Privacy Preserving Ranked Keyword Search Over Encrypted Cloud Data
Authors: MADHAVI.DANDA, Y.LEELA KRISHNA
DOI:
|
1 - 4 |
Download |
A Unique Advance for Exploit P2P File Access Convenience in Manageablead HOC
Systems.
Authors: SUHASINI JILLELLA, B.KRISHNA
DOI:
|
5 – 11 |
Download |
Fuzzy Logic Controller Based Load Frequency Control in Three Area Network
Including DG
Authors: ADARI HEMA, K.SUNEETHA, DR.B.SRINIVASA RAO
DOI:
|
12 – 20 |
Download |
Multilevel Inverter with Reduced Switch Count for Induction Motor Drive
Applications
Authors: JOGA SANTOSH KUMAR YADAV, TERUKOTI DIVYA
DOI:
|
21 – 30 |
Download |
Reduction of Static Power by Using Biasing and Body Biasing Techniques
Authors: TEJAVATH NANDA KUMAR, MR. Y. KONDAIAH GARU
DOI:
|
31 – 40 |
Download |
Fuzzy Controlled Single Phase to 3 Phase Converter with Reduced Switch Count
Authors: Mrs.G.JAJI SUDHA, Mr.K. RAMESH BABU , Mr.Ch.RAMBABU
DOI:
|
41 – 53 |
Download |
A Grid connected Dual Voltage source Inverter with power quality Improvement
features.
Authors: Y.DHANA LAKSHMI, MIKKILI.SURESH
DOI:
|
54 – 65 |
Download |
Solar PV Array-Fed Water Pumping System Using Zeta Converter based ClosedLoop
Control of BLDC Motor Drive.
Authors: P.KIRAN KUMAR, P.VENKATESWARA RAO
DOI:
|
66 – 75 |
Download |
A Novel Method of Controller Area Network Assisted Grid Synchronization Scheme
For Integration Of Res And Energy Storage Using Fuzzy Controller
Authors: B. KRANTHI KIRAN, SK. MD. SHAREEF
DOI:
|
76 – 88 |
Download |
Wireless Based INTELLI Industrial Security Robot
Authors: M.MOUNIKA, S.ARUNA, I.RAJASEKHAR
DOI:
|
89 - 94 |
Download |
Detecting Attacks in Wireless Sensor Network through Bloom Filtering
Authors: D.VENKATA SOWJANYA, A. HANUMAT PRASAD
DOI:
|
100 – 105 |
Download |
Distribution and Reusability Unified Routing in Multi-Hop Wireless Networks using
MAC layer
Authors: CHILUKURI.SRILAKSHMI DURGA, CHANDALURI. NAVEEN
DOI:
|
106 – 110 |
Download |
Secured Ranked Keyword Search Over Encrypted Data On Cloud
Authors: V.SRIKANTH
DOI:
|
111 – 119 |
Download |
Authentication of Meddle watermarks with Revocable Data Hiding and
Retrieving for RGB Color Images
Authors: G.HUSSAIN BABU, M.RANJITH KUMAR, SURESH.BOJJA
DOI:
|
120 – 126 |
Download |
Digital Video Watermarking by PAC and Discrete Cosine Transform
Authors: CH.SURESH, M.VENKATARAO, SURESH.BOJJA
DOI:
|
127 – 131 |
Download |
Discovery of Ranking Fraud for Mobile Apps.
Authors: DEVIREDDY SITHA MAHALAKSHMI, THOTA VENKATA GOPALA KRISHNA
DOI:
|
132 – 136 |
Download |
Dynamic proof of storage in multiple users Environment.
