An Improved Privacy Policy Inference over the Socially
Shared Images
Authors: A.MAMATHA, M.SHIRISHA
DOI: 10.48047/IJIEMR/V1/ISSUE 02/01
|
01 - 15 |
Download |
PACKET CLASSIFICATION WITH LOW MEMORY
CONSUMPTION
Authors: K.BRAHMA CHARY,B.SARITHA
DOI: 10.48047/IJIEMR/V1/ISSUE 02/02
|
16 - 34 |
Download |
Secure and Efficient Data Transmission for
Cluster-Based Wireless Sensor Networks
Authors: Ch.SRINATH, K.SRINIVAS
DOI: 10.48047/IJIEMR/V1/ISSUE 02/03
|
35 - 46 |
Download |
Content Caching and Scheduling in Wireless Networks
Authors: R.JYOTHSNA, CH.RAVINDER
DOI: 10.48047/IJIEMR/V1/ISSUE 02/04
|
47 - 52 |
Download |
Design A Highly Efficient Image Encryption The
Compression System Using Lossless and Lossy Compression
Authors: K.RAJU, MR.N.PRASAD
DOI: 10.48047/IJIEMR/V1/ISSUE 02/05
|
53 - 64 |
Download |
AN ADVANCED SCALABLE AND RECIABLE CONTENT
MATCHING SERVICE FOR PUBLISH SUBSCRIBE SYSTEM
Authors: S.KAVYA, R.VARUN
DOI: 10.48047/IJIEMR/V1/ISSUE 02/06
|
65 - 75 |
Download |
Data Sharing in Cloud Storage Using Key Aggregate
Cryptosystem
Authors: M.SHALINI, P.MAIPAL REDDY
DOI: 10.48047/IJIEMR/V1/ISSUE 02/07
|
76 - 84 |
Download |
Secure and Efficient Data Retriveral Over Encrypted
Data Using Attribute Based Encryption Cloud Storage
Authors: N.RAJESH, K.REKA DEVI
DOI: 10.48047/IJIEMR/V1/ISSUE 02/08
|
85 - 96 |
Download |
Control and Manage of Cloud and Sensor Networks
Integration
Authors: SALEHA NASREEN, K.SHEKAR
DOI: 10.48047/IJIEMR/V1/ISSUE 02/09
|
97 - 105 |
Download |
A Routing Protocol for Improving QOS in Hybrid Wireless
Networks
Authors: P.ANUSHA, SHAILAJA
DOI: 10.48047/IJIEMR/V1/ISSUE 02/10
|
106 - 114 |
Download |
Improving Multicast Capacity in Infrastructured Ad hoc
Networks
Authors: K.RAJA SHEKAR, R.VARUN
DOI: 10.48047/IJIEMR/V1/ISSUE 02/11
|
115 - 125 |
Download |
Location-Aware and Personalized Collaborative Filtering for
Web Service Recommendation
Authors: B. Sai Chander, A. Ramesh Babu
DOI: 10.48047/IJIEMR/V1/ISSUE 02/12
|
126 - 134 |
Download |
A Novel Distributed Load Balancing in Content Delivery
Network
Authors: N.SRIKANTH, S.THARUN REDDY
DOI: 10.48047/IJIEMR/V1/ISSUE 02/13
|
135 - 149 |
Download |
The Two Level Auditing Architecture for Cloud Consistency
Authors: N.UGENDER, K.SRINIVAS
DOI: 10.48047/IJIEMR/V1/ISSUE 02/14
|
150 - 160 |
Download |
COLLABORATIVE FILTERING BASED ON OBJECTIVE
TIPICALITY FOR NEIGHBOUR RECOMMENDATION
Authors: A. MUKESH, Mr. B. SRAVAN KUMAR
DOI: 10.48047/IJIEMR/V1/ISSUE 03/01
|
01 - 09 |
Download |
A Tamper-Proof Delegation of Computational Work to
Remote Servers in Cloud With Policy Attribute-Based
Encryption
