arrow
CURRENT
 
  Special Issue of ICACSSE 2014, held on October 10, 2014 in St. Ann’s College of Engineering & Technology, Chirala, Andhra Pradesh India
Article - 1
Title
Software Testing, Analysis and Objectives
Pages :01 - 04
 
Authors
Dr. Leelavathi Rajamanickam
       
Article - 2
Title
A naive Fuzzy Clustering Method for Pixel Segmentation by using Differential Evolution
Pages :05 - 10
 
Authors
A. Srikrishna, V. Sesha Srinivas , V. Rajiv Jetson
       
Article - 3
Title
Multi-Recipient Action Based Tapping in Email Communication
Pages : 11-16
 
Authors
Kusha Chopra, Ajay Jain
       
Article - 4
Title
Performance of Modified Jacobi Sequences with Good Merit Factor
Pages :17-24
 
Authors
K. Gurumurty, D.TirumalaRao, G. ManmadhaRao
       
Article - 5
Title
Traffic Management Using Fuzzy Control System in Net
Pages : 25-28
 
Authors
P.Manikanta, T.N Shankar
       
Article - 6
Title
High Speed and Low Power Implementation of FIR Filter Design using DADDA & WALLACE Tree Multiplier
Pages :29-34
 
Authors
D.G.Jignash, Jami Venkata Suman
       
Article - 7
Title
Removal of low and high density salt and pepper noise using combination of Fuzzy logic and Median Filter
Pages :35-39
 
Authors
B.Sravani, Dr.M.V.Nageswara Rao
       
Article -8
Title
DESIGN OF A SYNTHESIZABLE PIPELINED MIPS CORE FOR EMBEDDED APPLICATIONS
Pages :40-44
 
Authors
Venkateswarlu Kota, D.Tirumala Rao
       
Article - 9
Title
An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain
Pages :45-48
 
Authors
K.Babyrani , T.Geetamma
       
Article - 10
Title
DIGITAL IMAGE NOISE FILTERING USING EVOLVABLE HARDWARE
Pages :49-53
 
Authors
T.Jenny, T.Geetamma
       
Article -11
Title
Power Saving and Reducing Transmission Delay in WSN using DMP Scheme
Pages :54-59
 
Authors
T.Venkata Sateesh Babu, B.Anil Kumar
       
Article -12
Title
GNU Radio Based BIST for SDR Performance Measurement
Pages :60-63
 
Authors
Remya P S, Prof. B I Neelgar, Shibu R M
       
Article -13
Title
Prioritized Coding of Multiple ROIs on Medical Image
Pages :64-67
 
Authors
D.Vasanta, S. Sri Durgakameswari
       
Article - 14
Title
Lifting Bi-orthogonal Wavelet Transform Based Edge Feature Extraction
Pages :68-71
 
Authors
S.Devendra, P.M.K.Prasad
       
Article -15
Title
Optimal Location of STATCOM for Voltage Security Enhancement Using PSO
Pages :72-76
 
Authors
K.Praveena kumari, V.Srikanth Babu
       
Article - 16
Title
Importance of Load Balancing in Cloud Computing Environment: A Review
Pages :77-82
 
Authors
Yadaiah Balagoni, Dr.R.Rajeswara Rao
       
Article - 17
Title
128-bit Advanced Encryption Standard Algorithm implementation on FPGA
Pages :83-88
 
Authors
P.Ravisankararao, Dr. M.V.Nageswararao
       
Article - 18
Title
Security Based Intrusion-Detection System for Ad hoc mobile wireless networks
Pages :89-93
 
Authors
Addanki Kalyani, Dr. P. Harini
       
Article - 19
Title
Supervision termination for multipath routing with intervention detection in wireless sensor networks
Pages :94-97
 
Authors
Anil kumar.K, Eswar.K
       
Article - 20
Title
A Novel Framework Lime Lighting Dedup Over Caches in an Tacit Dope Center
Pages :98-104
 
Authors
B. SriLakshmi , Dr P. Harini
       
Article - 21
Title
An Efficient Secure Parallel Distributed Control Protocol for Content Delivery Networks
Pages :105-110
 
Authors
VARDHANA KUMAR CHELLI, YEZARLA CHITTI BABU
       
Article - 22
Title
Defending against Flood Attacks in Distraction Unbiased Networks
Pages :111-115
 
