S.No Name of The Article
01Generalized Energy Detector (GED) Based on Two Level Thresholding for Cognitive Radio Communications
Authors :S.MAMATHA, K.APARNA
02Secure Authorized Deduplication using Hybrid Cloud Approach
Authors :SABDUL AZAM, S.G.NAWAZ, M.HARATHI
03Scalable Data Sharing In Cloud Storage using Key Aggregatation
Authors :L. HARSHAVARDHAN, P. SHAKEEL AHAMED, P. BABU
04Containment of Proximity Malware Behavioral Detection in Delay Tolerant Networks
Authors :S.IRAFANA BEGUM, S.G.NAWAZ
05Enhanced Multivariate Correlation Analysis Model for Attack Detection System
Authors :SYED LARA, SK. NAZEER BASHA, P.BABU
06Supporting Security and Consistency for Distributed, Concurrent Access to Cloud Databases
Authors :S.RAZIA, S.G.NAWAZ, M.HARATHI
07Auditing Consistency of Cloud using Consistency as Service
Authors :NITHESH KUMAR K, P.SHAKEEL AHAMED, P.BABU
08Security Framework of Service Integrity Attestation for Software-As-A-Service Clouds
Authors :P.SAI PRIYA, S.G.NAWAZ, M.HARATHI
09Elastic Data Sharing Services for Cloud Based On Best Peer-To-Peer Networks
Authors :SHAIK SHAMEERBABU, CH. SUBBA RAO, P.BABU
10Scalable and Secure Personal Health Records in Cloud using Attribute Based Encryption with Checkability
Authors :P.VANI, S.G.NAWAZ
11A Balancing Energy Consumption Method for Wireless Sensor Network
Authors :SYED THASEEN, SYED AKHTAR, P.BABU
12An Analysis of Mechanical Property Optimization of AL-65032 Alloy using Taguchi Metal Inert Gas (MIG) Welding
Authors :DARA ESHWAR, DR. A. C. S. KUMAR, DR. B. KOTI VEERA CHARI
13An Efficient and Enhanced Low Power ETI Encoder for Serial Communication Links
Authors :U. APARNA DEVI, CH. JAYA PRAKASH
14An Efficient and Reliable Fingerprint Matching Authentication by FFT
Authors :D. SATYA PRIYANKA, D. LAKSHMI SAISREE, K. LAKSHMI NARAYAN
15A Combined Approach for Biometric System in Secured Applications
Authors :D. LAKSHMI SAISREE, D. SATYA PRIYANKA, K. LAKSHMI NARAYAN
16WatchDog: A Malicious URL Detection System for Social Networks (Twitter)
Authors :MADDALI SAIPOOJA, K. CHANDRA BABU
17An Efficient Algorithm for RMSA Nonlinear Elastic Optical Networks
Authors :SHAIK SHABANA, SYED ABDUL HAQ
18LLR Enhanced Model with Turbo Decoder for Index Assignment of Exit Optimization
Authors :CH. BALARAMA KRISHNA SAIBABA, CH. RAVI KUMAR
19A Reconfigurable Area &Time Optimized FPGA using APC and OMS Algorithms
Authors :P. RATHAN KISHORE, H. SUDHAKAR
20A Noval Approach of Information Sending using Mosaic Concept
Authors :T. PREM BOSCO, G. SRI LATHA
21Implementation of High Speed Multiplexer Based Scalable Comparator
Authors :Y. GRACE JWALA, K. MAHAMMAD HANEEF, MAHESWAR REDDY
22Privacy Preserving Public Analyze for Mundane Information in Cloud
Authors :D. CHANDANA, S. PRATHAP
23Ranked Query Assistance in Un-trusted Cloud Helper without Reveal Sensitive Data
Authors :S. V. JYOSTHNA, C. USHA RANI
24Design of Modified Modular Multipliers for RSA Cryptosystems
Authors :V. ROOPA THEJASWINI, T. VIJAYA NIRMALA
25Design of High Order Multiprecision Multiplier for DSP Based Voltage Scaling Applications
Authors :V. Z. SHAISTA SAMREEN, D. VIDYASAGAR, SYED SALEEM
26Design of an Enhanced Pulse Compression Techniques Using Polyphase Biphase And LFM
Authors :R. PRIYA LATHA, I. HEMA LATHA
27Two State Anonymity Privacy on Sensitive Labels and Attack on the Graphs
Authors :SATEESH MANCHALA, SUMALATHA. K
28Video Processing Implementation using FPGA
Authors :PRABHIJOT KOUR, K DHANUNJAYA
29Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
Authors :S.M.SISHA, SK.KARIMULLA, DR.PRAVEEN SHAM
30Optimized Balanced Scheduling Based Data Anonymization using Two Phase TDS Approach on Cloud
Authors :NUTHALAPATI SRILAKSHMI, SD.ABUL HAQ, P.BABU