Sr/ No |
Title |
Pdf |
1 |
Efficient Dynamic Streaming By Resolving Firewall Anomalies in Mobile AdHoc Networks
Prasanthi potnuru, Tatapudi.prabhakara Rao |
|
2 |
Design Strategy for Optimum Rating
Selection of Interline DVR
Bhamidipati.Ravikiran ,K.VenuMadhav
|
|
3 |
A Full-Bodied Real-time Embedded Visualization System on an
Unmanned Rotorcraft for Position Object Following
S.anitha, P.srilakshmi |
|
4 |
A Robust SVM for Density based Multifeatured Background Detection/Subtraction
Sireesha K., A.Vishnu vardhan |
|
5 |
DUAL STAGE CONTENTION RESOLUTION MAC
PROTOCOL USING
IMPLICIT PIPELINING
D. Upendar |
|
6 |
Convert the Resulting samples into numeric
Values Based On ARM9
C.SWATI |
|
7 |
Advance Train Detection Technique for Automatic Level Crossing
Surender Kumar, Dr. Y. K. Jain
|
|
8 |
DETECTION OF GLAUCOMA BASED ON K MEANS CLUSTERING
J.Surendiran, Dr.T.Saravanan |
|
9 |
FITM: FEROM Informal Text Mining
Surekha R. Janrao , Dr. Lata Ragha |
|
10 |
A Survey on Cross Site Scripting Attack
Detection
Sudhir. S. Dhekane, Prof. V. B. Gaikwad |
|
11 |
SRENGHTENING THE IMMUNE SYSTEM OF A NETWORK
Dr. Sriram A L, Subramanian A L |
|
12 |
A New Policy Enforcement Scheme for Utilizing Privacy and
Security Policies in Facebook
B.Sirisha , Venkata Ramana Adari |
|
13 |
A New System of Integrating Sound Signature in
Graphical Password Authentication
Anita Rout , Mogali Madhu Babu |
|
14 |
COLLUSION-FREE MULTICAST GROUP KEY DISTRIBUTION BASED ON TREE STRUCTURES
Syed. Abbas, P. Aravind |
|
15 |
ARM Based Temperature Control for Electrical
Furnace using Fuzzy logic
Soma Dhanvanthari M, Smt. Phanisri Ch |
|
16 |
An application of Fuzzy Max-Min composition in Medical Diagnosis using fuzzy operations
R.Jagatheeshwari, Shylaja.S |
|
17 |
Wireless IP Network Gateway Using Agro
Multimedia Sensors for Paddy Field
Monitoring
Seethalakshmi.R and Dr.T.Sheela |
|
18 |
A New Image Steganography Based On
Mathematical Methods
M.Sarika |
|
19 |
Image Contrast Enhancement By Using Modified
Histogram Equalization Techniques
S. Sandeep, B.T. Krishna
|
|
20 |
MACHINE REPRESENTATION & DATA
(CODES) IN COMPUTER SYSTEMS
Olawale J. Omotosho, Samson O. Ogunlere, Oludele Awodele |
|
21 |
NEGATIVE NUMBERS & COMPLEMENTARITHMETIC IN COMPUTER SYSTEMS
Olawale J. Omotosho, Samson O. Ogunlere, Oludele Awodele
|
|
22 |
A NINE-SWITCH AC/AC CONVERTER WITH
REDUCED SWITCHING FREQUENCY
M.Saida Rao
, L Bhanu Ganesh
|
|
23 |
Design and Implementation of Binary Tree
architecture for Fast Multiplication
Mr.S.B.Jadhav
, Mrs.J.K.Patil
, Mr.Y.S.Jagdale
|
|
24 |
Design and Simulate 60 GHz Transmitter and Enhanced Data Rate Using
QAM Modulation Technique
Manish Saxena
, Krishnakant Nayak
, Rishabh Dubey
|
|
25 |
Solution of microstrip low pass filters system
parameters by MATLAB
Ravi Kant Doneriya
, Laxmi Shrivastava
|
|
26 |
Solid Adsorption based Solar Powered IceMaker
R.B. Lokapure
, J.D.Joshi
|
|
27 |
Design and Implementation of RISC Processor
using FPGA for Convolution Application
Purandara Babu.N
, Manoj Kumar.K, Triveni.M
|
|
28 |
COLLUDER DETECTION WITH SEAACK FOR