Authors: T.Annapurna, Mr.K.Goutham Raju
DOI: 10.48047/IJIEMR/V1/ISSUE 03/02
|
10 - 17 |
Download |
Enhanced and Secure Query Services in Cloud with Perfect
Data Privacy for the Data Owner
Authors: T. ANUSHA, Dr. T. SRINIVAS CHARY
DOI: : 10.48047/IJIEMR/V1/ISSUE 03/03
|
18 - 29 |
Download |
Multivariate Correlation Analysis Based Denial of
Service Attack Detection System
Authors: D.ASHWINI
DOI: 10.48047/IJIEMR/V1/ISSUE 03/04
|
30 - 42 |
Download |
Optimizing the Capacity of Hybrid Wireless Network Using
Distributed Three hop Routing Protocol
Authors: M.ASHWINI,Mr. K. BHANU PRASAD
DOI: 10.48047/IJIEMR/V1/ISSUE 03/05
|
43 - 49 |
Download |
Cost effective dynamic migration of content into hybrid
clouds
Authors: B.BHAVANI,B.SRAVAN KUMAR
DOI: 10.48047/IJIEMR/V1/ISSUE 03/06
|
50 - 62 |
Download |
ACHIEVING DATA CONSISTENCY THROUGH QUERIES
Authors: N.Navya Deepthi, B.Saritha
DOI: 10.48047/IJIEMR/V1/ISSUE 03/07
|
63 - 76 |
Download |
An Online Vacation Package Recommendation System
Authors: Md.Asma Kousar,A.Madhavi
DOI: 10.48047/IJIEMR/V1/ISSUE 03/08
|
77 - 87 |
Download |
Anonymous Authentication Using Cloud Based
Decentralized Access Control Scheme
Authors: K.SHIRISHA, A.SWETHA
DOI: 10.48047/IJIEMR/V1/ISSUE 03/09
|
88 - 94 |
Download |
An Advance Scalable & Reliable Matching Service For
Content Based Systems
Authors: N.SRAVAN KUMAR,Dr.V.JANAKI
DOI: 10.48047/IJIEMR/V1/ISSUE 03/10
|
95 - 103 |
Download |
A Novel Family of Graphical Password Systems Integrating
Captcha Technology
Authors: P. DIVYA,Mr.K.GOUTHAM RAJU
DOI: 10.48047/IJIEMR/V1/ISSUE 03/11
|
104 - 118 |
Download |
Public Key Cipher Scheme For Rapid Keyword Search
Authors: G.HARIKA,M.SWAPNA
DOI: 10.48047/IJIEMR/V1/ISSUE 03/12
|
119 - 133 |
Download |
A Security Model for Protecting Location Based Queries
Authors: N.PRASANNA,K.MAHESH
DOI: 10.48047/IJIEMR/V1/ISSUE 03/13
|
134 - 145 |
Download |
To create convincing fake user secrets to protect user
privacy
Authors: N.NISHMA,Mr.B.Krishna
DOI: 10.48047/IJIEMR/V1/ISSUE 03/14
|
146 - 152 |
Download |
An Approach for Preserving Privacy of Shared Data in the
Cloud
Authors: R.BHARATH, E.PRAVEEN
DOI: 10.48047/IJIEMR/V1/ISSUE 03/15
|
153 - 163 |
Download |
Designing High Performence Web Based Computing Services
To Promote Tele Medicine Database Management System
Authors: V.SAHITHI,M.SWAPNA
DOI: 10.48047/IJIEMR/V1/ISSUE 04/01
|
01 - 12 |
Download |
Maximizing P2P File Access Availability in Mobile Ad hoc
Networks through Replication for Efficient File Sharing
Authors: A. Sirisha,P. Shailaja
DOI: 10.48047/IJIEMR/V1/ISSUE 04/02
|
13 - 23 |
Download |
Automatically Diversifies XML Keyword Search
