ISSN ONLINE(2320-9801) PRINT (2320-9798)
| Research Article: IJIRCCE |
| Construction and Selection of Six Sigma Quick Switching Sampling System: Sample Size Tightening |
| D. Senthilkumar, B. Esha Raffie |
|
DOI: 10.15680/ijircce.2015.0303002 |
| Research Article: IJIRCCE |
| Secured Data Transmission Using Elliptic Curve Cryptography |
| K.S.Abitha, Anjalipandey, K.P.Kaliyamurthie |
|
DOI: 10.15680/ijircce.2015.0303003 |
| Research Article: IJIRCCE |
| Detection of Hacking nodes using Dynamic Sensor with Ant Colony Optimization |
| R.Balaji, V.Abhishek, D.Kerana Hanirex |
|
DOI: 10.15680/ijircce.2015.0303004 |
| Research Article: IJIRCCE |
| Survey of Various Opinion Mining Approaches |
| Gayathri R Krishna, Jothi S, Minojini N, Sowmiyaa P |
|
DOI: 10.15680/ijircce.2015.0303005 |
| Research Article: IJIRCCE |
| Avoiding Network Performance Degradation Problem in Zigbee |
| Jothi.S, Daniel.D, Jackulin Durairani.A, Rekha.A |
|
DOI: 10.15680/ijircce.2015.0303006 |
| Research Article: IJIRCCE |
| Analysis of the Effect of Harmonics Due To Switching Devices W.R.T. Experimental & Simulation Point of View |
| Rajesh Maharudra Patil, M.S. Nagaraj, P.S.Venkataramu |
|
DOI: 10.15680/ijircce.2015.0303008 |
| Research Article: IJIRCCE |
| Evaluation of Keyword Search System with Ranking |
| P.Saranya, S.Babu |
|
DOI: 10.15680/ijircce.2015.0303009 |
| Research Article: IJIRCCE |
| Hill Cipher Modifications: A Detailed Review |
| Narendra B. Parmar, Kirit R. Bhatt |
|
DOI: 10.15680/ijircce.2015.0303010 |
| Research Article: IJIRCCE |
| Review on Anonymous Routing Protocol for High Anonymity Protection in MANETs |
| Namrata R. Borkar, Avinash P. Wadhe |
|
DOI: 10.15680/ijircce.2015.0303011 |
| Research Article: IJIRCCE |
| Isolated Telugu Speech Recognition using MFCC and Gamma tone features by Radial Basis Networks in Noisy Environment |
| Shaik Shafee, B.Anuradha |
|
DOI: 10.15680/ijircce.2015.0303012 |
| Research Article: IJIRCCE |
| DOGGY- a Graphical Security Technique to prevent Online Guessing Attacks |
| S.Sachin Shriram, K.P.Kaliyamurthie |
|
DOI: 10.15680/ijircce.2015.0303013 |
| Research Article: IJIRCCE |
| Adaptation Backoff Exponent Mechanism in Zigbee Sensor Network for Improving Through put |
| Priyanka Deshpande, Mangala S. Madankar |
|
DOI: 10.15680/ijircce.2015.0303014 |
| Research Article: IJIRCCE |
| Sybil Attack Resistant Cryptographic Traffic Information Dissemination in VuC |
| Vandana C.P, Nitty Sarah Alex |
|
DOI: 10.15680/ijircce.2015.0303015 |
| Research Article: IJIRCCE |
| Facial Feature Extraction Based On FPD and GLCM Algorithms |
| S. Vijayarani, S. Priyatharsini |
|
DOI: 10.15680/ijircce.2015.0303016 |
| Research Article: IJIRCCE |
| Legal Implication of Human and Physical- Activity Monitoring System Using Android Smartphone |
| K.P.Kaliyamurthie, H.Ajmal Hasan, Abhishek Mishra |
|
DOI: 10.15680/ijircce.2015.0303017 |
| Research Article: IJIRCCE |
| Survey on Different Phases of Digital Forensics Investigation Models |
| Priya S. Patil, A. S. Kapse |
|
DOI: 10.15680/ijircce.2015.0303018 |
| Research Article: IJIRCCE |
| Despeckling of SAR Images Using Wavelet Based Spatially Adaptive Method |
| B.Leela Kapil, M.Santosh Kumar, M.Avinash, K.Suhasan, K.Prasanna Kumar |
|
DOI: 10.15680/ijircce.2015.0303019 |
| Research Article: IJIRCCE |
| Design and Development of Efficient Content Independent Genealogy |
| Rahul S. Dudhabaware, Mangala S. Madankar |
|
DOI: 10.15680/ijircce.2015.0303020 |
| Research Article: IJIRCCE |
| Associate Adaptable Transactional Information Store in the Cloud Using Distributed Storage and Meta Data Manager |
| K.G.S. Venkatesan, Kathir.Viswalingam, N.G. Vijitha |
|
DOI: 10.15680/ijircce.2015.0303021 |
| Research Article: IJIRCCE |
| Mining User Profile Exploitation Cluster from Computer Program Logs |
| K.G.S. Venkatesan1, V. Khanna, Jay Prakash Thakur, Banbari Kumar |
|
DOI: 10.15680/ijircce.2015.0303022 |
| Research Article: IJIRCCE |
| Dynamic Pricing for Usage of Cloud Resource |
| K.Sangeetha, K.Ravikumar |
|
DOI: 10.15680/ijircce.2015.0303023 |
| Research Article: IJIRCCE |
| Opinion Mining From Text Reviews Using Machine Learning Algorithm |
| Poobana S, Sashi Rekha k |
|
DOI: 10.15680/ijircce.2015.0303024 |
| Research Article: IJIRCCE |
| A Comprehensive Approach on Different Biometric Modalities and Its Applications for Security |
| Saranya.K.R, Vanitha.S, Selva Priya.G |
|
DOI: 10.15680/ijircce.2015.0303025 |
| Research Article: IJIRCCE |
| Detecting Cars In Traffic Using Cascade Haar With KLP |
| Kiruthika R, Mythili S |
|
DOI: 10.15680/ijircce.2015.0303026 |
| Research Article: IJIRCCE |
| A Review on Software Fault Injection Methods and Tools |
| K. Umadevi, S. Brintha Rajakumari |
|
DOI: 10.15680/ijircce.2015.0303027 |
| Research Article: IJIRCCE |
