Title | Page No | Download |
MANAGEMENT INFORMATION SYSTEM FOR TRAINING PROGRAMMES – NAARM
EXPERIENCES Authors: VV SUMANTHKUMAR, 2ABHISHEK G DOI: |
161-166. | Download |
COLLABORATIVE FILTERING BASED ON OBJECTIVE
TIPICALITY FOR NEIGHBOUR RECOMMENDATION Authors: A. MUKESH, Mr. B. SRAVAN KUMAR DOI: |
01 to 09 | Download |
Exact Lower Bound for the Number of Switches in Series to
Implement a Combinational Logic Authors: Mr.P.Kiran ,Mr.G.Sakru DOI: |
01 to 11 | Download |
Designing High Performence Web Based Computing Services
To Promote Tele Medicine Database Management System Authors: V.SAHITHI,M.SWAPNA DOI: |
01 to 12 | Download |
An Improved Privacy Policy Inference over the Socially
Shared Images Authors: A.MAMATHA, M.SHIRISHA DOI: |
01 to 15 | Download |
mx2h Authors: mx2h DOI: |
1 | Download |
Implementation of Average based PCA method for Face Recognition Authors: Suresh , DOI: |
1-4 | Download |
Train Collision Avoidance Using by ARM and Collision
Sensor Authors: T.VENKATA HARSHA **M.RAMU DOI: |
1-5 | Download |
BUG TRACKING SYSTEM
Authors: *Kashif Hassan,** Md javed khan,***Suraj Kumar DOI: |
1-7 | Download |
PRIVACY-PRESERVING PROTOCOL TO OBTAIN THE SUM AGGREGATE OF TIME-SERIES DATA Authors: BODA MAHESH , LEELASRAVANTHI DOI: |
1-8 | Download |
ONLINE BLOOD BANK Authors: T. Sangeetha, **Ilham Abdullah, ***Farheen Jawed DOI: |
1-8 | Download |
DATA LEAKAGE DETECTION Authors: *SAIMA FAIYAZ, **M.JYOTHI, ***G.VAISHNAVI DOI: |
1-8 | Download |
A Tamper-Proof Delegation of Computational Work to
Remote Servers in Cloud With Policy Attribute-Based
Encryption Authors: T.Annapurna, Mr.K.Goutham Raju DOI: |
10 to 17 | Download |
Online Shortest Path Computation Authors: K.Saresh ,A.Madhavi DOI: |
101 to 113 | Download |
A Novel Family of Graphical Password Systems Integrating
Captcha Technology Authors: P. DIVYA,Mr.K.GOUTHAM RAJU DOI: |
102 to 115 | Download |
Control and Manage of Cloud and Sensor Networks
Integration Authors: SALEHA NASREEN, K.SHEKAR DOI: |
107 to 116 | Download |
Implementation of Biomedical Device to Measure Heart Rate and Temperature Authors: Uzma, K.Raj Kumar DOI: |
114 to 119 | Download |
Public Key Cipher Scheme For Rapid Keyword Search Authors: G.HARIKA,M.SWAPNA DOI: |
116 to 130 | Download |
A Routing Protocol for Improving QOS in Hybrid Wireless
Networks Authors: P.ANUSHA, SHAILAJA DOI: |
117 to 126 | Download |
A Design Approach for Compressor Based Approximate
Multipliers Authors: D.SUNIL SURESH ,P.AISHWARYA DOI: |
12 to 20 | Download |
Improving Multicast Capacity in Infrastructured Ad hoc
Networks Authors: K.RAJA SHEKAR, R.VARUN DOI: |
127 to 138 | Download |
Maximizing P2P File Access Availability in Mobile Ad hoc
Networks through Replication for Efficient File Sharing Authors: A. Sirisha,P. Shailaja DOI: |
13 to 23 | Download |
A Security Model for Protecting Location Based Queries Authors: N.PRASANNA,K.MAHESH DOI: |
131 to 142 | Download |
Location-Aware and Personalized Collaborative Filtering for
Web Service Recommendation Authors: B. Sai Chander, A. Ramesh Babu DOI: |
139 to 147 | Download |
To create convincing fake user secrets to protect user
privacy Authors: N.NISHMA,Mr.B.Krishna DOI: |
143 to 149 | Download |
A Novel Distributed Load Balancing in Content Delivery
Network Authors: N.SRIKANTH, S.THARUN REDDY DOI: |
148 to 162 | Download |
An Approach for Preserving Privacy of Shared Data in the
Cloud Authors: R.BHARATH, E.PRAVEEN DOI: |
150 to 160 | Download |