Authors: P.NAGA VALLI, A.HANUMAT PRASAD
DOI:
|
137 – 142 |
Download |
A novel method of Power Quality Improvement of Unified Power Quality
Conditioner by using Fuzzy Logic Controller
Authors: Mr.K.VENKATACHARI, Mr.M.VAMAN NAYAK
DOI:
|
143 – 155 |
Download |
A Hybrid Cloud Approach For Secure Authorized Deduplication
Authors: YADLAPALLI NAGA KALYANI, V. NAGA GOPI RAJU
DOI:
|
156 – 160 |
Download |
Discovery of Ranking Fraud For Mobile Apps
Authors: JAVVADI SRAVANTHI, V. NAGA GOPI RAJU
DOI:
|
161 – 164 |
Download |
Upper Bound Score Pruning Over Incomplete Data To Reduce Query Processing Time
Authors: J.RADHAKRISHNA, MD.ISMAIL KHAN
DOI:
|
165 – 174 |
Download |
Dual-server Public-key Encryption through Keyword Search for Sheltered Cloud
Storage
Authors: CH.LOKESH KIRAN, M.SARADA
DOI:
|
175 – 179 |
Download |
Efficiently Answering Xml Keyword Queries Using Lllist
Authors: SK.NOORBASHA KAREEM HUSSAIN, S.S.N ANJANEYULU
DOI:
|
180 – 189 |
Download |
Analysis of Heart Diseases Using Data Mining Classification Technique
Authors: *SARANGAM KODATI, DR. R VIVEKANANDAM, B. MADHUSUDHAN REDDY
DOI:
|
190 – 196 |
Download |
Evaluation of The Effect of Shear Wall Arrangement In Dual Systems Subjected To Lateral
Loads
Authors: G. HARIPRIYA, MR. K K D V. PRASAD
DOI:
|
197 – 206 |
Download |
Comparative Analysis of FCL and Dynamic Voltage Restorer For Fault Current Limitation
Authors: B SIVA KRISHNA, D.RAVI KUMAR
DOI:
|
207 – 218 |
Download |
An Improved D-STATCOM For Induction Motor Drive Applications
Authors: EBBILI MADHAVA KRISHNA AVINASH, DR.CH.V. SURESH
DOI:
|
219 – 227 |
Download |
An Improved D-STATCOM For Induction Motor Drive Applications
Authors: BANGARU APPARAO, VENKATESWARA RAO P
DOI:
|
228 – 235 |
Download |
Design of Modified 16-Bit Parallel Prefix Kogge Stone Adder
Authors: P DIVYA SREE, P SIVA KRISHNA
DOI:
|
236 – 239 |
Download |
Prepaid Energy Meter Billing System Using Arm Processor Using Recharge Cards
Authors: GUDURU GOWRI SANKAR REDDY, K. PRAKASH, M. KOTESWARA RAO
DOI:
|
240 – 243 |
Download |
Reusable Fm0 Sols Encoder For Dsrc Applications
Authors: P. MADHUSUDHANA RAO, G MADHUSUDHANA RAO, P JAYA BABU, C AMALA
DOI:
|
244 – 248 |
Download |
Design A Multiplier Using Dual Modified Adaptive Technique
Authors: G MADHUSUDHANA RAO, P JAYA BABU, M. CHAITANYA
DOI:
|
249 – 253 |
Download |
Design A Novel Built In Self Test Using Multiple Memory Instructions.
Authors: D. KAVITHA, G MADHUSUDHANA RAO, P JAYA BABU, T PRAVALLIKA
DOI:
|
254 – 258 |
Download |
Low Power and Reusable Fm0/Manchester Encoder For Dsrcs Applications
Authors: *PERABATHULA LATHA, P.NAGARAJU
DOI:
|
259 – 263 |
Download |
A novel method of Power Quality Improvement and Reactive Power Compensation in a
Grid Connected System for Non-Linear Loads Using DSTATCOM For Induction Motor Drive
Applications.
Authors: A.UDAI KIRAN, G.SRINIVAS
DOI:
|
264 – 272 |
Download |
A multi level inverter for induction motor drive application
Authors: S.RAVI, A. SUNDRA RAO
DOI:
|
273 – 283 |
Download |
Conformal Antennas Beam Fusion With Systematic Tapering
Authors: K SUMALATHA, DR. CH. R. PHANI KUMAR
DOI:
|
284 – 289 |
Download |
Erudition of Multi-model Representation Through Random Walks on Click Graph.
Authors: P.TEJASRI, M.ANKAMMA RAO
DOI:
|
289 – 296 |
Download |
Developing Green Internet By Deploying A Three Hop Mechanism
Authors: G.SIREESHA, S.S.N ANJANEYULU
DOI:
|
297 – 304 |
Download |
Implementing An Intrusion Detection Method Using A Filter Based Feature
Selection Algorithm
Authors: K.MANOJKUMAR, SK.FAYAZ
DOI:
|
305 – 312 |
Download |
A Protected Anti-Collusion Data Distribution System for Vibrant Groups in the
Cloud.