| Survey on Aggregate Cryptosystem for Scalable Vital Data Distribution in Cloud Storage |
| B. Thejaswini, M.Sakthi Priya |
|
DOI: 10.15680/ijircce.2015.0303028 |
| Research Article: IJIRCCE |
| Survey of Integrity Verification in Cloud- Storage Using Various Techniques |
| Sheela.K, Sivasri.S |
|
DOI: 10.15680/ijircce.2015.0303029 |
| Research Article: IJIRCCE |
| Study of Ridge Based and Image Based Approach for Fingerprint Gender Classification |
| Alok Chauhan, Akhil Anjikar, Suchita Tarare |
|
DOI: 10.15680/ijircce.2015.0303030 |
| Research Article: IJIRCCE |
| Communication through Photon Using Quantum Cryptography: A Survey |
| Leenata B. Isal, Chetan J. Shelke |
|
DOI: 10.15680/ijircce.2015.0303031 |
| Research Article: IJIRCCE |
| Fingerprint Based Gender Classification Using Block-Based DCT |
| Akhil Anjikar, Suchita Tarare, M. M. Goswami |
|
DOI: 10.15680/ijircce.2015.0303032 |
| Research Article: IJIRCCE |
| Survey on Policy Based Framework for Smartphone Application?s Privacy Using Multiple Profiles |
| Vinothini.S |
|
DOI: 10.15680/ijircce.2015.0303033 |
| Research Article: IJIRCCE |
| Design of 'V' Shape Microstrip Patch Antenna |
| Deepak Sabale, Ranjeet Landge, Vaibhav Salke, A.A.Trikolikar |
|
DOI: 10.15680/ijircce.2015.0303034 |
| Research Article: IJIRCCE |
| Human Effects to Enhance Clustering Techniques That Assists User in Grouping the Friends |
| S. Srigowthem, K.G.S Venkatesan, Sourav Kumar Nag, Suraj Raj |
|
DOI: 10.15680/ijircce.2015.0303035 |
| Research Article: IJIRCCE |
| LOBOT: Low-Cost Robotic Vehicle |
| Snehal D. Patil, Archana A. Hatkar |
|
DOI: 10.15680/ijircce.2015.0303036 |
| Research Article: IJIRCCE |
| Survey on CommTrust: Multi-Dimensional Trust Using Mining E-Commerce Feedback Comments |
| Vinaya R. Firake, Yogesh S. Patil |
|
DOI: 10.15680/ijircce.2015.0303037 |
| Research Article: IJIRCCE |
| An Image Removal Using Local Tetra Patterns for Content Based Image Retrieval |
| Manish K. Shriwas, Vivek. R. Raut |
|
DOI: 10.15680/ijircce.2015.0303038 |
| Research Article: IJIRCCE |
| A Framework for Detection of Jammers in Wireless Sensor Network |
| S.Jaipriya |
|
DOI: 10.15680/ijircce.2015.0303039 |
| Research Article: IJIRCCE |
| Performance Comparison of POLY Protocol with Existing CDS Protocols |
| Shimrose S.Mulla, S.V.Sankpal |
|
DOI: 10.15680/ijircce.2015.0303040 |
| Research Article: IJIRCCE |
| Survey on Feature Subset Selection Algorithm in Brain Interaction Patterns |
| K.Vidhyadevia, M.Beema Mehraj, K.P.Kaliyamurthie |
|
DOI: 10.15680/ijircce.2015.0303041 |
| Research Article: IJIRCCE |
| Unified Data Access Security on Revocable Multi Authority CP-ABE in Cloud |
| Suresh Kumar.P, Tamilselvan.D, Anuradha.C |
|
DOI: 10.15680/ijircce.2015.0303042 |
| Research Article: IJIRCCE |
| Automatic Integration of Drug Indications from Multiple Health Resources |
| S. Srivenkatesh, R. Karthikeyan |
|
DOI: 10.15680/ijircce.2015.0303043 |
| Research Article: IJIRCCE |
| A Review on Implementation of QAM on FPGA |
| Ravindra H. Sharma, Kiritkumar R. Bhatt |
|
DOI: 10.15680/ijircce.2015.0303044 |
| Research Article: IJIRCCE |
| Accessible Display Design to Control Home Area Networks |
| Rohini B. Thube, Archana A. Hatkar |
|
DOI: 10.15680/ijircce.2015.0303045 |
| Research Article: IJIRCCE |
| One Bit-Line Multi-Threshold SRAM Cell With High Read Stability |
| Prangya Parimita Nanda , Kanan Bala Ray, Sushree Sangita Das |
|
DOI: 10.15680/ijircce.2015.0303046 |
| Research Article: IJIRCCE |
| Identification of Cup-Disk Ratio for Glaucoma Prone Eyes |
| Niladri Halder, Dibyendu Roy, Arnab Chattaraj, Tanumoy Chowdhury |
|
DOI: 10.15680/ijircce.2015.0303047 |
| Research Article: IJIRCCE |
| An Efficient Data Aggregation Scheme and Cluster Optimization in Wireless Sensor Networks. |
| R.Mehala, A.Balamurugan |
|
DOI: 10.15680/ijircce.2015.0303048 |
| Research Article: IJIRCCE |
| Survey on Controllable Secure Watermark Technique to Detect Data Leakage |
| Sivasri S, Parthiban R |
|
DOI: 10.15680/ijircce.2015.0303049 |
| Research Article: IJIRCCE |
| Review of Automatic Attendance Using Facial Recognization |
| Rahul S. Rode , Nikhil A. Dahelkar, Nikhil R. Nagdive, Anagha S. Gajbhiye, Manish K. Shriwas |
|
DOI: 10.15680/ijircce.2015.0303050 |
| Research Article: IJIRCCE |
| Security and Privacy Issues in Private Cloud Storage |
| Girija Rajendra |
|
DOI: 10.15680/ijircce.2015.0303051 |
| Research Article: IJIRCCE |
| Literature Survey on Data Mining and Statistical Report for Drugs Reviews |
| V.Ranjani Gandhi, N.Priya |
|
DOI: 10.15680/ijircce.2015.0303052 |
| Research Article: IJIRCCE |
| D-Matrix: Fault Diagnosis Framework |
| Tinal R. Thombare, Lalit Dole |
|
DOI: 10.15680/ijircce.2015.0303053 |
| Research Article: IJIRCCE |
| Review on Intelligent Traffic Management System Based on VANET |
| Nikhil Suresh Kshirsagar, U. S. Sutar |