Authors: S.Sreedhari Sharma,B.Krishna
DOI: 10.48047/IJIEMR/V1/ISSUE 04/03
|
24 - 30 |
Download |
Protecting Outsourced Data in Cloud Storage against
Corruptions
Authors: M.Swathi ,G.Aruna Kranti
DOI: 10.48047/IJIEMR/V1/ISSUE 04/04
|
31 - 39 |
Download |
A Novel Approach for Protecting Location Information in
Geosocial Applications
Authors: SYEDA SOBIA FAREES ,M.SURESH KUMAR
DOI: 10.48047/IJIEMR/V1/ISSUE 04/05
|
40 - 44 |
Download |
Distortion Detection and Rectification in Fingerprint Based
Security Systems
Authors: V.SRAVANI,N.PRASAD
DOI: 10.48047/IJIEMR/V1/ISSUE 04/06
|
45 - 53 |
Download |
DESKTOP BASED EYE TRACER
Authors: E.VARUN,M.SUKESH
DOI: 10.48047/IJIEMR/V1/ISSUE 04/07
|
54 - 63 |
Download |
HLA Based Public Auditing Architecture for Wireless Ad hoc
Networks
Authors: YOUSUF ANEESA,B.RAJITHA
DOI: 10.48047/IJIEMR/V1/ISSUE 04/08
|
64 - 72 |
Download |
A Novel Based Friend Recommendation System for Social
Networks
Authors: B.RAMYA SREE ,N.RAJENDER REDDY
DOI: 10.48047/IJIEMR/V1/ISSUE 04/09
|
73 - 81 |
Download |
Competition of Efficient Data Access in Disruption Tolerant
Networks
Authors: A.Spandana,K.Rajesh Khanna
DOI: 10.48047/IJIEMR/V1/ISSUE 04/10
|
81 - 91 |
Download |
IDENTIFYING IDEAL CLOUD SERVICE PROVIDER
Authors: T.SRIVIDYA , THANVEER JHAN
DOI: 10.48047/IJIEMR/V1/ISSUE 04/11
|
92 - 101 |
Download |
Online Shortest Path Computation
Authors: K.Saresh ,A.Madhavi
DOI: 10.48047/IJIEMR/V1/ISSUE 04/12
|
102 - 114 |
Download |
Discriminative Affinity Based Effective Face Detection
Authors: Ch. HIMABINDU,G.RAMKRISHNA REDDY
DOI: 10.48047/IJIEMR/V1/ISSUE 02/15
|
161 - 171 |
Download |
An Optimized Design of High-Speed and Energy-
Efficient Carry Skip Adder with Variable Latency
Extension operating under a wide range of supply
voltage levels
Authors: Md. KURSHEEDA AFREEN, Mr. T. SAMMAIAH,Mr. G.BABU
DOI: 10.48047/IJIEMR/V1/ISSUE 02/16
|
172 - 182 |
Download |
Optimized Test compression bandwidth management
for Ultra-large-Scale System-on-Chip Architectures
performing Scan Test Bandwidth Management
Authors: P.ANNAPURNA ,Mr.T.RAJASHEKAR ,Mr.G.BABU
DOI: 10.48047/IJIEMR/V1/ISSUE 02/17
|
183 - 193 |
Download |
An Algorithm to Implement Combinational Logic Cells with
Reduced Number of Switches
Authors: B.Swathi ,Mr.B.Balaji,Mr.M.Devadas
DOI: 10.48047/IJIEMR/V1/ISSUE 02/18
|
194 - 203 |
Download |
Implementation of Dual Modulus Prescaler in True Single
Phase Clock (TSPC)
Authors: Ch.Priyanka,Mr.K.Thirupathi,Mr.M.Devadas
DOI: 10.48047/IJIEMR/V1/ISSUE 02/19
|
204 - 210 |
Download |
An Overview of Fault Models and Testing Approaches
for Reversible Logic
