SEQUENTIAL MINING: PATTERNS AND ALGORITHMS ANALYSIS
Author(s): Thabet Slimani | Amor Lazzez
Volume: 2
Issue: 5
Year: 2013




Comparison Between the Performance of Modified Multi-Diagonal Codes (MMD) and OOC Codes using Matlab
Author(s): Abdelkader Bouarfa | Malika Kandouci
Volume: 2
Issue: 5
Year: 2013




Processing Of Incomplete Data Set
Author(s): Mahesh Babanrao Shelke | K.B. Badade
Volume: 2
Issue: 5
Year: 2013




SURVEY OF MUTUAL EXCLUSION ALGORITHMS
Author(s): Hossein Nick Khah | Faroukh Koroupi | Arash Azizi Mazrae
Volume: 2
Issue: 5
Year: 2013




Design of UART-SPI converter for SOC
Author(s): K. Vinodalakshmi | Divya . | G. Sumalatha
Volume: 2
Issue: 5
Year: 2013




Sorting algorithms and difference of this algorithms
Author(s): Shirin Abbasloo | Faroukh Koroupi
Volume: 2
Issue: 5
Year: 2013




Similarities of Slant in Handwriting of Close Genotypic Family Members
Author(s): Vaibhav Saran | Suneet Kumar | Syeed Ahmed | A K Gupta
Volume: 2
Issue: 5
Year: 2013




CLOUD BASED SECURITY FOR ENHANCED DATA
Author(s): Naga Babu Garigipati | B. Sudhakar
Volume: 2
Issue: 4
Year: 2013




INTERNET ROUTING BASED MULTIPATH MEASUREMENT ANALYSIS ORIENTATION
Author(s): M. Sateesh | B. Sudhakar
Volume: 2
Issue: 4
Year: 2013




DISTRIBUTION OF THE LOAD BASED NETWORK ORIENTED MULTI PATH
Author(s): V.Ramana Babu | G.Chinni Krishna
Volume: 2
Issue: 4
Year: 2013




AN EFFICIENT STRATEGY OF ASSURED DELETION OF THE DATA ORIENTED CLOUD
Author(s): L.Swetha Yadav | K.C Ravi Kumar
Volume: 2
Issue: 4
Year: 2013




AN EFFECTIVE STRATEGY OF WELL EFFICIENT UTILIZATION OF INFRA STRUCTURE ORIENTED CLOUD
Author(s): S.V. Sree Lakshmi | Sk. Habeeb
Volume: 2
Issue: 4
Year: 2013




EFFICIENT RETRIEVAL OF THE DATA BY TEMPLATE ORIENTED STRATEGY
Author(s): P. Saikumari | Sk. Abdulla
Volume: 2
Issue: 4
Year: 2013




CLOUD BASED STORAGE ORIENTED SECURE SERVICES
Author(s): P. Raghu | M. Sreenu
Volume: 2
Issue: 4
Year: 2013




AN EFFECTIVE STRATEGY OF THE PAST LESSON ORIENTED CLOUD
Author(s): M.Suchith Chandra | J. Thirupathi
Volume: 2
Issue: 4
Year: 2013




SERVICES OF THE CLOUD BASED QUALITY PREDICTION STRATEGY
Author(s): Dandu Jagadeeswar Reddy | Shaik. Abdul
Volume: 2
Issue: 4
Year: 2013




AN EFFECTIVE FRAMEWORK FOR DYNAMIC STRATEGY
Author(s): G. Santhosha | B. Deepthi
Volume: 2
Issue: 4
Year: 2013




AN EFFECTIVE STRATEGY OF THE DATA PUBLISHING
Author(s): A. Yamuna | Ch. Srinivas
Volume: 2
Issue: 4
Year: 2013




CONCAVE OPTIMIZATION APPROACH FOR MINIMIZATION OF ENERGY FUNCTION USING RPM
Author(s): Yamala Jagadeesh | B.Jayanth Nadh
Volume: 2
Issue: 4
Year: 2013




AN EFFICIENT STRATEGY BASED DATA HIDING AGAINST JAMMING
Author(s): Mohammad Nafees Fathima | G. Minni
Volume: 2
Issue: 4
Year: 2013




MOBILE NETWROK BASED PRICING OF THEORITICAL GAMING STRATEGY
Author(s): Ravi. Sivayya | Syed Sadat Ali
Volume: 2
Issue: 4
Year: 2013




AN OVERVIEW OF MOBILE SAMPLING OF SENSOR FIELD INFORMATION USING RESTRICTED TRANSMIT
Author(s): Jagadeesh Paluru | K Anusha
Volume: 2
Issue: 4
Year: 2013




DISTRIBUTING SEARCH LOGS A RELATIVE STUDY OF CONFIDENTIALITY GUARANTEES
Author(s): V. Sujeeth | A. Satchidanandam
Volume: 2
Issue: 4
Year: 2013




MULTILEVEL CASCADING STATCOM ORIENTED CONTROL OF DC BALANCED VOLTAGE CAPACITOR
Author(s): Vadlamudi Naresh | Ranapanga Saidulu
Volume: 2
Issue: 4
Year: 2013




A CONTROLLED STRATEGY OF THE DETECTED DATA ORINETED LEAKAGE
Author(s): R.Sunil Kumar | K. Anusha
Volume: 2
Issue: 4
Year: 2013




IRIS RECOGNITION FOR ATM BASED APPROACH
Author(s): J. Sowjanya | S. Srivani
Volume: 2
Issue: 4
Year: 2013




DESIGN OF RFID BASED ATTRACTION OF TOURISTMONITORING SYSTEM
Author(s): Kommula Sahithya Devi | R. Bharath
Volume: 2
Issue: 4
Year: 2013