Authors
CHINTHA ANKI REDDY, AVS SUDHAKARA RAO
       
Article - 23
Title
EMAP: A Novel Approach for Providing the Security in the Vehicular Ad Hoc Network (VANET)
Pages :116-121
 
Authors
S.Durga Bhavani, Dr. P. Harini
       
Article - 24
Title
ELEVATED RECITAL COMMUNICATION IN MIMO ADHOC ASSOCIATIONS BY MANIPULATING
SUPPORTIVE CONVEY
Pages :122-125
 
Authors
G.SamuelPramod, Eswar. K
       
Article - 25
Title
A Person and Proclamation identification by using Local Directional Number Pattern
Pages :126-131
 
Authors
G Ganeshbabu, Y Sowjanya Kumari
       
Article - 26
Title
AN EXTREMELY ASCENDIBLE KEY PRE-DISTRIBUTION THEME FOR WIRELESS DEVICE NETWORKS
Pages :132-137
 
Authors
G.V.Abhiram, T.Y. Srinivasa Rao
       
Article - 27
Title
Least Outlay Jamming Obstruction In Multi Path Wireless Routing Protocols
Pages :138-142
 
Authors
GOVATHOTI BIKSHALU, YEZARLA CHITTI BABU
       
Article - 28
Title
Presumable Study of Single Sign-on Technique for Distributed Network Systems
Pages :143-147
 
Authors
GurralaVenkataMohana Sai, Dr P.Harini
       
Article - 29
Title
Efficient Distributed Profile Matching Using Multi-Party Computation in Mobile Social Networks
Pages :148-151
 
Authors
V.Himabindu, , Dr P.Harini
       
Article - 30
Title
Energy-Efficient Cooperative Video Distribution with applied mathematics QoS Provisions over Wireless Networks
Pages :152-157
 
Authors
Sk. Jilani, Y. Chitti Babu
       
Article - 31
Title
Communication Networks Based on Price Differentiation
Pages :158-163
 
Authors
K. Uma Maheswara Rao, T .Y. Srinivasa Rao
       
Article -32
Title
Node Stateless In Mantes Network Management By Using Statistics And Security Identifies Protocol
Pages :164-168
 
Authors
K Maheshbabu, Y Sowjanya Kumari
       
Article - 33
Title
Exemplar rooted digital inpainting image
Pages :169-172
 
Authors
K Ramesh, Y Sowjanya Kumari
       
Article - 34
Title
PRECLUDING SPAMS BY USING REVOCABLE DATA SMACKING IN ENCRYPTED IMAGES
Pages :173-177
 
Authors
K.Siddhartha, Eswar.K
       
Article - 35
Title
Query Generation for Multimedia Data Selection and Presentation
Pages :178-183
 
Authors
M Suresh, Y Sowjanya Kumari
       
Article - 36
Title
Defending Computer Networks from Covert Operations using Chaos Theory
Pages :184-188
 
Authors
Meruga Vishal Bharadwaj, AVS Sudhakara Rao
       
Article - 37
Title
ICMP: A Novel Profile Matching Scheme in Mobile Social Networks
Pages :189-194
 
Authors
Prabhakara Rao Motan, Dr. P. Harini
       
Article - 38
Title
WIRELESS AD HOC NETWORKS CREATION BASED ON SECURE PROTOCOL
Pages :195-202
 
Authors
KP.V.L.N Swaamy, Dr.R P.Harini
       
Article - 39
Title
Firewall Optimization for Privacy-Preserving With Cross Domain
Pages :203-206
 
Authors
NarendraKaranam, S.Anil Kumar
       
Article - 40
Title
A Pragmatic Intervention Model For Network Consistency Evaluation In Wireless Networks
Pages :207-211
 
Authors
PALLAPATI SOLMON , YEZARLA CHITTI BABU
       
Article - 41
Title
Attribute-Aware information Aggregation exploitation Potential-Based Dynamic Routing in Wireless detector Networks
Pages :2212-217
 
Authors
P Sivaparvathi, Y Sowjanya Kumari
       
Article - 42
Title
A Joint Congestion Control and Scheduling Algorithm for Decreasing the Delay in Multihop Wireless Networks
Pages :218-222
 