|
DOI: 10.15680/ijircce.2015.0303059 |
| Research Article: IJIRCCE |
| A Novel Cell Phone Designed For Blind Along With Voice Based Guidance and Location Indication |
| Reddy Roja, Shilpa.S, Swathi.J, Natya.S |
|
DOI: 10.15680/ijircce.2015.0303060 |
| Research Article: IJIRCCE |
| A Review of Bike Security System Using Fingerprint GSM&GPS |
| K.Dineshkumar, G. Nirmal, S.Prakash, S.Raguvaran |
|
DOI: 10.15680/ijircce.2015.0303061 |
| Research Article: IJIRCCE |
| Elimination of Baseline Fluctuation in EMG Signal Using Digital Filter |
| Jeet Singh, Jitendar yadav |
|
DOI: 10.15680/ijircce.2015.0303062 |
| Research Article: IJIRCCE |
| Performance Evaluation of Advanced OLSR against Black Hole Attack and Wormhole Attack in MANET |
| K.Sivagurunathan, K.Manojkumar, D.Sounder, Midhun Sebastian |
|
DOI: 10.15680/ijircce.2015.0303063 |
| Research Article: IJIRCCE |
| Current Distribution of Dipole Antenna for Different Lengths Using Different Types of Basis Functions Applying To Method of Moment |
| Tamajit Nag, Amlan Datta |
|
DOI: 10.15680/ijircce.2015.0303064 |
| Research Article: IJIRCCE |
| Interactive Voice Response System by Using Asterisk |
| Ankita Bhondge, Aditi Bhatkar, Sapna Fender, Sonali Thakre, Megha Goel |
|
DOI: 10.15680/ijircce.2015.0303065 |
| Research Article: IJIRCCE |
| Prepaid Energy Meter with GSM Technology |
| JaychandUpadhyay, Namita Devadiga, Alrina D’mello, Glenie Fernandes |
|
DOI: 10.15680/ijircce.2015.0303066 |
| Research Article: IJIRCCE |
| MOSES: Supporting and Enforcing Security Profiles on Smart Phones |
| E.Ramya, A.Nirosha |
|
DOI: 10.15680/ijircce.2015.0303068 |
| Research Article: IJIRCCE |
| Design of Space-Time Coded Single-Carrier and Multi-Carrier MIMO-CDMA systems |
| P. Sreesudha, B.L. Malleswari |
|
DOI: 10.15680/ijircce.2015.0303069 |
| Research Article: IJIRCCE |
| Personalized Search of User Search Behaviour with Ontology |
| N.Hemamalini, M.Gomati, V.Indumathi, S.Jegadeesan |
|
DOI: 10.15680/ijircce.2015.0303070 |
| Research Article: IJIRCCE |
| Detection of Implanted Devices In Underground By Using UWB Penetrating Radar with Support of PN Code |
| P.Navaganesh, P.Ananda Ramunaidu, K.Sudha Rani, N.Raja, Shaik.Azeez |
|
DOI: 10.15680/ijircce.2015.0303071 |
| Research Article: IJIRCCE |
| Contribution of Feed Waveguide on the Admittance Characteristics Of Coplanar Slot Coupled E-H Tee Junction |
| M.Murali, G.S.N Raju |
|
DOI: 10.15680/ijircce.2015.0303072 |
| Research Article: IJIRCCE |
| Survey on Text Classification Based on Similarity |
| Kavitha Sri.M, Hemalatha.P |
|
DOI: 10.15680/ijircce.2015.0303073 |
| Research Article: IJIRCCE |
| A Survey on the Privacy Settings of User Data and Images on Content Sharing Sites |
| Sangeetha J |
|
DOI: 10.15680/ijircce.2015.0303074 |
| Research Article: IJIRCCE |
| Automatic Generate CNC Code for Symmetrical Object |
| V.Naga Arjun, D.Nagarathinam |
|
DOI: 10.15680/ijircce.2015.0303075 |
| Research Article: IJIRCCE |
| Optimized Energy Conserving Using Selective Forwarding Algorithm (SFA) for Wireless Sensor Network (WSN) |
| K.Esthar, N.Aravindhan, S.Srinath, S.Sudharshan, D.Sriganesh |
|
DOI: 10.15680/ijircce.2015.0303076 |
| Research Article: IJIRCCE |
| U-Slot Microstrip Patch Antenna for Wireless Application |
| J.Venkatachalapathi, M.Kaanchana, T.Adhilakshmi, B.Vaishnavi, D.Sriganesh |
|
DOI: 10.15680/ijircce.2015.0303077 |
| Research Article: IJIRCCE |
| Accent Recognition using MFCC and LPC with Acoustic Features |
| Reena H. Chaudhari, Kavita Waghmare, Bharti W. Gawali |
|
DOI: 10.15680/ijircce.2015.0303078 |
| Research Article: IJIRCCE |
| Smart Antennas for Communications in Line of Sight |
| Surayamubeen, A.M.Prasad, A.Jhansi Rani |
|
DOI: 10.15680/ijircce.2015.0303079 |
| Research Article: IJIRCCE |
| Public Auditing of Dynamic Big Data Storage with Efficient High Memory Utilization and ECC Algorithm |
| G.Janani, C.Kavitha |
|
DOI: 10.15680/ijircce.2015.0303081 |
| Research Article: IJIRCCE |
| Efficient Deduplication with Security Using Jenkins and Recovery Techniques |
| S.Hemalatha, U.Muthaiah |
|
DOI: 10.15680/ijircce.2015.0303082 |
| Research Article: IJIRCCE |
| A Review onDesign of a high gain Microstrip Antenna using Parasitic Patch for GPS Application |
| RupeshBudharam Raut, V. D. Nagrale |
|
DOI: 10.15680/ijircce.2015.0303083 |
| Research Article: IJIRCCE |
| Providing Consistency in Cloud Using Read after Write Technique to Endusers |
| R.Jeena, S.Saravanakumar, B.Poornima Bharathi, R.P.Priyancaa |
|
DOI: 10.15680/ijircce.2015.0303084 |
| Research Article: IJIRCCE |
| Secure Internet-Banking with Visual Authentication Protocols |
| S.Saravana Kumar, R.Senthil Kumar, P.Venkatraman, M.Thamodharan, S.Vishnu Prashod |
|
DOI: 10.15680/ijircce.2015.0303085 |
| Research Article: IJIRCCE |
| Robust Video-based Face Recognition. |
