Special Issue No. – 2, August, 2019

National Conference on Advancement in Engineering, Science & Technology

Bharath Institute of Higher Education and Research, Chennai, Tamil Nadu, India

Blockchain and its Applications in Various Fields – A Surve

Authors:

Allin Geo Varghese,S.Amudha,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00001

Abstract:

Automatic international has delivered efficiencies, new ingenious items, and close customer connections all round with the aid of the a success usage of transportable, IoT (net of factors), on-line life, exam and cloud innovation to create models for higher selections. Blockchain is as of late presented and altering the computerized global conveying some other point of view to security, flexibility and effectiveness of frameworks. at the same time as at the start promoted via Bitcoin, Blockchain is considerably greater than an established order for virtual foreign money. It gives a secure technique to trade any sort of right, management, or change. Mechanical development regularly is based upon confided in organizations; but expanding manage, cybercrime and extortion are repressing extension. To cope with these difficulties, Blockchain will empower more mild-footed esteem chains, quicker object improvements, nearer consumer connections, and swifter incorporation with the IoT and cloud innovation. Facilitate Blockchain furnishes a decrease price of trade with a believed contract checked without mediation from outsider.

Keywords:

Blockchain,Bitcoin,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences,volume 9, Issue 3, Pg NoS103-S106, 2016

VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016
X. P. Zahradnik, “Equiripple Approximation of Low-pass FIR Filters Equiripple Approximation of Low-pass FIR Filters”,IEEE Transactions on Circuits and Systems II: Express Briefs, Issue: 99,pp. 1-5, 2017
XI. P. Zhao, J. McNeely, P. Golconda, M. A. Bayoumi, R. A. Barcenas, W.Kuang, ” Low-Power Clock Branch Sharing Double-Edge Triggered Flip- Flop”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.: 15, Issue: 3,pp: 338 – 345, 2007
XII. R. Kubasek, Z. Smekal, E. Gescheidtova, K. Bartusek, “Design of Twochannel Half-band Bank of Digital Filters using Optimization Methods”, International Conference on Networking, International Conference on
Systems and International Conference on Mobile Communications and Learning Technologies, page: 151, 2006
XIII. S. Archana, G. Durga, “Design of low power and high speed ripple carry adder”, International Conference on Communication and Signal pocessing, pp: 939 – 943, 2014
XIV. S. K. Mitra and J. F. Kaiser, Handbook for Digital Signal Processing. New York, NY, USA: Wiley, 1993.
XV. S. Samadi, A. Nishihara, H. Iwakura, “Universal maximally flat low pass FIR systems”, IEEE Transactions on Signal Processing Vol: 48, Issue: 7,pp: 1956 – 1964,2000
XVI. Wen Bin Ye, Xin Lou, Ya Jun Yu, “Design of Low-Power Multiplierless Linear-Phase FIR Filters” , IEEE Access, Volume: 5,pp: 23466 – 23472,2017
XVII. X. Zhang, K. Intosume, and T. Yoshikawa, “Design of low delay FIR halfband filters with arbitrary flatness and its application to filter banks,” Electron. Comm. Jpn 3, vol. 8, no. 10, pp. 1–9, 2000

View | Download

Big Data confidentiality in Healthcare

Authors:

S. Amudha,K. AnitaDavamani,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00002

Abstract:

We exist these days in an overall release, anywhere protection is not really kept up, with the huge information getting included, it's just deteriorating, since information is from this time forward all over and about everybody, we can't generally educate who recognizes what concerning who, where the information is really depending, and what utilizes are through not in of it. Security however a vital angle that individuals dependably require in numerous areas, and it's not less vital in the human services diligence, where data just gets much progressively close to home and touchy that any protection rupture turns into an issue of last chance. In this paper, we have focused on the benefits of giant data within the healthful services phase, even as a little of the principle challenges frequently intimate with. We’ve then centered on the Moroccan setting, incontestable the problems it's and its specificities, thus on propose proposals to urge the leaders to require the approach of massive Data. Lastly, we've enlightened the safety problems in healthful services and also the gift ways won’t to guarantee the patient's protection.

