Home | MEJSR | Journals | For Authors | Publications Ethics | Peer Review | Contact Us
MEJSR | Aims & Scope |  Editorial board | On-line Issues 
Middle-East Journal of Scientific Research
—————————————————————————————————————————————————————————————————————————————————————————————————————————

          Volume 24 (Techniques and Algorithms in Emerging Technologies), 2016


A Secure and Energy Efficient Multihop Communication in Wireless Sensor Networks (WSN)

P. Bhuvaneswari and P. Thirumoorthy

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Arduino Microcontroller Based Online Ambient Monitoring Using Internet of Things

P. Ramya and K. Anbarasan

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

SEO Techniques for Enhancement of Site Visibility

K.R. SriPreethaa, M. Nagammai, S. Sivaranjani and T. Swathy

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Extricating Opinion Word from Review Based on Word Alignment Model Using Topical Lexicon

S. Indhumathi and M. Senthamarai

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Clustering with Semantic Similarity for Text Mining

M.K. Vijaymeena and K. Kavitha

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Sensitive Data Leak-Detection Using Mobility Key Service

T.R. Srinivasan and S. Saranya

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Detection and Isolation of the Selfish Nodes Using a Collaborative Contact Based Watchdogs

T.R. Srinivasan and K.G. Chithra

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Coverage Performance of Global Sensor Deployment in Smart Sensing Environment

T.R. Srinivasan and Tharun Achu Philip

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Energy Aware and Bandwidth Optimized AODV Routing for Efficient Traffic Control in Mobile AD HOC Networks

C. Nallusamy, A. Sabari and V. Karthick

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Health Monitoring and Control System Using Wireless Sensor Network

N. Sivasankari, M. Parameswari and K. Anbarasan

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Search Engine Optimization for Effective Ranking of Educational Website

N. Yuvaraj, S. Gowdham, V.M. Dinesh Kumar and S. Mohammed Aslam Batcha

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Packet Verification and Forwarding in OpenFlow Access Used by Controller

G.K. Sowmya and R. Rajagopal

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Multi File Process Conformation in Network Overlays

G. Kiruthika and E. Menaka

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Mean Based Packet Forward by Improving Bandwidth Reservation Request in HPN

Cybercrime Risk and Cyber Security on Online Service Avoidance

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Cybercrime Risk and Cyber Security on Online Service Avoidance

D. Muthusankar, B. Kalaavathi and M. Deepa

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

A Survival Study on Efficient File Sharing in Virtual Cloud Servers with Load Balancing and Virtualization Techniques

C. Nelson Kennedy Babu and V. Priya

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Neural Network Modelling for Social Media Mining to Improve Health Informatics

T. Sureshkumar and T. Rajamadhangi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Gene Based Energy and Bandwidth Optimized Routing for Differentiated Services in Wireless Sensor Network

R. Nithya, K. Prasanth and P. Geethanjali

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Token Ring Based Co-Operative Bait Detection for Both Selfish and Malicious Node Attacks In Ad Hoc Network Communication

A. Syed Musthafa, C. Nelson Kennedy Babu and R. Kasthuri

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Particle Swarm Optimization: Essential Concepts, Applications and Variants in Wireless Sensor Networks

Mrs. M. Sangeetha, A. Sabari, Mrs. J. Deepika and Ms. K. Elakkiya

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Relative Node Mass Weighted Clustering Techniques in Manet

J. Mani Kandan, A. Sabari and S. Revathi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Mobile Educational Learning Using Qr Based U-Learning for Personalized Tutoring

R. Bhagya and K. Sivakumar

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Achieving Certain Optimization Objectives in Broadband Wireless Networks Using Periodic Feedback Channels

Prof. T.R. Srinivasan and K.S. Keerthika

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Statistical Feature-Based Support Vector Machine Approach for the Detection of Lung Cancer in Ct Images

I. Jennetmary and V. Ravi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Flow Control With Data Compression To Avoid Overload In Networks

C. Vigundhiya and E. Menaka

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Prediction and Pan Code Reuse Attack by Code Randomization Mechanism and Data Corruption

N. Mohanappriya and R. Rajagopal

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Fake Content Delivery Using Replacement Algorithm In Wireless Sensor Networks

R. Keerthana and M.M. Kokila

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Dynamic Route Node Based Timely Content Delivery in DTN

P. Thangamani and K. Sankar

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Provide Secure Transmission to Avoid Packet Drop Attacks in WSNs

B. Poovizhi and M.M. Kokila

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Scheduling Based Broadcasting Delay Overcome in Wireless Network

D. Sharmila and E. Menaka

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Mobility Control Based Dual Data Transmission for Load Balancing in WSN

P. Poornima and R. Rajesh

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

An Effective Data Storage Management Using Advances in Hadoop Environment

D. Vivek, K.S. Giriprasath and P. Balasubramanie

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Integrated Bee Colony and Tabu Search Optimization for Feature Selection and Classification of Breast Cancer in Digital Mammogram Images

