- Wireless Communication using WiMAX -Worldwide Interoperability for Microwave Access
Authors: Lakshmi Priya.S, Anitha.R
- Biometrics Authentication for Intrusion Detection System
Authors: C.Anitha, S.Sridhar
- Online Clustering Data Streams
Authors: M.Anitha, S.Sridhar
- Evolution and Revolution in 5G Wireless Systems
Authors: J.Gayathri, V.Sujatha
- Performance of Wi-Fi and WIMAX over Wireless Communication
Authors: K.Hemalatha, S.Sridhar
- Computer Graphics and Vision for the Synthesis of the 3D Faces and Computational Fluid Dynamics
Authors: S.Kumar, R.Anitha
- Modelling and Design of Soft and Hard Computing in Industrial Applications
Authors: K.Malathi, V.Sujatha
- Green-Droid Method Target an I Phone: Architecture for Dark Silicon
Authors: C.Ranjitha, S.Lakshmi Devi
- New Wi-Fi and Improve Fast Standard Process
Authors: A.Manikandan, P.Rekha
- Analyzing the Google Glass by Head Mounted Displays
Authors: M.Piyanka, R.Lakshmi Devi
- Database Management using Cloud Computing
Authors: P.Divyabharathy, S.Sridhar
- Detection Identification and Tracking of Smart Homes using Bluetooth and WLAN
Authors: Deepthi.H, Sujatha.V
- Survey on Ethical Hacking and System Security
Authors: R. Edward Andrews, S. Sridhar
- Data Storage Efficiency in Cloud Computing
Authors: K.Lavanya, N.Juliet
- Biometric Authentication Technique on Detection System using Fingerprint
Authors: M.Mathivathani, R.Anitha
- Information Security Issues in Big Data and Data Mining
Authors: Gomathi. M, V.Sujatha
- Transport Tracking Application for Smartphone via SMS using GPS and Graphical Map
Authors: S.Malathi, N.Juliet
- Biosecurity System in Computer Society
Authors: S. Ramesh, P. Rekha
- Bluetooth in Wireless Communication System
Authors: M.Kumaravelu, R. Anithar
- Detecting Packets in Wireless Adhoc Network
Authors: K.Elakiya, N.Juliet
- Security Issues in Cloud Computing
Authors: A.N. Vaishnavi, R.Anitha
- Network Security and Social Network Analysis in Data Mining
Authors: I. Kalaiselvi, R. Anitha
- Improve Social Networking Security and Minimized Risks Detection
Authors: K.Chithra, S.Sridhar
- Development of Network Monitoring System
Authors: M.Lavanya, R.Anitha
- Image Based User Choice and Design of Graphical Password Authentication
Authors: Selvakani.M, R. Sankar
- Analyzing the Advanced Mobile Phone Signal Jammer for GSM and CDMA
Authors: S. Madhuvanthi, R.Anitha
- Tools and Techniques of Software Testing
Authors: D. Rohini, R. Anitha
- Improving the Write Performance of Solid State Drives
Authors: N. Angeline Monica, R. Sridhar
- 5G Mobile Technology and Wireless Communication
Authors: P. Samundeeswari, R. Sankar
- Enhancing Performance, Features and Security Issues of Bluetooth
Authors: A. Parthibanr, R. Anitha
- Energy Consumption through Wired and Wireless Network Technologies
Authors: C.Ponkirthika, P.Rekha
- Analyzing and Extending the Distance of Mobile Jammer Efficiently to Block Signal
Authors: B. Pushpa, R. Lakshmi Devi
- Performance and Security Challenge of VoIP
Authors: R. Sathish, R. Sankar
- Reducing the Power Consumption using Coolspot using Wi-Fi
Authors: M. Anujavathy, S. Sridhar
- Smart Home Technology for Visible Light Communication
Authors: S. Vinothkumar, R. Sankar
- Future of Mobile Computing and Applications
Authors: V. Sandhiya, R. Sankar
- Confronts and Issues of Cloud Security
Authors: R.Sathishkumar, N. Juliet
- Grid Clustering by Sting for Query Processing
Authors: T.V. Suganiya, R. Sankar
- Wireless Network Intelligent: Performance and Flexibility
Authors: M. Sushmitha, R.Sankar
- Development of Wireless ATM and Its Technical Issues
Authors: S. Tamilselvi, N. Juliet
- Security Problems and Defies in Wireless Network
Authors: J.Usha, S.Lakshmi Devi
- Wireless LAN and Network Technology
Authors: G.Gopinath, S.Sridhar
- Evaluation of Iris Technology used in Security Measures
Authors: P. Devendrakumar, V.Sujatha
- Online Shopping using E –Commerce
Author: J. Sarathkumar
- Sensitive Online Transaction Process
Author: M.Vadivel
- Spectrum and Energy Efficient Heterogeneous Wireless Networks
Authors: V.Vaitheeswaran, S. Sridhar
- 5th Generation – Long Access WiFi Technology
Authors: Sachin.M., Sankar.R
- Mobile Activity Monitoring System using Android Spy
Authors: Siva.K, Sankar.R
- Tested for LIFI System using Integrated Street Lighters
Authors: R.Thanikasalam, P .Rekha
- Automatic Call using Google Glass
Authors: D.Ganapathi, R.Sankar
- Network Security using AES Algorithm by Cryptographic Technique
Authors: S.Rajakumari, R.Anitha
- Wireless Internet of Network and Security Data
Author: S.Ujagar
- A Secure Data Self-Destructing Scheme in Cloud Computing
Author: Lakshmi Kalvarayan
- Patient Self-Controllable and Multi-Level Privacy Preserving Cooperative Authentication in Distributed M-Healthcare System
Authors: M.Rajesh, R.Lakshmi Devi
- Secure Authentication in Internet Service
Authors: R.Arun, V.Sujatha
- The Efficiency of Precaution Imagery in Internet Pool
Author: S.Karapagavalli
- Wireless Anomaly Detection based on IEEE 802.11 Behavior Analysis
Authors: Sakthi Bharathi, V.Sujatha
|
S.Sridhar
Head of the Department,Department of MCA, S.A.Engineering College, Chennai
|