| Subashini.T, S.T.Munusamy, Srinivasan. R |
|
DOI: 10.15680/ijircce.2015.0303086 |
| Research Article: IJIRCCE |
| Robust Technique for Detection and Classification of Glands from Human Tissue Samples |
| Prachi Kawalkar, Girish Talmale |
|
DOI: 10.15680/ijircce.2015.0303087 |
| Research Article: IJIRCCE |
| Study of Algorithms for Separation of Singing Voice from Music |
| Madhuri A. Patil, Harshada P. Burute, Kirtimalini B. Chaudhari, Pradeep B. Mane |
|
DOI: 10.15680/ijircce.2015.0303088 |
| Research Article: IJIRCCE |
| Defense against DDoS Attacks Using IP Address Spoofing |
| Archana .S. Pimpalkar, A. R. Bhagat Patil |
|
DOI: 10.15680/ijircce.2015.0303110 |
| Research Article: IJIRCCE |
| Energy Efficient Mobile Sink Path Selection Using a Cluster Based Approach in WSNs |
| L.Brindha, U.Muthaiah |
|
DOI: 10.15680/ijircce.2015.0303111 |
| Research Article: IJIRCCE |
| Trust Management Model Observation towards Security Enhancements and QoS in MANET�s |
| A.Jayakumari, M.Sakthivel |
|
DOI: 10.15680/ijircce.2015.0303112 |
| Research Article: IJIRCCE |
| A Comparative Study about Region Based and Model Based Using Segmentation Techniques |
| A. Manikannan, J.SenthilMurugan |
|
DOI: 10.15680/ijircce.2015.0303113 |
| Research Article: IJIRCCE |
| Combination of Packet Switching and Circuit Switching In the upcoming Computer Networks |
| M H Pradeep Kumar |
|
DOI: 10.15680/ijircce.2015.0303114 |
| Research Article: IJIRCCE |
| Design of A DIP System for Circumstantial Examination and Determination for Visually Disabled Persons |
| M H Pradeep Kumar |
|
DOI: 10.15680/ijircce.2015.0303115 |
| Research Article: IJIRCCE |
| Comparing the Performance of Frequent Itemsets Mining Algorithms |
| Kalash Dave, Mayur Rathod, Parth Sheth, Avani Sakhapara |
|
DOI: 10.15680/ijircce.2015.0303116 |
| Research Article: IJIRCCE |
| Behavioural Model of Adult Obesity by Childhood Predictors using Crowd Sourcing |
| Mohd Zareef Affani, Uma N. Dulhare |
|
DOI: 10.15680/ijircce.2015.0303117 |
| Research Article: IJIRCCE |
| Survey of DOS Defense Mechanisms |
| Anup Ranekar, A. R. Bhagat Patil |
|
DOI: 10.15680/ijircce.2015.0303118 |
| Research Article: IJIRCCE |
| Preserving Privacy using Secret Sharing in Distributed Environment on Perturbed Data |
| Sagar S. Phake, Vikrant S. Moon, Avinash A. Waghmare, Gaurav B. Ijare |
|
DOI: 10.15680/ijircce.2015.0303119 |
| Research Article: IJIRCCE |
| Survey on Interactive Visualization and Navigation of Web Search Results |
| S.Sandhiya, P.Hemalatha |
|
DOI: 10.15680/ijircce.2015.0303120 |
| Research Article: IJIRCCE |
| Data Access Service through Web Service by Auto-Updation Mechanism |
| Sneha Kalbande, N.M.Tarbani |
|
DOI: 10.15680/ijircce.2015.0303121 |
| Research Article: IJIRCCE |
| Handling Load Balancing using Genetic Algorithm in Cloud Based Multimedia System |
| E.Naveen Karki, S.Venkateswaran, AR.Arunachalam |
|
DOI: 10.15680/ijircce.2015.0303122 |
| Research Article: IJIRCCE |
| An Empirical Performance Analysis of Relative Keyword Search Techniques |
| Avinandan Kumar, Dipankar Nag, G.Michael |
|
DOI: 10.15680/ijircce.2015.0303123 |
| Research Article: IJIRCCE |
| Multi Modulus Blind Equalizations for Quadrature Amplitude Modulation |
| Arivukkarasu S, Malar R |
|
DOI: 10.15680/ijircce.2015.0303124 |
| Research Article: IJIRCCE |
| Design of Microstrip Patch Antenna for GPS Applications using EBG Structures |
| Naveen JVSS, Varun Kumar.K, Ramesh.B, Vinay. K.P |
|
DOI: 10.15680/ijircce.2015.0303125 |
| Research Article: IJIRCCE |
| The Software Approach to Measure the Quality of Vein Images for Fake Detection in Online Attendance System |
| B.Ayisha, S.Rajeswari |
|
DOI: 10.15680/ijircce.2015.0303126 |
| Research Article: IJIRCCE |
| Broadband Double Psi (�¨) Shaped Patch Antennas for Wireless Communications |
| Kavita Gundappa Talandage, U. S. Sutar |
|
DOI: 10.15680/ijircce.2015.0303127 |
| Research Article: IJIRCCE |
| Efficient Cloud Computing Load Balancing Using Cloud Partitioning and Game Theory in Public Cloud |
| P.Rahul, A.Senthil Kumar, Boney Cherian |
|
DOI: 10.15680/ijircce.2015.0303128 |
| Research Article: IJIRCCE |
| Prevention of SQL Injection Attack on Web Applications |
| Shakti Kumar, Subhendu Dey, R.Karthikeyan, K.G.S. Venkatesan |
|
DOI: 10.15680/ijircce.2015.0303129 |
| Research Article: IJIRCCE |
| Multi-hop overlay Transport for High Throughput transfers in the Internet |
|
DOI: 10.15680/ijircce.2015.0303130 |
| Research Article: IJIRCCE |
| Advanced Adaptive Routing Algorithm for Highway and City Scenarios in VANET |
| Shubhrant Jibhkate, Smith Khare, Ashwin Kamble, Amutha Jeyakumar |
|
DOI: 10.15680/ijircce.2015.0303131 |
| Research Article: IJIRCCE |
| Cryptographic Technique through Hexagonal Path Using Genetic Algorithm |
| Somalina Chowdhury |
|
DOI: 10.15680/ijircce.2015.0303132 |