DETECTION OF THE CUT BASED STRATEGY IN A NETWORK ORIENTED WIRELESS PHENOMENA
Author(s): Shaheen Begum | Akheel Mohammed | Ayesha .
Volume: 2
Issue: 4
Year: 2013




DATA PUBLISHING AND PRIVACY MAINTENANCE BY AN APPROACH ORIENTED SLICING
Author(s): Addagarla Harica | G. Minni
Volume: 2
Issue: 4
Year: 2013




EFFECTIVE RETRIEVAL OF THE IMAGES BASED ON THE CONTENT ORIENTED SKETCHES
Author(s): Mahesh T | Syed Yasin
Volume: 2
Issue: 4
Year: 2013




MEASURING WEIGHT MISUSE BY EFFECTIVE M-SCORE PHENOMENA
Author(s): Narendra Karampudi | Syed Sadat Ali
Volume: 2
Issue: 4
Year: 2013




IMAGE CLASSIFICATION FROM SEARCH ENGINE BASED WEB SHARING
Author(s): Sireesha Dhanekula | G. Minni
Volume: 2
Issue: 4
Year: 2013




METHODS ORIENTED WITH DETECTION OF FRAUD BASED ON CREDIT CARD ANALYSIS
Author(s): Akkineni Sriranjani | Syed Sadat Ali
Volume: 2
Issue: 4
Year: 2013




SEARCH SPECIFIC DOMAIN BY A MODEL OF RANKING
Author(s): P.Rama Teja | J.Ravi Kumar
Volume: 2
Issue: 4
Year: 2013




CLOUD COMPUTING BASED ORIENTATION
Author(s): K. Jithendar | K.Srujan Raju | K. Neeraja
Volume: 2
Issue: 4
Year: 2013




A PROJECT REPORT ON EMERGENCY HEALTHCARE BASED MOBILE COMPUTING FRAMEWORK
Author(s): J. Prashanth | Navnath D. Kale | N. Srinivas
Volume: 2
Issue: 4
Year: 2013




A SYSTEM BASED DRIVER ASSISTANCE FOR EFFECTIVE DETECTION OF PEDESTRIAN
Author(s): Bodigari Rakesh | P. Prakash
Volume: 2
Issue: 4
Year: 2013




An Advance towards Standard Utilities for Document Clustering
Author(s): Aggadi Gnanesh | M.Sudhir Kumar | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013




Data Based Text Encrypting in Audio
Author(s): Bommala Suneel Kumar | S. Satyanarayana
Volume: 2
Issue: 4
Year: 2013




Queries Based Uncertain Locations across Mean Range Oriented Computation Efficiency
Author(s): G. Pushpa | M.V.Jagannatha Reddy
Volume: 2
Issue: 4
Year: 2013




Scheduling of Virtual Scheme for WSN Lifetime Maximisation
Author(s): P. Sateesh | K.Kiran Kumar
Volume: 2
Issue: 4
Year: 2013




Creating Profiles on Behaviour of User
Author(s): Pulikanti Chanakya | A.Shiva Kumar
Volume: 2
Issue: 4
Year: 2013




A Review on Similarity Measure View Point Oriented Clustering
Author(s): M.Vinaya Babu | K.J. Sarma
Volume: 2
Issue: 4
Year: 2013




A Project Report on Mining Based User Oriented Online Recommendation
Author(s): Rekha Bantu | V. Narmada | S. Aparna | V.Murali Mohan
Volume: 2
Issue: 4
Year: 2013




Network Oriented Blocking Followed by Misbehaving Oriented Phenomena
Author(s): Moghal Yaseen Pasha | Moghal Irfan Pasha
Volume: 2
Issue: 4
Year: 2013




Cloud Based Integration of the Data by Efficient Outsourcing
Author(s): Darshane Shriniwas Vasudev | N.Pavan Kumar | Md. Anwar Ali
Volume: 2
Issue: 4
Year: 2013




AN EFFICIENT AND PROTECTED ROUTING PRACTICE FOR HIGH RELIABILITY SENSOR NETWORKS
Author(s): E. Srinivas | M.Ekamabaram Naidu | Pasala Raja Prakasha Rao
Volume: 2
Issue: 4
Year: 2013




PREVENTION OF ATTACKS BASED ON DOS AND ITS DETECTION
Author(s): N.Vijaya Sunder Sagar
Volume: 2
Issue: 4
Year: 2013




ACCESSING QUERY LINK BASED MOBILE COMPUTING
Author(s): Atul Chandrahar Mali | S. Md. Ismail | Md. Anwar Ali
Volume: 2
Issue: 4
Year: 2013




AN APPROACH TOWARDS PUBLISH/SUBSCRIBE SYSTEM FOR WIRELESS NETWORKS
Author(s): Suman Kumar Shriramoju | Jagadeeshwar Madiraju | Adloori Ramesh Babu
Volume: 2
Issue: 4
Year: 2013




ROUTER BASED PACKET DISTRIBUTION IN A HIGH SWITCHING BANDWIDTH
Author(s): N.Naresh Kumar | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013




OBSTRUCTION OF ACCESS TO DISRUPTIVE CLIENTS IN ANONYMIZING NETWORK SYSTEMS
Author(s): S.K. Alisha | N.G.K. Murthy | P. Pothuraju | D. Srikar
Volume: 2
Issue: 4
Year: 2013




Performance of Quasi Orthogonal Space Time Codes on Rayleigh and Rician Fading Channel
Author(s): Sajjad Ahmed Ghauri | Hannan Adeel | Bilal Irshad | Agha Saif
Volume: 2
Issue: 4
Year: 2013




Data Mining through Time Series Forecasting Algorithm
Author(s): Thudum Venkatesh | Kondabathula DurgaCharan | Krishna Kumar Singh
Volume: 2
Issue: 4
Year: 2013