Authors
Poluri Koteswararao, K Subbarao
       
Article - 43
Title
Robust Satellite Image Resolution Enhancement using Double Density Dual Tree Complex Wavelet Transform
Pages :223-228
 
Authors
G.Prasanthi, Dr. P. Harini
       
Article - 44
Title
Companionate Data in Wireless Sensor Network with Prune Delay
Pages :229-233
 
Authors
RAJESH BABU KETHAMALA, YEZARLA CHITTI BABU, Dr.P.HARINI
       
Article - 45
Title
Scalable Reliable Multicasting in Delay Tolerant Networks with Erasure Correction
Pages :234-238
 
Authors
P.S. Naveen Kumar, Dr. P.Harini
       
Article - 46
Title
DYNAMIC MANAGEMENT OF CRYPTOGRAPHY FOR PROGRESSIVE PACKET ARRIVALS IN DTNS
Pages :239-243
 
Authors
V.Sivakrishna, Dr.P.Harini
       
Article - 47
Title
Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control
Pages :244-248
 
Authors
Sajja Srinivas, Dr P Harini
       
Article - 48
Title
Noise Removing for Enhanced Images using Wavelet Transform
Pages :249-253
 
Authors
KATHI SYAM DAIVA KRUPA, K. SUBBA RAO
       
Article - 49
Title
Secure sharing in distributed information Management Applications
Pages :254-259
 
Authors
Thota Beula, Eswar Kodali
       
Article - 50
Title
Facilitating Indirect Mutual Trust for Cloud Storage Systems
Pages 260-:266
 
Authors
Vaddepati Venkata Srikanth, Eswar Kodali
       
Article - 51
Title
OPPORTUNISTIC MANETS: QUALITY WILL FRAME FOR LOW TRANSMISSION POWER
Pages :267-271
 
Authors
K.Venu, T .Y. Srinivasa Rao
       
Article -52
Title
Face Ascertain Based Method For Accessible By Pardons Words
Pages :272-277
 
Authors
YAGNANARAYANANAKKALA,SATHUPATI ANIL KUMAR
       
Article - 53
Title
SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management
Pages :278-281
 
Authors
Y.SHEILA, Dr.P.HARINI
       
Article - 54
Title
Cloud based Structure Approach of Content-As-A-Service for Supplier Impartial of Mobile Gadgets
Pages :282-287
 
Authors
Maddali M. V. M. Kumar, Rajesh Ghanta
       
Article -55
Title
Comparing Performance of Kalman Filtering and DWT based Speech Enhancement Techniques
Pages :288-293
 
Authors
K.Raghavendra Rao , Suneel Miriyala
       
Article - 56
Title
Instinctive Digital Snapshot – Graph Matching for Character Identification
Pages :294-299
 
Authors
Anudeep AKS, Dr.P.Harini
       
Article -57
Title
Nonlinear Approximations in Sigmoid Transfer Function for Improved Statistical Pattern Recognition Based
On PNN Bayesian Approach
Pages :300-305
 
Authors
R. Murugadoss, Dr.M. Ramakrishnan
       
Article - 58
Title
Repetition Administration of Multipath Routing for Intrusion Tolerance in Heterogeneous
Wireless Sensor Networks
Pages :306-309
 
Authors
N.ANOHU, P.V.SUBBARAMASARMA
       
Article - 59
Title
An Efficient Key Exchange Authentication using Browser based Security
Pages :310-315
 
Authors
T.ANUSHA, S.AMARNATH BABU
       
Article -60
Title
CREATION OF DYNAMIC QUERY FOR MINING HIGHLY OPTIMIZED TRANSACTIONAL DATABASES
Pages :316-320
 
Authors
K . Chaitanya, M .Lakshmi Bai
       
Article -61
Title
High-Limit Reversible Information Stowing away In Double Pictures by Utilizing Example Substitution
Pages :321-326
 
Authors
G Ashok, K Subba Rao
       
Article - 62
Title
Web Image Re-ranking using Query Log Data and visual photo Quality Assessment
Pages :327-331
 
Authors
P.GULZAR, A.THIRUPATHAIAH
       
Article - 63
Title
Artificial Intelligence in Cyber Defense
Pages :332-336
 
Authors
I.Yallamanda Reddy, A.Thirupathaiah
       
Article - 64
Title
Adaptable Face Picture Recovery utilizing Quality Upgraded Meager Code words
Pages: 337-341
 
