TitlePage NoDownload
Privacy Preserving Ranked Keyword Search Over Encrypted Cloud Data
Authors: MADHAVI.DANDA, Y.LEELA KRISHNA
1 - 4 Download
A Unique Advance for Exploit P2P File Access Convenience in Manageablead HOC Systems.
Authors: SUHASINI JILLELLA, B.KRISHNA
5 – 11 Download
Fuzzy Logic Controller Based Load Frequency Control in Three Area Network Including DG
Authors: ADARI HEMA, K.SUNEETHA, DR.B.SRINIVASA RAO
12 – 20 Download
Multilevel Inverter with Reduced Switch Count for Induction Motor Drive Applications
Authors: JOGA SANTOSH KUMAR YADAV, TERUKOTI DIVYA
21 – 30 Download
Reduction of Static Power by Using Biasing and Body Biasing Techniques
Authors: TEJAVATH NANDA KUMAR, MR. Y. KONDAIAH GARU
31 – 40 Download
Fuzzy Controlled Single Phase to 3 Phase Converter with Reduced Switch Count
Authors: Mrs.G.JAJI SUDHA, Mr.K. RAMESH BABU , Mr.Ch.RAMBABU
41 – 53 Download
A Grid connected Dual Voltage source Inverter with power quality Improvement features.
Authors: Y.DHANA LAKSHMI, MIKKILI.SURESH
54 – 65 Download
Solar PV Array-Fed Water Pumping System Using Zeta Converter based ClosedLoop Control of BLDC Motor Drive.
Authors: P.KIRAN KUMAR, P.VENKATESWARA RAO
66 – 75 Download
A Novel Method of Controller Area Network Assisted Grid Synchronization Scheme For Integration Of Res And Energy Storage Using Fuzzy Controller
Authors: B. KRANTHI KIRAN, SK. MD. SHAREEF
76 – 88 Download
Wireless Based INTELLI Industrial Security Robot
Authors: M.MOUNIKA, S.ARUNA, I.RAJASEKHAR
89 - 94 Download
Detecting Attacks in Wireless Sensor Network through Bloom Filtering
Authors: D.VENKATA SOWJANYA, A. HANUMAT PRASAD
100 – 105 Download
Distribution and Reusability Unified Routing in Multi-Hop Wireless Networks using MAC layer
Authors: CHILUKURI.SRILAKSHMI DURGA, CHANDALURI. NAVEEN
106 – 110 Download
Secured Ranked Keyword Search Over Encrypted Data On Cloud
Authors: V.SRIKANTH
111 – 119 Download
Authentication of Meddle watermarks with Revocable Data Hiding and Retrieving for RGB Color Images
Authors: G.HUSSAIN BABU, M.RANJITH KUMAR, SURESH.BOJJA
120 – 126 Download
Digital Video Watermarking by PAC and Discrete Cosine Transform
Authors: CH.SURESH, M.VENKATARAO, SURESH.BOJJA
127 – 131 Download
Discovery of Ranking Fraud for Mobile Apps.
Authors: DEVIREDDY SITHA MAHALAKSHMI, THOTA VENKATA GOPALA KRISHNA
132 – 136 Download
Dynamic proof of storage in multiple users Environment.
Authors: P.NAGA VALLI, A.HANUMAT PRASAD
137 – 142 Download
A novel method of Power Quality Improvement of Unified Power Quality Conditioner by using Fuzzy Logic Controller
Authors: Mr.K.VENKATACHARI, Mr.M.VAMAN NAYAK
143 – 155 Download
A Hybrid Cloud Approach For Secure Authorized Deduplication
Authors: YADLAPALLI NAGA KALYANI, V. NAGA GOPI RAJU
156 – 160 Download
Discovery of Ranking Fraud For Mobile Apps
Authors: JAVVADI SRAVANTHI, V. NAGA GOPI RAJU
161 – 164 Download
Upper Bound Score Pruning Over Incomplete Data To Reduce Query Processing Time
Authors: J.RADHAKRISHNA, MD.ISMAIL KHAN
165 – 174 Download
Dual-server Public-key Encryption through Keyword Search for Sheltered Cloud Storage
Authors: CH.LOKESH KIRAN, M.SARADA
175 – 179 Download
Efficiently Answering Xml Keyword Queries Using Lllist
Authors: SK.NOORBASHA KAREEM HUSSAIN, S.S.N ANJANEYULU
180 – 189 Download
Analysis of Heart Diseases Using Data Mining Classification Technique
Authors: *SARANGAM KODATI, DR. R VIVEKANANDAM, B. MADHUSUDHAN REDDY
190 – 196 Download
Evaluation of The Effect of Shear Wall Arrangement In Dual Systems Subjected To Lateral Loads
Authors: G. HARIPRIYA, MR. K K D V. PRASAD
197 – 206 Download
Comparative Analysis of FCL and Dynamic Voltage Restorer For Fault Current Limitation
Authors: B SIVA KRISHNA, D.RAVI KUMAR
207 – 218 Download
An Improved D-STATCOM For Induction Motor Drive Applications
Authors: EBBILI MADHAVA KRISHNA AVINASH, DR.CH.V. SURESH
219 – 227 Download
An Improved D-STATCOM For Induction Motor Drive Applications
Authors: BANGARU APPARAO, VENKATESWARA RAO P
228 – 235 Download
Design of Modified 16-Bit Parallel Prefix Kogge Stone Adder
Authors: P DIVYA SREE, P SIVA KRISHNA
236 – 239 Download
Prepaid Energy Meter Billing System Using Arm Processor Using Recharge Cards
Authors: GUDURU GOWRI SANKAR REDDY, K. PRAKASH, M. KOTESWARA RAO
240 – 243 Download
Reusable Fm0 Sols Encoder For Dsrc Applications
Authors: P. MADHUSUDHANA RAO, G MADHUSUDHANA RAO, P JAYA BABU, C AMALA
244 – 248 Download
Design A Multiplier Using Dual Modified Adaptive Technique
Authors: G MADHUSUDHANA RAO, P JAYA BABU, M. CHAITANYA
249 – 253 Download
Design A Novel Built In Self Test Using Multiple Memory Instructions.
