Title Page No Download
Privacy Preserving Ranked Keyword Search Over Encrypted Cloud Data
Authors: MADHAVI.DANDA, Y.LEELA KRISHNA
DOI:
1 - 4 Download
A Unique Advance for Exploit P2P File Access Convenience in Manageablead HOC Systems.
Authors: SUHASINI JILLELLA, B.KRISHNA
DOI:
5 – 11 Download
Fuzzy Logic Controller Based Load Frequency Control in Three Area Network Including DG
Authors: ADARI HEMA, K.SUNEETHA, DR.B.SRINIVASA RAO
DOI:
12 – 20 Download
Multilevel Inverter with Reduced Switch Count for Induction Motor Drive Applications
Authors: JOGA SANTOSH KUMAR YADAV, TERUKOTI DIVYA
DOI:
21 – 30 Download
Reduction of Static Power by Using Biasing and Body Biasing Techniques
Authors: TEJAVATH NANDA KUMAR, MR. Y. KONDAIAH GARU
DOI:
31 – 40 Download
Fuzzy Controlled Single Phase to 3 Phase Converter with Reduced Switch Count
Authors: Mrs.G.JAJI SUDHA, Mr.K. RAMESH BABU , Mr.Ch.RAMBABU
DOI:
41 – 53 Download
A Grid connected Dual Voltage source Inverter with power quality Improvement features.
Authors: Y.DHANA LAKSHMI, MIKKILI.SURESH
DOI:
54 – 65 Download
Solar PV Array-Fed Water Pumping System Using Zeta Converter based ClosedLoop Control of BLDC Motor Drive.
Authors: P.KIRAN KUMAR, P.VENKATESWARA RAO
DOI:
66 – 75 Download
A Novel Method of Controller Area Network Assisted Grid Synchronization Scheme For Integration Of Res And Energy Storage Using Fuzzy Controller
Authors: B. KRANTHI KIRAN, SK. MD. SHAREEF
DOI:
76 – 88 Download
Wireless Based INTELLI Industrial Security Robot
Authors: M.MOUNIKA, S.ARUNA, I.RAJASEKHAR
DOI:
89 - 94 Download
Detecting Attacks in Wireless Sensor Network through Bloom Filtering
Authors: D.VENKATA SOWJANYA, A. HANUMAT PRASAD
DOI:
100 – 105 Download
Distribution and Reusability Unified Routing in Multi-Hop Wireless Networks using MAC layer
Authors: CHILUKURI.SRILAKSHMI DURGA, CHANDALURI. NAVEEN
DOI:
106 – 110 Download
Secured Ranked Keyword Search Over Encrypted Data On Cloud
Authors: V.SRIKANTH
DOI:
111 – 119 Download
Authentication of Meddle watermarks with Revocable Data Hiding and Retrieving for RGB Color Images
Authors: G.HUSSAIN BABU, M.RANJITH KUMAR, SURESH.BOJJA
DOI:
120 – 126 Download
Digital Video Watermarking by PAC and Discrete Cosine Transform
Authors: CH.SURESH, M.VENKATARAO, SURESH.BOJJA
DOI:
127 – 131 Download
Discovery of Ranking Fraud for Mobile Apps.
Authors: DEVIREDDY SITHA MAHALAKSHMI, THOTA VENKATA GOPALA KRISHNA
DOI:
132 – 136 Download
Dynamic proof of storage in multiple users Environment.