SIGNIFYING SENTENCE FRAMEWORK IN MACHINE LEARNING METHOD FOR INFORMATION MINING
Author(s): V.Praveen Kumar | V.V.R.L.S. Gangadhar
Volume: 2
Issue: 4
Year: 2013




AN EVALUATION AND SCHEME FOR FIGHTING INTERNET AUCTION DECEPTION
Author(s): G. Keerthichandra | M. Sivaswetha | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013




MULTI SHARES PRACTICE FOR PROMISING CONFIDENTIALITY IN CLOUD COMPUTING
Author(s): Poloju Kiran Kumar | Amjan Shaik | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013




SAFETY SUPERVISION OF FOCUSSING VITAL AREAS IN CLOUD COMPUTING
Author(s): Sagar Shivaji Sawant | S. Soujanya | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013




TRADING ARRANGEMENT FOR UNCERTAINTY IN WIRELESS OPPORTUNISTIC ROUTING
Author(s): Ch.Satish Chandra | J. Sreedhar | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013




LIABILITY AS AN APPROACH FOR CONFIDENTIALITY FORTIFICATION IN THE CLOUD
Author(s): Bheemeshwar Yerra | Amjan Shaik | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013




A WELL-ORGANIZED APPROACH TOWARDS SOCIAL TAGGING OF MULTIMEDIA CONTENT
Author(s): M.Praveen Kumar | Manjula Patil
Volume: 2
Issue: 4
Year: 2013




TEXTURE DEPICTION SUBSEQUENT TO VISUAL PERCEPTION
Author(s): P. Rajitha | Y. Madhusekhar
Volume: 2
Issue: 4
Year: 2013




A RESOURCEFUL PRIVACY SAFEGUARDING METHOD AGAINST TRAFFIC ANALYSIS ATTACKS
Author(s): S.Venkata Subbaiah | A. Pravallika
Volume: 2
Issue: 4
Year: 2013




A RESOURCEFUL APPROACH TOWARDS QUERY LOAD SHEDDING IN MOBILE SYSTEMS
Author(s): Upendra Babu Paluru | K.Nagi Reddy
Volume: 2
Issue: 4
Year: 2013




ACCOMPLISHING OF RESPONSIBILITY, VERIFICATION AND RELIANCE IN CLOUD COMPUTING
Author(s): Shaik Abid | L.Ravi Kumar | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013




AN EFFICIENT DEPICTION OF DENIAL OF SERVICE ATTACKS IN WIRELESS NETWORKS
Author(s): A.Dastagiri Reddy | Y. Madhusekhar
Volume: 2
Issue: 4
Year: 2013




PROBABILITY OF INITIATION AND IDENTIFYING JAMMING ATTACKS IN WIRELESS NETWORKS
Author(s): T.Charan Singh | Dayakar Kondamudi | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013




RAPID EFFECTIVE SYSTEM DOUBLING FOR CLOUD COMPUTING
Author(s): K.Nageswara Reddy | B.Venkata Ramani | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013




EFFECTIVE ADVANCEMENT OF AUTHENTIC TRAFFIC CONTROL CLOUDS
Author(s): Mahipal Peddamanna | G.Krishna Veni
Volume: 2
Issue: 4
Year: 2013




AN EFFECTIVE APPROACH TOWARDS THE CREDIT CARD FRAUDULENCE DISCLOSURE METHODS
Author(s): C. Anjaneyulu | Y. Madhusekhar
Volume: 2
Issue: 4
Year: 2013




A PROTECTED DECENTRALIZED ELIMINATION CODE FOR DISPERSED NETWORK STORAGE
Author(s): Gundrati Santosh Kumar | L.Ravi Kumar | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013




A REVIEW ON SAFETY CONCERNS IN SERVICE DELIVERY ILLUSTRATION OF CLOUD COMPUTING
Author(s): M.Vijay Kumar | K.Veera Kishore
Volume: 2
Issue: 4
Year: 2013




PROFICIENT BUILDING OF AGGREGATES IN PROBABILISTIC DATABASES
Author(s): M.Sai Kumar | B.V.Ravi Prasad
Volume: 2
Issue: 4
Year: 2013




RECOVERING THE PERFORMANCE OF DISPERSED APPLICATIONS WITH DYNAMIC NETWORKS
Author(s): Yadla Kiran Kumar | G.Shiva Krishna
Volume: 2
Issue: 4
Year: 2013




ADVANCEMENT FOR INVOLUNTARY RECONFIGURATION FOR AMPLE RESPONSIBLE STORAGE SYSTEMS
Author(s): Velikanti Kiran Kumar | A. Satchidanandam
Volume: 2
Issue: 4
Year: 2013




A Quick Review on Reordering Approaches in Statistical Machine Translation Systems
Author(s): Arefeh Kazemi | Amirhassan Monadjemi | Mohammadali Nematbakhsh
Volume: 2
Issue: 4
Year: 2013




Adaptive Decision Feedback Equalizer (ADFE)
Author(s): Sajjad Ahmed Ghauri | Hannan Adee | Muhammad Safi-ur-Rehman Butt | Muhammad Arslan
Volume: 2
Issue: 4
Year: 2013




DESIGEN AND ANALYSIS OF LOW-VOLTAGE ANALOG MULTIPLEXER USING FOUR-QUADRIC 50 nm CMOS TECHNOLOGY
Author(s): Mohammad Ali Bordbar | Saeed Ghorbani
Volume: 1
Issue: 4
Year: 2012




A Comparative Analysis of classification of Micro Array Gene Expression Data using Dimensionality Reduction Techniques
Author(s): TamilSelvi Madeswaran | G.M.Kadhar Nawaz
Volume: 1
Issue: 4
Year: 2012