PACKET CLASSIFICATION WITH LOW MEMORY
CONSUMPTION Authors: K.BRAHMA CHARY,B.SARITHA DOI: |
16 to 34 | Download |
The Two Level Auditing Architecture for Cloud Consistency Authors: N.UGENDER, K.SRINIVAS DOI: |
163 to 173 | Download |
An Optimized Design of High-Speed and Energy-
Efficient Carry Skip Adder with Variable Latency
Extension operating under a wide range of supply
voltage levels Authors: Md. KURSHEEDA AFREEN, Mr. T. SAMMAIAH,Mr. G.BABU DOI: |
174 to 184 | Download |
Enhanced and Secure Query Services in Cloud with Perfect
Data Privacy for the Data Owner Authors: T. ANUSHA, Dr. T. SRINIVAS CHARY DOI: |
18 to 29 | Download |
Optimized Test compression bandwidth management
for Ultra-large-Scale System-on-Chip Architectures
performing Scan Test Bandwidth Management Authors: P.ANNAPURNA ,Mr.T.RAJASHEKAR ,Mr.G.BABU DOI: |
185 to 195 | Download |
An Algorithm to Implement Combinational Logic Cells with
Reduced Number of Switches Authors: B.Swathi ,Mr.B.Balaji,Mr.M.Devadas DOI: |
196 to 205 | Download |
Implementation of Dual Modulus Prescaler in True Single
Phase Clock (TSPC) Authors: Ch.Priyanka,Mr.K.Thirupathi,Mr.M.Devadas DOI: |
206 to 212 | Download |
An Overview of Fault Models and Testing Approaches
for Reversible Logic Authors: D.MOUNIKA ,Mr.Ch.ANIL KUMAR DOI: |
213 to 232 | Download |
Enhanced Penta MTJ Based Combinational
and Sequential Circuits Authors: K.LATHA SRI,B.HARI KRISHNA DOI: |
233 to 243 | Download |
Automatically Diversifies XML Keyword Search Authors: S.Sreedhari Sharma,B.Krishna DOI: |
24 to 30 | Download |
CMOS REALIZATION OF LOW POWER MIXING DRIVERS
IN CLOCK TREE Authors: M.RADHIKA ,B.SANTHOSH KUMAR ,T.SAMMAIAH DOI: |
244 to 256 | Download |
Design of Reversible LFSR for Cryptographic Application Authors: O.Swapna ,G.Babu DOI: |
257 to 266 | Download |
Efficient Implementation of Non-binary Low Density Parity
Check (LDPC) Decoder in VLSI Authors: S.Sahaja,Mr.B.Ranjith Kumar,Mr.M.Devadas DOI: |
276 to 290 | Download |
Enhanced Vlsi Architecture For Montgomery Modular
Multiplication In Digital Filters Authors: E.Shirisha , D.SrinivasRao,Mr.G.Babu DOI: |
291 to 302 | Download |
Multivariate Correlation Analysis Based Denial of
Service Attack Detection System Authors: D.ASHWINI DOI: |
30 to 42 | Download |
Electronic Auto Information quiery System in Educational Institutions Authors: R.Ramya,G.Koteshwar Rao DOI: |
30 to 36 | Download |
VLSI Implementation of Reconfigurable Low Power Fir Filter
Architecture Authors: A.SUDHA RANI,U.RAJITHA DOI: |
303 to 311 | Download |
Protecting Outsourced Data in Cloud Storage against
Corruptions Authors: M.Swathi ,G.Aruna Kranti DOI: |
31 to 39 | Download |
Design of An Efficient Aging-Aware Reliable Multiplier
Based On Adaptive Hold Logic Authors: V.SUSMITHA,P.RAJANI DOI: |
312 to 323 | Download |
An Optimized Design of High-Speed and Energy-
Efficient Carry Skip Adder with Variable
Latency Extension Authors: S.SWATHI,B.SHIVA KUMAR DOI: |
324 to 334 | Download |
Power Optimized Implementation of PRPG with Low
Transition Test Compression Technique Authors: B.Udayini,Mr.M.Mahesh,Mr.M.Devadas DOI: |
335 to 353 | Download |
Secure and Efficient Data Transmission for
Cluster-Based Wireless Sensor Networks Authors: Ch.SRINATH, K.SRINIVAS DOI: |
35 to 47 | Download |
Input-Based Dynamic Reconfiguration of Video Encoding by
Approximate Arithmetic Units Authors: M. UJWALA,Mr.M.Devadas DOI: |
354 to 365 | Download |
PERFORMANCE IMPROVEMENT OF OFDM SYSTEM