Authors: P.NAGA VALLI, A.HANUMAT PRASAD
DOI:
137 – 142 Download
A novel method of Power Quality Improvement of Unified Power Quality Conditioner by using Fuzzy Logic Controller
Authors: Mr.K.VENKATACHARI, Mr.M.VAMAN NAYAK
DOI:
143 – 155 Download
A Hybrid Cloud Approach For Secure Authorized Deduplication
Authors: YADLAPALLI NAGA KALYANI, V. NAGA GOPI RAJU
DOI:
156 – 160 Download
Discovery of Ranking Fraud For Mobile Apps
Authors: JAVVADI SRAVANTHI, V. NAGA GOPI RAJU
DOI:
161 – 164 Download
Upper Bound Score Pruning Over Incomplete Data To Reduce Query Processing Time
Authors: J.RADHAKRISHNA, MD.ISMAIL KHAN
DOI:
165 – 174 Download
Dual-server Public-key Encryption through Keyword Search for Sheltered Cloud Storage
Authors: CH.LOKESH KIRAN, M.SARADA
DOI:
175 – 179 Download
Efficiently Answering Xml Keyword Queries Using Lllist
Authors: SK.NOORBASHA KAREEM HUSSAIN, S.S.N ANJANEYULU
DOI:
180 – 189 Download
Analysis of Heart Diseases Using Data Mining Classification Technique
Authors: *SARANGAM KODATI, DR. R VIVEKANANDAM, B. MADHUSUDHAN REDDY
DOI:
190 – 196 Download
Evaluation of The Effect of Shear Wall Arrangement In Dual Systems Subjected To Lateral Loads
Authors: G. HARIPRIYA, MR. K K D V. PRASAD
DOI:
197 – 206 Download
Comparative Analysis of FCL and Dynamic Voltage Restorer For Fault Current Limitation
Authors: B SIVA KRISHNA, D.RAVI KUMAR
DOI:
207 – 218 Download
An Improved D-STATCOM For Induction Motor Drive Applications
Authors: EBBILI MADHAVA KRISHNA AVINASH, DR.CH.V. SURESH
DOI:
219 – 227 Download
An Improved D-STATCOM For Induction Motor Drive Applications
Authors: BANGARU APPARAO, VENKATESWARA RAO P
DOI:
228 – 235 Download
Design of Modified 16-Bit Parallel Prefix Kogge Stone Adder
Authors: P DIVYA SREE, P SIVA KRISHNA
DOI:
236 – 239 Download
Prepaid Energy Meter Billing System Using Arm Processor Using Recharge Cards
Authors: GUDURU GOWRI SANKAR REDDY, K. PRAKASH, M. KOTESWARA RAO
DOI:
240 – 243 Download
Reusable Fm0 Sols Encoder For Dsrc Applications
Authors: P. MADHUSUDHANA RAO, G MADHUSUDHANA RAO, P JAYA BABU, C AMALA
DOI:
244 – 248 Download
Design A Multiplier Using Dual Modified Adaptive Technique
Authors: G MADHUSUDHANA RAO, P JAYA BABU, M. CHAITANYA
DOI:
249 – 253 Download
Design A Novel Built In Self Test Using Multiple Memory Instructions.
Authors: D. KAVITHA, G MADHUSUDHANA RAO, P JAYA BABU, T PRAVALLIKA
DOI:
254 – 258 Download
Low Power and Reusable Fm0/Manchester Encoder For Dsrcs Applications
Authors: *PERABATHULA LATHA, P.NAGARAJU
DOI:
259 – 263 Download
A novel method of Power Quality Improvement and Reactive Power Compensation in a Grid Connected System for Non-Linear Loads Using DSTATCOM For Induction Motor Drive Applications.
Authors: A.UDAI KIRAN, G.SRINIVAS
DOI:
264 – 272 Download
A multi level inverter for induction motor drive application
Authors: S.RAVI, A. SUNDRA RAO
DOI:
273 – 283 Download
Conformal Antennas Beam Fusion With Systematic Tapering
Authors: K SUMALATHA, DR. CH. R. PHANI KUMAR
DOI:
284 – 289 Download
Erudition of Multi-model Representation Through Random Walks on Click Graph.
Authors: P.TEJASRI, M.ANKAMMA RAO
DOI:
289 – 296 Download
Developing Green Internet By Deploying A Three Hop Mechanism
Authors: G.SIREESHA, S.S.N ANJANEYULU
DOI:
297 – 304 Download
Implementing An Intrusion Detection Method Using A Filter Based Feature Selection Algorithm
Authors: K.MANOJKUMAR, SK.FAYAZ
DOI:
305 – 312 Download
A Protected Anti-Collusion Data Distribution System for Vibrant Groups in the Cloud.