INTRUSION DETECTION IN MANET
S.PRIYANKA
,
V.ABINAYA
,
S.S ARCHANA |
|
29 |
Multicast Routing Protocol for MANET with
Constrained Directional Forwarding For Less Energy Consumption
Praveen Kumar V
,
Rajendra Prasad Ch
,
Brahma Reddy B
|
|
30 |
Voltage Stability And Its Improvement With Fact
Device Compensation Using Matlab Simulation
Prashant Raghuwanshi
, Bharat Bhushan Jain |
|
31 |
Enhancing the Buffer-Size for Handling Large
Number of Data Packets in Routers
A. Chandrasekar, M.Deepa, D. Prabakar
, Dr. T. Kalaikumaran |
|
32 |
Performance Evaluation of Ad Hoc Routing Protocols TORA, OLSR and
GRP under Pathway Mobility Model
Gurjot Singh Sidhu,Praveen Kakkar |
|
33 |
EFFECT OF LYDIARD TRAINING ON SELECTED PHYSICAL
FITNESS COMPONENTS AND PERFORMANCE VARIABLES
AMONG MALE LONG DISTANCE RUNNERS
A. Dominic
, P.Kamaraj
, S.Rameshkumar
, K. Mohan |
|
34 |
Pattern Recognition Matching of Rheumatoid
Arthritis Using bit Allocation
Dr. S.P Singh , Muntaser A.F. Ali , Dr.R.P Bansal , Dr. Mukesh Tewar |
|
35 |
Study on clustering security – in Distributed
Databases
P. Ganesh, M.Sumathi
, D. Prabakar
, Dr. T. Kalaikumaran |
|
36 |
Pattern Recognition for Imaging and Detection of Arthritis Disease
S.P Singh ,Muntaser Abdelsalam Faraj Ali |
|
37 |
Survey on MapReduce with Scheduling and
Partitioning In Big Data
C.Nandhini
, P.Premadevi
|
|
38 |
DWT AND PCA BASED DIGITAL
VIDEO WATERMARKING
A.M.V.N.Maruti
,
P.Siva Kumar
|
|
39 |
THE EFFECT OF HCG TREATMENT ON DAY OF MATING ON PREGNANCY RATE
AND REPRODUCTIVE PERFORMANCE OF SHEEP
MUSHTAQ H. LASHARI, ZAHIDA TASAWAR
|
|
40 |
AUTOMATIC METER READING SYSTEM
BASED ON AT89S52 MICROCONTROLLER
S.Murali
, S.M.K.Chaitanya
|
|
41 |
Incremental Conductance MPPT Algorithm for
Photovoltaic System
T.Muralimohan, V.V.Naidu, V. Brahmeswar Rao |
|
42 |
An overview of the application of principal component analysis and factor analysis (PCA/FA) in water resource management
Adamu Mustapha
|
|
43 |
Optimization of Wireless Mesh Networks using Integer Linear Programming
Veera Naga Raju J, Aruna J
|
|
44 |
An Efficient Architecture for 3-D Discrete
Wavelet Transform
Triveni.M, Manoj Kumar.K, Purandara Babu.N
|
|
45 |
Performance Evaluation and Analysis of Routing Protocols
Chaitali Brahmbhatt, Minal Mishra |
|
46 |
VOLTAGE REGULATION VIA STATCOM BY COMBINED FUZZY AND PI CONTROLLER
Thenepalli Murali Mohan , Zeyauddin Sk Md |
|
47 |
CPLD based Solar Power Saving System for Street Lights and Automatic Traffic Controller
Manoj Kumar.K ,Purandara Babu.N ,Triveni.M,Ramesh Babu
|
|
48 |
A Study of Various Fractal Antenna Design Techniques for New Generation Wireless Network
Mandeep Kaur Minhas,
Gurpadam Singh,
Vibha Raj Nag |
|
49 |
STRUCTURAL DESIGN OF ELECTRONIC PACKAGE FOR AN AIR BORNE VEHICLE AGAINST
RANDOM VIBRATION ENVIRONMENT
K.MAHENDER |
|
50 |
An Empirical and Efficient Auditing over cloud Services
Prakash Palika, K Ravi Kumar |
|
51 |
Design and Implementation of Adaptive Viterbi Decoder for High Speed Applications
Chaitali Brahmbhatt, Minal Mishra |
|
52 |
Colour Based Segmentation of Red Blood Cells using K-means and Image Morphological Operations
