S.No Name of The Article
01Techniques to Ensure Reliable Data Transfer and Congestion Control in Wireless Networks
Authors :B. REVATHI, S.S. RAJA KUMARI
02Active Resource Provision in Cloud Computing Through Virtualization
Authors :DANTI SRINIVASULU, J. CHANDRA BABU
03Robust Swarm Management for Multiple Torrent Environments
Authors :GOLLA RAVI KUMAR1 J. BALA MURALI KRISHNA
04Protecting Private Information in Social Networks
Authors :PENCHALAPRASAD KAKIVAI, S.PRATHAP
05Dynamic Strategies to Stabilize Jobs in Partitioned Public Cloud
Authors :DHANU MUKESH, G. LAKSHMI NARAYANA
06Ultra-Wideband Technology Based Specification of Sensor Network Security Protocols
Authors :MUDHIREDDY SREENIVASULU REDDY, T.LOKESH
07IR Remote Controlled Water Robot Using ARM7
Authors :P. VIKRAMSINGH, M. A. KHADAR BABA
08A Hybrid Wind-Photovoltaic System with Multi-input CUK and SEPIC Rectifier Topology
Authors :N. THRIVIKRAMARAJU, K. KALYANKUMAR
09IR Remote Controlled Water Robot Using ARM7
Authors :P. VIKRAMSINGH, M. A. KHADAR BABA
10The Modeling and Control of a Wind Turbine using Permanent Magnet Synchronous Generator
Authors :R. NAGA VENKATA SUDHEER, K. KALYANKUMAR
11Design of an Built In Self Detection & Correction (BISDC) Architecture for Motion Estimation Computing Arrays
Authors :KASTHALA CHARAN TEJA, YELITHOTI SRAVAN KUMAR
12Data Security in Cloud Computing using RSA algorithm
Authors :S. RADHA, G. HARISH REDDY, K. SATYANARAYANA
13Low Latency on Chip Permutation Network for Multiprocessor System on Chip
Authors :K.SAYEEDA AMREEN, R.BASAVARAJU
14Implementation and Analysis of Multiplier using High Speed and Area Efficient Carry Select Adders
Authors :K. JULEKHA, V. CHINNA OBULESU
15Spatial Approximate String Search using RSASSOL
Authors :JAKKAM REDDY RAMYA SREE, M.HYMAVATHI, P.BABU
16An Efficient Low Power L2 Cache Architecture using Way Tag Information
Authors :NOSSAM PRASANNA LAKSHMI, P.RAJESH
17Low-Transition Test Pattern Generation for BIST-Based Applications
Authors :MOLAGAVALLI MASTANVALI, R.BASARAJU
18EAACK as IDS for MANETs
Authors :T.RAJU, B.RUPA DEVI
19An Extempore Protocol for Secured Wireless MANET Creation
Authors :RAMIREDDY SUNEEL, VARIGONDA GOPI
20Secure Multi Keyword Top-k Retrieval over Rijndael Encrypted Cloud Data
Authors :S.MAHABOOB VALI, C.USHA RANI
21Design of an Built In Self Detection & Correction (BISDC) Architecture for Motion Estimation Computing Arrays
Authors :KASTHALA CHARAN TEJA, YELITHOTI SRAVAN KUMAR
22The Modeling and Control of a Wind Turbine using Permanent Magnet Synchronous Generator
Authors :R. NAGA VENKATA SUDHEER, K. KALYANKUMAR
23IR Remote Controlled Water Robot Using ARM7
Authors :P. VIKRAMSINGH, M. A. KHADAR BABA
24A Hybrid Wind-Photovoltaic System with Multi-input CUK and SEPIC Rectifier Topology
Authors :N. THRIVIKRAMARAJU , K. KALYANKUMAR
25Power Oscillations Damping By Controllable Hybrid Series Capacitive Compensation Scheme
Authors :P. PRASANNA KUMAR,M.BHASKAR REDDY
26Speed Sensorless Control Scheme of Induction Motor against Rotor Resistance Variation
Authors :R. M. DEEPTHI BAI, B. MOULI CHANDRA
27Computations of Relay Settings and Development of Programmable Scheme Logic for a Numerical Distance Relay
Authors :K. GIRIDHAR, K. S. N. REDDY
28Implementation of IRIS Recognition System using Phase Based Image Matching Algorithm
Authors :N. MURALI KRISHNA, DR. P. CHANDRA SEKHAR REDDY
29Design of FIR Filters Implementation Based on Digit-Serial Algorithm
Authors :G. DEEPTHI , KAVITHA.R.S