| S.No | Name of The Article |
| 01 | Generalized Energy Detector (GED) Based on Two Level Thresholding for Cognitive Radio Communications Authors :S.MAMATHA, K.APARNA |
| 02 | Secure Authorized Deduplication using Hybrid Cloud Approach Authors :SABDUL AZAM, S.G.NAWAZ, M.HARATHI |
| 03 | Scalable Data Sharing In Cloud Storage using Key Aggregatation Authors :L. HARSHAVARDHAN, P. SHAKEEL AHAMED, P. BABU |
| 04 | Containment of Proximity Malware Behavioral Detection in Delay Tolerant Networks Authors :S.IRAFANA BEGUM, S.G.NAWAZ |
| 05 | Enhanced Multivariate Correlation Analysis Model for Attack Detection System Authors :SYED LARA, SK. NAZEER BASHA, P.BABU |
| 06 | Supporting Security and Consistency for Distributed, Concurrent Access to Cloud Databases Authors :S.RAZIA, S.G.NAWAZ, M.HARATHI |
| 07 | Auditing Consistency of Cloud using Consistency as Service Authors :NITHESH KUMAR K, P.SHAKEEL AHAMED, P.BABU |
| 08 | Security Framework of Service Integrity Attestation for Software-As-A-Service Clouds Authors :P.SAI PRIYA, S.G.NAWAZ, M.HARATHI |
| 09 | Elastic Data Sharing Services for Cloud Based On Best Peer-To-Peer Networks Authors :SHAIK SHAMEERBABU, CH. SUBBA RAO, P.BABU |
| 10 | Scalable and Secure Personal Health Records in Cloud using Attribute Based Encryption with Checkability Authors :P.VANI, S.G.NAWAZ |
| 11 | A Balancing Energy Consumption Method for Wireless Sensor Network Authors :SYED THASEEN, SYED AKHTAR, P.BABU |
| 12 | An Analysis of Mechanical Property Optimization of AL-65032 Alloy using Taguchi Metal Inert Gas (MIG) Welding Authors :DARA ESHWAR, DR. A. C. S. KUMAR, DR. B. KOTI VEERA CHARI |
| 13 | An Efficient and Enhanced Low Power ETI Encoder for Serial Communication Links Authors :U. APARNA DEVI, CH. JAYA PRAKASH |
| 14 | An Efficient and Reliable Fingerprint Matching Authentication by FFT Authors :D. SATYA PRIYANKA, D. LAKSHMI SAISREE, K. LAKSHMI NARAYAN |
| 15 | A Combined Approach for Biometric System in Secured Applications Authors :D. LAKSHMI SAISREE, D. SATYA PRIYANKA, K. LAKSHMI NARAYAN |
| 16 | WatchDog: A Malicious URL Detection System for Social Networks (Twitter) Authors :MADDALI SAIPOOJA, K. CHANDRA BABU |
| 17 | An Efficient Algorithm for RMSA Nonlinear Elastic Optical Networks Authors :SHAIK SHABANA, SYED ABDUL HAQ |
| 18 | LLR Enhanced Model with Turbo Decoder for Index Assignment of Exit Optimization Authors :CH. BALARAMA KRISHNA SAIBABA, CH. RAVI KUMAR |
| 19 | A Reconfigurable Area &Time Optimized FPGA using APC and OMS Algorithms Authors :P. RATHAN KISHORE, H. SUDHAKAR |
| 20 | A Noval Approach of Information Sending using Mosaic Concept Authors :T. PREM BOSCO, G. SRI LATHA |
| 21 | Implementation of High Speed Multiplexer Based Scalable Comparator Authors :Y. GRACE JWALA, K. MAHAMMAD HANEEF, MAHESWAR REDDY |
| 22 | Privacy Preserving Public Analyze for Mundane Information in Cloud Authors :D. CHANDANA, S. PRATHAP |
| 23 | Ranked Query Assistance in Un-trusted Cloud Helper without Reveal Sensitive Data Authors :S. V. JYOSTHNA, C. USHA RANI |
| 24 | Design of Modified Modular Multipliers for RSA Cryptosystems Authors :V. ROOPA THEJASWINI, T. VIJAYA NIRMALA |
| 25 | Design of High Order Multiprecision Multiplier for DSP Based Voltage Scaling Applications Authors :V. Z. SHAISTA SAMREEN, D. VIDYASAGAR, SYED SALEEM |
| 26 | Design of an Enhanced Pulse Compression Techniques Using Polyphase Biphase And LFM Authors :R. PRIYA LATHA, I. HEMA LATHA |
| 27 | Two State Anonymity Privacy on Sensitive Labels and Attack on the Graphs Authors :SATEESH MANCHALA, SUMALATHA. K |
| 28 | Video Processing Implementation using FPGA Authors :PRABHIJOT KOUR, K DHANUNJAYA |
| 29 | Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage Authors :S.M.SISHA, SK.KARIMULLA, DR.PRAVEEN SHAM |
| 30 | Optimized Balanced Scheduling Based Data Anonymization using Two Phase TDS Approach on Cloud Authors :NUTHALAPATI SRILAKSHMI, SD.ABUL HAQ, P.BABU |