Special Issue of ICACSSE 2014, held on October 10, 2014 in St. Ann’s College of Engineering & Technology, Chirala, Andhra Pradesh India |
Article - 1 |
Title |
Software Testing, Analysis and Objectives |
Pages :01 - 04 |
|
Authors |
Dr. Leelavathi Rajamanickam |
|
|
|
|
|
Article - 2 |
Title |
A naive Fuzzy Clustering Method for Pixel Segmentation by using Differential Evolution |
Pages :05 - 10 |
|
Authors |
A. Srikrishna, V. Sesha Srinivas , V. Rajiv Jetson |
|
|
|
|
|
Article - 3 |
Title |
Multi-Recipient Action Based Tapping in Email Communication |
Pages : 11-16 |
|
Authors |
Kusha Chopra, Ajay Jain |
|
|
|
|
|
Article - 4 |
Title |
Performance of Modified Jacobi Sequences with Good Merit Factor |
Pages :17-24 |
|
Authors |
K. Gurumurty, D.TirumalaRao, G. ManmadhaRao |
|
|
|
|
|
Article - 5 |
Title |
Traffic Management Using Fuzzy Control System in Net |
Pages : 25-28 |
|
Authors |
P.Manikanta, T.N Shankar |
|
|
|
|
|
|
|
Article - 6 |
Title |
High Speed and Low Power Implementation of FIR Filter Design using DADDA & WALLACE Tree Multiplier |
Pages :29-34 |
|
Authors |
D.G.Jignash, Jami Venkata Suman |
|
|
|
|
|
|
Article - 7 |
Title |
Removal of low and high density salt and pepper noise using combination of Fuzzy logic and Median Filter |
Pages :35-39 |
|
Authors |
B.Sravani, Dr.M.V.Nageswara Rao |
|
|
|
|
|
|
Article -8 |
Title |
DESIGN OF A SYNTHESIZABLE PIPELINED MIPS CORE FOR EMBEDDED APPLICATIONS |
Pages :40-44 |
|
Authors |
Venkateswarlu Kota, D.Tirumala Rao |
|
|
|
|
|
|
Article - 9 |
Title |
An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain |
Pages :45-48 |
|
Authors |
K.Babyrani , T.Geetamma |
|
|
|
|
|
|
Article - 10 |
Title |
DIGITAL IMAGE NOISE FILTERING USING EVOLVABLE HARDWARE |
Pages :49-53 |
|
Authors |
T.Jenny, T.Geetamma |
|
|
|
|
|
|
Article -11 |
Title |
Power Saving and Reducing Transmission Delay in WSN using DMP Scheme |
Pages :54-59 |
|
Authors |
T.Venkata Sateesh Babu, B.Anil Kumar |
|
|
|
|
|
|
Article -12 |
Title |
GNU Radio Based BIST for SDR Performance Measurement |
Pages :60-63 |
|
Authors |
Remya P S, Prof. B I Neelgar, Shibu R M |
|
|
|
|
|
|
Article -13 |
Title |
Prioritized Coding of Multiple ROIs on Medical Image
|
Pages :64-67 |
|
Authors |
D.Vasanta, S. Sri Durgakameswari |
|
|
|
|
|
|
Article - 14 |
Title |
Lifting Bi-orthogonal Wavelet Transform Based Edge Feature Extraction |
Pages :68-71 |
|
Authors |
S.Devendra, P.M.K.Prasad |
|
|
|
|
|
|
Article -15 |
Title |
Optimal Location of STATCOM for Voltage Security Enhancement Using PSO |
Pages :72-76 |
|
Authors |
K.Praveena kumari, V.Srikanth Babu |
|
|
|
|
|
|
Article - 16 |
Title |
Importance of Load Balancing in Cloud Computing Environment: A Review |
Pages :77-82 |
|
Authors |
Yadaiah Balagoni, Dr.R.Rajeswara Rao |
|
|
|
|
|
|
Article - 17 |
Title |
128-bit Advanced Encryption Standard Algorithm implementation on FPGA |
Pages :83-88 |
|
Authors |
P.Ravisankararao, Dr. M.V.Nageswararao |