Authors: D. KAVITHA, G MADHUSUDHANA RAO, P JAYA BABU, T PRAVALLIKA
254 – 258 Download
Low Power and Reusable Fm0/Manchester Encoder For Dsrcs Applications
Authors: *PERABATHULA LATHA, P.NAGARAJU
259 – 263 Download
A novel method of Power Quality Improvement and Reactive Power Compensation in a Grid Connected System for Non-Linear Loads Using DSTATCOM For Induction Motor Drive Applications.
Authors: A.UDAI KIRAN, G.SRINIVAS
264 – 272 Download
A multi level inverter for induction motor drive application
Authors: S.RAVI, A. SUNDRA RAO
273 – 283 Download
Conformal Antennas Beam Fusion With Systematic Tapering
Authors: K SUMALATHA, DR. CH. R. PHANI KUMAR
284 – 289 Download
Erudition of Multi-model Representation Through Random Walks on Click Graph.
Authors: P.TEJASRI, M.ANKAMMA RAO
289 – 296 Download
Developing Green Internet By Deploying A Three Hop Mechanism
Authors: G.SIREESHA, S.S.N ANJANEYULU
297 – 304 Download
Implementing An Intrusion Detection Method Using A Filter Based Feature Selection Algorithm
Authors: K.MANOJKUMAR, SK.FAYAZ
305 – 312 Download
A Protected Anti-Collusion Data Distribution System for Vibrant Groups in the Cloud.
Authors: SK.ABDUL GAFOOR, MD.JOHNSAIDA
313 – 319 Download
Connected Friend Overlapping Groups Based On Social Network Context
Authors: A JAYALAKSHMI, J.LAKSHMI
320 – 326 Download
Vibrant And Public Auditing By Way of Fair Negotiation For Cloud Data
Authors: V.V ABHILASHA, G.NAGARJUNA
327 – 333 Download
Design Algorithm For Low Complexity Reconfigurable Fir Filter Based On Edbns
Authors: MORTHA VARAPRASAD, P NAGA RAJU
334 – 339 Download
A Hybrid Cloud Approach For Secure Authorized Deduplication
Authors: *YEDLAPALLI NAGA KALYANI, V. NAGA GOPI RAJU
340 – 344 Download
Experimental investigation of mechanical properties of magnesium matrix composite reinforced with silicon carbide
Authors: M.RAJESH, R.RANJITH KUMAR
345 – 348 Download
Design And Implementation Of Dual Key Triple Encryption Text Based Message Using Cryptography
Authors: VALLEPU SUREKHA, K. SAM PRASAD
340 – 344 Download
Solar PV Array-Fed Water Pumping System Using Zeta Converter based Closed-Loop Control of BLDC Motor Drive
Authors: Y. LAKSHMI GANESH, A. RAMA KRISHNA
357 – 366 Download
Determining Multi-party Privacy Conflicts in Social Media
Authors: MUKIRI.ANUSHA , KARPURAPU SUDHAKARABABU
367 – 371 Download
Speed Control of SRM drive for PV integrated EV system with Fuzzy Logic Controller
Authors: S.V.V.S.R.RAYUDU, P.BALAKRISHNA
372 – 385 Download
Fake Biometric Detection System For Spoofing Iris And Fingerprint Face Images
Authors: K.SRUJANA, B.SIVANAGESWARA RAO
386 – 392 Download
Design and Implementation of Accident Preventing, Driver Intoxication Finding System Using Feedback and IOT
Authors: NUVVULA NAGA NAVYA SPANDANA, KORANGI L VIJAYA PRASAD
393 – 403 Download
Mining Tweets To Generates The Tweets and Retweet and Retweeters
Authors: D. KRISHNAVENI, P.CHANDRA MOHANA RAI
404 – 411 Download
Increasing the efficiency of cache mechanism by path planning
Authors: CHERUKUPALLI MADHURI, P.SUDHEER
412 – 419 Download
Predicting Neighbour set Keyword search in Multidimensional Dataset.