Towards Optimal Joint Network Management and Flow Control
Author(s): Ghulam Abbas
Volume: 1
Issue: 4
Year: 2012




STUDY OF FRACTAL COMPRESSION FOR TEXT IMAGES
Author(s): Rodolfo Romero | Jesus Yalja Montiel
Volume: 1
Issue: 4
Year: 2012




Architecture and Implementation of Real Time Vehicle Tracking System Using Wireless, Sensor Devices and Google Maps API
Author(s): Khizar Ahmed Syed | Kiran Kumar Sreenivasiah | S. M. Ahmed | Shiva Kumar
Volume: 1
Issue: 4
Year: 2012




A STUDY ON ADHOC NETWORK ROUTING PROTOCOLS
Author(s): Venkata Suryanarayana | M. Ambica
Volume: 1
Issue: 4
Year: 2012




A Novel Block Cipher Involving a Key Bunch Matrix and a Permutation
Author(s): V.U.K. Sastry | Shirisha Kakarla
Volume: 1
Issue: 4
Year: 2012




Channel Shortening for doubly selective channels using TEQ, MMSE and LMS
Author(s): Sajjad Ahmed Ghauri | Farhan Sohail | SherazAlam Khan | Farrukh Tahir | Anum Tariq | Maria Tariq
Volume: 1
Issue: 4
Year: 2012




Monitoring the paddy crop field using zigbee network
Author(s): Sri Harsha Karri | T.V. Janardhana Rao | A. Pravin | K. Rajasekhar
Volume: 1
Issue: 4
Year: 2012




Timeserving Routing Protocol Implementation to accomplish best throughput and fairness
Author(s): Narasimha Rao V L Potta | B. Sarath Kumar
Volume: 1
Issue: 4
Year: 2012




Implementation of Cryptographic Algorithm Based on MicroBlaze
Author(s): Indrayani Ishwardayal Patle | Jitendra Zalke
Volume: 1
Issue: 4
Year: 2012




BANDWIDTH ENHANCED E- SHAPED MICROSTRIP ANTENNA WITH PAIR OF WIDE SLITS
Author(s): Shushant Kumar Jain | Asha Singh Kushwah | Avnish Sharma | Yogesh Sharma
Volume: 1
Issue: 4
Year: 2012




A Block Cipher Involving a Key Bunch Matrix, and a Key Matrix Supported With Modular Arithmetic Addition, and Supplemented with Permutation
Author(s): V.U.K. Sastry | Shirisha Kakarla
Volume: 1
Issue: 4
Year: 2012




A Block Cipher Involving a Key Bunch Matrix, and a Key Matrix Supported With Xor Operation, and Supplemented with Permutation
Author(s): V.U.K. Sastry | Shirisha Kakarla
Volume: 1
Issue: 4
Year: 2012




UNDISTURBED COLLABORATIVE DEMONSTRATION FOR PATTERN CLASSIFICATION
Author(s): Himaja Kadali | M.D Parveen Sulthana | P. Suresh
Volume: 2
Issue: 3
Year: 2013




A COLLECTIVE APPROACH TOWARDS ENERGY-BASED STRUCTURE FOR AUTONOMOUS LEARNING
Author(s): Ananya Pothula | Ch.Navya Deepthi | P. Suresh
Volume: 2
Issue: 3
Year: 2013




AN EFFECTIVE APPROACH TOWARDS THE AUTOMATIC IMAGE LISTING
Author(s): Yarlagadda Umamaheswari | P.U.V Pavan Kumar | P. Suresh
Volume: 2
Issue: 3
Year: 2013




ONLINE ASSORTMENT OF SELECTIVE TRACKING FEATURES
Author(s): Ajith Medukonduru | Manjula Patil
Volume: 2
Issue: 3
Year: 2013




EFFICIENT PRIVACY SAFEGUARDING METHODS FOR SOCIAL NETWORKS
Author(s): Mahesh Hundekar | A. Satchidanandam
Volume: 2
Issue: 3
Year: 2013




MUTUAL DEVELOPMENT AND POWER MANAGING FOR WIRELESS AD-HOC NETWORKS
Author(s): A.Srinivasa Reddy | B. Venkanna | V.Hari Prasad
Volume: 2
Issue: 3
Year: 2013




SECURITY MANAGEMENT FOR CONSIDERABLE REGIONS IN A ASSURED CLOUD COMPUTING
Author(s): Vijaya Alapati | T. Swapna | Pasala Raja Prakasha Rao
Volume: 2
Issue: 3
Year: 2013




A RESOURCEFUL EVALUATION OF PERMUTATION-BASED ALGORITHM
Author(s): R.Pavan Kumar | B.Ravi Prasad
Volume: 2
Issue: 3
Year: 2013




AN OVERVIEW OF ACTIVE CHANNEL ALLOTMENT FOR WIRELESS MULTICAST AND BROADCAST SERVICE
Author(s): M.Rajendra Reddy | K.Nagi Reddy
Volume: 2
Issue: 3
Year: 2013




A PROFICIENT APPROACH TOWARDS WIRELESS SENSOR NETWORK SAFETY MODEL
Author(s): K.Y. Maheswari | A. Satchidanandam
Volume: 2
Issue: 3
Year: 2013




A VALUABLE IMPROVEMENT TOWARDS THE PACKET LOSS CONTROL
Author(s): Radhabai. B.Kalaskar | Manjula Patil
Volume: 2
Issue: 3
Year: 2013




ESTABLISHING CORRESPONDING DEPENDENTS OVER P2P NETWORKS
Author(s): Chandrakala Patil | Manjula Patil
Volume: 2
Issue: 3
Year: 2013




A COMPETENT APPROACH OF DATA AGGREGATION IN TREE BASED WIRELESS SENSOR NETWORKS
Author(s): T.Pavan Kumar | K.Nagi Reddy
Volume: 2
Issue: 3
Year: 2013




