TitlePage NoDownload
A Tamper-Proof Delegation of Computational Work to Remote Servers in Cloud With Policy Attribute-Based Encryption
Authors: T.Annapurna **Mr.K.Goutham Raju
1-9 Download
ACHIEVING DATA CONSISTENCY THROUGH QUERIES
Authors: N.Navya Deepthi **B.Saritha
1-13 Download
An Online Vacation Package Recommendation System
Authors: *Md.Asma Kousar **A.Madhavi
1-13 Download
A Novel Family of Graphical Password Systems Integrating Captcha Technology
Authors: P. DIVYA **Mr.K.GOUTHAM RAJU
1-10 Download
A Security Model for Protecting Location Based Queries
Authors: N.PRASANNA **K.MAHESH
1-9 Download
ARM7 BASED WIRELESS INDUSTRY DATA ACQUISITION SYSTEM
Authors: ALLI MALATHI
1-13 Download
Low-Power Programmable PRPG With Test Compression Capabilities
Authors: SANDEEP MOPARTHI, **VIJAYA SAI THOTA
1-14 Download
ENILYTICS OF TWEET STREAM
Authors: MRS. B.SANGEETHA
15-20 Download
DATA ENCODING AND DECODING TECHNIQUES FOR REDUCING ENERGY CONSUMPTION
Authors: MR. DEVISINGH, MR.M.ANIL KUMAR, MR.C. LAXMI PRASAD
21-28 Download
SPATIAL DOMAIN WATERMARKING TECHNIQUE USING SHELL BASED PIXEL SELECTION
Authors: DR. K.MURALI BABU, ASIYA SULTHANA
29-35 Download
Enhancement f Power Quality Using Dvr For Assymetrical Faults
Authors: DR. C.RAJSELVAN, S.MALLIKARJUN REDDY.
36 - 43 Download