Special Issue - 2019
Heart Disease Risk Prediction System Mrs. R.Ramya Devi, N.Akshara, Shruthy G.S |
1-2 |
Refining Digital Behaviour Change Interventions Mrs.R.Amirthavalli, Prathiyankaradevi.R, Poornima.K |
3-5 |
Hospital Seeker Dr.S.PadmaPriya, G.Naveen Kumar, N.Prem Kumar |
6-8 |
Smart Restaurant Billing System With Globalized
Menu Using Android Iot R.Sandhiya, Mrs.L.Karthika |
9-12 |
Smart Health Care Using Iot Mohan Krishna.H, Girish.S, Mr.R.Ganesan |
13-16 |
Secure and Encrypted Personal Health Record in
Cloud Abarna S, Dr.A.S.Kumaresan M.E., Ph.D., FIE., |
17-19 |
Patient Health Care Detector Poornima S, Mrs.Vanitha.M |
20-21 |
Ticket Reselling App Edwin Joseph, Pradheep.S, S.Deepa |
22-24 |
Data Deduplication Using Hybrid Encryption
Algorithm Anusha.P, Malarvizhi.R, Mrs.Sumathi |
25-27 |
Real Time Bugs Tracking System Harshini P, Saranya S, Mrs. R. Amirthavalli |
28-30 |
Chatbot for Student Information Indhu.G, Swetha.R, Sumathi. G |
31-33 |
Smart Home Automation System with Security
Using Iot Mrs.M.Renuka devi, T.Anupriya |
34-36 |
Detecting Hidden Attacks in Apps through the
Mobile App-Web Interface Mrs.S.Revathy, Ashvitha.V, Vaishnavi.N |
37-45 |
Solar Energy Monitoring System by IOT K.G.Srinivasan, Dr.K.Vimaladevi, Dr.S.Chakravarthi |
46-51 |
Rural Drinking Water Supply Using Application Hari babu R, Jayakumar E, Dr.S. Padma Priya |
56-58 |
An Online Training System to Learn Test and
Evaluate on Aptitude Nisha K, Keerthana V, K.C.Aarthi, Assistant Professor |
59-61 |
IoT Enabled Smart Vehicle Safety System K.R. Shashi Vardhan, S. Shriram, Dr.S. Padmapriya |
62-65 |
Detection and Automation System in Fire Work
Factories using IOT G. Pravin Gandhi IV YR, Mr. B.Ravi Kumar |
66-69 |
Geographical Profiling of Locations Based on
Security and Survelliance Ajith shankrithi.S, Ganesh prasad.R, Famitha Hussain.S |
70-72 |
Entrepreneurs Hub Mr.R.Thiyagarajan, M.Narendra Kumar, S.Surender |
73-75 |
Proficient Public Attestation of Data Veracity for Storage of Cloud Across Dual Protection T Ramya |
76-79 |
Smart School Bus Monitoring with Inappropriate Drop Notification System B.Divya, M.Samundeeshwari |
80-83 |
Intelligent Tool to Detect Social Engineering
Attacks Using Rule-Based Expert Systems S.Priyadharsini, S.Revathy, S.Lydia |
84-88 |
Recommending Stock Markets Using Web Media
Content Manoj V, Revanth B |
89-91 |
A Survey of Predicting Depression Levels Using
Social Media Posts Ms.S.Subha, Sairamakrishnen J, Yuvaraj D |
92-95 |
Real Time Driver Drowsiness Detection Using
Open CV Yuvan.M, Varun Ramesh Kumar, Prem Kumar S, Mr.V.Ashok |
96-99 |
Accident Prevention Dr. S. Chakaravarthi, Dr. K. Vimaladevi, F. Merlin Christo |
100-105 |
A Survey on Detection of False Data Injection
Attacks in Smart Grid Communication Systems Dr.R. Lalitha, Praveen.P, Prasanna K, Monash K |
106-110 |
Smart Shoe Based On Internet of Things Karthikeyan.M.P, Venkateshwar.S, Prasad.R |
111-112 |
Parkspot-To Locate Nearby Parking Station Mr. Kishore Kumar.K, Mr.Raghu.B, Mrs. R. Amirthavalli |
113-116 |
IOT Based Soil Irrigation App Thejeshwar AB, Vignesh S, Lalitha S.D |
117-118 |
Data Cleaning and Visualization using Machine
Learning C.J.Subhaswini, A.Sharmila, G.Shobana, Raina Miriam Jose |
119-122 |
A Survey on Protected and Well Organized Entree
Control for Cloud Storage Mr. A. Mani, P. Deepa, M. Divya dharani, E. Karthiga |
123-125 |
Intelligent Door Lock System Nandhini V S, Umadevi K, Revathy K P |
126-128 |
Digital Cash: Tracking of Users in Bitcoin
Transactions Gunasundari B, Nithyassree V, Prithikca Lakshmi SP |
129-131 |
Online Certificate Validation Using Blockchain Shanmuga Priya R, Swetha N |
132-135 |