CONSTRICTING THE PATH OF MOVABLE OBJECTS IN SENSOR NETWORKS
Author(s): P. Srikantam | G.Shiva Krishna
Volume: 2
Issue: 3
Year: 2013




DISPERSED LIABILITY REASSURANCE FOR DATA ALLOTMENT IN CLOUD COMPUTING
Author(s): S Vara Vinod Ungarala | Sri P B V Raja Rao
Volume: 2
Issue: 3
Year: 2013




A COMPETENT APPROACH OF DATA AGGREGATION IN TREE BASED WIRELESS SENSOR NETWORKS
Author(s): Divyatheja Gadikota | Pasala Raja Prakasha Rao | Chittam Venkata Rajesh
Volume: 2
Issue: 3
Year: 2013




BUILDING OF DECISION TREE CLASSFIERS BY MEANS OF DATA IMPROBABILITY NUMERICAL FEATURES
Author(s): Devender Rondla | G. Krishna Veni
Volume: 2
Issue: 3
Year: 2013




A STUDY ON CREDIT CARD DECEPTION EXPOSURE METHODS
Author(s): Rajesh Manda | G.Shiva Krishna
Volume: 2
Issue: 3
Year: 2013




A FUZZY CHARACTERISTIC SELECTION AND EXTRACTION FOR TEXT CATEGORIZATION
Author(s): Jhansi Koorapati | G.Vijaya Lakshmi | R. Nagaraju
Volume: 2
Issue: 3
Year: 2013




A PROSPEROUS ENCROACHMENT TOWARDS THE SUPERVISION OF PACKET LOSS
Author(s): B.Bhavani Neehar Reddy | Pasala Raja Prakasha Rao | Chittam Venkata Rajesh
Volume: 2
Issue: 3
Year: 2013




Routing Protocols In Mobile Ad Hoc Networks: A Survey
Author(s): Reetika Khetarpal | Bhushan Dua
Volume: 2
Issue: 3
Year: 2013




GOLD SEQUENCE GENERATION-A VLSI IMPLEMENTATION (16nm TECHNOLOGY)
Author(s): Yogendra Jangid | Deepesh Shukla | Gaurav Jeswani | Vinod Agarwal | Vivek Kumar Jain | Yatendra Rathore | R. S. Meena | Pankaj Shukla
Volume: 2
Issue: 3
Year: 2013




GSM Based Vehicle Security System
Author(s): Rinju Dutta | Sushmita Gogoi | Shreya Boro | Rakesh Basumatary | Tanvira Ismail
Volume: 2
Issue: 3
Year: 2013




ELECTRICITY METER READING USING GSM
Author(s): Tanvira Ismail | Partha Protim Dutta | Dipannita Das | Bikash Borgohain | Amit Prasad
Volume: 2
Issue: 3
Year: 2013




Designing a Wi- Fi Enabled Robot
Author(s): K. Sai Rohit Singh | Mohammed Ali Hussain
Volume: 2
Issue: 3
Year: 2013




Adapting Tactile Graphic Tool for Portable Digital Pads and Tablet PCs
Author(s): Robinson Thamburaj | Atulya Nagar
Volume: 2
Issue: 3
Year: 2013




Speech Enhancement Using Spectral Subtraction Method
Author(s): Sadashiv Badiger | Bairu Krishnaji Saptalakar
Volume: 2
Issue: 3
Year: 2013




Feedback Controller Design for AQM using Lambert-W function
Author(s): Neeraj Choudhary | Jagdeep Singh Lather
Volume: 2
Issue: 3
Year: 2013




A WELL-ORGANIZED ESTIMATION OF INDEFINITE LOCATION RELIANT QUERIES
Author(s): S.Praveen Kumar | R.V. Krishnaiah
Volume: 2
Issue: 3
Year: 2013




A PROFICIENT APPROACH TOWARDS THE DETECTION OF INTRUSIONS IN MULTI-TIER APPLICATIONS
Author(s): K.Rama Chary | M. Srinivas
Volume: 2
Issue: 3
Year: 2013




AN EFFECTIVE APPROACH TOWARDS CREDIT CARD DECEPTION DISCOVERY METHODS
Author(s): K. Nirusha | R.V. Krishnaiah
Volume: 2
Issue: 3
Year: 2013




CARRIER-FREQUENCY HARMONIZATION STRUCTURE FOR ENHANCED AMPLITUDE MODULATION FUNCTION
Author(s): B.V.Subba Rao | P. Satyanarayanna
Volume: 2
Issue: 3
Year: 2013




AN EFFICIENT HIERARCHICAL QOS ALGORITHM FOR WIRELESS SENSOR NETWORKS
Author(s): Narendra Kumar | Sri Lavanya Sajja
Volume: 2
Issue: 3
Year: 2013




A SURVEY ON VARIOUS WATERMARKING METHODS FOR GIS VECTOR DATA
Author(s): P. Bhanuchandar | M.Siva Ganga Prasad | K.Phani Srinivas
Volume: 2
Issue: 3
Year: 2013




A WELL-ORGANIZED AND SECURE ROUTING TECHNIQUE FOR HIGH INTEGRITY SENSOR NETWORKS
Author(s): K.Adi Lakshmi | M. Srinivas
Volume: 2
Issue: 3
Year: 2013




AN EFFICIENT APPROACH TOWARDS PROGRAMMABLE MEMORY BUILT-IN SELF-TEST FOR EMBEDDED MEMORY
Author(s): P. Sireesha | P. Prakash
Volume: 2
Issue: 3
Year: 2013