|
|
|
|
|
|
Article - 18 |
Title |
Security Based Intrusion-Detection System for Ad hoc mobile wireless networks |
Pages :89-93 |
|
Authors |
Addanki Kalyani, Dr. P. Harini |
|
|
|
|
|
|
Article - 19 |
Title |
Supervision termination for multipath routing with intervention detection in wireless sensor networks |
Pages :94-97 |
|
Authors |
Anil kumar.K, Eswar.K |
|
|
|
|
|
|
Article - 20 |
Title |
A Novel Framework Lime Lighting Dedup Over Caches in an Tacit Dope Center |
Pages :98-104 |
|
Authors |
B. SriLakshmi , Dr P. Harini |
|
|
|
|
|
|
Article - 21 |
Title |
An Efficient Secure Parallel Distributed Control Protocol for Content Delivery Networks |
Pages :105-110 |
|
Authors |
VARDHANA KUMAR CHELLI, YEZARLA CHITTI BABU |
|
|
|
|
|
|
Article - 22 |
Title |
Defending against Flood Attacks in Distraction Unbiased Networks |
Pages :111-115 |
|
Authors |
CHINTHA ANKI REDDY, AVS SUDHAKARA RAO |
|
|
|
|
|
|
Article - 23 |
Title |
EMAP: A Novel Approach for Providing the Security in the Vehicular Ad Hoc Network (VANET)
|
Pages :116-121 |
|
Authors |
S.Durga Bhavani, Dr. P. Harini |
|
|
|
|
|
|
Article - 24 |
Title |
ELEVATED RECITAL COMMUNICATION IN MIMO ADHOC ASSOCIATIONS BY MANIPULATING
SUPPORTIVE CONVEY |
Pages :122-125 |
|
Authors |
G.SamuelPramod, Eswar. K |
|
|
|
|
|
|
Article - 25 |
Title |
A Person and Proclamation identification by using Local Directional Number Pattern |
Pages :126-131 |
|
Authors |
G Ganeshbabu, Y Sowjanya Kumari |
|
|
|
|
|
|
Article - 26 |
Title |
AN EXTREMELY ASCENDIBLE KEY PRE-DISTRIBUTION THEME FOR WIRELESS DEVICE NETWORKS |
Pages :132-137 |
|
Authors |
G.V.Abhiram, T.Y. Srinivasa Rao |
|
|
|
|
|
|
Article - 27 |
Title |
Least Outlay Jamming Obstruction In Multi Path Wireless Routing Protocols |
Pages :138-142 |
|
Authors |
GOVATHOTI BIKSHALU, YEZARLA CHITTI BABU |
|
|
|
|
|
|
Article - 28 |
Title |
Presumable Study of Single Sign-on Technique for Distributed Network Systems |
Pages :143-147 |
|
Authors |
GurralaVenkataMohana Sai, Dr P.Harini |
|
|
|
|
|
|
Article - 29 |
Title |
Efficient Distributed Profile Matching Using Multi-Party Computation in Mobile Social Networks |
Pages :148-151 |
|
Authors |
V.Himabindu, , Dr P.Harini |
|
|
|
|
|
|
Article - 30 |
Title |
Energy-Efficient Cooperative Video Distribution with applied mathematics QoS Provisions over
Wireless Networks |
Pages :152-157 |
|
Authors |
Sk. Jilani, Y. Chitti Babu |
|
|
|
|
|
|
Article - 31 |
Title |
Communication Networks Based on Price Differentiation |
Pages :158-163 |
|
Authors |
K. Uma Maheswara Rao, T .Y. Srinivasa Rao |
|
|
|
|
|
|
Article -32 |
Title |
Node Stateless In Mantes Network Management By Using Statistics And Security Identifies Protocol |
Pages :164-168 |
|
Authors |
K Maheshbabu, Y Sowjanya Kumari |
|
|
|
|
|
|
Article - 33 |
Title |
Exemplar rooted digital inpainting image |
Pages :169-172 |
|
Authors |
K Ramesh, Y Sowjanya Kumari |
|
|
|
|
|
|
Article - 34 |
Title |