| Research Article: IJIRCCE |
| Image Encryption Using Chaotic Map and Prime modulo Multiplicative Linear Congruential Generator |
| Sukhjeevan Kaur, Shaveta Angurala |
|
DOI: 10.15680/ijircce.2015.0303133 |
| Research Article: IJIRCCE |
| Top K Result Retrieval in Searching the File over the Encrypted Data in Cloud |
| C.Saranya, G.Radha, R.Subash |
|
DOI: 10.15680/ijircce.2015.0303134 |
| Research Article: IJIRCCE |
| A Review On the Development of GEDIT 3 Plug-In: Go-To Definition for C Using Exuberant-Ctags |
| P.S. Bangare, Pramod Sonar, Pallab Pain and Sadhna Advani |
|
DOI: 10.15680/ijircce.2015.0303135 |
| Research Article: IJIRCCE |
| Vedic Multiplier in VLSI for High Speed Applications |
| G.Ramachandran, T.Muthumanickam, P.M.Murali, Sajith.S.Nair, L.Vasnath |
|
DOI: 10.15680/ijircce.2015.0303136 |
| Research Article: IJIRCCE |
| Intersection RSU in VANET |
| Rohini Avinash Nere, Uma Nagaraj |
|
DOI: 10.15680/ijircce.2015.0303137 |
| Research Article: IJIRCCE |
| Search Me If You Can Privacy-Preserving Location Query Service |
| Akash Mishra, Shefali Kadam, Avinash Kumar, Sharvari Shinde |
|
DOI: 10.15680/ijircce.2015.0303138 |
| Research Article: IJIRCCE |
| Detection of Intrusions in KDDCup Dataset using GA by Enumeration Technique |
| Vishal R. Chaudhary, R. S. Bichkar |
|
DOI: 10.15680/ijircce.2015.0303139 |
| Research Article: IJIRCCE |
| Multi Threshold Low Power SRAM Using Floating Gates |
| Sushree Sangita Das, Kanan Bala Ray, Prangya Parimita Nanda |
|
DOI: 10.15680/ijircce.2015.0303140 |
| Research Article: IJIRCCE |
| Review of Botnet Attacks and its Detection Mechanism |
| D.Kavitha, Rani S.K |
|
DOI: 10.15680/ijircce.2015.0303141 |
| Research Article: IJIRCCE |
| A Review: Eulerian Video Motion Magnification |
| Kranti Kamble, Nitin Jagtap, R.A Patil, Ankit Bhurane |
|
DOI: 10.15680/ijircce.2015.0303142 |
| Research Article: IJIRCCE |
| Litrature Survey on Collaborative Cloud Computing For Sharing Resource in Trustworthy Manner |
| Bhaskar, Pothumani, Aravind Gosh |
|
DOI: 10.15680/ijircce.2015.0303143 |
| Research Article: IJIRCCE |
| Multilevel Anti-Discrimination Privacy Preserved Data Transmission |
| Naveena M.S, Merlin Shoerio |
|
DOI: 10.15680/ijircce.2015.0303144 |
| Research Article: IJIRCCE |
| Vehicle Locking Using Radio Frequency Identification with Theft Intimation and Smart Tracking System |
| Manu Poduval, Nitish Pokharkar, Anirudha Punekar, S. D. Borde |
|
DOI: 10.15680/ijircce.2015.0303145 |
| Research Article: IJIRCCE |
| Design of 1X2 Triangular Shaped Microstrip Patch Antenna Array for WLAN Applications with DGS Structures |
| K.Shrikar, L. Sai vinodh, B.Ramesh, K.P.Vinay |
|
DOI: 10.15680/ijircce.2015.0303146 |
| Research Article: IJIRCCE |
| Efficient Cloud Storage Management Using DHT Mechanism |
| D.K.Karthika, G.Sudhakar, D.Sugumar |
|
DOI: 10.15680/ijircce.2015.0303147 |
| Research Article: IJIRCCE |
| Review on Various Face Recognition Techniques |
| Ashlesha D. Kolap,S.V. Shrikhande, Nitin K. Jagtap |
|
DOI: 10.15680/ijircce.2015.0303148 |
| Research Article: IJIRCCE |
| Computer Intraction Based on Hand Gestures |
| Suresh.D, Subash.P, F.Noorullah Khan |
|
DOI: 10.15680/ijircce.2015.0303149 |
| Research Article: IJIRCCE |
| Uncertain Bandwidth Calculation in Networks with Non-Linear Services |
| T.Keerthikala, L.Hemalatha, B.Sundarraj |
|
DOI: 10.15680/ijircce.2015.0303150 |
| Research Article: IJIRCCE |
| Dynamic Annotation by Web Database Search Results |
| Bincy S Kalloor, Sheeja Agustin |
|
DOI: 10.15680/ijircce.2015.0303151 |
| Research Article: IJIRCCE |
| Secured Authentication for De-Duplication by Using Hybrid Cloud Approach |
| Anucia Devi D.S, Anuradha C, K.G.S. Venkatesan |
|
DOI: 10.15680/ijircce.2015.0303153 |
| Research Article: IJIRCCE |
| Performance Analysis of Time Moments, Markov's Parameters and Eigen Spectrum Using Matching Moments |
| Dharmendra Singh, Om Prakash Gujela |
|
DOI: 10.15680/ijircce.2015.0303154 |
| Research Article: IJIRCCE |
| Light Weight Intrusion Detection System with Wrapper Approach and Optimized Feature Selection |
| Amol A.Dhiwar, G.K.Patnaik |
|
DOI: 10.15680/ijircce.2015.0303155 |
| Research Article: IJIRCCE |
| Automated Drinking Water Supply System and Theft Identification Using Embedded Technology |
| Sagar Khole, Tushar Kolape, A.P.More |
|
DOI: 10.15680/ijircce.2015.0303156 |
| Research Article: IJIRCCE |
| Association Rules Mining in Vertically Distributed Databases |
| P.Kalaivani, D.Kerana Hanirex, K.P.Kaliyamurthie |
|
DOI: 10.15680/ijircce.2015.0303157 |
| Research Article: IJIRCCE |
| Maintaining Reliability and Time in the Message Transfer within Wireless Sensor Network |
| Prajakta D.Patil, A. A. Tayade |
|
DOI: 10.15680/ijircce.2015.0303158 |
| Research Article: IJIRCCE |
