MAY

VOLUME 2, ISSUE 5, MAY 2015

Access Policy Consolidation For Event Processing Systems
Arun R Nair & D Teja Santosh
A Security System That Addresses the Problem of Dynamically Mining and Extracting Information
G R Rajitha & M Akkalakshmi
Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain
Kamarasa V D S Santhosh & G.Sri Sowmya
Event Based Cut Detection in Wireless Sensor Networks Using DOS and CCOS Methodology
V.Teja & D.Vijaya Lakshmi
Providing Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control
T.Lakshmi & K.Sudheer Babu
Highly Secure Data Sharing in Cloud Storage with Key Aggregation Cryptosystem
T.Divya & Mr. Arif Mohammad Abdul
A Load Balancing Model Based on Cloud Partitioning for Public Cloud Using Game Theory
K.Mahesh & Mr B.Rajendra Prasad Babu
Improving Effectiveness by Clustering of BioMedical Documents Using Semi supervised Clustering Method
M.Mounika & Dr. Sudarson Jena
Security for Decentralized Disruption-Tolerant Military Networks
P.Bhavana & Yugandhar Garapati
Detecting and Mitigating Collaborative Attacks using NICE in Virtual Network systems
Y.Srilakshmi & Mr.S.D.Vara Prasad
Study of Key Pre-Distribution Schema in WSN Based on Unital Design Theroy
P.Priyanka & Mrs K.Nikitha
Providing Ranks to Services in Cloud Computing Environment Based on Quality of Service
V.Mounika Iashwarya & B.Mallikarjuna
Study of Association Rules In Horizontally Distributed Databases With High Security
M.Bhargav Kumar & CH.Venkatarami Reddy
An Area Efficient Multiplier Design Using Fixed-Width Replica Redundancy
P.Madhura & Mr.V.Jayachandra Naidu
An Efficient Design of Memory-Based Realization of FIR Digital Filter
Ms.K.Neeraja & Dr.C.Chandrasekhar
Review on Methods of Content Based Image Retrieval
Miti.H.Desai & Neeta Chudasama
Physical Design Implementation of I2C Bus Master Controller
Panthnagi Saidulu & N.Nirmala Devi
Scalable Data Sharing in Cloud Storage by Using Key-Aggregate Cryptosystem
K.G.Kedarnath, M.Sowmya, N. Musrat Sultana & K.Shirisha
(K, X)-Bottleneck in the System For Multi-Hop Wireless Networks
D.Lakshmi Chaitanya & G.Shiva Kumar
Path Aggregation for QOS Provisioning for Peer-to-Peer Streaming
M.Prathyusha & G.Anitha
An Improved Opinionated Ranking Retrieval System from Blogs
N.Sprushya & M.Swapna
Thinking in the Marketing Capacity Building Practice Marketing
Baqerkhudhair Abdul Al-Abbas Alhadrawi & Dergham Mohammed Shati Khaqani
Hiding an Image into Multiple Videos Using Message Digest Algorithm
Avinash & Vivek Jaladi
FPGA Controlled Rover through Android Smartphone
Damarla Ramya & V.C. Madavi
A Case Study on Built Operate and Transfer
K. Muni Swamy & A. Rama Krishnaiah
Design and Analysis of Fly Wheel and By Using CATIA and ANSYS Software
Pagoti Lokesh & Mr. B.Ashok Kumar
Implementation of Health Monitoring System for Heart Pulse Using Pletysmographic Sensor and Temperature Detection Using Wireless Communication
D. Monica & B. Suneela
Modeling and Simulation of Power Control of a Wind Turbine Permanent Magnet Synchronous Generator System
G.Ashwini, Mr.G.Srinivasulu Reddy & Dr.I.Prabhakar Reddy
Design and Implementation of an Advanced Home Automation System using Android and GSM Technologies
Mrs. Geetha Mrunalini.Kadiyam, Mr. K.Rajasekhar & Mr. A.Pravin
Multi biometric system using Face Recognition by SIFT Algorithm and RFID with SMS reporting system
S.Saleem Azad & Syed Samiuddin
The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment
Majjaru Chandra Babu
Novel Design and Implementation of Self Organizing Trust Model for Peer – Peer Systems
E. Latha & T. Moulika
An Adaptive Downloading Service from Object Storage Cloud
T.Avinash & T. Moulika
Design and Implementation of Complex Multiplier Using Compressors
Shaik Mohammed Sadiq & P.Prathap
Identity-Based Integrity Verification Using PDP in Multi Cloud Storage
Ch.Baji Babu & Mr.Ch. Mohan Babu
An Efficient Design of Frame Synchroinization in FPGA
Bhumi Reddy Maha Lakshmi & Y.Murali Mohan Babu
Synthesis and Simulation of Look-Ahead Clock Gating Technique
J.Pradeep & R.Mahesh Kumar
Observer Synthesis for Nonlinear of Switched Dynamical Systems Application to Bioreactor
T.Sanjeev Rao, D.Swathi & M.Praveen Kumar
A Novel Algorithm for View and Illumination
Face Recognition