Authors: SK.ABDUL GAFOOR, MD.JOHNSAIDA
DOI:
|
313 – 319 |
Download |
Connected Friend Overlapping Groups Based On Social Network Context
Authors: A JAYALAKSHMI, J.LAKSHMI
DOI:
|
320 – 326 |
Download |
Vibrant And Public Auditing By Way of Fair Negotiation For Cloud Data
Authors: V.V ABHILASHA, G.NAGARJUNA
DOI:
|
327 – 333 |
Download |
Design Algorithm For Low Complexity Reconfigurable Fir Filter Based On Edbns
Authors: MORTHA VARAPRASAD, P NAGA RAJU
DOI:
|
334 – 339 |
Download |
A Hybrid Cloud Approach For Secure Authorized Deduplication
Authors: *YEDLAPALLI NAGA KALYANI, V. NAGA GOPI RAJU
DOI:
|
340 – 344 |
Download |
Experimental investigation of mechanical properties of magnesium matrix
composite reinforced with silicon carbide
Authors: M.RAJESH, R.RANJITH KUMAR
DOI:
|
345 – 348 |
Download |
Design And Implementation Of Dual Key Triple Encryption Text Based Message Using
Cryptography
Authors: VALLEPU SUREKHA, K. SAM PRASAD
DOI:
|
340 – 344 |
Download |
Solar PV Array-Fed Water Pumping System Using Zeta Converter based Closed-Loop
Control of BLDC Motor Drive
Authors: Y. LAKSHMI GANESH, A. RAMA KRISHNA
DOI:
|
357 – 366 |
Download |
Determining Multi-party Privacy Conflicts in Social Media
Authors: MUKIRI.ANUSHA , KARPURAPU SUDHAKARABABU
DOI:
|
367 – 371 |
Download |
Speed Control of SRM drive for PV integrated EV system with Fuzzy Logic Controller
Authors: S.V.V.S.R.RAYUDU, P.BALAKRISHNA
DOI:
|
372 – 385 |
Download |
Fake Biometric Detection System For Spoofing Iris And Fingerprint Face Images
Authors: K.SRUJANA, B.SIVANAGESWARA RAO
DOI:
|
386 – 392 |
Download |
Design and Implementation of Accident Preventing, Driver Intoxication Finding System
Using Feedback and IOT
Authors: NUVVULA NAGA NAVYA SPANDANA, KORANGI L VIJAYA PRASAD
DOI:
|
393 – 403 |
Download |
Mining Tweets To Generates The Tweets and Retweet and Retweeters
Authors: D. KRISHNAVENI, P.CHANDRA MOHANA RAI
DOI:
|
404 – 411 |
Download |
Increasing the efficiency of cache mechanism by path planning
Authors: CHERUKUPALLI MADHURI, P.SUDHEER
DOI:
|
412 – 419 |
Download |
Predicting Neighbour set Keyword search in Multidimensional Dataset.
Authors: MUNDLAMURI RENUKA, B.JYOTHI
DOI:
|
420 – 425 |
Download |
Finding Fake Ranking Applications in Play Store.
Authors: SHAIKSHABENA, J.LAKSHMI
DOI:
|
426 – 432 |
Download |
Finding Fake Rankings in Mobile Applications
Authors: PASUMARTHI ROJA, MR. VENKAT N RAVIPATI
DOI:
|
433 – 444 |
Download |
Solar PV Array-Fed Water Pumping System Using Zeta Converter Based ClosedLoop
Control Of BLDC Motor Drive
Authors: B. VEERABABU, A.S.S. VEERENDRABABU
DOI:
|
445 - 455 |
Download |
An Approach to Protecting Privacy of User’s Images
Authors: V. ASHA JYOTHI, D.SRIKAR
DOI:
|
456 - 461 |
Download |
Determination of Failure Strength of Flate Plate Weld Joint Using Finite Element Analysis
Authors: K. SANDYA SERIN, Y.SUVARNA KUMAR, K.L.N.MURTHY
DOI:
|
462 – 474 |
Download |
Implementing Secure User Revocation Scheme from Collusion Attacks for Dynamic Groups
in Cloud.
Authors: MAKKENA. ASHOK, M. NARESH.
DOI:
|
579 - 583 |
Download |
Enhancing Secure, Key Escrow issue using Attribute Weighted Data Sharing Scheme.