| Secure Top-K Query to Variably Encrypted Signature in Tiered Sensor Networks |
| P.Ramya, C. Nalini |
|
DOI: 10.15680/ijircce.2015.0303159 |
| Research Article: IJIRCCE |
| Pixel Steganalysis - A Novel Approach in Image Steganography Using F5 Algorithm |
| Prabhu Kumar, Nikhil Tirpathi, G.Michael |
|
DOI: 10.15680/ijircce.2015.0303160 |
| Research Article: IJIRCCE |
| SLA Based Resource Allocation as a Service Provider (SaaS) in Cloud Computing Environments |
| K.Adithya Narayanan, Monish Joel Singh, D.Kerana Hanirex, K.G.S. Venkatesan |
|
DOI: 10.15680/ijircce.2015.0303161 |
| Research Article: IJIRCCE |
| QOS - Guaranteed Neighbour Selection & Distributed Packet Scheduling Algorithm by Using MANET Wireless Networks |
| Abhinav Kumar, Abhijeet Kumar, Dr. C. Nalini, K.G.S. Venkatesan |
|
DOI: 10.15680/ijircce.2015.0303162 |
| Research Article: IJIRCCE |
| Traffic Identification Method Engine: An Open Platform for Traffic Classification |
| A.R. Arunachalam, K.G.S. Venkatesan, Abdul Basith.K.V, M. Sriram |
|
DOI: 10.15680/ijircce.2015.0303163 |
| Research Article: IJIRCCE |
| Recommendation System Based On Clustering and Collaborative Filtering |
| K. Dhanalakshmi, A.Anitha, G. Michael, K.G.S. Venkatesan |
|
DOI: 10.15680/ijircce.2015.0303164 |
| Research Article: IJIRCCE |
| Retinal Disparity Estimation and 2D Fusion in Stereo-Pairs |
| Priyanka.V.K, Vijayakumar.K, Sudheesh Madhavan |
|
DOI: 10.15680/ijircce.2015.0303165 |
| Research Article: IJIRCCE |
| CBPPP: Cloud Based Patient Centric Privacy Preserving System |
| Nishant Kumar, Nitish Kumar, C.Anuradha |
|
DOI: 10.15680/ijircce.2015.0303166 |
| Research Article: IJIRCCE |
| Geographic Random Forwarding for Ad-Hoc and Sensor Networks Multihop Performance |
| B.Sundar Raj, S.Naveenraj, A.Gopinath |
|
DOI: 10.15680/ijircce.2015.0303167 |
| Research Article: IJIRCCE |
| Fast Data Collection Using Two-Layer Multicast Communication Protocol in Wireless Sensor Networks |
| K.Priyadharshini, S.Bhuvenswari, R.Arun, K.Cholaraja |
|
DOI: 10.15680/ijircce.2015.0303168 |
| Research Article: IJIRCCE |
| FPGA Based Intelligent Potholes Detection System |
| Sumit Pawade, B.P. Fuladi, L.A. Hundikar |
|
DOI: 10.15680/ijircce.2015.0303169 |
| Research Article: IJIRCCE |
| Session Based Access Control Mechanism Using ECC in WMN- A Review |
| Rahul V.Bambodkar, Avinash P. Wadhe |
|
DOI: 10.15680/ijircce.2015.0303170 |
| Research Article: IJIRCCE |
| Design of Review Based Product Aspect Ranking With Transaction Id Verification |
| Rupesh, K.sivaraman |
|
DOI: 10.15680/ijircce.2015.0303171 |
| Research Article: IJIRCCE |
| Mat Lab Based Synthesis of Speech & Speaker Reorganization Using Data Driven Approach |
| Leela Kumari, Aakash Dadhich, Rahul Guha |
|
DOI: 10.15680/ijircce.2015.0303172 |
| Research Article: IJIRCCE |
| Neighborhood based Framework Active Learning |
| K.P.Kaliyamurthie, K.G.S. Venkatesan, S. Sriram, N.Vijay , Richard Solomon |
|
DOI: 10.15680/ijircce.2015.0303173 |
| Research Article: IJIRCCE |
| Intelligent Surveillance and Security System |
| Monali Chaudhari, Gauresh Vanjare, Dhairya Thakkar, Malay Shah, Amit Kadam |
|
DOI: 10.15680/ijircce.2015.0303174 |
| Research Article: IJIRCCE |
| Parallel Clustering of Gene Expression Dataset in Multicore Environment |
| Pranoti Kamble, Rakhi Wajgi |
|
DOI: 10.15680/ijircce.2015.0303175 |
| Research Article: IJIRCCE |
| Managing XML Retrieval through Personalization Using Search Engine |
| B. Kurinchi Meenakshi, C.Nalini |
|
DOI: 10.15680/ijircce.2015.03030176 |
| Research Article: IJIRCCE |
| A Survey on Economic Denial of Sustainability Attack Mitigation Techniques |
| Rohit Thaper, Amandeep Verma |
|
DOI: 10.15680/ijircce.2015.03030177 |
| Research Article: IJIRCCE |
| A Novel Approach for Energy Efficient Reliable Routing Using TABU in Wireless Ad Hoc Networks |
| M.Ranjitha, K.Gowsic |
|
DOI: 10.15680/ijircce.2015.03030178 |
| Research Article: IJIRCCE |
| Modification of Linux Kernel with Jumping Virtual Clock Round Robin Scheduling |
| Laxmi M. Gurnani, Anurag Sinha, Gurmeet Singh Gujral, Abhijeet Patil, Ashish T. Bhole |
|
DOI: 10.15680/ijircce.2015.03030179 |
| Research Article: IJIRCCE |
| Comparative Study of Load Testing Tools |
| Sandeep Bhatti, Raj Kumari |
|
DOI: 10.15680/ijircce.2015.0303181 |
| Research Article: IJIRCCE |
| High Utility Itemset Mining with Selective Item Replication |
| V.Narendranath, P.S.Rajan, R.Karthikeyan |
|
DOI: 10.15680/ijircce.2015.0303182 |
| Research Article: IJIRCCE |
| Vehicular Ad hoc Network (VANETs): A Review |
| Divya Chadha, Reena |
|
DOI: 10.15680/ijircce.2015.0303183 |
| Research Article: IJIRCCE |
| IVUS detection using Image Processing: A Review |
| Rahul Lanjewar, Kiran Barapatre, Mayur Petkar, Prasad Pande |
|
DOI: 10.15680/ijircce.2015.0303184 |
| Research Article: IJIRCCE |