Pulagam Madhavi & Mrs.Udayini Chandana
Automatic Ventilation of Vehicle Interior Using ARM7
N Rajesh Reddy & K Venkatramana Reddy
An Improved Speech Denoising and Enhancement Based on Radon Transform and Local Ridgelet Transform
P. P. S. Subhashini & J. Ravindranadh
Implementation of Zigbee Based Smart Grid to Remotely Monitor And Control Using Renewable Energy Sources
V.Prasanth & K.Venkatesh
Power Quality Improvement of Electrical Railway System by Fuzzy Logic Based Direct Power Control with Space Vector Modulation
M.Sandeep Kumar & M.Lokesh
A Novel Architecture for Booth Multiplier Using MCSLA and CBL
D.Ravindra Reddy, Mrs.D.Rama Devi & Dr.P.Ram Mohan Rao
Secure Cloud Transactions by Performance, Accuracy and Precision
Patil Vaibhav Nivrutti & K Suresh Kumar
Traffic Sign Recognition for Advanced Driver Assistance Using Matlab and Embedded Systems
Pola Naveen Kumar & Mr.B.Nanda Kumar
Mutual Authority Using Privacy Preserving and Authentication Protocol in Cloud Computing
Ali Abdulbaqi Abdulazeez
SEFM-Cloud: A Structure of Social Video Efficient & Flowing Adaptive Mobile Video in the Clouds
Ahmed Khaldoon Abdulateef & T. Ramdas Naik
Togther4Ever: A Social Network with a Social Life Based Friend Recommendation System
Aiman Muneam Suhail
Design and Implementation of Aging-Aware Reliable Multiplier by Using Booth Algorithm
Thakur Vishesh Singh, K. Kumara Swamy & Dr.P.Ram Mohan Rao
Effectiveness of Fiber Optic Cable Technology in Domestic Communications
Sridhar Goud Arelli
Comprasion of Compressive Strength of M20 Grade Fly Ash with Rice Husk Ash Concrete
Reshma.S & Dr.S.Siddiraju
A Novel Approach for Automated Color Segmentation of Tuberculosis Bacteria through Region Growing
M. Hemalatha, A.V. Kiranmai & D.Sreehari
Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)
Avinash & Vivek Jaladi
Secure and Constant Cost Hybrid Cloud Storage Auditing With Deduplication
Divya Vijay Kandalkar & Prof. R.R.Bhambare
Survey Paper of Discrete Wavelet Transform-Based Satellite Image Resolution Enhancementmethod
Saudagar Arshed Salim & Mr. Vinod Shinde
Advanced SPWM Controller with 3 Phase Ups System Operating in Extream Nonlinear Load
Archana R. Sonawane & Prof.R.R.Bhambare
Reduction of Noise Based on Partial-Reference, Dual-Treewavelet Transform Compressing
Manisha Vidyasagar Gawai & Prof.R.R.Bhambare
Survey Paper on Edge and Corner Detection Algorithms
Mrs.Payal S.Khawase, Prof.G.M.Phade & Prof.P.A.Dhulekar
Design of a Single Phase Clock Multiband Flexible Divider Using Low Power Techniques
J.Santoshini & Rani Rajesh
An Assessment on Cloud Computing Data Security and Exploration
V.Ashok Gajapathi Raju & G.Nagendra Kumar
Seismic Events Identification below the Surface by Using 3d Seismic Data Acquisition and Processing Techniques in Ramnad Sub-Basin, Chennai, ONGC
Priyanka Palivela
Advance Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
J. Kiranmai & K.Raju
A novel method for Online Shortest Path
M.Prathibha Bharathi & T. Moulika
Privateness-Protect Diffuse Keywords Classified Searching Over Cloud Computing
Ali Naji Yasser & T. Ramdas Naik
Implementation of Novel BP Algorithm for LDPC Decoding on a General Purpose Mobile ARM11 CPU
R.Ramyashree, K.Bramaramba & Prof. A.Gopala Sharma
Controlling and Monitoring the Various Applications of Embedded Wireless Sensor Network
S.Priyanka & M.Srilakshmi Ravali
Auto Metro Train to Shuttle Between Stations
Parkash Ratan & Chandra Jogi
Evolutional History of Fable Stories and Their Influence on Culture in Ancient World
Arjuman Sultana Nishat
An Automatic Analysis Technique in Order to Deduce Search Results From Search Engines for Efficient Machine Processing
Kadambala Sankar & Chintada Sunil Kumar
Modified (2PVCP) to Balance Performance, Accuracy and Precision for Transactions in Secure Cloud
Salam Allawi Hussein
Data Ownership Collaborative Evidence for Verifying Integrity in Multi-Cloud Storage
Alyaa Abduljawad Mahmood
Filtering False Evidence Sequentially and Distributed By Extending Bayesian Malware Detection to DTNS
Mahmoud Saeed Al-Jabari & T. Ramdas Naik
Identifying and Removing, Irrelevant and Redundant Features in High Dimension Data Using Feature Subset
Ghazi Fuad Khamis Rabi Abunqara & T. Ramdas Naik
F. Scott Fitzgerald`S the Great Gatsby as A Significant Work of the Lost Generation
Ammar Zuher Ahmed
Design of 8-Bit MCC Convey Chain Adder with Using Two 4-Bit Chains in Domino Logic
Mrs.Farha Anjum, Mr.Mohammad Iliyas, Dr.Anil Kumar Sharma & Dr.R.Murali Prasad
Power Quality Improvement by using DSTATCOM for Distribution System
Mohd Abdul Kareem & Dr.Dalvinder Kaur Mangal