Table of Contents
Articles
| Secure Authorized De-duplication with Hybrid Cloud Approach |
PDF
|
| Minal Pore, Nilav Mukhopadhyay | 167-170 |
| Service Delivery Model for Big Data as a Service |
PDF
|
| Devang Swami, Bibhudatta Sahoo | 171-176 |
| Fastened Multi keyword Search over Encrypted Cloud Data |
PDF
|
| Pradnya H. Unde, Arti Mohanpurkar | 177-180 |
| Text Mining: State-of-the-Art and Research Directions |
PDF
|
| N. Venkata Sailaja, Dr. L. Padmasree, Dr. N. Mangathayaru | 181-187 |
| Real Time Implementation of Enhanced Nonlinear PID Controller for a Conical Tank Process |
PDF
|
| S. Prince Samuel, R. Kiruba, M. Saranya | 188-192 |
| Exam Hall Seating Allotment System |
PDF
|
| K. Kalaiselvi, V. Nithya, P. Rathiga, M. Sri Vaishnavy | 193-194 |
| An Efficient Intrusion Detection and Prevention System against Insider Attack by User Behavior Mining |
PDF
|
| N. Birla, M. Jagadish, E. Venkatesan | 195-198 |
| Performance Enhanceduser Revocation for Shared Resource Incloud |
PDF
|
| R. Ashwini, S. Ishwarya, P. Saranya | 199-201 |
| Data Processing for Large Database using Mapreduce Approach and Using APSO |
PDF
|
| S. Bindhu, R. Preethi, N. Gopinath | 202-205 |
| A Framework for the Resource Allocation in Cloud Computing |
PDF
|
| P. Sandhiya, B. Sowmiya, M. Uma Maheswari, P. Vaisnavi, J.A. Dhinesh Joseph | 206-208 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578