Authors
J Durga, Dr. P Harini
       
Article - 65
Title
Novel Techniques for Transmissions to Communication Jamming Denial-of-Service Attacks
Pages :342-346
 
Authors
JOGI SUVARNA BHARATHA RAJU, Dr. P. HARINI
       
Article - 66
Title
Secure Mining of Affiliation Runs in Evenly Disseminated Databases
Pages :347-351
 
Authors
K.SAMYUKTHA, M. LAKSHMI BAI
       
Article - 67
Title
A VISUAL CRYPTOGRAPHY SCHEME WITH LAYERED EXPANSION FOR SECRETHALFTONE IMAGES
Pages :352-356
 
Authors
M. KarthikBabu , S. Amarnath Babu
       
Article -68
Title
An Exteriorized Itinerant Search Portal
Pages :357-360
 
Authors
M Lavanya, K.Subba Rao
       
Article - 69
Title
C-Privacy: Collaborative Data Publishing to Preserve Integrity in Data Dissemination

Pages :361-366
 
Authors
N.LALITHA, S.AMARNATH BABU
       
Article -70
Title
Access Approach Union for Occasion Preparing Frameworks
Pages :367-371
 
Authors
N.Ramesh, Dr.P.Harini
       
Article - 71
Title
GENETIC ALGORITHM TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE IN MODULE SYSTEM
Pages :372-375
 
Authors
NORI.VENKATA YASASWI, P.V.SUBBARAMA SARMA
       
Article - 72
Title
On The Node Clone Detection Using DHT and RDE
Pages :376-379
 
Authors
PASUPULETI R A N PRASAD, Dr.P.Harini
       
Article - 73
Title
An Efficient Reversible Data Hiding Technique using Reserving Room before Encryption for Data Hiding
in Encrypted Images
Pages :380-384
 
Authors
P.SHAKIRA, Dr.P.HARINI
       
Article - 74
Title
Fault Node Identification Using Comparison Models
Pages :385-388
 
Authors
K.V.Sudhakar, N. Lakshmi Narayana
       
Article - 75
Title
A Hybrid Intrusion Detection System for Identification of Anonymous Behavior
Pages :389-391
 
Authors
K.Sasidhar, N.Sagar Pavan Kumar
       
Article - 76
Title
Answering General Time Sensitive Queries
Pages :392-394
 
Authors
O.Ramesh, V. Vidya Sagar
       
Article - 77
Title
Service Oriented application based search Engine for Mobile
Pages :395-398
 
Authors
G.Jyothi Kishore, V.Srikanth
       
Article - 78
Title
Privacy Preserving and Optimal Keyword Search Over Out Sourced Data
Pages :399-402
 
Authors
J. Satyanarayana Swamy, V. Visweswararao
       
Article - 79
Title
An Empirical Model of Data Monitoring Service over cloud
Pages :403-407
 
Authors
N.Sowjanya, Ch. Swapna Priya
       
Article - 80
Title
An efficient Privacy Preserving Data Clustering over distributed Networks
Pages :408-410
 
Authors
G. Kananka Maha Laksmi, V.Visweswara Rao
       
Article - 81
Title
A Novel Intrusion Detection System with Classification and Signature approach
Pages :411-413
 
Authors
Y. Keerthi, CH . SwapnaPriya
       
Article -82
Title
A Double Layer Security Scheme for Conserving Private Data in Cloud Services
Pages :414-418
 
Authors
M.Santhoshi, V.Srikanth
       
Article - 83
Title
A Novel classification approach for Firewall Log data Analysis
Pages :419-422
 
Authors
P.Sowjanya, V.Srikanth
       
Article -84
Title
A Genetic Based Pattern Mining approach for Search engine optimization
Pages :423-426
 
Authors
K.Satya Srivalli, V. Vidya Sagar
       
Article - 85
Title
An Empirical Model of Secure Data Sharing between Multi Data Owners
Pages :427-430
 
Authors
Padmashree, V. Vidya Sagar
       
Article - 86
Title
Frequent Pattern Comparative Analysis of Apriori and FLAG Matrix
Pages :431-434
 
Authors
Vysyaraju Raisha,V. Sangeetha
       
Article - 87
Title
Privacy Preserving Data Storage of Intermediate Data Sets over Cloud
Pages :435-438
 