Authors: SK.ABDUL GAFOOR, MD.JOHNSAIDA
DOI:
313 – 319 Download
Connected Friend Overlapping Groups Based On Social Network Context
Authors: A JAYALAKSHMI, J.LAKSHMI
DOI:
320 – 326 Download
Vibrant And Public Auditing By Way of Fair Negotiation For Cloud Data
Authors: V.V ABHILASHA, G.NAGARJUNA
DOI:
327 – 333 Download
Design Algorithm For Low Complexity Reconfigurable Fir Filter Based On Edbns
Authors: MORTHA VARAPRASAD, P NAGA RAJU
DOI:
334 – 339 Download
A Hybrid Cloud Approach For Secure Authorized Deduplication
Authors: *YEDLAPALLI NAGA KALYANI, V. NAGA GOPI RAJU
DOI:
340 – 344 Download
Experimental investigation of mechanical properties of magnesium matrix composite reinforced with silicon carbide
Authors: M.RAJESH, R.RANJITH KUMAR
DOI:
345 – 348 Download
Design And Implementation Of Dual Key Triple Encryption Text Based Message Using Cryptography
Authors: VALLEPU SUREKHA, K. SAM PRASAD
DOI:
340 – 344 Download
Solar PV Array-Fed Water Pumping System Using Zeta Converter based Closed-Loop Control of BLDC Motor Drive
Authors: Y. LAKSHMI GANESH, A. RAMA KRISHNA
DOI:
357 – 366 Download
Determining Multi-party Privacy Conflicts in Social Media
Authors: MUKIRI.ANUSHA , KARPURAPU SUDHAKARABABU
DOI:
367 – 371 Download
Speed Control of SRM drive for PV integrated EV system with Fuzzy Logic Controller
Authors: S.V.V.S.R.RAYUDU, P.BALAKRISHNA
DOI:
372 – 385 Download
Fake Biometric Detection System For Spoofing Iris And Fingerprint Face Images
Authors: K.SRUJANA, B.SIVANAGESWARA RAO
DOI:
386 – 392 Download
Design and Implementation of Accident Preventing, Driver Intoxication Finding System Using Feedback and IOT
Authors: NUVVULA NAGA NAVYA SPANDANA, KORANGI L VIJAYA PRASAD
DOI:
393 – 403 Download
Mining Tweets To Generates The Tweets and Retweet and Retweeters
Authors: D. KRISHNAVENI, P.CHANDRA MOHANA RAI
DOI:
404 – 411 Download
Increasing the efficiency of cache mechanism by path planning
Authors: CHERUKUPALLI MADHURI, P.SUDHEER
DOI:
412 – 419 Download
Predicting Neighbour set Keyword search in Multidimensional Dataset.
Authors: MUNDLAMURI RENUKA, B.JYOTHI
DOI:
420 – 425 Download
Finding Fake Ranking Applications in Play Store.
Authors: SHAIKSHABENA, J.LAKSHMI
DOI:
426 – 432 Download
Finding Fake Rankings in Mobile Applications
Authors: PASUMARTHI ROJA, MR. VENKAT N RAVIPATI
DOI:
433 – 444 Download
Solar PV Array-Fed Water Pumping System Using Zeta Converter Based ClosedLoop Control Of BLDC Motor Drive
Authors: B. VEERABABU, A.S.S. VEERENDRABABU
DOI:
445 - 455 Download
An Approach to Protecting Privacy of User’s Images
Authors: V. ASHA JYOTHI, D.SRIKAR
DOI:
456 - 461 Download
Determination of Failure Strength of Flate Plate Weld Joint Using Finite Element Analysis
Authors: K. SANDYA SERIN, Y.SUVARNA KUMAR, K.L.N.MURTHY
DOI:
462 – 474 Download
Implementing Secure User Revocation Scheme from Collusion Attacks for Dynamic Groups in Cloud.
Authors: MAKKENA. ASHOK, M. NARESH.
DOI:
579 - 583 Download
Enhancing Secure, Key Escrow issue using Attribute Weighted Data Sharing Scheme.
Authors: KANIGANTI SRI LAKSHMI, M. VENKATAIAH
DOI:
573 - 578 Download
Greedy Depth-First-Search Scheme on Encrypted Data In Cloud Storage
Authors: MR. SHAHANSHA SHAIK , MR. NAGARJUNA REDDY
DOI:
475 - 481 Download
Automatic Human Defence System Using Nanoids
Authors: ARAVIND BOMMALATA
DOI:
493 - 503 Download
Delightful Attribute-Based Access Control Mechanism And Advance Security In Clouds
Authors: Mr. V RAMANJANEYULU, Mr. NAGARJUNA REDDY
DOI:
504 – 509 Download
Formulate A Query Over Search Result Using Exploit Mining Aspects
Authors: Mr. BOYA RAJASEKHAR, Mr. NAGARJUNA REDDY
DOI:
510 – 518 Download
Invention of Trickery Ranking Using Global And Local Anomaly For Apps
Authors: MR. VANGA UDAYKUMAR , MR. NAGARJUNA REDDY
DOI:
519 – 524 Download
PRP Algorithm For Immune Data Cluster In Wireless Sensor Network
Authors: MR. LINGABATHULA UDAY, MR. N RAMESH, MRS. V PRATHIMA
DOI:
525 - 529. Download
key-exposure resist, storage and auditing in clouds with empirical key updates
Authors: MR. VENKAT RAMU E, DR.J.PRAKASH REDDY
DOI:
530 – 536 Download
Frappe: Malignant Applications Discovery In Facebook Using Frappe
Authors: Ms. M.RANI, Dr.J.PRAKASH REDDY
DOI:
537 – 545 Download
Resilient and Provable Hybrid Authority Access Control Environment for Public Clouds.