PRECLUDING SPAMS BY USING REVOCABLE DATA SMACKING IN ENCRYPTED IMAGES
|
Pages :173-177 |
|
Authors |
K.Siddhartha, Eswar.K |
|
|
|
|
|
|
Article - 35 |
Title |
Query Generation for Multimedia Data Selection and Presentation
|
Pages :178-183 |
|
Authors |
M Suresh, Y Sowjanya Kumari |
|
|
|
|
|
|
Article - 36 |
Title |
Defending Computer Networks from Covert Operations using Chaos Theory |
Pages :184-188 |
|
Authors |
Meruga Vishal Bharadwaj, AVS Sudhakara Rao |
|
|
|
|
|
|
Article - 37 |
Title |
ICMP: A Novel Profile Matching Scheme in Mobile Social Networks |
Pages :189-194 |
|
Authors |
Prabhakara Rao Motan, Dr. P. Harini |
|
|
|
|
|
|
Article - 38 |
Title |
WIRELESS AD HOC NETWORKS CREATION BASED ON SECURE PROTOCOL |
Pages :195-202 |
|
Authors |
KP.V.L.N Swaamy, Dr.R P.Harini |
|
|
|
|
|
|
Article - 39 |
Title |
Firewall Optimization for Privacy-Preserving With Cross Domain |
Pages :203-206 |
|
Authors |
NarendraKaranam, S.Anil Kumar |
|
|
|
|
|
|
Article - 40 |
Title |
A Pragmatic Intervention Model For Network Consistency Evaluation In Wireless Networks |
Pages :207-211 |
|
Authors |
PALLAPATI SOLMON , YEZARLA CHITTI BABU |
|
|
|
|
|
|
Article - 41 |
Title |
Attribute-Aware information Aggregation exploitation Potential-Based Dynamic Routing in
Wireless detector Networks |
Pages :2212-217 |
|
Authors |
P Sivaparvathi, Y Sowjanya Kumari |
|
|
|
|
|
|
Article - 42 |
Title |
A Joint Congestion Control and Scheduling Algorithm for Decreasing the Delay in Multihop Wireless Networks
|
Pages :218-222 |
|
Authors |
Poluri Koteswararao, K Subbarao |
|
|
|
|
|
|
Article - 43 |
Title |
Robust Satellite Image Resolution Enhancement using Double Density Dual Tree Complex Wavelet Transform |
Pages :223-228 |
|
Authors |
G.Prasanthi, Dr. P. Harini |
|
|
|
|
|
|
Article - 44 |
Title |
Companionate Data in Wireless Sensor Network with Prune Delay |
Pages :229-233 |
|
Authors |
RAJESH BABU KETHAMALA, YEZARLA CHITTI BABU, Dr.P.HARINI |
|
|
|
|
|
|
Article - 45 |
Title |
Scalable Reliable Multicasting in Delay Tolerant Networks with Erasure Correction |
Pages :234-238 |
|
Authors |
P.S. Naveen Kumar, Dr. P.Harini |
|
|
|
|
|
|
Article - 46 |
Title |
DYNAMIC MANAGEMENT OF CRYPTOGRAPHY FOR PROGRESSIVE PACKET ARRIVALS IN DTNS |
Pages :239-243 |
|
Authors |
V.Sivakrishna, Dr.P.Harini |
|
|
|
|
|
|
Article - 47 |
Title |
Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control |
Pages :244-248 |
|
Authors |
Sajja Srinivas, Dr P Harini |
|
|
|
|
|
|
Article - 48 |
Title |
Noise Removing for Enhanced Images using Wavelet Transform |
Pages :249-253 |
|
Authors |
KATHI SYAM DAIVA KRUPA, K. SUBBA RAO |
|
|
|
|
|
|
Article - 49 |
Title |
Secure sharing in distributed information Management Applications |
Pages :254-259 |
|
Authors |
Thota Beula, Eswar Kodali |
|
|
|
|
|
|
Article - 50 |
Title |
Facilitating Indirect Mutual Trust for Cloud Storage Systems |
Pages 260-:266 |
|
Authors |