Keywords:

Moroccan setting,massive Data,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April-June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology,
Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of highpower hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016
X. P. Zahradnik, “Equiripple Approximation of Low-pass FIR Filters Equiripple Approximation of Low-pass FIR Filters”,IEEE Transactions on Circuits and Systems II: Express Briefs, Issue: 99,pp. 1-5, 2017
XI. P. Zhao, J. McNeely, P. Golconda, M. A. Bayoumi, R. A. Barcenas, W. Kuang, ” Low-Power Clock Branch Sharing Double-Edge Triggered Flip- Flop”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.: 15, Issue: 3,pp: 338 – 345, 2007

View | Download

Online Examination Service Using Mobile Application in IOT

Authors:

S. Srigowthem,V.Khanna,B.Sundarraj,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00003

Abstract:

Day-to-day life has been changed a lot . Each and everything is held through internet and many institutions, companies works through internet. Most advantages or helpful by internet is, having exam through online (or) internet. So we can write or attend the exam anywhere anytime. To make this, we need cloud concept too. In cloud, we create own cloud and store the data for exam, so a person can access data from cloud through internet anytime. And mobile application is also being trend now, so many applications of this is possible to make it out.

Keywords:

Exam,Online,Student,Database,Web Service,Administrator,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June
2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for edevices“ Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology,
Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of highpower hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016

View | Download

Collaborative Approach of Secrecy Regulation and Obstruction of Photo Theft on Social Platform

Authors:

C. Anuradha,S .Pothumani,R. Vishwaa,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00004

Abstract:

Nowadays, People are well-connected to one another in Social Networks. Usage of Internet and involvement in Online Social Platforms are increasing day by day. People sharing their personal information in these platforms. Even, they started Uploading their Photo in the Internet and it became very common among the Internet users. Without understanding the risk, user involved in sharing their personal details. Some fraudulent users uploading another user’s photo without their knowledge. They are getting photos of others in many ways such as by taking photos using their mobile cameras, collecting images from Social networks, stealing images from the theft mobile. They are posting the photos in the Social media applications which are stored enduringly in the database. This results in the misuse of photo and involved in many criminal activities. To overcome this security problem, a competent face recognition system is needed which identify the user in the photo. To handle this, a set of users, friends list and their private photographs. This system accomplished as an evidence of approach in social network on Facebook application.

Keywords:

Photo Theft,Internet Platform,Collaborative approach,Securing Image,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET”, 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar, J.Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

An Analysis of Computation Offloading Mechanisms for Computationally Intensive Mobile Applications

Authors:

C. Anuradha,M. Ponnavaiko,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00005

Abstract:

Smart phones are generally utilized in our everyday lives. We utilize computationally escalated versatile applications, for example, face location, enlarged reality, video preparing, video gaming and discourse acknowledgment. These applications are perplexing as well as they request high figuring assets. These gadgets show a few constraints, for example, restricted calculation control, little memory estimate, erratic system availability, constrained battery lifetime, and so forth. Every one of these constraints can be survived if distributed computing can be coordinated with cell phones. Versatile distributed computing is the worldview which can be utilized to give boundless access of figuring assets to cell phones. Computational offloading is a ground-breaking system utilized in versatile distributed computing for improving reaction time and battery productivity of the cell phones which are considered as two basic factors in the ease of use of portable applications. By offloading computationally concentrated assignments to committed processing framework, gadgets can diminish load alone assets while profiting by assets given by the devoted foundation. This paper gives a diagram of different foundation, structures and procedures for calculation offloading.

Keywords:

Mobile cloud computing,computation offloading,energy consumption,execution time,bandwidth,network connectivity,

Refference:

