S.No | Name of The Article |
01 | Techniques to Ensure Reliable Data Transfer and Congestion Control in Wireless Networks Authors :B. REVATHI, S.S. RAJA KUMARI |
02 | Active Resource Provision in Cloud Computing Through Virtualization Authors :DANTI SRINIVASULU, J. CHANDRA BABU |
03 | Robust Swarm Management for Multiple Torrent Environments Authors :GOLLA RAVI KUMAR1 J. BALA MURALI KRISHNA |
04 | Protecting Private Information in Social Networks Authors :PENCHALAPRASAD KAKIVAI, S.PRATHAP |
05 | Dynamic Strategies to Stabilize Jobs in Partitioned Public Cloud Authors :DHANU MUKESH, G. LAKSHMI NARAYANA |
06 | Ultra-Wideband Technology Based Specification of Sensor Network Security Protocols Authors :MUDHIREDDY SREENIVASULU REDDY, T.LOKESH |
07 | IR Remote Controlled Water Robot Using ARM7 Authors :P. VIKRAMSINGH, M. A. KHADAR BABA |
08 | A Hybrid Wind-Photovoltaic System with Multi-input CUK and SEPIC Rectifier Topology Authors :N. THRIVIKRAMARAJU, K. KALYANKUMAR |
09 | IR Remote Controlled Water Robot Using ARM7 Authors :P. VIKRAMSINGH, M. A. KHADAR BABA |
10 | The Modeling and Control of a Wind Turbine using Permanent Magnet Synchronous Generator Authors :R. NAGA VENKATA SUDHEER, K. KALYANKUMAR |
11 | Design of an Built In Self Detection & Correction (BISDC) Architecture for Motion Estimation Computing Arrays Authors :KASTHALA CHARAN TEJA, YELITHOTI SRAVAN KUMAR |
12 | Data Security in Cloud Computing using RSA algorithm Authors :S. RADHA, G. HARISH REDDY, K. SATYANARAYANA |
13 | Low Latency on Chip Permutation Network for Multiprocessor System on Chip Authors :K.SAYEEDA AMREEN, R.BASAVARAJU |
14 | Implementation and Analysis of Multiplier using High Speed and Area Efficient Carry Select Adders Authors :K. JULEKHA, V. CHINNA OBULESU |
15 | Spatial Approximate String Search using RSASSOL Authors :JAKKAM REDDY RAMYA SREE, M.HYMAVATHI, P.BABU |
16 | An Efficient Low Power L2 Cache Architecture using Way Tag Information Authors :NOSSAM PRASANNA LAKSHMI, P.RAJESH |
17 | Low-Transition Test Pattern Generation for BIST-Based Applications Authors :MOLAGAVALLI MASTANVALI, R.BASARAJU |
18 | EAACK as IDS for MANETs Authors :T.RAJU, B.RUPA DEVI |
19 | An Extempore Protocol for Secured Wireless MANET Creation Authors :RAMIREDDY SUNEEL, VARIGONDA GOPI |
20 | Secure Multi Keyword Top-k Retrieval over Rijndael Encrypted Cloud Data Authors :S.MAHABOOB VALI, C.USHA RANI |
21 | Design of an Built In Self Detection & Correction (BISDC) Architecture for Motion Estimation Computing Arrays Authors :KASTHALA CHARAN TEJA, YELITHOTI SRAVAN KUMAR |
22 | The Modeling and Control of a Wind Turbine using Permanent Magnet Synchronous Generator Authors :R. NAGA VENKATA SUDHEER, K. KALYANKUMAR |
23 | IR Remote Controlled Water Robot Using ARM7 Authors :P. VIKRAMSINGH, M. A. KHADAR BABA |
24 | A Hybrid Wind-Photovoltaic System with Multi-input CUK and SEPIC Rectifier Topology Authors :N. THRIVIKRAMARAJU , K. KALYANKUMAR |
25 | Power Oscillations Damping By Controllable Hybrid Series Capacitive Compensation Scheme Authors :P. PRASANNA KUMAR,M.BHASKAR REDDY |
26 | Speed Sensorless Control Scheme of Induction Motor against Rotor Resistance Variation Authors :R. M. DEEPTHI BAI, B. MOULI CHANDRA |
27 | Computations of Relay Settings and Development of Programmable Scheme Logic for a Numerical Distance Relay Authors :K. GIRIDHAR, K. S. N. REDDY |
28 | Implementation of IRIS Recognition System using Phase Based Image Matching Algorithm Authors :N. MURALI KRISHNA, DR. P. CHANDRA SEKHAR REDDY |
29 | Design of FIR Filters Implementation Based on Digit-Serial Algorithm Authors :G. DEEPTHI , KAVITHA.R.S |