Vaddepati Venkata Srikanth, Eswar Kodali |
|
|
|
|
|
|
Article - 51 |
Title |
OPPORTUNISTIC MANETS: QUALITY WILL FRAME FOR LOW TRANSMISSION POWER |
Pages :267-271 |
|
Authors |
K.Venu, T .Y. Srinivasa Rao |
|
|
|
|
|
|
Article -52 |
Title |
Face Ascertain Based Method For Accessible By Pardons Words
|
Pages :272-277 |
|
Authors |
YAGNANARAYANANAKKALA,SATHUPATI ANIL KUMAR |
|
|
|
|
|
|
Article - 53 |
Title |
SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management |
Pages :278-281 |
|
Authors |
Y.SHEILA, Dr.P.HARINI |
|
|
|
|
|
|
Article - 54 |
Title |
Cloud based Structure Approach of Content-As-A-Service for Supplier Impartial of Mobile Gadgets |
Pages :282-287 |
|
Authors |
Maddali M. V. M. Kumar, Rajesh Ghanta |
|
|
|
|
|
|
Article -55 |
Title |
Comparing Performance of Kalman Filtering and DWT based Speech Enhancement Techniques |
Pages :288-293 |
|
Authors |
K.Raghavendra Rao , Suneel Miriyala |
|
|
|
|
|
|
Article - 56 |
Title |
Instinctive Digital Snapshot – Graph Matching for Character Identification |
Pages :294-299 |
|
Authors |
Anudeep AKS, Dr.P.Harini |
|
|
|
|
|
|
Article -57 |
Title |
Nonlinear Approximations in Sigmoid Transfer Function for Improved Statistical Pattern Recognition Based
On PNN Bayesian Approach |
Pages :300-305 |
|
Authors |
R. Murugadoss, Dr.M. Ramakrishnan |
|
|
|
|
|
|
Article - 58 |
Title |
Repetition Administration of Multipath Routing for Intrusion Tolerance in Heterogeneous
Wireless Sensor Networks |
Pages :306-309 |
|
Authors |
N.ANOHU, P.V.SUBBARAMASARMA |
|
|
|
|
|
|
Article - 59 |
Title |
An Efficient Key Exchange Authentication using Browser based Security |
Pages :310-315 |
|
Authors |
T.ANUSHA, S.AMARNATH BABU |
|
|
|
|
|
|
Article -60 |
Title |
CREATION OF DYNAMIC QUERY FOR MINING HIGHLY OPTIMIZED TRANSACTIONAL DATABASES |
Pages :316-320 |
|
Authors |
K . Chaitanya, M .Lakshmi Bai |
|
|
|
|
|
|
Article -61 |
Title |
High-Limit Reversible Information Stowing away In Double Pictures by Utilizing Example Substitution
|
Pages :321-326 |
|
Authors |
G Ashok, K Subba Rao |
|
|
|
|
|
|
Article - 62 |
Title |
Web Image Re-ranking using Query Log Data and visual photo Quality Assessment |
Pages :327-331 |
|
Authors |
P.GULZAR, A.THIRUPATHAIAH |
|
|
|
|
|
|
Article - 63 |
Title |
Artificial Intelligence in Cyber Defense |
Pages :332-336 |
|
Authors |
I.Yallamanda Reddy, A.Thirupathaiah |
|
|
|
|
|
|
Article - 64 |
Title |
Adaptable Face Picture Recovery utilizing Quality Upgraded Meager Code words |
Pages: 337-341 |
|
Authors |
J Durga, Dr. P Harini |
|
|
|
|
|
|
Article - 65 |
Title |
Novel Techniques for Transmissions to Communication Jamming Denial-of-Service Attacks |
Pages :342-346 |
|
Authors |
JOGI SUVARNA BHARATHA RAJU, Dr. P. HARINI |
|
|
|
|
|
|
Article - 66 |
Title |
Secure Mining of Affiliation Runs in Evenly Disseminated Databases |
Pages :347-351 |
|
Authors |
K.SAMYUKTHA, M. LAKSHMI BAI |
|
|
|
|
|
|
Article - 67 |
Title |