Faten Abushmmala, Mohammed Alhanjouri
|
|
53 |
A Power-Aware Cooperative Caching Technique for MANET
K.Geetha, K.Sabeetha, A.Sangeetha |
|
54 |
DOS ATTACK DETECTION IN WIRELESS NETWORKS USING RINJINDAEL ALGORITHM
S GOMATHI, N ANANDH, SHERIN DOMINIC
|
|
55 |
Good Governance: A Strategic Road Map for Indian Higher Education
Dr. Goutam G. Saha |
|
56 |
LOAD FREQUENCY ANALYSIS OF AUTOMATIC GENERATION CONTROL SINGLE AREA NETWORK USING ANN AND GA
SEEMA DAS,Hari Mohan Rai,Shailey Gulati, Rinku Sanghwan |
|
57 |
PID AND FUZZY-PID CONTROLLER FOR VARIOUS ELECTRICAL MACHINE APPLICATIONS: A COMPARATIVE STUDY
Swetla Barwal, Hari Mohan Rai, Seema Das, Rinku Sanghwan |
|
58 |
Using Foreign Agent For Home Agent Fault Tolerance in Mobile IP
Amina Y. AlSallut , Hana H. Hejazi , Heba A. AbuGhali |
|
59 |
A Fast Parallel Alpha-Beta Algorithm for Tic TAC Toe Game
Amina Y. AlSallut , Hana H. Hejazi, Heba A. AbuGhali |
|
60 |
CAP* Theorem vs. CAS** Principle in Computer Networks
Amina Y. AlSallut , Hana H. Hejazi , Heba A. AbuGhali |
|
61 |
A LOW-COMPLEXITY HIGH-THROUGHPUT MIMO DECODER ON FPGA USING VB ALGORITHM
Himalaya.B and Mr.P.Prakash |
|
62 |
AN EFFICIENT PARALLELIZED ALGORITHM FOR MINING ASSOCIATION RULES
G.SUMATHI,M.INDUMATHI,K.TAMILARASI |
|
63 |
Clustering in Cloud Computing Environment
Ms.Kiran Dhandore, Dr. Lata Ragha, Prof. Sonali Shukla |
|
64 |
Quick information gathering inside a hierarchy network
N.Kishore, T.Ravi Kumar |
|
65 |
Routing Scale: A Method for compute routing support Traffic examination in Wireless Network
Seshidhar Duvvada, T.Prabhakara Rao |
|
66 |
ONLINE CLUSTERING USING K-MEANS and SOM
K.Chandru, K.Duraiswamy, B.Mahalakshmi |
|
67 |
Mutual collection of clouds growth for data scalability in SOA
Divya manuguri, Mrs padmaja rani |
|
68 |
Professional replica of pattern recognition for textual data extraction
VechalapuAlekya, P.Pavithra |
|
69 |
A tracker for spanning the WSN and defeating the blockers in casting mechanism
Vamsi Anush.Dakoju, Mrs Padmaja Rani |
|
70 |
Secure online voting dashboard with general hash aproach
Kallepalli N V Nirisha |
|
71 |
The New Convergence for Similitude Examination of Data
Bhanu Rekha Pydi, D.T.V. Dharmajee Rao |
|
72 |
Internal Self IP Trace back System for tracing IP Spoofing inNetworks
VURITI SIREESHA, P.K.SAHU |
|
73 |
Comparative Analysis of Effective Pattern Search Implementation
Vasudeva Reddy.P, Kumar Vasantha ,Prof. C.Mohan rao |
|
74 |
A Systematic Approach to IP traceback using MANET’s
A.Sri Satya Kalyani ,Mrs.P.Parimala, Dr.P.Satheesh |
|
75 |
A Framework for Accessing Control over the Personal Health Records Based on Attributes
B.V.P.V.Narasimha Murty, Ch.Sunil |
|
76 |
Insecticidal Effect of Leaf Extract of Aegle marmelos (L.) On Some Insect Pests
Of Stored Grain
Dr. Devendra N. Pandey |
|
77 |
An Energy Aware and Reliable Route Selection in MANET
P.Dhivya, R.M.Thiriburabhavan, R.M.Bhavatharani, Dr. S. Karthik |
|
78 |
A SECURE AND FAULT TOLERANCE JOB SCHEDULING STRATEGY IN GRID ENVIRONMENT