Authors: D.MOUNIKA ,Mr.Ch.ANIL KUMAR
DOI: 10.48047/IJIEMR/V1/ISSUE 02/20
|
211 - 234 |
Download |
Enhanced Penta MTJ Based Combinational
and Sequential Circuits
Authors: K.LATHA SRI,B.HARI KRISHNA
DOI: 10.48047/IJIEMR/V1/ISSUE 02/21
|
235 - 246 |
Download |
CMOS REALIZATION OF LOW POWER MIXING DRIVERS
IN CLOCK TREE
Authors: M.RADHIKA ,B.SANTHOSH KUMAR ,T.SAMMAIAH
DOI: 10.48047/IJIEMR/V1/ISSUE 02/22
|
247 - 259 |
Download |
Design of Reversible LFSR for Cryptographic Application
Authors: O.Swapna ,G.Babu
DOI: 10.48047/IJIEMR/V1/ISSUE 02/23
|
260 - 270 |
Download |
Efficient Implementation of Non-binary Low Density Parity
Check (LDPC) Decoder in VLSI
Authors: S.Sahaja,Mr.B.Ranjith Kumar,Mr.M.Devadas
DOI: 10.48047/IJIEMR/V1/ISSUE 02/24
|
271 - 285 |
Download |
Enhanced Vlsi Architecture For Montgomery Modular
Multiplication In Digital Filters
Authors: E.Shirisha , D.SrinivasRao,Mr.G.Babu
DOI: 10.48047/IJIEMR/V1/ISSUE 02/25
|
286 - 297 |
Download |
VLSI Implementation of Reconfigurable Low Power Fir Filter
Architecture
Authors: A.SUDHA RANI,U.RAJITHA
DOI: 10.48047/IJIEMR/V1/ISSUE 02/26
|
298 - 306 |
Download |
Design of An Efficient Aging-Aware Reliable Multiplier
Based On Adaptive Hold Logic
Authors: V.SUSMITHA,P.RAJANI
DOI: 10.48047/IJIEMR/V1/ISSUE 02/27
|
307 - 318 |
Download |
An Optimized Design of High-Speed and Energy-
Efficient Carry Skip Adder with Variable
Latency Extension
Authors: S.SWATHI,B.SHIVA KUMAR
DOI: 10.48047/IJIEMR/V1/ISSUE 02/28
|
320 - 330 |
Download |
Power Optimized Implementation of PRPG with Low
Transition Test Compression Technique
Authors: B.Udayini,Mr.M.Mahesh,Mr.M.Devadas
DOI: 10.48047/IJIEMR/V1/ISSUE 02/29
|
331 - 341 |
Download |
Input-Based Dynamic Reconfiguration of Video Encoding by
Approximate Arithmetic Units
Authors: M. UJWALA,Mr.M.Devadas
DOI: 10.48047/IJIEMR/V1/ISSUE 02/30
|
342 - 352 |
Download |
PERFORMANCE IMPROVEMENT OF OFDM SYSTEM
BY USING ICI SELF CANCELLATION TECHNIQUE
Authors: G.PRIYANKA,M.SHIVA PRASAD
DOI: 10.48047/IJIEMR/V1/ISSUE 02/31
|
353 - 361 |
Download |
Pilot-Symbol-Aided Iterative Channel Estimation for OFDMBased
Systems
Authors: K.Laxman Reddy,V.Sabitha
DOI: 10.48047/IJIEMR/V1/ISSUE 02/32
|
362 - 372 |
Download |
Implementation of Biomedical Device to Measure Heart Rate and Temperature
Authors: Uzma, K.Raj Kumar
DOI: 10.48047/IJIEMR/V1/ISSUE 04/13
|
115 - 120 |
Download |
Exact Lower Bound for the Number of Switches in Series to
Implement a Combinational Logic
Authors: Mr.P.Kiran ,Mr.G.Sakru
DOI: 10.48047/IJIEMR/V1/ISSUE 05/01
|
01 - 11 |
Download |
A Design Approach for Compressor Based Approximate
Multipliers