Online Voting System Using Fingerprint Sensor Nishanthi R, Preethi L, Anitha lakshmi V |
136-138 |
Crop Management and Irrigation Automation
Using Data Analysis Techniques Preetha P, Pavithra, Dr.S.Padmapriya |
139-142 |
Sharing Sports Event Using Android Application Nivedha P, Abinaya S, B,Kannamma R |
143-145 |
Computer Vision Based Text Scanners
(Handwritten Character Recognition) Sakthi J, Soniya G, Thamba Meshach W |
146-148 |
Efficient Farming – Hiring Equipments for
Farmers B. JothiJahnavi, R. Monica, N. Sripriya |
149-151 |
Three Layer Privacy Preserving Using Fog
Computing Manasa.R, Gayathri.T.K, K.Shankar |
152-155 |
Estimation and Prediction of Diabetes Mellitus
Using Association Summarization Techniques Meena, B.Sindhupriya, G.Sowmya |
156-157 |
Secure Intra-Communication Information
Authority in Organization Kavitha.R, ChithraDevi.P, Famitha.S |
158-161 |
Ambulance Service Using Android Application Gayathrishanmugam, N.A JothiJanifer, B.Gunasundari |
162-164 |
Stock Management in Restaurants B. Akshaya, P. Mohana, W. Thamba Meshach |
165-167 |
Design of Patch Antenna for Military Applications E. Arun Kumar, E. Bharanidharan, A.Jayasuriya, Mrs.P.Bini Palas |
168-171 |
Object Recongition and Distance Finding Using
Convolutional Neural Network for Blind People Ms. K. Sornalatha, P. Prabhu, G. veeramani |
172-174 |
An Intelligent System to Choose Career Deena Bandhu.M, Senthil kumaran.A, Mrs. K.Vijayalakshmi |
175-177 |
Energy Efficient Sea Shallow Based Protocol for Improving Packet Delivery in Underwater Communication Mr. Gowtham Dharshan.B, Mrs. A. Rajeswari |
178-182 |
Face Expression Recognition Through Image
Processing Akash Leoni A, Manikandan.S, Mr.P.Navaneetha Krishnan |
183-185 |
Face Image Manipulation Detection using
Deep Learning Mr. A. Arockia Abins, Gowthaman.R, Pughazhenthi.R.R |
186-189 |
Introduction of Newsfeed in Food Review Mohanasundaram.M, Karthick.R, Mr.Mohanraj.K.R |
190-192 |
Automated Student Attendance Using Facial
Recognition Based On DRLBP &DRLDP G.Deepika, M.Priya Agarwal, Mrs.K.C Aarthi |
193-196 |
Question and Answer Extraction Using NLP Akash Shekar, Jeevanantham.P |
197-199 |
Voice Based Transport Enquiry System Venkataramanan.S, Suriya.D, Mr. K.R.MohanRaj |
200-201 |
Diet Monitoring and Health Analysis Using
Artificial Intelligence R. Divya, S. Vithiya Lakshmi, Mrs S.L. JayaLakshmi |
202-204 |
On Spot Accident Information and Insurance
Dispute Resolution DivyaBharathi.R, Ellakya.S, Kavitha.V.R |
205-207 |
Expenses Management System M. Vanitha, Alekhya. K, Sai Gowthami. A. |
208-211 |
Students Attendance Using QR Code Pravinya Srinivasan, K.Manjupriya, Mrs.A.Rajeswari |
212-216 |
Interactive Chatbot Using AIML Madhumitha.S, Keerthana.B, Mrs.Hemalatha.B |
217-223 |
Secure Data hiding using Steganography and transmission through Simple Mail Transfer Protocol Vadivelu A, Hemaraj G, Kushal Chand K |
224-226 |
Online Services Gorthi Nikhil, Gnanasekar.V, Mr.M.S.Murali Dhar |
227-228 |
A Novel Strategy to Enhance Security through
Retro Bit Method Mr.Sundar, Arul Mozhi Varman. G., TVishaal. B |
229-230 |
Entertainment Recommendation System Using
Artificial Intelligence Mr.A.Arockia Abins, Karthick.R, Eashwar.R |
231-233 |
Detecting Fake Accounts in Media Application
Using Machine Learning Gayathri A, Radhika S, Mrs. Jayalakshmi S.L. |
234-237 |
Efficient Electricity Theft Identification and
Notification Mechanism Using Modified Consensus Based Algorithm Vasanth V, Udaya Raja S, Ahamed Ali S |
238-242 |
An Android Application for the Hearing Impaired Mr. Ahamed Ali, S.Ragha Shruthi, U.Divyalakshmi |
243-245 |
An Emergency Notification Android Application