Authors: MUNDLAMURI RENUKA, B.JYOTHI
420 – 425 Download
Finding Fake Ranking Applications in Play Store.
Authors: SHAIKSHABENA, J.LAKSHMI
426 – 432 Download
Finding Fake Rankings in Mobile Applications
Authors: PASUMARTHI ROJA, MR. VENKAT N RAVIPATI
433 – 444 Download
Solar PV Array-Fed Water Pumping System Using Zeta Converter Based ClosedLoop Control Of BLDC Motor Drive
Authors: B. VEERABABU, A.S.S. VEERENDRABABU
445 - 455 Download
An Approach to Protecting Privacy of User’s Images
Authors: V. ASHA JYOTHI, D.SRIKAR
456 - 461 Download
Determination of Failure Strength of Flate Plate Weld Joint Using Finite Element Analysis
Authors: K. SANDYA SERIN, Y.SUVARNA KUMAR, K.L.N.MURTHY
462 – 474 Download
Implementing Secure User Revocation Scheme from Collusion Attacks for Dynamic Groups in Cloud.
Authors: MAKKENA. ASHOK, M. NARESH.
579 - 583 Download
Enhancing Secure, Key Escrow issue using Attribute Weighted Data Sharing Scheme.
Authors: KANIGANTI SRI LAKSHMI, M. VENKATAIAH
573 - 578 Download
Greedy Depth-First-Search Scheme on Encrypted Data In Cloud Storage
Authors: MR. SHAHANSHA SHAIK , MR. NAGARJUNA REDDY
475 - 481 Download
Automatic Human Defence System Using Nanoids
Authors: ARAVIND BOMMALATA
493 - 503 Download
Delightful Attribute-Based Access Control Mechanism And Advance Security In Clouds
Authors: Mr. V RAMANJANEYULU, Mr. NAGARJUNA REDDY
504 – 509 Download
Formulate A Query Over Search Result Using Exploit Mining Aspects
Authors: Mr. BOYA RAJASEKHAR, Mr. NAGARJUNA REDDY
510 – 518 Download
Invention of Trickery Ranking Using Global And Local Anomaly For Apps
Authors: MR. VANGA UDAYKUMAR , MR. NAGARJUNA REDDY
519 – 524 Download
PRP Algorithm For Immune Data Cluster In Wireless Sensor Network
Authors: MR. LINGABATHULA UDAY, MR. N RAMESH, MRS. V PRATHIMA
525 - 529. Download
key-exposure resist, storage and auditing in clouds with empirical key updates
Authors: MR. VENKAT RAMU E, DR.J.PRAKASH REDDY
530 – 536 Download
Frappe: Malignant Applications Discovery In Facebook Using Frappe
Authors: Ms. M.RANI, Dr.J.PRAKASH REDDY
537 – 545 Download
Resilient and Provable Hybrid Authority Access Control Environment for Public Clouds.