Authors
T.N.S.Satyavani, Cheekatla Swapna Priya
       
Article - 88
Title
An Efficient Filtering Technique over Undesirable Data of OSN User Walls
Pages :439-442
 
Authors
Rakesh Singampalli, K.Vinaykumar
       
Article - 89
Title
A Secure Self-Destructive Active Storage Framework for Data Confidentiality
Pages :443-446
 
Authors
Balla Rajendra, V.Sangeeta
       
Article - 90
Title
An Evolutionary approach for Candidate Set generation with String Transformation Technique
Pages :447-450
 
Authors
B. Srinivas Reddy, V.Vidyasagar
       
Article - 91
Title
A Framework for Attaining Uncertainty and Traceability in WMN
Pages :451-455
 
Authors
G.Vinay Reddy, V.VisweswaraRao
       
Article - 92
Title
Design of Optimized 64 Bit MAC Unit for DSP Applications
Pages :456-460
 
Authors
Shaik.Masthan Sharif ,D.Y.V.Prasad
       
Article - 93
Title
TRI-DCT BASED FAST BACK PROPAGATION ALGORITHM
Pages :461 - 465
 
Authors
G.Visalakshi, K.Chiranjeevi
       
Article -94
Title
Performance Analysis of High Speed DDR3 SDRAM
Pages :466-469
 
Authors
G.B.S.R.Naidu , U.Venkata Rao
       
Article - 95
Title
MIMO-OFDM DOWNLINK WIRELESS SYSTEM WITH REDUCED PAPER
Pages :470-475
 
Authors
Ch.Naveen Kumar, D.Srinivasa Rao
       
Article - 96
Title
MIMO RADAR PERFORMANCE USING SWERLING SCATTERING MODELS
Pages :504-480
 
Authors
P. JYOTSNA, D. TIRUMALA RAO
       
Article -97
Title
CAPSULE IMAGE RETRIEVAL USING EDGE BASED ALGORITHMS
Pages :481-484
 
Authors
Chesti Altaff Hussain, Dr.D. Venkata Rao, B.Venkata Sekhar Babu, J.Chiranjeevi Revanth
       
Article - 98
Title
Artificial Neural Network Model for the Prediction of Thrombo-embolic Stroke
Pages :485-492
 
Authors
K..Suneetha,Ch.Hephzibah, D.V. Chandra Sekhar
       
Article - 99
Title
Review on Classification Techniques in Data Mining
Pages :493-497
 
Authors
Hari Krishna Kanagala, Dr JayaramakrishnaiahVemula , Prof. Ramchand H Rao Kolasani
       
Article - 100
Title
Opinion Mining and Sentiment Analysis: A Survey
Pages :498-502
 
Authors
Chandra Sekhar Reddy Mukkarapu, Dr.v. Jaya Rama Krishnaiah Vemula
       
Article - 101
Title
A New System to Generate Simplified Decision Trees for applicability in the domain of Health Care
Pages :503-507
 
Authors
Abdul Ahad Md, Dr. Suresh Babu Y , Rajesh Chandra G
       
Article - 102
Title
A PROTOTYPE FOR DIAGNOSING CANCER DISEASE USING ADVANCED MINING TECHNIQUE
Pages :508-514
 
Authors
A.D.P.Swaroop, L.Padmavathi
       
Article - 103
Title
Secure Communication using Modified S-DES with Steganography
Pages :515-518
 
Authors
Prashanti.G, Sandhyarani.K
       
Article - 104
Title
A Survey on gap between SQL and DMQL
Pages :519-525
 
Authors
S. POOJITA, P.THRIDHARA
       
Article - 105
Title
Detecting Outliers in Large Dataset using Distributed Method
Pages :526-528
 
Authors
D.Madhavi, Ch. Sreenubabu
       
Article - 106
Title
Mobile Sensor and Destination Tracking in Wireless Sensor Networks
Pages :529-532
 
Authors
Dr Y. SURESH BABU , P. VIJAY KUMAR, Y. Gokul
       
Article - 107
Title
Classification of Diabetic Retinopathy Using Image Processing and Soft Computing Techniques
Pages :533-537
 
Authors
Muppidi Venkatesh, V Sree Ramamurthy
       
 
Copyright © 2011 - 2012. All Rights Reserved