survey on Combinatorial Testing Strategies

B.Vani and Dr. R. Deepa Lakshmi

25-32

----------------------------------------------------------------------------------------------------------------------------------

Detection of Static and Dynamic Behavior in Forbidden Areas of a Complex
Environment

Sumalatha Ramachandran and Lakshmi Harika Palivela

33-39

----------------------------------------------------------------------------------------------------------------------------------

Exhibiting Human Behavior in Transforming Informal Words in to Formal Words on
Tweet Messages

Kumaragurubaran Thangavel and IndraDevi M

40-43


----------------------------------------------------------------------------------------------------------------------------------

Identifying Security threats using Signature based Intrusion detection system in
wireless sensor networks

A.Hyils Sharon Magdalene and Dr.P.Kumar

44-47

----------------------------------------------------------------------------------------------------------------------------------

A Unique Location-Key pair based Security for Wireless Sensor Network

R. Amuthavalli and Dr. R. S. Bhuvaneswaran

48-53

----------------------------------------------------------------------------------------------------------------------------------

Flexible Tradeoff Based Real Time Service Selection Process Based On Priorities and
User Preferences

Adlin Suji.K and Dr.S.Sujatha

54-59

----------------------------------------------------------------------------------------------------------------------------------

Clustering Text Reviews for Opinion Mining

Periakaruppan Sudhakaran, Shanmugasundaram Hariharan and Joan Lu

60-65

----------------------------------------------------------------------------------------------------------------------------------

Analysis of Residual Energy and SNR of DSR/AODV/RPAR Protocols in Wireless
Multimedia Sensor Networks

A.Sivagami, S.Malarkkan, S.Sandiya and R.Ramakrishnan

66-74

----------------------------------------------------------------------------------------------------------------------------------

A Novel Approach for Detecting Rare Drug-Drug Interaction using Data Mining

Bazila Banu. A, Appavu alias Balamurugan and Shyni Beaulah.M

75-83

----------------------------------------------------------------------------------------------------------------------------------

 
 
© 2007, AENSI Publications