IMPROVED DEPTH CONCEPTION WITH SHARPNESS AUGMENTATION FOR STEREO VIDEO
Author(s): P. Balanna | K. Suvarna | K. Sudhakar
Volume: 2
Issue: 3
Year: 2013




AN EMINENT REVERSIBLE DATA HIDING SYSTEM WITH EDGE PREDICTION AND VARIATION EXPANSION
Author(s): Satharla Raga Deepthi | H. Devanna | K. Sudhakar
Volume: 2
Issue: 3
Year: 2013




CONFIDENTIALITY SHIELDING COOPERATIVE MULTILEVEL DRM BUILDING
Author(s): M.Krishna Naik | T. Chakrapani | K. Sudhakar
Volume: 2
Issue: 3
Year: 2013




DIMINISHING OF IMAGE BY MEANS ON DISCRETE PRODUCT PATTERN
Author(s): Kataru Sateesh Kumar | H. Devanna | K. Sudhakar
Volume: 2
Issue: 3
Year: 2013




AN ELUCIDATION TO GAIN ATTACK ON WATERMARKING METHODS
Author(s): N. Daniel | I. Sandhya | Pasala Raja Prakasha Rao
Volume: 2
Issue: 3
Year: 2013




CONDENSED-STATE PROGRESSION DISCOVERY THROUGH CONVOLUTIONAL CODES
Author(s): Chiranjeevi Oguri | C. Rambabu | S.M.A. Naveed
Volume: 2
Issue: 3
Year: 2013




A RESOURCEFUL AND SAFE ROUTING METHOD FOR ELEVATED RELIABILITY SENSOR NETWORKS
Author(s): P.Nagaiah Goud | G.N.V.Ramana Rao
Volume: 2
Issue: 3
Year: 2013




A PROGRESSION TOWARDS ROUTING EXPERTISE FOR ENHANCEMENT OF INTERNET PROTOCOL NETWORKS
Author(s): Patlola Jyothirmai | Gandla Nageswararao
Volume: 2
Issue: 3
Year: 2013




EXPLORATION OF THE WEB BY MEANS OF MOBILE IMAGES FOR LOCATION DETECTION
Author(s): Munukuntla Jyothsna | M. Srinivas
Volume: 2
Issue: 3
Year: 2013




EFFECTIVE ANALYSIS OF NETWORK TOPOLOGY REPRESENTATION ON ACTIVE WORM ATTACKS
Author(s): Kore Kunal Sidramappa | A. Satchidanandam | K.Nagi Reddy
Volume: 2
Issue: 3
Year: 2013




EFFECTIVE EXAMINATION ON DEVELOPMENT POLICIES FOR MULTI-HOP WIRELESS NETWORKS
Author(s): Kamble Nagaraj Pralhad | Manjula Patil | K.Nagi Reddy
Volume: 2
Issue: 3
Year: 2013




EFFICIENT PERFORMANCE OF ROUTING ALGORITHMS IN SENSOR NETWORKS
Author(s): Vanitha Komira | T.Soma Shekar | T.Venkata Ramana
Volume: 2
Issue: 3
Year: 2013




SAFETY MANAGEMENT FOR SIGNIFICANT REGIONS IN A TRUSTED CLOUD COMPUTING
Author(s): Thatikonda Radhika | A. Ramesh | T.Venkata Ramana
Volume: 2
Issue: 3
Year: 2013




VIGOROUS ROUTING AND ADVANCEMENT IN WIRELESS MESH NETWORKS
Author(s): K.Murali Mohan | A. Ramesh | .T.Venkata Ramana
Volume: 2
Issue: 3
Year: 2013




A SURVEY ON EFFICIENT ROUTING TECHNOLOGY FOR A RAPID INTERNET PROTOCOL NETWORK IMPROVEMENT
Author(s): Morampudi Naresh | T.Soma Shekar | T.Venkata Ramana
Volume: 2
Issue: 3
Year: 2013




IMPROVING RESOURCE ADMINISTRATION USING ACTIVE LOAD ESTIMATION
Author(s): M. Yadagiri | P.Pranai Kumar | T.Venkata Ramana
Volume: 2
Issue: 3
Year: 2013




ACHIEVEMENT OF LIABILITY, AUDITABILITY AND RELIANCE IN CLOUD COMPUTING
Author(s): Ramya Sree Uppalapati | K.Nagi Reddy
Volume: 2
Issue: 3
Year: 2013




AN ASSESSMENT ON PROFICIENT ROUTING KNOWLEDGE FOR A FAST INTERNET PROTOCOL NETWORK ENHANCEMENT
Author(s): B. Naresh | .K.J. Sarma | Pasala Raja Prakasha Rao
Volume: 2
Issue: 3
Year: 2013




A RESOURCEFUL DEVELOPMENT OF SPATIAL PREFERENCE DATA
Author(s): K. Seetharamaiah | Ch.V.Mahavira Lakshmi
Volume: 2
Issue: 3
Year: 2013




COMFORTING DISSEMINATED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD
Author(s): K. Pravallika | P.B.V Raja Rao
Volume: 2
Issue: 3
Year: 2013




AN ASSESSMENT OF PIONEERING WATERMARKING METHODS FOR IMAGE AUTHENTICATION
Author(s): U. Sivaji
Volume: 2
Issue: 3
Year: 2013




A VALUABLE PROGRESS ON THE WAY TO CREDIT CARD DECEPTION REVELATION SYSTEM
Author(s): K.Nagasai Goutham Kumar | Pasala Raja Prakasha Rao
Volume: 2
Issue: 3
Year: 2013




AN EXPANSION TOWARDS THE CONFIDENTIALITY SAFEGUARDING OF HEALTH RECORDS
Author(s): R. Iswarya | M.Sudhir Kumar | L. Malathi
Volume: 2
Issue: 3
Year: 2013




