Volume 4 Issue 2

1
Virtual Shuffling For Efficient Data Movement In Map Reduce
Authors : DEEPIGA , M.VIJAYANANTHKUMAR , R.VETRIVENTHAN, SENTHIL KUMARAN
Pages : 76 - 78

2
Web Content Trust Rating Prediction Using Evidence Theory
Authors : S.ARUNA, M.VIJAYANANTHKUMAR , R.VETRIVENTHAN, SENTHIL KUMARAN
Pages : 71 - 75

3
Understanding Smartphone Sensor And App Data For Enhancing The Security
Authors : D.ANBUMOZHI , M.VIJAYANANTHKUMAR , R.VETRIVENTHAN, SENTHIL KUMARAN
Pages : 65 - 70

4
Mining Free Item Sets Under Constraints
Authors : VASANTHAKUMARI , R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN
Pages : 57- 64

5
Frodo: Fraud Resilient Device For Off Line Micro-payments
Authors : KARTHIGA, , M.VIJAY ANANTH KUMAR , R.VETRIVENTHAN,SENTHIL KUMARAN
Pages : 52 - 56

6
A Survey On Block Design-based Key Agreement
Authors : MANIKANDAN, , M.VIJAY ANANTH KUMAR , R.VETRIVENTHAN , SENTHIL KUMARAN
Pages : 48 - 51

7
Applying Intrusion Detection Systems
Authors : J.PRIYA , M.VIJAY ANANTH KUMAR , R.VETRIVENTHAN, SENTHIL KUMARAN
Pages : 43 - 47

8
Search Rank Fraud And Malware Detection In Google Play
Authors : M.RAMYA , R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN
Pages : 29 - 42

9
A Research Paper On An Impact Of Goods And Service Tax (gst)
Authors : ELAKKIYA. I , R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN
Pages : 27 - 28

10
Tafc: Time And Attribute Factors Combined Access Control
Authors : K.DINESH , R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN
Pages : 13 - 26

11
Small – Foot Print Keyword Spotting Using Deep Neural Networks
Authors : DHATCHAYINI.B, R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN
Pages : 7 - 12

12
Passbyop: Bring Your Own Picture For Securing Graphical Passwords
Authors : A.ANANTHARAJ , R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN
Pages : 1 - 6