Using Number Plate Recognition I.Anicham, M.Diviya, M.Kaviya, S.Gajalakshmi |
246-250 |
Emotion Recognition System Using Open Web
Platform Tejeswi Vallabhaneni, Thiresh hasan, S.d. Lalitha |
251-255 |
An IOT Based Alarm System in Car for Traffic,
Alcohol and Drowsiness Detection and Accident Prevention J.Rooban Roy, S.Sibi, V.Vengataramanan, V.Gowri |
256-258 |
Sharing of Data Using Privacy Preserving Public
Auditing in Cloud S.Monika, S.Pavithra |
259-261 |
An Optimized Approach to Detect Attacks in IDS
using Fuzzy Methodology C.M.Nalayini, R.RamyaEswari, R.Swedha, P.S.Sushila |
262-266 |
Intrusion-Detection in Self Motivated Topology
for Manets C.M.Nalayini, RitigaAgarwal, SumaiyaHayath |
267-271 |
File Splitting and Storing In Multiple Cloud
Servers for Secured Cloud Storage A.Prema, S.Aishwarya, M.Keerthana, K.S.Nivetha |
272-275 |
Smart Application for the Detection of Road
Conditions While Driving A.Prema, Karuniya N, Roshini D |
276-278 |
Data Security using Blockchain Technology P.Nivethini, S.Meena, V.Krithikaa, G. Prethija |
279-282 |
Image processing based intruder Detection using Raspberry PI S.Adhav, R.Manthira moorthi, G. Prethija |
283-288 |
Quantum Image Scrambling Deborah Adeline George, Jeevitha, Kalpana, S.D. Lalitha |
289-292 |
Tools and Techniques to Prevent Misuse of Personal Information in Social Networking J.SathyaPriya, C.M.Nalayini, S.Priyadharshini |
293-296 |
Online Crime Reporting System Archana.M, Durga S, Saveetha K |
297-299 |
Secure Data Transmission Using Image Steganography A.Prema, V.Gowri |
300-303 |
De-Duplication of Data in Cloud Storage Jessia.E.Joby, R.Manju, J.Sathya Priya |
304-306 |
Monitoring Dementia Patients with IOT V Subbulakshmi1, S Kanchan Reethika, R Suriya |
307-313 |
Machine Learning Framework for Detecting Phishing Websites Jaya Siva Shankaran G, Gowtham Chand Narrayanan S A, Bala Kumar S, Vijayan A |
314-316 |
Monitoring and Controlling Energy Consumption Using IOT and Blockchain V.Subbulakshmi, D.Aiswarya, A.R.Arulselvi |
317-321 |
Android based Access Control Systems using Sensory-Data Vijayan A, Niharika G, Saranya R |
322-327 |
A Blockchain-Based Access Control System for Cloud Storage A.Vijayan, P.S.Priyadharshini, S.Rasika |
328-331 |
Soil & Water Compatibility Testing Based on IOT Manivasan V, Jothi rathinavel P, Abhilash khanna K, P.Visu |
332-334 |
Anita Nair’s Detective Fiction, Cut like Wound and Chain of Custody: a Comparative Perspective V.Srinivas, A.Shobharani |
335-337 |
Race, Ethnicity and History- The Voices From Below Ms. Domitel D’Souza |
338-342 |
Study of Science Process Skills and Academic Achievement among Secondary School Students Dr. Amit Ahuja |
343-346 |
Facilitated Giving Form of Cause Related
Marketing – Providing Stimulus, Eliciting Responses Raina Pinto |
347-351 |
Family, Honor (Ghairat) and the Female Experience Jowairia Umeruddeen |
352-354 |
Greek Philosophy Dr. B. Johan Robert |
355-360 |
Role of Women Education in Determining Birth
Rates Dr. RohitaDeshprabhuKamat, Ms. LizetteD’Costa |
361-366 |
Act East: India’s ASEAN Strategy with special Reference to Myanmar: Issues and Challenges Dr. Neelam Gupta |
371-374 |
Customer Perception: A Case Study of Patanjali
Products Prof: Siddhesh S. Narvekar |
375-382 |
An Examination of the Relationship between Service Quality and Consumers Satisfaction in the Restaurant Industry, Mysuru Sujay M.J, Dr.Noor Afza |
383-387 |
Impact of Trust in Leadership on Sportsmanship Behavior of Subordinates and Moderating Role of Trait Emotional Intelligence Dr. Vibhuti Gupta |
388-397 |
Copyright © All rights reserved | by IJANA - The International Journal of Advanced Networking and Applications, Published by Eswar Publications.