| Implementation of a New Electro Magnetic Interference Filters Design to Diminish CM Noise |
| G.Vengatesan, B.Karthik, T.V.U. Kiran Kumar |
|
DOI: 10.15680/ijircce.2015.0303185 |
| Research Article: IJIRCCE |
| A Study on Content Based Image Retrieval Systems |
| L. Haldurai, V. Vinodhini |
|
DOI: 10.15680/ijircce.2015.0303186 |
| Research Article: IJIRCCE |
| A Stochastic Model to Investigate Data Center Performance and QoS in Iaas Cloud Computing Systems |
| B. Sundarraj, K.G.S. Venkatesan, Vimal Chand |
|
DOI: 10.15680/ijircce.2015.0303187 |
| Research Article: IJIRCCE |
| Reduced Path, Sink Failures in Autonomous Network Reconfiguration System (ANRS) Techniques |
| K.G.S. Venkatesan, V. Khanaa, A. Chandrasekar |
|
DOI: 10.15680/ijircce.2015.0303188 |
| Research Article: IJIRCCE |
| Accident Detection System by Using Navigation Devices |
| Priyanka Dodmise, Priya Mahadik, Nihalahmad Shikalgar |
|
DOI: 10.15680/ijircce.2015.0303189 |
| Research Article: IJIRCCE |
| Design and Implementation of 2by3 Prescaler using Different Logic in CMOS 45nm Technology |
| Siddharth A. Koshiyar, Narendra J. Patadiya, Bharat H. Nagpara |
|
DOI: 10.15680/ijircce.2015.0303190 |
| Research Article: IJIRCCE |
| Thermodynamic Modeling and Optimization of a Dual Pressure Reheat Combined Power Cycle |
| Seema S. Billur, Vaijanath V. Yerigeri, Ravi V. Yerigeri |
|
DOI: 10.15680/ijircce.2015.0303191 |
| Research Article: IJIRCCE |
| An Iaas Cloud System with Federation Threshold |
| B. Sundarraj, K.G.S. Venkatesan, M. Sriram, Vimal Chand |
|
DOI: 10.15680/ijircce.2015.0303192 |
| Research Article: IJIRCCE |
| Literature Survey on Hybrid Approach for Cloud Bandwidth and Cost Reduction System Using Predictive Acknowledgements |
| Syed Sajid Hussain, A R Arunachalam |
|
DOI: 10.15680/ijircce.2015.0303007 |
| Research Article: IJIRCCE |
| Improved Crypto Analysis for Scrambling Digital Video Using Secret Key |
| S.Hemalatha, V.Hemamalini, S.Manimozhi, B. Revathi, S. Sridevi |
|
DOI: 10.15680/ijircce.2015.0303054 |
| Research Article: IJIRCCE |
| Design of SCS Protocol and Analysis of Quality of Service Parameters for Wireless Sensor Networks |
| G Ramprabu, S Ananthi, R Chitra, J Saranya, G Saratha Preethi |
|
DOI: 10.15680/ijircce.2015.0303055 |
| Research Article: IJIRCCE |
| Secure Crypto and ECG Steganography Based Data Communication for Wireless Body Sensor Network |
| G Sheeba, M I Anju, K Hari Priya, V Monisha, M M Sabbana Banu |
|
DOI: 10.15680/ijircce.2015.0303056 |
| Research Article: IJIRCCE |
| Fiber Fault Localization in FTTH Using Online Monitoring |
| S Sivakami, G Ramprabu, V Hemamalini, K Veronica, C Thirupoorani |
|
DOI: 10.15680/ijircce.2015.0303057 |
| Research Article: IJIRCCE |
| Organ Abnormality Prediction Using Finger Vein Reader |
| S Tamilelakkiya, S Hemalatha, S Manimala, B Santhamala, P Sri Indhuganga |
|
DOI: 10.15680/ijircce.2015.0303058 |
| Research Article: IJIRCCE |
| Video Streaming Over WIMAX with Ant Colony Optimization for Health Applications |
| S.Suganya, R.Ponnulakshmi |
|
DOI: 10.15680/ijircce.2015.0303067 |
| Research Article: IJIRCCE |
| Design and Performance Evaluation of DWDM based Metropolitan Ring Networks |
| Jaspreet Minhas, Rajesh Kochher |
|
DOI: 10.15680/ijircce.2015.0303080 |
| Research Article: IJIRCCE |
| Big Data Processing of Data Services in Geo Distributed Data Centers Using Cost Minimization Implementation |
| A. Dhineshkumar, M.Sakthivel |
|
DOI: 10.15680/ijircce.2015.0303152 |
| Research Article: IJIRCCE |
| Efficient Privacy Preserving Secure ODARM Algorithm in Horizontally Distributed Database |
| Priyanka.G, Premkumar.M |
|
DOI: 10.15680/ijircce.2015.0303180 |
| Research Article: IJIRCCE |
| Design of Double Tail Comparator Using Dual Mode Logic in PTL Design |
| Elackiya.N, Swethaabraham |
|
DOI: 10.15680/ijircce.2015.0305015 |
| Research Article: IJIRCCE |
| OSDM Based Underwater Acoustic Communication |
| D.Arunkumar, M.Margarat |
|
DOI: 10.15680/ijircce.2015.0303193 |
| Research Article: IJIRCCE |
| Healthcare Data Security in Cloud Computing |
| G. Rathi, Abinaya. M, Deepika. M¸ Kavyasri. T |
|
DOI: 10.15680/ijircce.2015.0303089 |
| Research Article: IJIRCCE |
| Moral Hacking: A Way to Boost Data Security by Using Vulnerability Scanning Tools |
| Anish Kumar Anbukarsan, Ilampirai Nagarajan, K.G.S Venkatesan |
|
DOI: 10.15680/ijircce.2015.0303194 |
| Research Article: IJIRCCE |
| Preserving Privacy by Enhancing Security in Cloud |
| N.Vaitheeka, V.Rajeswari, D.Mahendran |
|
DOI: 10.15680/ijircce.2015.0303195 |
| Research Article: IJIRCCE |
| Virtual Makeover and Virtual Trial Dressing |
| Jaychand Upadhyay, Divya Shukla, Nidhi Patel, Sheetal Nangare |
|
DOI: 10.15680/ijircce.2015.0303090 |
| Research Article: IJIRCCE |
| Authenticated Deniable Internet Key Exchange |
| R.Pitchandi, S.Saranya |
|
DOI: 10.15680/ijircce.2015.0303196 |