J. Nithya and M. Mugilya

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Random Key Updation for Certificateless Remote Authentication Protocol with Anonimity in Wban Domain: Network Security

Haobijam Jina Devi and E. Menaka

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

A Surveillance System for Real Time Monitoring and Capturi 3G with User-Friendly

M. Anto Bennet, M. Jayashanka, M. Naveen Kumar, V. Logesh, S. Sankaranarayanan and C. Murugan

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Structure Optimization Using Bee and Fish School Algorithm for Mobility Prediction

J. Ananthi, V. Ranganathan and B. Sowmya

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Power-Aware Algorithms over Dual Processors for Real Time Periodic Applications

B.M. Beena and C.S.R. Prashanth

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Ciphertext Policy Attribute Based Hybrid Encryption with User Revocation in Data Outsourcing Systems

M. Maryam Jameelah, C. Suresh Gnana Dhas and P. Suganya

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Improving Performance of Fuzzy Based Routing Through Optimization for Manet

R. Menaka, V. Ranganathan and B. Sowmya

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Optimizing Feature Selection and Support Vector Machine Using Clonal Selection for Brain Computer Interface

R. Padmavathy, V. Ranganathan and B. Sowmya

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Efficient Data Gathering Using Mobile Collectors and Dual Data Uploading in Wireless Sensor Networks

M. Papitha, C. Suresh Gnana Dhas and V. Shanmugavalli

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Information Security Issues and Challenges in Cloud Computing

S. Ramasamy, R.K. Gnanamurthy and R. Thilagavathi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

An Efficient Duplicate Detection Based on Navie Block Detection Algorithm

S. Ramya and C. Palani Nehru

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Retrieving Data Securely in Disruption Tolerant Military Networks

R. Saranya, L. Malathi and S. Sneha

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Survey on Performance Estimate Fashions for Information Retrieval System

K. Seenuvasan and V. Janani

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Image Retrieval Based on Similarity Search Using the Combination of Fisher Criterion Based Genetic Algorithm

T. Sowmi and E. Saravana Kumar

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Lung Nodule Classification Using Lsvm Classifier for Low Dose Computed Tomography Images

A. Suganya, N. Mohanapriya and B. Kalaavathi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Efficient Trace Aware Locality Clustered P2P File Sharing System

V. Priya, C. Nelson Kennedy Babu and V. Avibala

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Virtualization of Resources and Services in Cloud Environment

V.P. Dhivya and A. Sowendariya

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Performance Analysis of Supervised Machine Learning Algorithms for Opinion Mining in E-Commerce Websites

N. Yuvaraj and A. Sabari

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

A Comparative Analysis of Recommendation Systems

S. Prabha and K. Duraisamy

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Architecture of HEVC /H.265 Using Pipeline Operation

G. Sankarbabu, M. Anto Bennet, V. Thayanantha Krishnan, P. Srinivasan and R. Vivek

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Low Power High Speed Performance of Multiplexer Using Reversible Logic

R. Suresh, T.R. Dinesh kumar, M. Anto Bennet, Thamu, Santhosh and Sudhakharan

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Automatic Vehicle Parking Indicator and Traffic Violation Detection System

Ms. S. Mekala, M. AntoBennet, S. Melvin Jeyakumar, P. Karthickkumar, G. Gokul and A. Vinod

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

VLSI Modelling of FM0 and Phase Encoding Using Balanced-Logic Operation with Pulse Generator for Adaptive Transportation

R. Suresh, M. Anto Bennet, T.R. Dinesh Kumar, V. Sushmitha, R. Sarumathi and J. Sankari Gomathi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Voice Control Prosthetic Arm

S. Mohamed Sulaiman, M. Anto Bennet, P.L. Annamalai, E. Ramki and M. Mohamed tazudeen

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

A Design of E-Voting Using Fingerprint Recognition System for Secured Voting

S. Mohamed Sulaiman, M. Anto Bennet, A.A. Aravind, S.K. Rajvel and G. Janakiraman

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Energy Meter Reading System Using Automatic Camera Solar/thermal Energy

S. Venkatraman, M. Anto Bennet, N. Pradeepkumar, P. Vigneshwaran and P.V. Vijaykumar

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Speed Control and Shared Steering Control Between a Driver and an Automation: by Buzzer Intimation

V. Mahalakshmi, M. Anto Bennet, S. Aravind, B.S. Jayavignesh and S. Immanuel

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Solar Powered Automated Fertigation Control System for Terrace Farming Using Zigbee

S. Venkatraman, L. Devandra Kumar, E. Anish, V.X. Abinesh and M. Anto Bennet

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Design of Tl Shape Rectangular Patch Antenna for Global Positioning System (GPS) Applications

M. Preethi, G. Shobana, P. Thanga Nandhini, M. Sheriff and M. Anto Bennet

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

No Billing Queue Purchase System with Automatic Product Detection System Using Lifi, IOT in Retail Shop

S. Mekala, A. Arun Kumar, N. Balaji, A. Prasath and M. Anto Bennet

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Big Log Search and Analysis Using Elk Environment

Mrs. I. Nivetha and Mrs. J. Preethi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