Authors: Mr. A.KAMALAKAR, Mr. MD NAZMODDIN, Mrs. MUBINA BEGUM
546 - 552 Download
Pivot Encryption And Query Search With Duplex Servers In Secure Clouds
Authors: Mr. A.PRASHANTH, Dr.J.PRAKASH REDDY
553 – 558 Download
Unthreaten and Reliable Info Sharing Scheme For Unions In The Public Cloud
Authors: MS. G.APARNA, MRS. SWATI OLLALWAR, MR. V.SIVAPRASAD
559 - 564 Download
Syntactic Search Using Neighbourhood Mechanism For Ultra Storage System
Authors: Mr. SHIVASHANKAR.G, Ms. SWATI OLLALWAR, Mr. V.SIVAPRASAD
565 – 572 Download
Boundary Detection Using Double-Opponency And Spatial Sparseness Constraint
Authors: SHAIK HAZEERA, SHAIK UMAR FARUQ
584 - 589 Download
Enhancing Various Parameters of Rural Telephony For Hybrid Wind Solar Power System
Authors: THARA SINGH AMGOTH
590 - 596 Download
High performance and Throughput Amplifier design for Wireless Network
Authors: SANGANI INDRAJA, M SRI MANIKYAMBA
597 - 604 Download
Fixed And Normalized Architecture Based On Multi Level Radices For Delay Commutator And Feedback Techniques
Authors: ANIVIREDDY POSIYA, M SURESH KUMAR
605 - 610 Download
Cost Effective Approach For Multi Level Filter Design For Reconstruction Of Stable And Dynamic Applications
Authors: BOLISETTI VEERABABU, R.VINAY KUMAR
611 - 617 Download
LDPC Decoders for the design and implementation of high performance and low cost techniques
Authors: RAMESWARAPU KIRANMAYI, P.NAGARAJU
618 - 624 Download
Multiple Clock gating Schemes for Fused-MAC for Floating-Point Units
Authors: RAYADU LAVANYA, S.DEVA KARUN
635 – 646 Download
Novel Approach For Hybrid- Multi Level Filter Design For Wireless Applications
Authors: GOLLAPALLI RAMAKRISNA, N G N PRASAD
647 – 655 Download
Digital Modular Implementation of DSP Systems for Data and Design Hiding Applications
Authors: ATHIM S V V S MANIKANTA, P.SATYAVANI
656 – 665 Download
Improving the accuracy of Popularity-based Voting Recommendation Using a Novel Recommender System Models
Authors: DHULIPALLA VENKATA JYOTHI, D. RAMMOHAN REDDY
666 – 670 Download
An Efficient Encrypted Cloud Email System based CIBPRE Scheme for Store and Share data in Cloud
Authors: JALLEDA HYMAVATHI, G. CH. SRINIAVASA RAO
671 – 676. Download
A Wireless Tracking System for At-Home Medical Instru-Mentation throughout Natural Disasters
Authors: N SRI DATTA, M.KOTIREDDY.
677 - 681 Download
Underground Cable Fault Detection
Authors: KAKI RAMYA SREE, P.NAGARAJU
682 - 687 Download
An Effective Approach in Wireless Sensor Networks for Reconstruction of ipath Inference
Authors: D.YADAIAH
688 - 695 Download
Advanced Home Automatiom and Security System (Has) With Energy Management System (HEMS) Using IOT Technology
Authors: ARAVIND BOMMALATA
482 – 492 Download
MONITORING AND CONTROLLING OF HOME APPLICATIONS BY USING RASPBERRY PI WITH WIRELESS COMMUNICATION
Authors: DEEVI.VALLIBALA, GANESH BABU. PANTANGI
475-482 Download
AUTOMATIC HUMAN DEFENCE SYSTEM USING NANOIDS
Authors: ARAVIND BOMMALATA
493-503 Download
MODELLING OF VARIOUS MATERIALS FOR HEAT EXCHANGER TUBES
Authors: B MUKESH
696-702 Download
DESIGN ANALYSIS ON EFFECT OF GROOVE GEOMETRY ON TRAIN BREAKS
Authors: Dr M Naveen Kumar
703-708 Download
LOW- PRESSURE STEAM TURBINE THERMAL ANALYSIS
Authors: R RAMYA
709-719 Download
A STUDY OF ENGINE FAILURE CONDITIONS IN ENGINE OVERHEATING CASES
Authors: M HARISH
719-725 Download
PRESSURE VESSEL FINITE ELEMENT ANALYSIS
Authors: Dr S M BASHA
726-734 Download
CAD/CAE BASED MANUFACTURING TECHNIQUES FOR CERAMIC COATED PISTON
Authors: K APARNA
735-743 Download
Nearest Ranked Keyword Search Efficiently In Cloud Computing Applications
Authors: GASI LAKSHMI PRAVEENA, DANDA SREEKANTH.
95-99 Download
A Cross Cloud Approach For Protected Authoritative Deduplications
Authors: NIHARIKA MANDA
744 – 749 Download
INTERFACING WEB-BASED SOCIAL NETWORKING TO ONLINE BUSINESS USING SCALE BLOGGING DATA
Authors: CH. KISHORE KUMAR, DR. M.PRIYA, DR. A.MUTHUKUMARAVEL
750-759 Download
CLOUD COMPUTING FOR RURAL DEVELOPMENT
Authors: K.SRINIVAS, DR. JOSEPH PRAKASH MOSIGANTI
770-775 Download
SENTIMENT ANALYSIS OF BIG DATA METHODS APPLICATIONS AND OPEN CHALLENGES
Authors: VANAM SRAVAN DR. RASHMI AGAEWAL
760-769 Download
ANALYSING USER REVIEW SENTIMENT ON PRODUCT BY DEEP LEARNING
Authors: MS.G.PRASANTHI, D.GANESH REDDY
91-97 Download
UNDERVOLTAGE AND OVERVOLTAGE PROTECTION OF ELECTRICAL EQUIPMENT
Authors: AYESHA KOUSAR , Dr. BOINI RAJENDER REDDY,
770-774 Download