A COMPETENT PROGRESS TOWARDS PRESERVING THE DATA CONSISTENCY IN STORAGE OUTSOURCING
Author(s): Divya Malakapalli | M.Sudhir Kumar | J. Tirupathi
Volume: 2
Issue: 3
Year: 2013




AN EFFICIENT APPROACH OF AMORPHOUS PEER-TO-PEER SYSTEMS
Author(s): R.V.V.S.V. Prasad | B.S.N. Murty
Volume: 2
Issue: 3
Year: 2013




INACTIVE ATTACK EXAMINATION FOR ASSOCIATION-BASED ANONYMITY SYSTEMS
Author(s): S. Sowmya | M.Sudhir Kumar | K.Ranjith Reddy
Volume: 2
Issue: 3
Year: 2013




Automated Facial Feature Points Extraction
Author(s): Arun Kumar Nagdeve | Somesh Kumar Dewangan
Volume: 1
Issue: 3
Year: 2012




An algorithm of Total Variation for Image Inpainting
Author(s): Shubhangi N. Ghate | Shilpa Achaliya | Smitha Raveendran
Volume: 1
Issue: 3
Year: 2012




ANALYSIS OF HSV COLOR SPACE FOR IMAGE RETRIEVAL
Author(s): Rachita Sharma | Sanjay Kumar Dubey
Volume: 1
Issue: 3
Year: 2012




Automated Face Detection in Color Images using Skin Region and Adaptive template Matching
Author(s): Chandrashekar M Beedimani
Volume: 1
Issue: 3
Year: 2012




A Study of Remote Sensing Technology and its Applications
Author(s): Subrahmanyeswara Rao. Maradani
Volume: 1
Issue: 3
Year: 2012




A Novel Content Based Image Retrieval using Variance Color Moment
Author(s): Hariharapavan Kumar Bhuravarjula | V.N.S Vijaya Kumar
Volume: 1
Issue: 3
Year: 2012




Profiling on Superscalar Pipelining Architecture and Multi-Pipeline Scheduling Policies
Author(s): Tarun Bhalla | Mohit Mittal
Volume: 1
Issue: 3
Year: 2012




Hybrid Approach for Measuring String Similarity and its Usage in Supply Type Questions’ Answer Evaluation
Author(s): Khyati Rajulkumar Shah | Mayuri Patel | Jikitsha Sheth | Kalpesh Lad
Volume: 1
Issue: 3
Year: 2012




Performance Analysis of Physical Layer of WiMAX System using Simulink
Author(s): Anurag Sharma | Anita Garhwal
Volume: 2
Issue: 2
Year: 2013




Productivity Inference with Dynamic Bayesian Models in Software Development Projects
Author(s): Abou Bakar Naman | M.Ikram. Lali
Volume: 1
Issue: 2
Year: 2012




A New Focus on Distance Learning for Physically Impaired Students: A Multi-agent Oriented Approach
Author(s): Shiladitya Pujari | Subrata Mondal
Volume: 1
Issue: 2
Year: 2012




Embedded System For Intelligent Ambulance And Traffic Control Management
Author(s): Sarika Baburao Kale | Gajanan P. Dhok
Volume: 2
Issue: 2
Year: 2013




An Efficient Approach for Countering Black Hole Attack in MANETs
Author(s): S.J. Sultanuddin | Mohammed Ali Hussain
Volume: 2
Issue: 2
Year: 2013




RED TACTON HUMAN AREA NETWORKING
Author(s): Priyanka Kakade | Khobragade S V
Volume: 2
Issue: 2
Year: 2013




Mitigating effect of high GDOP on position fix accuracy of Pseudolite only Navigation System
Author(s): K Tiwary | G Sharada | Dr. Prahalada
Volume: 2
Issue: 2
Year: 2013




Virtual Class Management
Author(s): Drashti Shrimal | Shraddha Singh | Deepika Rajendra Jain
Volume: 2
Issue: 2
Year: 2013




Implementing the ARM7 Soft Core Processor in FPGA
Author(s): Y.B.T. Sundari | T. Surender Reddy | Laxminarayana G
Volume: 2
Issue: 2
Year: 2013




Regression Model Diagnostic, Test and Robustification in the Presence of Multicollinear Covariates: A Review
Author(s): Olushina Olawale Awe | Isaac Oluseyi Ajao | Michael A.Olagunju
Volume: 2
Issue: 2
Year: 2013




Mutual Information-Based Supervised Attribute Clustering for Large Microarray Sample Classification
Author(s): Senthamarai Kannan S | Sherin Mariam John
Volume: 2
Issue: 2
Year: 2013




Forgery Detection in Offline Handwritten Signature using Global and Geometric Features
Author(s): Ashish Chandra Verma | Dipankar Saha | H. Saikia
Volume: 2
Issue: 2
Year: 2013




Low power add and shift multiplier design using BZFAD architecture
Author(s): Prasann D Kulkarni | S.P. Deshpande | G.R. Udupi
Volume: 2
Issue: 2
Year: 2013




Implementation of Integrity of Voice and face Recognition for Home Security by using GSM AND ZIGBEE
Author(s): Chandrasekhar Lokanadham | B. Purna V. Subbarao | V. Santhisri
Volume: 1
Issue: 2
Year: 2012




A Distributed Synchronous Algorithm for Minimum-Weight Spanning Trees
Author(s): Md Mohsin Ali | Mst Shakila Khan Rumi
Volume: 1
Issue: 2
Year: 2012




Corpus based Emotion Extraction to implement prosody feature in Speech Synthesis Systems
Author(s): Manoj B Chandak | Swati Bhutekar
Volume: 1
Issue: 2
Year: 2012




RSA Algorithm Implementation for Ciphering Medical Imaging
Author(s): Samoud Ali | Cherif Adnen
Volume: 1
Issue: 2
Year: 2012




Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment
Author(s): Swarnpreet SIngh Saini | Ritu Bagga | Devinder Singh | Tarun Jangwal
Volume: 1
Issue: 2
Year: 2012




AUTOMATION OF ROTOMOULDING PLANT (RP) USING PLC
Author(s): Bushra Naz Soomro | Naveed Ahmed Jaffari | Faisal KaimKhani
Volume: 2
Issue: 2
Year: 2013




Acquisition and Utilization of Statistical Consulting/Collaboration Skills among University Students in Nigeria: A Recent Survey
Author(s): Olushina Olawale Awe | Dayo Micheal Oguntuase
Volume: 2
Issue: 2
Year: 2013




Selection of Multi-Cloud Storage Using Cost Based Approach
Author(s): Sai Kiran M | Gowtham Kumar Neredumilli | Praveen Kumar Rao K
Volume: 2
Issue: 2
Year: 2013




Cloud Security Based On Oracle Storage Using Transparent Table Encryption Technique
Author(s): Ankita Prakash Baheti | Surendra Vasantrao Patil
Volume: 2
Issue: 2
Year: 2013




Drowsiness Detection Based on Eye Shape Measurement
Author(s): Shashidhar M. Sugur | Vidyagouri B. Hemadri | U.P. Kulkarni
Volume: 2
Issue: 2
Year: 2013




Achieving Information Accountability in Cloud Computing Environment
Author(s): P Sobha Rani | V. Sangeeta | P.Suresh Babu
Volume: 2
Issue: 2
Year: 2013




COMPARATIVE STUDY OF LOAD BALANCING TECHNIQUES FOR OPTIMIZATION OF NETWORK LIFETIME IN WIRELESS SENSOR NETWORKS
Author(s): Lalit Kumar Saraswat | Sachin Kumar
Volume: 2
Issue: 2
Year: 2013




Uniform Payment System for Banking Industries: A Case Study in Bangladesh
Author(s): Md. Baharul Islam | Md. Tukhrejul Inam | Md. Ekramul Kabir
Volume: 2
Issue: 2
Year: 2013




Data Mining in Medical Application for better Detection of Disease
Author(s): Fanil V. Gada | Kartik R. Yadav | Rupen Deepak Shah
Volume: 2
Issue: 2
Year: 2013




A NEW DATA HIDING METHOD USING PIXEL POSITION AND LOGICAL AND OPERATION
Author(s): Ravi Saini | Rajkumar Yadav
Volume: 1
Issue: 1
Year: 2012




A STUDY ON KNOWLEDGE ACQUISITION APPROACH FOR COMPOSITE AEROSPACE COMPONENT DESIGN
Author(s): G Sivaraman
Volume: 1
Issue: 1
Year: 2012




A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography
Author(s): Thamaraiselvan R | A. Saradha
Volume: 1
Issue: 1
Year: 2012




A hybrid k-Mean-GRASP for partition based Clustering of two-dimensional data space as an application of p-median problem
Author(s): Sunil Nadella | Kiranmai M V S V | Narasimha Gugulotu
Volume: 1
Issue: 1
Year: 2012




A number of Real Time Operating Systems Implemented in Hardware
Author(s): Aashish A. Gadgil
Volume: 2
Issue: 1
Year: 2013




SEGMENTATION BASED DETECTION OF BRAIN TUMOUR
Author(s): Bairu Krishnaji Saptalakar | Rajeshwari H
Volume: 2
Issue: 1
Year: 2013




Power Efficient Data Transmission in a Clustering Protocol with Mobile Sink
Author(s): Sathish G P | B.R.Shyamala Devi
Volume: 2
Issue: 1
Year: 2013




Media - Oriented Rate Selection Algorithm for IEEE 802.11 WLANs
Author(s): Syed Umar | Mohammed Ali Hussain
Volume: 2
Issue: 1
Year: 2013




Implementation of OFDM and Channel Estimation using LS and MMSE Estimators
Author(s): Sajjad Ahmed Ghauri | Sheraz Alam | M. Farhan Sohail | Asad Ali | Faizan Saleem
Volume: 2
Issue: 1
Year: 2013




Spectrum Sensing for Cognitive Radio Networks over fading channels
Author(s): Sajjad Ahmed Ghauri | I M Qureshi | M. Farhan Sohail | Sheraz Alam | M. Anas Ashraf
Volume: 2
Issue: 1
Year: 2013




Geodesic Approach for 3D Image Construction using Laser Triangulation Method
Author(s): Tallha Akram | QiChang Duan | Muhammad Usman
Volume: 2
Issue: 1
Year: 2013




AUTOMATION OF ROTOMOULDING PLANT (RP) USING PLC
Author(s): Bushra Naz Soomro | Bushra Naz | Faisal Kaim Khani
Volume: 2
Issue: 1
Year: 2013




Detecting a Moving Object
Author(s): Archana Sidhanti | Anusha Sidhanti
Volume: 2
Issue: 1
Year: 2013




VEHICLE LICENSE PLATE CHARACTER SEGMENTATION – A VEHICLE LICENSE PLATE CHARACTER SEGMENTATION – A STUDY
Author(s): V. Karthi Keyan | R. Sindhu | K. Anusha | D.S. Vijith
Volume: 2
Issue: 1
Year: 2013




A PRACTICAL APPROACH TO WORKING OF WEB SEARCH ENGINE
Author(s): Vijaya Kumar P N | Raghunatha Reddy V
Volume: 2
Issue: 1
Year: 2013




Development and performance of new-Antenna Diversity Techniques for OFDM Systems
Author(s): Abdelhamid Cherifi | B. Yagoubi | B.S. Bouazza | A. Garadi
Volume: 2
Issue: 1
Year: 2013



