S.No | Name of The Article |
01 | Generalized Energy Detector (GED) Based on Two Level Thresholding for Cognitive Radio Communications Authors :S.MAMATHA, K.APARNA |
02 | Secure Authorized Deduplication using Hybrid Cloud Approach Authors :SABDUL AZAM, S.G.NAWAZ, M.HARATHI |
03 | Scalable Data Sharing In Cloud Storage using Key Aggregatation Authors :L. HARSHAVARDHAN, P. SHAKEEL AHAMED, P. BABU |
04 | Containment of Proximity Malware Behavioral Detection in Delay Tolerant Networks Authors :S.IRAFANA BEGUM, S.G.NAWAZ |
05 | Enhanced Multivariate Correlation Analysis Model for Attack Detection System Authors :SYED LARA, SK. NAZEER BASHA, P.BABU |
06 | Supporting Security and Consistency for Distributed, Concurrent Access to Cloud Databases Authors :S.RAZIA, S.G.NAWAZ, M.HARATHI |
07 | Auditing Consistency of Cloud using Consistency as Service Authors :NITHESH KUMAR K, P.SHAKEEL AHAMED, P.BABU |
08 | Security Framework of Service Integrity Attestation for Software-As-A-Service Clouds Authors :P.SAI PRIYA, S.G.NAWAZ, M.HARATHI |
09 | Elastic Data Sharing Services for Cloud Based On Best Peer-To-Peer Networks Authors :SHAIK SHAMEERBABU, CH. SUBBA RAO, P.BABU |
10 | Scalable and Secure Personal Health Records in Cloud using Attribute Based Encryption with Checkability Authors :P.VANI, S.G.NAWAZ |
11 | A Balancing Energy Consumption Method for Wireless Sensor Network Authors :SYED THASEEN, SYED AKHTAR, P.BABU |
12 | An Analysis of Mechanical Property Optimization of AL-65032 Alloy using Taguchi Metal Inert Gas (MIG) Welding Authors :DARA ESHWAR, DR. A. C. S. KUMAR, DR. B. KOTI VEERA CHARI |
13 | An Efficient and Enhanced Low Power ETI Encoder for Serial Communication Links Authors :U. APARNA DEVI, CH. JAYA PRAKASH |
14 | An Efficient and Reliable Fingerprint Matching Authentication by FFT Authors :D. SATYA PRIYANKA, D. LAKSHMI SAISREE, K. LAKSHMI NARAYAN |
15 | A Combined Approach for Biometric System in Secured Applications Authors :D. LAKSHMI SAISREE, D. SATYA PRIYANKA, K. LAKSHMI NARAYAN |
16 | WatchDog: A Malicious URL Detection System for Social Networks (Twitter) Authors :MADDALI SAIPOOJA, K. CHANDRA BABU |
17 | An Efficient Algorithm for RMSA Nonlinear Elastic Optical Networks Authors :SHAIK SHABANA, SYED ABDUL HAQ |
18 | LLR Enhanced Model with Turbo Decoder for Index Assignment of Exit Optimization Authors :CH. BALARAMA KRISHNA SAIBABA, CH. RAVI KUMAR |
19 | A Reconfigurable Area &Time Optimized FPGA using APC and OMS Algorithms Authors :P. RATHAN KISHORE, H. SUDHAKAR |
20 | A Noval Approach of Information Sending using Mosaic Concept Authors :T. PREM BOSCO, G. SRI LATHA |
21 | Implementation of High Speed Multiplexer Based Scalable Comparator Authors :Y. GRACE JWALA, K. MAHAMMAD HANEEF, MAHESWAR REDDY |
22 | Privacy Preserving Public Analyze for Mundane Information in Cloud Authors :D. CHANDANA, S. PRATHAP |
23 | Ranked Query Assistance in Un-trusted Cloud Helper without Reveal Sensitive Data Authors :S. V. JYOSTHNA, C. USHA RANI |
24 | Design of Modified Modular Multipliers for RSA Cryptosystems Authors :V. ROOPA THEJASWINI, T. VIJAYA NIRMALA |
25 | Design of High Order Multiprecision Multiplier for DSP Based Voltage Scaling Applications Authors :V. Z. SHAISTA SAMREEN, D. VIDYASAGAR, SYED SALEEM |
26 | Design of an Enhanced Pulse Compression Techniques Using Polyphase Biphase And LFM Authors :R. PRIYA LATHA, I. HEMA LATHA |
27 | Two State Anonymity Privacy on Sensitive Labels and Attack on the Graphs Authors :SATEESH MANCHALA, SUMALATHA. K |
28 | Video Processing Implementation using FPGA Authors :PRABHIJOT KOUR, K DHANUNJAYA |
29 | Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage Authors :S.M.SISHA, SK.KARIMULLA, DR.PRAVEEN SHAM |
30 | Optimized Balanced Scheduling Based Data Anonymization using Two Phase TDS Approach on Cloud Authors :NUTHALAPATI SRILAKSHMI, SD.ABUL HAQ, P.BABU |