Authors: Mr. A.KAMALAKAR, Mr. MD NAZMODDIN, Mrs. MUBINA BEGUM
DOI:
546 - 552 Download
Pivot Encryption And Query Search With Duplex Servers In Secure Clouds
Authors: Mr. A.PRASHANTH, Dr.J.PRAKASH REDDY
DOI:
553 – 558 Download
Unthreaten and Reliable Info Sharing Scheme For Unions In The Public Cloud
Authors: MS. G.APARNA, MRS. SWATI OLLALWAR, MR. V.SIVAPRASAD
DOI:
559 - 564 Download
Syntactic Search Using Neighbourhood Mechanism For Ultra Storage System
Authors: Mr. SHIVASHANKAR.G, Ms. SWATI OLLALWAR, Mr. V.SIVAPRASAD
DOI:
565 – 572 Download
Boundary Detection Using Double-Opponency And Spatial Sparseness Constraint
Authors: SHAIK HAZEERA, SHAIK UMAR FARUQ
DOI:
584 - 589 Download
Enhancing Various Parameters of Rural Telephony For Hybrid Wind Solar Power System
Authors: THARA SINGH AMGOTH
DOI:
590 - 596 Download
High performance and Throughput Amplifier design for Wireless Network
Authors: SANGANI INDRAJA, M SRI MANIKYAMBA
DOI:
597 - 604 Download
Fixed And Normalized Architecture Based On Multi Level Radices For Delay Commutator And Feedback Techniques
Authors: ANIVIREDDY POSIYA, M SURESH KUMAR
DOI:
605 - 610 Download
Cost Effective Approach For Multi Level Filter Design For Reconstruction Of Stable And Dynamic Applications
Authors: BOLISETTI VEERABABU, R.VINAY KUMAR
DOI:
611 - 617 Download
LDPC Decoders for the design and implementation of high performance and low cost techniques
Authors: RAMESWARAPU KIRANMAYI, P.NAGARAJU
DOI:
618 - 624 Download
Multiple Clock gating Schemes for Fused-MAC for Floating-Point Units
Authors: RAYADU LAVANYA, S.DEVA KARUN
DOI:
635 – 646 Download
Novel Approach For Hybrid- Multi Level Filter Design For Wireless Applications
Authors: GOLLAPALLI RAMAKRISNA, N G N PRASAD
DOI:
647 – 655 Download
Digital Modular Implementation of DSP Systems for Data and Design Hiding Applications
Authors: ATHIM S V V S MANIKANTA, P.SATYAVANI
DOI:
656 – 665 Download
Improving the accuracy of Popularity-based Voting Recommendation Using a Novel Recommender System Models
Authors: DHULIPALLA VENKATA JYOTHI, D. RAMMOHAN REDDY
DOI:
666 – 670 Download
An Efficient Encrypted Cloud Email System based CIBPRE Scheme for Store and Share data in Cloud
Authors: JALLEDA HYMAVATHI, G. CH. SRINIAVASA RAO
DOI:
671 – 676. Download
A Wireless Tracking System for At-Home Medical Instru-Mentation throughout Natural Disasters
Authors: N SRI DATTA, M.KOTIREDDY.
