Volume-07 , Special Issue-02 , Jan - 2019 Go Back

Open Access   Article

Examination on Various Mining Techniques used in Healthcare Field for the Best Decision Making

J. Lavanya
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.98-101, Jan-2019
Open Access   Article

Web Acceptance Mining Based Web Advocacy Systems-A Review

P. Manivel
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.102-106, Jan-2019
Open Access   Article

A Study of Fuzzy Minimum Spanning Trees Using Prufer Sequences

M.Vijaya, B. Mohanapriyaa
Survey Paper | Journal Paper
Vol.07 , Issue.02 , pp.107-110, Jan-2019
Open Access   Article

Frequent Mining Techniques In Bigdata : Study

Muthamiz Selvi, P. Srivaramangai
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.111-116, Jan-2019
Open Access   Article

Cloud Security System With Sequel Homomorphic Encryption and Diffie-Hellman Algorithm

K Kuppuswamy, M.R. Nagarajan
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.117-120, Jan-2019
Open Access   Article

Analysis of Intrusion Detection System in Data mining

P. Mangaiyakarasi
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.121-125, Jan-2019
Open Access   Article

A Novel Approach for Security in Cloud Environment

M. Prithika
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.126-133, Jan-2019
Open Access   Article

Data Protection Using Elliptic Curve Cryptography

M. Subhashini, P. Srivaramangai
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.134-138, Jan-2019
Open Access   Article

A Literature Survey on Internet of Things security issues

V. Suganthi, P.K. ManojKumar
Survey Paper | Journal Paper
Vol.07 , Issue.02 , pp.139-141, Jan-2019
Open Access   Article

A Survey On Network Layer Attack Detection And Isolation Techniques In MANET

R. Sujatha, P. Srivaramangai
Survey Paper | Journal Paper
Vol.07 , Issue.02 , pp.142-145, Jan-2019
First    Previous    Next    Last