I. A.Sangeetha,C.Nalini,”Semantic Ranking based on keywords extractions in the web”, International Journal of Engineering & Technology, 7 (2.6) (2018) 290-292
II. S.V.Gayathiri Devi, C.Nalini, N.Kumar, ”An efficient software verification using multi-layered software verification tool “International Journal of Engineering & Technology, 7(2.21)2018 454-457
III. C.Nalini, ShwtambariKharabe, ”A Comparative Study On Different
Techniques Used For Finger – Vein Authentication”, International Journal Of Pure And Applied Mathematics, Volume 116 No. 8 2017, 327-333, Issn:1314-3395
IV. M.S. Vivekanandan and Dr. C. Rajabhushanam, “Enabling Privacy Protection and Content Assurance in Geo-Social Networks”, International Journal of Innovative Research in Management, Engineering and
Technology, Vol 3, Issue 4, pp. 49-55, April 2018.
V. Dr. C. Rajabhushanam, V. Karthik, and G. Vivek, “Elasticity in Cloud Computing”, International Journal of Innovative Research in Management, Engineering and Technology, Vol 3, Issue 4, pp. 104-111, April 2018.
VI. K. Rangaswamy and Dr. C. Rajabhushanamc, “CCN-Based Congestion Control Mechanism In Dynamic Networks”, International Journal of Innovative Research in Management, Engineering and Technology, Vol 3,
Issue 4, pp. 117-119, April 2018.
VII. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
VIII. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
IX. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
X. Michael, G., Chandrasekar, A.,”Leader election based malicious detection and response system in MANET using mechanism design approach”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April -June 2016
XI. Michael, G., Chandrasekar, A.,”Modeling of detection of camouflaging worm using epidemic dynamic model and power spectral density”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XII. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S32-S35, 2016
XIII. Pothumani, S., Sriram, M., Sridhar , Various schemes for database encryption-a survey, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
XIV. Pothumani, S., Sriram, M., Sridhar, A novel economic framework for cloud and grid computing, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S29-S31, 2016
XV. Priya, N., Sridhar, J., Sriram, M. “Ecommerce Transaction Security Challenges and Prevention Methods- New Approach” 2016 ,Journal ofChemical and Pharmaceutical Sciences, JCPS Volume 9 Issue 3.page no:S66-S68 .
XVI. Priya, N.,Sridhar,J.,Sriram, M.“Vehicular cloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XVII. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume 9 Issue 2. April – June 2016
XVIII. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
XIX. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XX. Anuradha.C, Khanna.V, “Secured privacy preserving sharing and data integration in mobile web environments “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XXI. Sundarraj, B., Kaliyamurthie, K.P. Social network analysis for decisive the ultimate classification from the ensemble to boost accuracy rates 2016 8
XXII. International Journal of Pharmacy and TechnologySundarraj, B., Kaliyamurthie, K.P. A content-based spam filtering approach victimisation artificial neural networks 2016 8 3 International Journal of Pharmacy and Technology
XXIII. Sundarraj, B., Kaliyamurthie, K.P. Remote sensing imaging for satellite image segmentation 2016 8 3 International Journal of Pharmacy and Technology.

View | Download

Optical Character Recognition with Tesseract

Authors:

C. Geetha,K. Anitha Davamani,V.V. Krishna Teja,S. Hema Sekhar,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00006

Abstract:

Optical Character Recognition is the machine replication of human perusing. Electronic Conversion of examined pictures where picture can be type composed or printed content. It is executed utilizing Google's open source Optical Character Recognition programming called Tesseract. The OCR accepts picture as the information, gets content from that picture and afterward changes over it into whatever other language that the client needed. This framework can be helpful in different applications like banking, legitimate industry, explorers’ different ventures, and home and office robotization. It for the most part intended for individuals who are unfit to peruse any sort of content archives and to diminish the weight of information passage occupations

Keywords:

Tesseract,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“ Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

System Failure Detection and Diagnosis by Analyzing Syslog and SNS Data: Applying Big Data Analysis to Network Operations

Authors:

D. Vimala,I. MaryLinda,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00007

Abstract:

We present two major information examination strategies for diagnosing the reasons for system disappointments and for identifying system disappointments early. Syslogs contain log information created by the framework. We dissected syslogs what's more, prevailing with regards to distinguishing the reason for a system disappointment via consequently learning more than 100 million logs without requiring any past learning of log information. Investigation of the information of an interpersonal interaction benefit (in particular, Twitter) empowered us to recognize conceivable system disappointments by extricating system disappointment related tweets, which represent under 1% of all tweets, continuously and with high exactness.

Keywords:

Big data,syslog,network failure detection,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
IV. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
V. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VI. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
VIII. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

Effective Security Mechanism for Cloud Storage using Biometric System

Authors:

R. Kavitha,S.Pothumani,R. Ramya,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00008

Abstract:

Biometric distinctive proof has clad to be more and more distinguished as these days. With the development of distributed computing, information proprietors are persuaded to re-appropriate the substantial size of biometric details and distinctive evidential duty to the cloud to lose the pricey capability and computational prices that anyway conveys potential dangers to clients' security. During this paper, we have a tendency to propose a productive and security safeguarding biometric ID redistributing arrange. Particularly, the biometric information is encoded and redistributed to the cloud server. To carry out biometric recognizable evidence, the information proprietor encodes the question information and handover to the cloud. The cloud discharge distinctive proof activities over the disorganized information and gave the final outcome to the database proprietor. A thoroughgoing security investigation shows the projected arrange is secure irrespective of whether or not aggressors will manufacture recognizable proof demands and intrigue with the cloud. Dissimilar and gone by customs, trial results demonstrate the projected plan fulfill a superior outcome in each coming up with and distinctive proof methodology.