Authors: KANIGANTI SRI LAKSHMI, M. VENKATAIAH
DOI:
|
573 - 578 |
Download |
Greedy Depth-First-Search Scheme on Encrypted Data In Cloud Storage
Authors: MR. SHAHANSHA SHAIK , MR. NAGARJUNA REDDY
DOI:
|
475 - 481 |
Download |
Automatic Human Defence System Using Nanoids
Authors: ARAVIND BOMMALATA
DOI:
|
493 - 503 |
Download |
Delightful Attribute-Based Access Control Mechanism And Advance Security In Clouds
Authors: Mr. V RAMANJANEYULU, Mr. NAGARJUNA REDDY
DOI:
|
504 – 509 |
Download |
Formulate A Query Over Search Result Using Exploit Mining Aspects
Authors: Mr. BOYA RAJASEKHAR, Mr. NAGARJUNA REDDY
DOI:
|
510 – 518 |
Download |
Invention of Trickery Ranking Using Global And Local Anomaly For Apps
Authors: MR. VANGA UDAYKUMAR , MR. NAGARJUNA REDDY
DOI:
|
519 – 524 |
Download |
PRP Algorithm For Immune Data Cluster In Wireless Sensor Network
Authors: MR. LINGABATHULA UDAY, MR. N RAMESH, MRS. V PRATHIMA
DOI:
|
525 - 529. |
Download |
key-exposure resist, storage and auditing in clouds with empirical key updates
Authors: MR. VENKAT RAMU E, DR.J.PRAKASH REDDY
DOI:
|
530 – 536 |
Download |
Frappe: Malignant Applications Discovery In Facebook Using Frappe
Authors: Ms. M.RANI, Dr.J.PRAKASH REDDY
DOI:
|
537 – 545 |
Download |
Resilient and Provable Hybrid Authority Access Control Environment for Public
Clouds.
Authors: Mr. A.KAMALAKAR, Mr. MD NAZMODDIN, Mrs. MUBINA BEGUM
DOI:
|
546 - 552 |
Download |
Pivot Encryption And Query Search With Duplex Servers In Secure Clouds
Authors: Mr. A.PRASHANTH, Dr.J.PRAKASH REDDY
DOI:
|
553 – 558 |
Download |
Unthreaten and Reliable Info Sharing Scheme For Unions In The Public Cloud
Authors: MS. G.APARNA, MRS. SWATI OLLALWAR, MR. V.SIVAPRASAD
DOI:
|
559 - 564 |
Download |
Syntactic Search Using Neighbourhood Mechanism For Ultra Storage System
Authors: Mr. SHIVASHANKAR.G, Ms. SWATI OLLALWAR, Mr. V.SIVAPRASAD
DOI:
|
565 – 572 |
Download |
Boundary Detection Using Double-Opponency And Spatial Sparseness Constraint
Authors: SHAIK HAZEERA, SHAIK UMAR FARUQ
DOI:
|
584 - 589 |
Download |
Enhancing Various Parameters of Rural Telephony For Hybrid Wind Solar Power
System
Authors: THARA SINGH AMGOTH
DOI:
|
590 - 596 |
Download |
High performance and Throughput Amplifier design for Wireless Network
Authors: SANGANI INDRAJA, M SRI MANIKYAMBA
DOI:
|
597 - 604 |
Download |
Fixed And Normalized Architecture Based On Multi Level Radices For Delay Commutator
And Feedback Techniques
Authors: ANIVIREDDY POSIYA, M SURESH KUMAR
DOI:
|
605 - 610 |
Download |
Cost Effective Approach For Multi Level Filter Design For Reconstruction Of Stable
And Dynamic Applications
Authors: BOLISETTI VEERABABU, R.VINAY KUMAR
DOI:
|
611 - 617 |
Download |
LDPC Decoders for the design and implementation of high performance and low
cost techniques
Authors: RAMESWARAPU KIRANMAYI, P.NAGARAJU
DOI:
|
618 - 624 |
Download |
Multiple Clock gating Schemes for Fused-MAC for Floating-Point Units
Authors: RAYADU LAVANYA, S.DEVA KARUN
DOI:
|
635 – 646 |
Download |
Novel Approach For Hybrid- Multi Level Filter Design For Wireless Applications
Authors: GOLLAPALLI RAMAKRISNA, N G N PRASAD
DOI:
|
647 – 655 |
Download |
Digital Modular Implementation of DSP Systems for Data and Design Hiding Applications
Authors: ATHIM S V V S MANIKANTA, P.SATYAVANI
DOI:
|
656 – 665 |
Download |
Improving the accuracy of Popularity-based Voting Recommendation Using a Novel
Recommender System Models
Authors: DHULIPALLA VENKATA JYOTHI, D. RAMMOHAN REDDY
DOI:
|
666 – 670 |
Download |
An Efficient Encrypted Cloud Email System based CIBPRE Scheme for Store and Share data
in Cloud
Authors: JALLEDA HYMAVATHI, G. CH. SRINIAVASA RAO
DOI:
|
671 – 676. |
Download |
A Wireless Tracking System for At-Home Medical Instru-Mentation
throughout Natural Disasters
Authors: N SRI DATTA, M.KOTIREDDY.