C.Sathya, S.R.Janani, Dhivya.P, Dr.S.Karthik |
|
79 |
TARGETING AND TRACKING MOVING OBJECTS IN A CLOSED ENVIRONMENT
Dinesh A |
|
80 |
Adaptive image warping using Disparity-
Map-Based Rendering for hole prevention in
3D view synthesis
Ms.R.M.Bhavithra,Mr.S.K.Somasundaram |
|
81 |
A New Mobile Relay Component for Configuring in Data - Intensive Wireless Sensor
SaiKanth, Venkata Ramana Adari |
|
82 |
Grid based image warping for hole prevention in 3D applications
Mr.S.Yoganandhan, Ms.B.Vinitha Subashini |
|
83 |
MONTE CARLO BASED SSTA ON GRAPHIC PROCESSING UNITS ON FPGAS
Srinivas |
|
84 |
A New Survey for Evaluation of Various Spoofing Defences
Yasoda Krishna Kuppili , Venkata Ramana Adari |
|
85 |
DESIGNING OF LOW PASS MICROSTRIP FILTER USING
RECTANGULAR PHOTONIC BAND GAP
Shubhankar Paul, A. Barapatre, Dhurv Singh Thakur |
|
86 |
TIME STEP STRESS ACCELERATED LIFE TEST MODEL FOR PARETO DISTRIBUTION
Shashi Saxena, Mustafa Kamal |
|
87 |
ASSESSMENT OF GROUNDWATER RESOURCES THROUGH ELECTRICAL RESISTIVITY SURVEYS IN HARD ROCK TERRAIN: A CASE STUDY IN KADIRI SCHIST BELT, ANANTAPUR DISTRICT, ANDHRA PRADESH.
K. S. Sai Prasad, P.T.Ashok Kumar Reddy, N.B.Y.Reddy |
|
88 |
An Embedding technique for encoding for secure and lossless transmission
Ravi shankar Raja Allam, A Ajaya Kumar |
|
89 |
Efficient Analytical and Implementation work on Frequent Pattern Mining Algorithms
Prof. Paresh Tanna, Dr. Yogesh Ghodasara |
|
90 |
Design and Implementation of PLC-Based Monitoring Control System for Induction Motor
Nitin D. Sonawane, Prof. A.M.Jain |
|
91 |
An Effective Visual Cryptography using Image Sharing
Ramjan Beebi shaik, B.Ramesh Babu, Y.Ramesh Kumar |
|
92 |
Performance Analysis of Different Cryptographic Algorithms of Block and Stream Ciphers
Md Imran Alam |
|
93 |
Comparative Study of Different Symmetric and Asymmetric Algorithms of Cryptography
Md Imran Alam |
|
94 |
A Novel and Dynamic Protocol to Ensure Secure Data Storage and Sharing In Cloud
Ch.Venkata Ramana, M.V.Rajesh |
|
95 |
A Succinct Answering Prototype for XML Data
K.Chiranjeevi, Kumar Vasantha, Dr.C.Mohan Rao |
|
96 |
Modification of PVC Film with Thiouronium and study the Effect of Biocompatibility
Kumar Kandukuri, Solaiappan Solasubbu |
|
97 |
An innovative approach to investigate for data by shuffling of similar pixel pairs
Narisimhamurthy.Yenda, R.Srinivas Rao |
|
98 |
Traceback Behavior with routing concept
Mrs Ashajahnavi Adari |
|
99 |
new approach for efficacious pattern frame in the various categories of data in Mining
Kalyan Savalapurapu, D.T.V. Dharmajee Rao |
|
100 |
Efficacious approach for clustering with percentage of drift technique for text frequency
WV Nkhila anjaneya, P.Pavithra |
|
101 |
Grouping with compound vision position supported relate computation
M.Krantikumar, Dr.P.Sateesh |
|
102 |
HYBRID WIND-SOLAR ENERGY SYSTEM WITH RECTIFIER TECHNOLOGY
Mergu. Chandramouly, Dr. B. Balu Naik, Dr. M.T Naik |
|
103 |
ISSUES AND SECURITY TECHNIQUES FOR THE BORDER
GATEWAY PROTOCAL
V.C Gayathri,
K. Arun kumar |
|
104 |