Keywords:

Cloud Storage,Biometric System,Identity Management System,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “ Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
IV. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
V. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VI. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VII. Priya, N.,Sridhar,J.,Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
VIII. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue2. April – June 2016

 

View | Download

Cognitive Security in Software Define Network Layer

Authors:

R. Kavitha,N.Priya,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00009

Abstract:

The need for better security is always increasing in exponential demand with the elevation of the security concerns created by the vulnerable code and software being produced. A smart, self-healing and cognitive security network is the demand of the generation. With machine learning capabilities and advanced deep learning, we explore the possibility of architecting such a network build on a SDN network. Software Defined Networking replaces the conventional way of traditional networking with an application layer giving the programming capability to the networks thus increasing the flexibility of the network in terms of adaptability. Programming machine learning capability by introducing a learning element to the SDN network. We deploy security and classification algorithm to identify and classify traffic into potential attacks and intrusion. The results show improved accuracy that can detect all possible attacks over the neural network based on our pattern recognition algorithm for intrusion detection and recognition. The network can also self-optimize itself to defend itself real-time.

Keywords:

SDN-Software Defined Networks,WAN,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “ Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg. No. 103-S106, 2016
VIII. Priya, N. Sridhar, J. Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

Authenticated Online Fee Payment System

Authors:

R. Kavitha,S.R. Srividhya,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00010

Abstract:

The widespread use of online payments has been grown rapidly like for bill and fee payments through android application or internet. But some of the applications or websites are not authenticated. Some websites are accepting the payments even we entered invalid information in particular fields. This project covers the issues of authentication in online payments, and it will check whether the entered fields are valid or not by using predefined format. If the entered information in particular fields is valid then it will redirect to the payment gateway, if not it will shows a message as invalid information.

Keywords:

Payment Authentication,Data Validation,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network back propagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg. No. 103-S106, 2016
VIII. Priya, N., Sridhar, J.,Sriram, M.“Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9, Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

Program Identification in Wireless Sensor Networks

Authors:

D. Jeyapriya,R.Velvizhi,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00011

Abstract:

Deployment of Wireless Sensor Networks (WSN) has accomplished enormous development lately making it wind up plainly one of the best creating regions of the low information limit correspondences framework. The critical issue in WSN is the requirement on vitality and preparing assets capacity in bit which lessens down potential usefulness of sensor hub. Likewise persistent utilization of a solitary briefest course amongst source and sink brings about a shorter life expectancy of a sensor hub which thusly debases the system execution. The imperative thought for the wide scale WSN is the advance on control usage productivity. In this way bunching is imperative vitality productive steering procedures for WSN. The proposed Spherical Routing convention (SpRP) are planned and its execution measurements are assessed as i.e. number of bundle transmitted, number of parcel got, rate in parcel conveyance, throughput and normal lingering vitality and contrasted and the execution measurements estimations of Modified LEACH (M-LEACH) grouping Protocol. The conclusion from the investigation of results is that SpRP convention accomplishes better streamlined execution difference to famous M-LEACH convention. The anticipated work results from the execution measurements can includes additional life time in a WSN to give unrivaled Quality of Service (QoS).

Keywords:

Data Capacity,Spherical Routing,M-LEACH,Life traverse,Quality of Service,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “ Journal of Chemical and Pharmaceutical Sciences(JCPS)” Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., Sridhar, J. Sriram M. “Vehicular cloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

Multi Participant Chat Analysis

Authors:

K. Anita Davamani,S.Amudha,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00012

Abstract:

Human practices have dependably been of incredible enthusiasm to analysts and researchers. Surmising positive and negative suppositions from discussion has been something which humanity has dependably had enthusiasm from an earlier time. With the appearance of web-based social networking channels, the measure of data we are getting about people and their practices is enormous. Internet based life has brought the discussions of individuals as content which can be handled, and inductions can be made. At present there exists a ton of work in the field of slant examination and there have been a couple of web administrations which use feeling investigation for impact positioning and brand gathering figuring. In my project, my research work is focused on analyzing massive group chats and dividing them separately for every user by clustering them based on gap between them. It can be very useful for societies, Business farms, National Security and in many other fields. Because in today’s world where everybody is interested rely on the data harvesting and What people are talking about. From a big cooperation to National Investigation Agencies (NIA) rely on data about the conversation between people’s what they are more commonly talking about and is there anything odd in those conversations. But a big question arise as there are thousands of groups and they have hundreds of members and thousand’s of messages out of them there few ones who participate actively while there are many members who rarely send messages in those groups and in those thousand’s of messages there is some particular words which are used more commonly and while there are also words which get used rarely. So how to classify all this information? Can we rely on manual classification? Or do we need program to automatically do this work for us and presenting in form of graphs?

