Mail your papers to ijarmate@gmail.com or editor.ijarmate@gmail.com;Call for Papers for current isssue; Last Date: 20th of every month
Volume 4,Issue 7,July 2018
TITLE AUTHORS DOWNLOAD QR CODE
SVM BASED CBIR USING FEATURES EXTRACTED FROM HALFTONING-BASED BLOCK TRUNCATION CODING R. Senthilkumar, Dr.K.Kuppusamy Full Paper
doi>
10.20256/IJARMATE.2018.0407001
IMPROVING PRIVACY PRESERVING AGAINST SHILLING ATTACK IN RECOMMENDER SYSTEM K. Padma, T.Meyyappan , SM.Thamarai Full Paper
doi>
10.20256/IJARMATE.2018.0407002
Efficient Detecting Of Stress Based On Social Communication In Social Networks J.Muthusonai , Dr.E.Ramaraj Full Paper
doi>
10.20256/IJARMATE.2018.0407003
EFFICEINT IMAGE ENHANCMENT USING WCID ALGORITHM WITH UNDER WATER IMAGES B.Malaiyeshwari , Dr. M.Vanitha Full Paper
doi>
10.20256/IJARMATE.2018.0407004
DETECTON OF EXUDATES IN RETINAL IMAGES USING LINEAR SPATIAL FILTERING S.Hari Sudhan, Dr.P.Eswaran Full Paper
doi>
10.20256/IJARMATE.2018.0407005
IMPROVING AND ANALYSIS EMBEDDING SECURITY IN DIGITAL IMAGES USING RDH APPROACHES E.JEEVAJOTHI, DR.K.KUPPUSAMY Full Paper
doi>
10.20256/IJARMATE.2018.0407006
Cancer Data Classification using Clustering Techniques P. Deepalakshmi , Dr.V.Umadevi Full Paper
doi>
10.20256/IJARMATE.2018.0407007
EXTRACTION OF BIOLOGICAL KNOWLEDGE BY CLUSTERING DATA MINING TECHNIQUES P. Lakshmi , Dr.K.Nachimuthu Full Paper
doi>
10.20256/IJARMATE.2018.0407008
Selection of Appropriate Security Patterns P. Megala, Dr.V.Umadevi Full Paper
doi>
10.20256/IJARMATE.2018.0407009
Network Coding in a Bluetooth Network M. Nandhini , Dr.K.Nachimuthu Full Paper
doi>
10.20256/IJARMATE.2018.04070010
Energy Aware Multipath Routing in Wireless Sensor Networks S. Thalfiyanasrin , Dr.K.Nachimuthu Full Paper
doi>
10.20256/IJARMATE.2018.04070011