DOI:
|
677 - 681 |
Download |
Underground Cable Fault Detection
Authors: KAKI RAMYA SREE, P.NAGARAJU
DOI:
|
682 - 687 |
Download |
An Effective Approach in Wireless Sensor Networks for Reconstruction of ipath Inference
Authors: D.YADAIAH
DOI:
|
688 - 695 |
Download |
Advanced Home Automatiom and Security System (Has) With Energy Management
System (HEMS) Using IOT Technology
Authors: ARAVIND BOMMALATA
DOI:
|
482 – 492 |
Download |
MONITORING AND CONTROLLING OF HOME APPLICATIONS BY USING RASPBERRY
PI WITH WIRELESS COMMUNICATION
Authors: DEEVI.VALLIBALA, GANESH BABU. PANTANGI
DOI:
|
475-482 |
Download |
AUTOMATIC HUMAN DEFENCE SYSTEM USING NANOIDS
Authors: ARAVIND BOMMALATA
DOI:
|
493-503 |
Download |
MODELLING OF VARIOUS MATERIALS FOR HEAT EXCHANGER
TUBES
Authors: B MUKESH
DOI:
|
696-702 |
Download |
DESIGN ANALYSIS ON EFFECT OF GROOVE GEOMETRY ON
TRAIN BREAKS
Authors: Dr M Naveen Kumar
DOI:
|
703-708 |
Download |
LOW- PRESSURE STEAM TURBINE THERMAL ANALYSIS
Authors: R RAMYA
DOI:
|
709-719 |
Download |
A STUDY OF ENGINE FAILURE CONDITIONS IN ENGINE
OVERHEATING CASES
Authors: M HARISH
DOI:
|
719-725 |
Download |
PRESSURE VESSEL FINITE ELEMENT ANALYSIS
Authors: Dr S M BASHA
DOI:
|
726-734 |
Download |
CAD/CAE BASED MANUFACTURING TECHNIQUES FOR
CERAMIC COATED PISTON
Authors: K APARNA
DOI:
|
735-743 |
Download |
Nearest Ranked Keyword Search Efficiently In Cloud Computing Applications
Authors: GASI LAKSHMI PRAVEENA, DANDA SREEKANTH.
DOI:
|
95-99 |
Download |
A Cross Cloud Approach For Protected Authoritative Deduplications
Authors: NIHARIKA MANDA
DOI:
|
744 – 749 |
Download |
INTERFACING WEB-BASED SOCIAL NETWORKING TO ONLINE BUSINESS USING
SCALE BLOGGING DATA
Authors: CH. KISHORE KUMAR, DR. M.PRIYA, DR. A.MUTHUKUMARAVEL
DOI:
|
750-759 |
Download |
CLOUD COMPUTING FOR RURAL DEVELOPMENT
Authors: K.SRINIVAS, DR. JOSEPH PRAKASH MOSIGANTI
DOI:
|
770-775 |
Download |
SENTIMENT ANALYSIS OF BIG DATA METHODS APPLICATIONS
AND OPEN CHALLENGES
Authors: VANAM SRAVAN DR. RASHMI AGAEWAL
DOI:
|
760-769 |
Download |
ANALYSING USER REVIEW SENTIMENT ON PRODUCT BY DEEP LEARNING
Authors: MS.G.PRASANTHI, D.GANESH REDDY
DOI:
|
91-97 |
Download |
UNDERVOLTAGE AND OVERVOLTAGE PROTECTION OF
ELECTRICAL EQUIPMENT
Authors: AYESHA KOUSAR , Dr. BOINI RAJENDER REDDY,
DOI:
|
770-774 |
Download |