Keywords:

web-based social networking,measure of data,(NIA) rely on data,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg. No. 103-S106, 2016
VIII. Priya, N., Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9, Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

A Novel Voice Authentication Using Hidden Markov Model (HMM)

Authors:

K. Anita Davamani,Sangeetha.S,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00013

Abstract:

Hidden Markov Model (HMM) is a characteristic and profoundly hearty measurable technique or programmed voice check. The ordinary sign dealing with strategies envision that the sign ought to be stationary and are inadequate in observing non stationary standard, for example, the voice signals. The voice check framework consolidating the pre-accentuation, begin/end point identification, include extraction and vector quantization. Gee is utilized both in preparing procedure and check process. The info discourse sign is pre-underlined to wipe out the foundation clamor and to improve higher recurrence parts. For this reason a first request high pass FIR channel was utilized. Begin and end point identification of the ideal discourse sign must be finished. For this reason decrease calculation is utilized. At that point the Mel cepstrum is utilized to get an awesome voice check framework. The Mel cepstral coefficients got from each must mapped to a solitary point. For this reason vector quantization is utilized. This is used in HMMA Hidden Markov Model is a Finite State Machine having a fixed number of states. It is a quantifiable procedure for delineating the ghastly properties of the edges of a point of reference. The verified weakness of the HMM is that the trade can be all around depicted as a parametric energetic philosophy and that the parameters of the stochastic system can be considered in a particularly outlined way. Gee is a doubly installed stochastic procedure with a hidden stochastic procedure that isn't straightforwardly recognizable, yet can be watched distinctly through another arrangement of stochastic procedures that produce the grouping of perceptions. The layout technique for discourse acknowledgment experiences the time arrangement issue. DTW takes care of this issue by utilizing Dynamic Programming. Nonetheless, the format approach did not depend on factual sign displaying in an exacting sense.

Keywords:

HMM,wavelet transform,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”. Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

Intelligent Surveillance System with Time Optimization

Authors:

M. Ramamoorthy,N. Ayyanathan,M. Padma Usha,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00014

Abstract:

Recent video surveillance system provides a path to continuously monitor any place at any time. In addition IP based surveillance system helps to monitor the place remotely through wide area network. Here the system is designed such that the camera which captures the video act as the front end and the computer which helps as to view the details acts as the client of the system. The main aim of this paper is to increase the resolution of the video in the system and to reduce the transmission time of the IP based video surveillance system. In this system we use IP camera to capture the scene and a field programmable gate array (FPGA) is connected to the local server through the IP network. The FPGA used here is programmed to process the captured video and operates towards effective data transmission in IP network. The algorithms like connected component labeling, background modeling is analyzed along with High Efficiency Video Coding (HEVC) to enhance the quality of the video captured. In future on updating the designed model Using WAP structure the cell phones can be used for the client side of the system. As expected due to the introduction of efficient video coding and IP networking the transmission time is highly reduced in our proposed system.

Keywords:

HEVC,FPGA,Video Surveillance,Image Enhancement,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET”, 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

Relationship Identification & Prediction Of Diseases Association Using Micro-RNA Of Genomic Data

Authors:

G. Michael,R. Kavitha,P. Abi Glory Treasa,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00015

Abstract:

The current process of finding the relationship between the father and the son and also predicting the diseases that is yet to occur is quite inaccurate because it includes only the gene-id of the respected person. In order to handle or to make this system more accurate, we propose this system by using the chromosome structure of the person. This system takes the input of the chromosome structure of the son that has been partitioned from the father’s chromosome structure. It initially preprocesses the image of the son using the collaborative filtering for making it look different from the input image to show the similarity between the father and the son. It then detects the edge of the structure after preprocessing it using the SOBEL edge recognition calculation. The SOBEL edge discovery calculation is that the inclination of the picture is determined for every pixel position in the picture .After detecting the edges of those input images, matching process starts between the input image and the list of father chromosome images. Then the matched output appears. In order to predict the diseases which is yet to come in future for the son is represented graphically by dividing it into three colors, firstly green represents there is less possibility of the son getting the disease, secondly yellow represents there may be any chance of son getting the disease and finally red represents there is high possibility of son getting the disease.

Keywords:

Image processing,Edge detection,Image matching,Graphical representation,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.Sridhar, J. Sriram, M. “Vehicular cloudc omputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April -June, 2016

View | Download