BY USING ICI SELF CANCELLATION TECHNIQUE Authors: G.PRIYANKA,M.SHIVA PRASAD DOI: |
366 to 374 | Download |
Control and Measure System from Air Pollution by Co2 Exhaust in Vehicles and ECU Authors: E. Roja,A. Bharath Kumar DOI: |
37 to 42 | Download |
Pilot-Symbol-Aided Iterative Channel Estimation for OFDMBased
Systems Authors: K.Laxman Reddy,V.Sabitha DOI: |
375 to 385 | Download |
A NOVEL METHOD OF RETRIVAL OF NOISY IMAGES BASED ON
REDUCED TEXTURE SPECTRUM Authors: *P. S. V. SRINIVASA RAO **J. AJAY SHARMA DOI: |
386-398 | Download |
RAYLEIGH FADING CHANNEL BASED BER PERFORMANCE
ANALYSIS OF ALAMOUTI CODING TECHNIQUE
Authors: *Ms. SWAPNA THOUTI DOI: |
399-403 | Download |
A Novel Approach for Protecting Location Information in
Geosocial Applications Authors: SYEDA SOBIA FAREES ,M.SURESH KUMAR DOI: |
40 to 44 | Download |
Automatic Irrigation System Based On IOT and Embedded Linux High End Processor Authors: FEROZABHANU,G.RADHIKA DOI: |
43 to 48 | Download |
Optimizing the Capacity of Hybrid Wireless Network Using
Distributed Three hop Routing Protocol Authors: M.ASHWINI,Mr. K. BHANU PRASAD DOI: |
43 to 49 | Download |
Distortion Detection and Rectification in Fingerprint Based
Security Systems Authors: V.SRAVANI,N.PRASAD DOI: |
45 to 53 | Download |
Discriminative Affinity Based Effective Face Detection Authors: Ch. HIMABINDU,G.RAMKRISHNA REDDY DOI: |
48 to 58 | Download |
Cost effective dynamic migration of content into hybrid
clouds Authors: B.BHAVANI,B.SRAVAN KUMAR DOI: |
50 to 62 | Download |
DESKTOP BASED EYE TRACER Authors: E.VARUN,M.SUKESH DOI: |
54 to 62 | Download |
Content Caching and Scheduling in Wireless Networks Authors: R.JYOTHSNA, CH.RAVINDER DOI: |
59 to 64 | Download |
ACHIEVING DATA CONSISTENCY THROUGH QUERIES Authors: N.Navya Deepthi, B.Saritha DOI: |
63 to 76 | Download |
HLA Based Public Auditing Architecture for Wireless Ad hoc
Networks Authors: YOUSUF ANEESA,B.RAJITHA DOI: |
63 to71 | Download |
Design A Highly Efficient Image Encryption The
Compression System Using Lossless and Lossy Compression Authors: K.RAJU, MR.N.PRASAD DOI: |
65 to 76 | Download |
A Novel Based Friend Recommendation System for Social
Networks Authors: B.RAMYA SREE ,N.RAJENDER REDDY DOI: |
72 to 80 | Download |
AN ADVANCED SCALABLE AND RECIABLE CONTENT
MATCHING SERVICE FOR PUBLISH SUBSCRIBE SYSTEM Authors: S.KAVYA, R.VARUN DOI: |
77 to 87 | Download |
An Online Vacation Package Recommendation System Authors: Md.Asma Kousar,A.Madhavi DOI: |
77 to 87 | Download |
Competition of Efficient Data Access in Disruption Tolerant
Networks Authors: A.Spandana,K.Rajesh Khanna DOI: |
81 to 90 | Download |
Anonymous Authentication Using Cloud Based
Decentralized Access Control Scheme Authors: K.SHIRISHA, A.SWETHA DOI: |
88 to 93 | Download |
Data Sharing in Cloud Storage Using Key Aggregate
Cryptosystem Authors: M.SHALINI, P.MAIPAL REDDY DOI: |
88 to 95 | Download |
UNDERSTANDING THE PERFORMANCE AND POTENTIAL OF CLOUD
COMPUTING FOR SCIENTIFIC APPLICATIONS Authors: MR M SURESH, DR ARVIND KUMAR RAI DOI: |
9-15 | Download |
IDENTIFYING IDEAL CLOUD SERVICE PROVIDER Authors: T.SRIVIDYA , THANVEER JHAN DOI: |
91 to 100 | Download |
An Advance Scalable & Reliable Matching Service For
Content Based Systems Authors: N.SRAVAN KUMAR,Dr.V.JANAKI DOI: |
94 to 101 | Download |
Secure and Efficient Data Retriveral Over Encrypted
Data Using Attribute Based Encryption Cloud Storage Authors: N.RAJESH, K.REKA DEVI DOI: |
95 to 106 | Download |