A New Method Avoids the Falling-Off Boundaries by Using Try-Way Pixel Value Difference and Modulus Function in Image Steganography
Dr.K.B.Jayarraman,G.Dhakshana Moorthi, A.Revathy |
|
105 |
Summer Water Crisis of Rewa City (M.P.), IndiaSummer Water Crisis of Rewa City (M.P.), India
Dr.Umesh Prasad Patel and Dr.Sandeep Shukla |
|
106 |
Hop-by-Hop Steering in Wireless lattice
Networks with Reliable Bandwidth
Peddisetti Maha Lakshmi, K Ravi Chand |
|
107 |
Cloud Data Protection and Benefits in IT Demanding Sectors
Mubeen, G Bhargavi |
|
108 |
DDoS Attacks: Intelligent Detection Technique using
ANNIFS
Rakesh Suryawanshi, Vaibhav Survase |
|
109 |
Recent Trends in Data Mining
Rakesh Suryawanshi, Vaibhav Survase |
|
110 |
Design of High Performance FFT Algorithm in
OFDM Communication System
K Ashok Varma,B Leela Kumari |
|
111 |
A New Privacy Preserving Private Profile Matching Technique for Proximity-based Mobile Social Networks
Konakanchi.V.S.H.Ganesh, Venkata Ramana Adari |
|
112 |
Calculate Patterns for Perceptual texture image Sign and mining
MrsPadmavathi, Ch.Ramesh |
|
113 |
Close protection and reliable storage examine during cloud(service) computing
K.Venu, MVB Chandrasekhar |
|
114 |
Data hiding knowledge by modestly Extending Database
N.Pandeeswari, Dr.P.Ganesh Kumar, R.sivakami |
|
115 |
A New Mobile Relay Component for Configuring in Data - Intensive Wireless Sensor
Saikiran Potnuri , Sk Shafiulilah |
|
116 |
A New Distributed Environment for Cooperative Caching in Social Wireless
Kosuru Shalini , B.Bangar Naidu |
|
117 |
Low-Voltage CMOS Defuzzifier Circuit for Using in
Fuzzy Controller
Behzad Ghanavati |
|
118 |
Low-Voltage CMOS Squarer Circuit
Behzad Ghanavati, Enayatollah Taghavi Moghaddam |
|
119 |
A new current-mode min-max circuit
Milad kaboli |
|
120 |
Designing of a squarer circuit in standard 0.18μm
CMOS technology
Milad kaboli |
|
121 |
Optimized Background Preservation for Image Enhancement
Manpreet Kaur, Gagan Jindal |
|
122 |
Analysis of Non-isothermal temperature distribution
on laminar flow and heat transfer over a backward
facing step
Alireza Falahat |
|
123 |
Effect of different positions of the heater on laminar
natural convection in right triangular enclosure
Alireza Falahat |
|
124 |
Optimized Software Component Reuse with Various Attributes for
Efficient Search
Navjot Kaur
,
Dr.Sushil Garg
|
|
125 |
A new approach for efficaciousPattern frames in text mining
Ramesh kumar Mojjada
|
|
126 |
Linear State Estimator for Phasor Measurement Unit
Anudesh Kumar, Surya Prakash, V K Dixit, Rahul Singh
|
|
127 |
Energy Efficiency in Wireless Sensor Networks with MAC Protocol
S. Pradeepa, S. Mylsamy
|
|
128 |
An Empirical Model of Clustering for Rank Oriented Results
D. Jyothibhaskar, Ch.Suni
|
|
129 |
A Novel Suffix Based Pattern Mining On Sequential Datasets
Naga Laxmi Pramoda.G, Kumar Vasantha ,Prof. C.Mohan rao
|
|
130 |
A Novel and Efficient Implementation of User Search Histories
S.N.V.Brahmaji ,N.V.Ashok Kumar,Dr.C.Mohan Rao
|
|
131 |
A Lexical Pattern Based Method for Searching of Personal Name
K.S.Lakshmi, Kumar.Vasantha, Prof. C.MohanRao
|
|