>
Volume 2 / Issue 3 / January - March 2018
1. WAP:REMOTE ADMINISTRATOR TOOL FOR CONTROLLING OPERATING SYSTEM
S.Monika, B.Vinitha, M. Saravanan
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 1 - 8 ♦ DOI: Full text Download ♦ Article Views: 12
2. A SURVEY OF RFID TECHNOLOGY
C.N.Rajalakshmi, N.Anbarasan, K.Elangovan
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 9 - 15 ♦ DOI: Full text Download ♦ Article Views: 10
3. RECENT CHALLENGES IN MOBILE COMPUTING
Saravanan.T, Saranya.K, Sharmila.D
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 16 - 19 ♦ DOI: Full text Download ♦ Article Views: 18
4. A SURVEY ON WI-FI HACKING TOOLS IN KALI LINUX ENVIRONMENT
P.Kalaiyarasu, P.Lokesh, A.Appandiraj
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 20 - 26 ♦ DOI: Full text Download ♦ Article Views: 14
5. WEB CONTENT MINING -STRATEGIES, TOOLS AND ITS COMPARISON
K.Mahalakshmi, A.Chitra Devi, A.Appandairaj
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 27 - 35 ♦ DOI: Full text Download ♦ Article Views: 11
6. CLOUD SERVICES CONCESSION IN INTERNET OF THINGS SURROUNDINGS: A MISCELLANEOUS APPROACH
M.Balaji ,G.R.Gopi, S.Hemanth Kumar, R. Thillaikarasi
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 27 - 35 ♦ DOI: Full text Download ♦ Article Views: 22
7. MODELING AND ANALYSIS ON THE PROPAGATION DYNAMICS OF MODERN EMAIL MALWARE
B.Anusha,R.Archana,K.Farhana jabeen,K.Suganya
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 43 - 48 ♦ DOI: Full text Download ♦ Article Views: 17
8. A ROBUST PRIVACY PRESERVING FOR E-HEALTH SYSTEMS THROUGH THREE FACTOR KEY AGREEMENT
D.E.Gowthami, P.Jayashree, S.Meena, A.S.Vibith
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 49 - 54 ♦ DOI: Full text Download ♦ Article Views: 17
9. A 3D STEGANALYTIC COMPUTATION AND STEGANALYSIS SAFE WATERMARKING
S.Abirami, K.Ajantha,G.Archana,R.Thillaikarasi
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 55 - 60 ♦ DOI: Full text Download ♦ Article Views: 26
10. ANDROID BASED COLLEGE SYSTEM
R.Srinavya,B.Soniya,A.S.Vibith
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 61 - 70 ♦ DOI: Full text Download ♦ Article Views: 14
11. ANDROID BASED ACCELEROMETER SIDE CHANNELS ON SMARTPHONES
G.R.Jaisree,N.Keerthana,M.Monisha,R.Ruhin Kouser
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 71 - 75 ♦ DOI: Full text Download ♦ Article Views: 22
12. RASPBERRY PI BASED A CYBER - DEFENSIVE INDUSTRIAL CONTROL SYSTEM WITH REDUNDANCY AND INTRUSION DETECTION
M.Aswitha,S.Divya,G.Hemavathi,R.Thillaikarasi
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 76 - 80 ♦ DOI: Full text Download ♦ Article Views: 31
13.ESTIMATION OF TUMOR CELLS USING DW-MRI IMAGES -AN EXAMPLE FROM LUNG CANCER
Bharathi. A, Devidurga .E, Gayathri.K.R
Int.Jou.Glo.Engg., 2017, 2(3) , pp. 81 - 89 ♦ DOI: Full text Download ♦ Article Views: 31
14.EFFICIENT CONTENT BASED IMAGE RETRIEVAL USING FUZZY APPROACH
R. Ranjith Kumar, G. Premalatha
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 90 - 95 ♦ DOI: Full text Download ♦ Article Views: 39
15.SMART WATER CONSERVATION AND MANAGEMENT SYSTEM USING IOT
K.Srinivasan, B.Thamizhkani, S.Kamatchi
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 96 - 99 ♦ DOI: Full text Download ♦ Article Views: 24
16.Attaining Energy and Storage Adaptability via Energy efficient Computational offloading with CO2 reduction
S.Sashikumar, G.VijayBabu, T.Johnpeter
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 100 - 108 ♦ DOI: Full text Download ♦ Article Views: 24
17.EXPERIMENTAL STUDY ON COCONUT FIBER IN CONCRETE
S.Pranavan & Rajavel.R
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 109 - 119 ♦ DOI: Full text Download ♦ Article Views: 24
18.CONVENTIONAL BLOOD PRESSURE MONITORING SYSTEM USING RISC MICROCONTROLLER
K.Saravanan, S.Yamini Priya, A.Rajan, J.Kaliappan
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 120 - 128 ♦ DOI: Full text Download ♦ Article Views: 24
19.FAILURE ANALYSIS OF TRANSMISSION LINE TOWERS
Gowsik Prasaanth.P & Sundaraman.R
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 129 - 139 ♦ DOI: Full text Download ♦ Article Views: 34
20.Iris Data Indexing Method Using Gabor Energy Features
J.R.Nishanth, Usha nandhini, Reshma Chandran, J.Jerin Joe rini
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 140 - 147 ♦ DOI: Full text Download ♦ Article Views: 34
21.CORRECTION OF MIMO CHARACTERIZATION SYSTEM LEVEL OF 5G MICRO BASE STATION USING WSNs
N.Suma, N.Bamakumari, R.Siva kumar
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 148 - 160 ♦ DOI: Full text Download ♦ Article Views: 34
22.SURVEY ON WIRELESS SENSOR NETWORKS
N.Suma, S.Yamini Priya,V.S.Kanimozhi
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 161 - 168 ♦ DOI: Full text Download ♦ Article Views: 28
23.SECURE TRANSMISSION AGAINST SOURCE FORGERY AND PACKET DROPPED ATTACKS
A.RachelRoselin, R.Padmavathi, F.Angel Ingnishyaa
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 169 - 174 ♦ DOI: Full text Download ♦ Article Views: 21
24.COMPUTATION OF SKYLINE FOR AMALGAMATED SERVICE SELECTION USING BOTTOM UP ALGORITHM
S. Sashikumar, S. Srilekaa, A. Rachel Roselin
Int.Jou.Glo.Engg., 2018, 2(3) , pp. 175 - 185 ♦ DOI: Full text Download ♦ Article Views: 19