Authors: D.SUNIL SURESH ,P.AISHWARYA
DOI: 10.48047/IJIEMR/V1/ISSUE 05/02
|
12 - 20 |
Download |
Electronic Auto Information quiery System in Educational Institutions
Authors: R.Ramya,G.Koteshwar Rao
DOI: 10.48047/IJIEMR/V1/ISSUE 05/03
|
21 - 27 |
Download |
Control and Measure System from Air Pollution by Co2 Exhaust in Vehicles and ECU
Authors: E. Roja,A. Bharath Kumar
DOI: 10.48047/IJIEMR/V1/ISSUE 05/04
|
28 - 33 |
Download |
Automatic Irrigation System Based On IOT and Embedded Linux High End Processor
Authors: FEROZABHANU,G.RADHIKA
DOI: 10.48047/IJIEMR/V1/ISSUE 05/05
|
34 - 39 |
Download |
PRIVACY-PRESERVING PROTOCOL TO OBTAIN THE SUM AGGREGATE OF TIME-SERIES DATA
Authors: BODA MAHESH , LEELASRAVANTHI
DOI: 10.48047/IJIEMR/V1/ISSUE 05/06
|
40-46 |
Download |
ONLINE BLOOD BANK
Authors: T. Sangeetha, **Ilham Abdullah, ***Farheen Jawed
DOI: 10.48047/IJIEMR/V1/ISSUE 06/01
|
1-8 |
Download |
BUG TRACKING SYSTEM
Authors: *Kashif Hassan,** Md javed khan,***Suraj Kumar
DOI: 10.48047/IJIEMR/V1/ISSUE 06/02
|
9-10 |
Download |
DATA LEAKAGE DETECTION
Authors: *SAIMA FAIYAZ, **M.JYOTHI, ***G.VAISHNAVI
DOI: 10.48047/IJIEMR/V1/ISSUE 06/03
|
10-11 |
Download |
Train Collision Avoidance Using by ARM and Collision
Sensor
Authors: T.VENKATA HARSHA **M.RAMU
DOI: 10.48047/IJIEMR/V1/ISSUE 05/07
|
47-51 |
Download |
Implementation of Average based PCA method for Face Recognition
Authors: Suresh ,
DOI: 10.48047/IJIEMR/V1/ISSUE 01/01
|
1-4 |
Download |
MANAGEMENT INFORMATION SYSTEM FOR TRAINING PROGRAMMES – NAARM
EXPERIENCES
Authors: VV SUMANTHKUMAR, 2ABHISHEK G
DOI: 10.48047/IJIEMR/V1/ISSUE 03/16
|
164-169 |
Download |
A NOVEL METHOD OF RETRIVAL OF NOISY IMAGES BASED ON
REDUCED TEXTURE SPECTRUM
Authors: *P. S. V. SRINIVASA RAO **J. AJAY SHARMA
DOI: 10.48047/IJIEMR/V1/ISSUE 02/33
|
373-387 |
Download |
RAYLEIGH FADING CHANNEL BASED BER PERFORMANCE
ANALYSIS OF ALAMOUTI CODING TECHNIQUE
Authors: *Ms. SWAPNA THOUTI
DOI: 10.48047/IJIEMR/V1/ISSUE 02/34
|
388-389 |
Download |
UNDERSTANDING THE PERFORMANCE AND POTENTIAL OF CLOUD
COMPUTING FOR SCIENTIFIC APPLICATIONS
Authors: MR M SURESH, DR ARVIND KUMAR RAI
DOI: 10.48047/IJIEMR/V1/ISSUE 06/04
|
11-17 |
Download |
Foreign Institutional Investment and Macro Economic Factors - Impact
Analysis
Authors: Anuradha Jha
DOI: 10.48047/IJIEMR/V01/ISSUE 06/04
|
16-24 |
Download |
Critiquing the Tradition: A protest voice through Social
and Literary Movements
Authors: Dr. Banala Srinivas Rao
DOI: 10.48047/IJIEMR/V01/ISSUE 06/05
|
25-31 |
Download |
PROSTITUTION IN INDIA AND IT’S LEGALITY
Authors: Rang Nath Singh
DOI: 10.48047/IJIEMR/V01/ISSUE 06/06
|
32-38 |
Download |