A Fuzzy-Genetic Based Approach for Improving OLSR Routing Protocol in Mobile Adhoc Networks

R.S. Latha and Dr. G. Murugesan

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Spreading Process Avoidance by Building Firewall in Base Station on Multilayer Networks

Ms. S. Kanmani and Mr. K. Sankar

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Secure Deduplication Using De Key with Efficient and Reliable Convergent Key Management in Cloud Storage

R. Thilagavathi, S. Ramasamy and R.K. Gnanamurthy

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Efficient Trace Aware Locality Clustered P2P File Sharing System

V. Priya, C. Nelson Kennedy Babu and V. Avibala

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

A Comparative Analysis of Recommendation Systems

S. Prabha and K. Duraisamy

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Architecture of HEVC /H.265 Using Pipeline Operation

G. Sankarbabu, M. Anto Bennet, V. Thayanantha Krishnan, P. Srinivasan and R. Vivek

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Energy Meter Reading System Using Automatic Camera Solar/thermal Energy

S. Venkatraman, M. Anto Bennet, N. Pradeepkumar, P. Vigneshwaran and P.V. Vijaykumar

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Secure AASR Protocol with Trust for Manets in Adversarial Environment

R. Archana and W. Gracy Theresa

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

An Medical Image Segmentation Using Regional Maxima Based Watershed Algorithm

K.K. Devika, N. Mohanapriya and B. Kalaavathi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Secure Data in Muliti-Cloud Using Multi Integrity Auditing Protocol in Drops Teqniques

S. Indhumathi and A.S. Radhika D. Renuga Devi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

An Efficient Private Frequent Itemset and Association Rule Mining

A. Jayakumari, R. Rohini and B. Anitha

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Review on Cover Coefficient Concept and Incremental Approach for Document Clustering

N. Kannammal, Dr. S. Vijayan and R. Sathish Kumar

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Big Log Search and Analysis Using Elk Environment

S.I. Nivetha and S.J. Preethi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

A Fuzzy-Genetic Based Approach for Improving OLSR Routing Protocol in Mobile Adhoc Networks

R.S. Latha and G. Murugesan

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Design and Implementation of Low Power Finfets Using Adiabatic Logic

V.M. Senthil Kumar, S. Saravanan, P. Deepa and S. Priyanka

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

An Efficient Parallel Iterative Mapreduce Based Frequent Subgraph Mining Algorithm

A. Praveena, B. Anitha and R. Rohini

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Super Threshold FinFET Circuits Based on Pass Transistor Adiabatic Logic-2N Operating Region

V.M. Senthil Kumar , S. Saravanan , S. Priyanka and P. Deepa

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Efficient Re-Ranking and Image Retrieval Based on Fuzzy Color Feature Extraction

S. Deepa, S.R. Menaka and S. Syed Farmhan

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Propagation Analysis and Prevention Model for Modern Email Malware

S. Sneha, L. Malathi and P. Pandian

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Improve Privacy Policy Inference Model for Network Communication Using Enhanced Parent Policy Control Algorithm

K. Soniya Lakshmi, D. Gowdhami and P. Brindha

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Secure Deduplication Using De Key with Efficient and Reliable Convergent Key Management in Cloud Storage

R. Thilagavathi, S. Ramasamy and R.K. Gnanamurthy

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Trust Based Services in Youtube Using Compressed Video Steganographic Scheme

S. Vishnu Priya, V. Arul and G. Sasikala

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Integrating ARM Based Controller for a Single Area Deregulated LFC Modeled in LabVIEW

R.R. Lekshmi, B. Suresh, C. Vineel Sreya Sujith and Shrishti

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Breast Cancer Detection: A Framework to Classify Mammograms

S. Devisuganya and R.C. Suganthe

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Cloud Security: Trust with Swarm Based Scheduling

D. Sumathi and P. Poongodi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Design and Development of Hybrid Energy Control Scheme for Multi Purpose Usage in a Building

P. Karthikeyan and K. Anbarasan

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

A Survey on Bio Inspired Algorithms for Trusted AODV Routing Optimization in Manet

V. Keerthika and N. Malarvizhi

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Performance Evaluation of Cyclic Prefix OFDM Using Mimo

R. Meenakshi, P. Indumathi and R. Raja Kumar

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

High Gain Step up Converter Using Multilevel Inverter for HVDC Application

B. Suriya, Ms. T. Lavanya and K. Anbarasan

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

An Implementation of Battery Charging Methods for Electric Transportation Application

K. Thenmozhi, Mrs. P. Chandra and K. Anbarasan

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

A Stable and Energy Efficient Clustering Algorithm for Mobile AD HOC Networks

G.R. Sreekanth and R.C. Suganthe

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

Study on Big Data

N.V. Monisha, A. Nagalakshmi, Namratha Raj, N. Purnashree and K.R. Suneetha

[ Abstract ]  [ Full Text ]

—————————————————————————————————————————————————————————————————————————————————————————————————————————

—————————————————————————————————————————————————————————————————————————————————————————————————————————