IJAET - Journal Papers

Virtual Shuffling For Efficient Data Movement In Map Reduce

Authors :  DEEPIGA , M.VIJAYANANTHKUMAR , R.VETRIVENTHAN, SENTHIL KUMARAN | Pages : 76 - 78

Web Content Trust Rating Prediction Using Evidence Theory

Authors :  S.ARUNA, M.VIJAYANANTHKUMAR , R.VETRIVENTHAN, SENTHIL KUMARAN | Pages : 71 - 75

Understanding Smartphone Sensor And App Data For Enhancing The Security

Authors :  D.ANBUMOZHI , M.VIJAYANANTHKUMAR , R.VETRIVENTHAN, SENTHIL KUMARAN | Pages : 65 - 70

Mining Free Item Sets Under Constraints

Authors :  VASANTHAKUMARI , R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN | Pages : 57- 64

Frodo: Fraud Resilient Device For Off Line Micro-payments

Authors :  KARTHIGA, , M.VIJAY ANANTH KUMAR , R.VETRIVENTHAN,SENTHIL KUMARAN | Pages : 52 - 56

A Survey On Block Design-based Key Agreement

Authors :  MANIKANDAN, , M.VIJAY ANANTH KUMAR , R.VETRIVENTHAN , SENTHIL KUMARAN | Pages : 48 - 51

Applying Intrusion Detection Systems

Authors :  J.PRIYA , M.VIJAY ANANTH KUMAR , R.VETRIVENTHAN, SENTHIL KUMARAN | Pages : 43 - 47

Search Rank Fraud And Malware Detection In Google Play

Authors :  M.RAMYA , R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN | Pages : 29 - 42

A Research Paper On An Impact Of Goods And Service Tax (gst)

Authors :  ELAKKIYA. I , R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN | Pages : 27 - 28

Tafc: Time And Attribute Factors Combined Access Control

Authors :  K.DINESH , R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN | Pages : 13 - 26

Small – Foot Print Keyword Spotting Using Deep Neural Networks

Authors :  DHATCHAYINI.B, R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN | Pages : 7 - 12

Passbyop: Bring Your Own Picture For Securing Graphical Passwords

Authors :  A.ANANTHARAJ , R.SIVAPRAKASH , R.VETRIVENTHAN, SENTHIL KUMARAN | Pages : 1 - 6