DOI:
677 - 681 Download
Underground Cable Fault Detection
Authors: KAKI RAMYA SREE, P.NAGARAJU
DOI:
682 - 687 Download
An Effective Approach in Wireless Sensor Networks for Reconstruction of ipath Inference
Authors: D.YADAIAH
DOI:
688 - 695 Download
Advanced Home Automatiom and Security System (Has) With Energy Management System (HEMS) Using IOT Technology
Authors: ARAVIND BOMMALATA
DOI:
482 – 492 Download
MONITORING AND CONTROLLING OF HOME APPLICATIONS BY USING RASPBERRY PI WITH WIRELESS COMMUNICATION
Authors: DEEVI.VALLIBALA, GANESH BABU. PANTANGI
DOI:
475-482 Download
AUTOMATIC HUMAN DEFENCE SYSTEM USING NANOIDS
Authors: ARAVIND BOMMALATA
DOI:
493-503 Download
MODELLING OF VARIOUS MATERIALS FOR HEAT EXCHANGER TUBES
Authors: B MUKESH
DOI:
696-702 Download
DESIGN ANALYSIS ON EFFECT OF GROOVE GEOMETRY ON TRAIN BREAKS
Authors: Dr M Naveen Kumar
DOI:
703-708 Download
LOW- PRESSURE STEAM TURBINE THERMAL ANALYSIS
Authors: R RAMYA
DOI:
709-719 Download
A STUDY OF ENGINE FAILURE CONDITIONS IN ENGINE OVERHEATING CASES
Authors: M HARISH
DOI:
719-725 Download
PRESSURE VESSEL FINITE ELEMENT ANALYSIS
Authors: Dr S M BASHA
DOI:
726-734 Download
CAD/CAE BASED MANUFACTURING TECHNIQUES FOR CERAMIC COATED PISTON
Authors: K APARNA
DOI:
735-743 Download
Nearest Ranked Keyword Search Efficiently In Cloud Computing Applications
Authors: GASI LAKSHMI PRAVEENA, DANDA SREEKANTH.
DOI:
95-99 Download
A Cross Cloud Approach For Protected Authoritative Deduplications
Authors: NIHARIKA MANDA
DOI:
744 – 749 Download
INTERFACING WEB-BASED SOCIAL NETWORKING TO ONLINE BUSINESS USING SCALE BLOGGING DATA
Authors: CH. KISHORE KUMAR, DR. M.PRIYA, DR. A.MUTHUKUMARAVEL
DOI:
750-759 Download
CLOUD COMPUTING FOR RURAL DEVELOPMENT
Authors: K.SRINIVAS, DR. JOSEPH PRAKASH MOSIGANTI
DOI:
770-775 Download
SENTIMENT ANALYSIS OF BIG DATA METHODS APPLICATIONS AND OPEN CHALLENGES
Authors: VANAM SRAVAN DR. RASHMI AGAEWAL
DOI:
760-769 Download
ANALYSING USER REVIEW SENTIMENT ON PRODUCT BY DEEP LEARNING
Authors: MS.G.PRASANTHI, D.GANESH REDDY
DOI:
91-97 Download
UNDERVOLTAGE AND OVERVOLTAGE PROTECTION OF ELECTRICAL EQUIPMENT
Authors: AYESHA KOUSAR , Dr. BOINI RAJENDER REDDY,
DOI:
770-774 Download
Pundi Rezeki Dari JP Paus Olympus Hari Ini Settingan Bet Pemicu maxwin Starlight Princess x500 Rekomendasi Waktu Top di Starlight Princess 2024 Pola Epic Starlight Princess Special Natal Tips dan Trik Dapatkan Scatter Legendaris Olympus Bocoran Game Pemberi Kemenangan di PINBET76 Fitur Scatter Hitam Lebih Mudah Didapat di PINBET76 Panen Petir Merah Zeus Lebih Mudah Dengan Cara Ini Ciri-Ciri Kemenangan Olympus yang Akan Datang Fitur Scatter Hitam Mudah Muncul Saat Musim Hujan Pola Terkuat Taklukan Scatter Hitam Mahjong Ways Kesaktian Pola Nyentrik X Admin Pusat di Olympus Bocoran Jam Malam Olympus Muntahkan JP Paus Cheat Maxwin Terbaru Gates Of Olympus Mania Kunci Maxwin di Simbol Rahasia Starlight Princess Hindari Kesalahan Ini Agar Maxwin di Mahjong Ways Online Bocoran Ritme Putaran Untuk Meraih Maxwin Banjir Scatter Hitam Mahjong Ways 1 Malam Ini Hujan WD Dimahjong Ways 3 Terbaru 2024 Bocoran Strategi Lumpuhkan Settingan Game Zeus Olympus