| Research Article: IJIRCCE |
| A Novel Security Issues Analysis and Evaluation of Security Method in WSNs |
| A.Senthilkumar, R.B.Sarooraj |
|
DOI: 10.15680/ijircce.2015.0303197 |
| Research Article: IJIRCCE |
| Enhancement of Underwater Images Using Wavelength Compensation Method |
| R.Sathya, M.Bharathi |
|
DOI: 10.15680/ijircce.2015.0303091 |
| Research Article: IJIRCCE |
| An Efficient Attack Detection Method in Proactive Source Routing Protocol for Mobile Adhoc Networks |
| S.Kanagalakshmi, N.Pappu Sivanantham |
|
DOI: 10.15680/ijircce.2015.0303092 |
| Research Article: IJIRCCE |
| Digital Watermarking of Audio in Time Domain Multiple Bit Plane based on Chaotic Scrambling. |
| Jeebananda Panda, Indu Kumari, Nitish Goe |
|
DOI: 10.15680/ijircce.2015.0303093 |
| Research Article: IJIRCCE |
| Cloud Service Based Measuring Consumer's Preferences |
| T. Leema Rose, AR.Arunachalam |
|
DOI: 10.15680/ijircce.2015.0303198 |
| Research Article: IJIRCCE |
| Design of Smart Home Energy Management System. |
| Vaibhavi Sunil Yardi |
|
DOI: 10.15680/ijircce.2015.0303094 |
| Research Article: IJIRCCE |
| Designing of MCAM Using 22nm Technology |
| Komal J. Anasane, Ujwala A.Kshirsagar |
|
DOI: 10.15680/ijircce.2015.0303199 |
| Research Article: IJIRCCE |
| Survey on Intelligent Semantic Web Search Engines as Generic Search Engine |
| Deepika Dasari Soorasamharan, Pranamita Nanda |
|
DOI: 10.15680/ijircce.2015.0303200 |
| Research Article: IJIRCCE |
| Detecting and Preventing DDoS Attacks in Cloud. |
| S.SaravanaKumar, R.SenthilKumar, R.Arun prasad, S.Thiraviam, J.Vignesh |
|
DOI: 10.15680/ijircce.2015.0303095 |
| Research Article: IJIRCCE |
| VHDL Simulation of Image Compression Using LBG |
| Rahul R. Ade, Ashish B. Kharate |
|
DOI: 10.15680/ijircce.2015.0303201 |
| Research Article: IJIRCCE |
| Scalable Learning for Collective Behaviour Using Sparse Social Dimensions |
| V.Priyadharshini, K.Thamaria Selvi, P.Sowmiyaa |
|
DOI: 10.15680/ijircce.2015.0303096 |
| Research Article: IJIRCCE |
| An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring In Real-World Limited Bandwidth Networks |
| K.G.S. Venkatesan, Dr. V. Khanaa, M.Sriram, Lekha Sri |
|
DOI: 10.15680/ijircce.2015.0303202 |
| Research Article: IJIRCCE |
| Survey on Web-Scale Image Search and Re-Ranking With Semantic Signatures. |
| Darshana C. Chaudhari, Priti Subramanium. |
|
DOI: 10.15680/ijircce.2015.0303097 |
| Research Article: IJIRCCE |
| Energy Efficient Design for Full Adder Logic Implementation |
| Rakhi Saha, Sambita Dalal, Satyasis Mishra |
|
DOI: 10.15680/ijircce.2015.0303098 |
| Research Article: IJIRCCE |
| Document Image Binarization Using Threshold Segmentation. |
| Rekha Chaudhari, Dinesh Patil |
|
DOI: 10.15680/ijircce.2015.0303099 |
| Research Article: IJIRCCE |
| Simulation of Algal Bloom Detection System Using Modified ABR Algorithm |
| S.Nithya Kamatchi, S.Suresh Kumar. |
|
DOI: 10.15680/ijircce.2015.0303100 |
| Research Article: IJIRCCE |
| Real Time GPRS- Fuel Tracking and Monitoring Entity Using Telematics |
| Dhivyasri G, Rajeshwari Mariappan |
|
DOI: 10.15680/ijircce.2015.0303101 |
| Research Article: IJIRCCE |
| Analysis and Design of Efficient generalized Forensic framework for Detecting Twitter Spammers |
| Ankita M. Ghate, L. G. Malik |
|
DOI: 10.15680/ijircce.2015.0303102 |
| Research Article: IJIRCCE |
| A Combined Approach Using IoT and Cloud for the Efficient Data Retrieval in Medical Technology |
| Shaik Hussain S I |
|
DOI: 10.15680/ijircce.2015.0303103 |
| Research Article: IJIRCCE |
| Comprehensive Study and Review Various Routing Protocols in MANET |
| Manish Sharma, Jaspreet Kaur |
|
DOI: 10.15680/ijircce.2015.0303104 |
| Research Article: IJIRCCE |
| Biometric Secured Voting Machine to Avoid Bogus Voting Based on AADHAR CARD |
| Umang Shah, Trupt Shah, Marteen Kansagara, Saagar Daxini |
|
DOI: 10.15680/ijircce.2015.0303105 |
| Research Article: IJIRCCE |
| Detection of Parkinson's Disease by Speech Analysis |
| Ch.Rajanikanth, A.Amardeep, B.Kishore, Shaik Azeez |
|
DOI: 10.15680/ijircce.2015.0303106 |
| Research Article: IJIRCCE |
| Performance Analysis of PAPR Reduction Using DFT-Spreading OFDMA Technique |
| Alcardo Alex Barakabitze, Tan Xiaoheng |
|
DOI: 10.15680/ijircce.2015.0303001 |
| Research Article: IJIRCCE |
| Online Voting System Using Three Factor Authentication |
| Rashmi Nade, Monali Raut, Punam Agawane, Jayshree Shinde |
|
DOI: 10.15680/ijircce.2015.0303107 |
| Research Article: IJIRCCE |
| Hybrid Based Energy Efficient Wireless Sensor Network Routing Algorithm for Farmland |
| Pramod T. Shitole, UmeshL. Kulkarni |
|
DOI: 10.15680/ijircce.2015.0303108 |
| Research Article: IJIRCCE |
| A Context-Aware Relation Extraction Method for Relation Completion |
| B.Sivaranjani, Meena Selvaraj |
|
DOI: 10.15680/ijircce.2015.0303109 |