A VISUAL CRYPTOGRAPHY SCHEME WITH LAYERED EXPANSION FOR SECRETHALFTONE IMAGES
|
Pages :352-356 |
|
Authors |
M. KarthikBabu , S. Amarnath Babu |
|
|
|
|
|
|
Article -68 |
Title |
An Exteriorized Itinerant Search Portal |
Pages :357-360 |
|
Authors |
M Lavanya, K.Subba Rao |
|
|
|
|
|
|
Article - 69 |
Title |
C-Privacy: Collaborative Data Publishing to Preserve Integrity in Data Dissemination
|
Pages :361-366 |
|
Authors |
N.LALITHA, S.AMARNATH BABU |
|
|
|
|
|
|
Article -70 |
Title |
Access Approach Union for Occasion Preparing Frameworks |
Pages :367-371 |
|
Authors |
N.Ramesh, Dr.P.Harini |
|
|
|
|
|
|
Article - 71 |
Title |
GENETIC ALGORITHM TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE IN MODULE SYSTEM |
Pages :372-375 |
|
Authors |
NORI.VENKATA YASASWI, P.V.SUBBARAMA SARMA |
|
|
|
|
|
|
Article - 72 |
Title |
On The Node Clone Detection Using DHT and RDE |
Pages :376-379 |
|
Authors |
PASUPULETI R A N PRASAD, Dr.P.Harini |
|
|
|
|
|
|
Article - 73 |
Title |
An Efficient Reversible Data Hiding Technique using Reserving Room before Encryption for Data Hiding
in Encrypted Images
|
Pages :380-384 |
|
Authors |
P.SHAKIRA, Dr.P.HARINI |
|
|
|
|
|
|
Article - 74 |
Title |
Fault Node Identification Using Comparison Models |
Pages :385-388 |
|
Authors |
K.V.Sudhakar, N. Lakshmi Narayana |
|
|
|
|
|
|
Article - 75 |
Title |
A Hybrid Intrusion Detection System for Identification of Anonymous Behavior |
Pages :389-391 |
|
Authors |
K.Sasidhar, N.Sagar Pavan Kumar |
|
|
|
|
|
|
Article - 76 |
Title |
Answering General Time Sensitive Queries
|
Pages :392-394 |
|
Authors |
O.Ramesh, V. Vidya Sagar |
|
|
|
|
|
|
Article - 77 |
Title |
Service Oriented application based search Engine for Mobile |
Pages :395-398 |
|
Authors |
G.Jyothi Kishore, V.Srikanth |
|
|
|
|
|
|
Article - 78 |
Title |
Privacy Preserving and Optimal Keyword Search Over Out Sourced Data |
Pages :399-402 |
|
Authors |
J. Satyanarayana Swamy, V. Visweswararao |
|
|
|
|
|
|
Article - 79 |
Title |
An Empirical Model of Data Monitoring Service over cloud |
Pages :403-407 |
|
Authors |
N.Sowjanya, Ch. Swapna Priya |
|
|
|
|
|
|
Article - 80 |
Title |
An efficient Privacy Preserving Data Clustering over distributed Networks |
Pages :408-410 |
|
Authors |
G. Kananka Maha Laksmi, V.Visweswara Rao |
|
|
|
|
|
|
Article - 81 |
Title |
A Novel Intrusion Detection System with Classification and Signature approach |
Pages :411-413 |
|
Authors |
Y. Keerthi, CH . SwapnaPriya |
|
|
|
|
|
|
Article -82 |
Title |
A Double Layer Security Scheme for Conserving Private Data in Cloud Services
|
Pages :414-418 |
|
Authors |
M.Santhoshi, V.Srikanth |
|
|
|
|
|
|
Article - 83 |
Title |
A Novel classification approach for Firewall Log data Analysis |
Pages :419-422 |
|
Authors |
P.Sowjanya, V.Srikanth |
|
|
|
|
|
|
Article -84 |
Title |
A Genetic Based Pattern Mining approach for Search engine optimization |
Pages :423-426 |
|
Authors |
K.Satya Srivalli, V. Vidya Sagar |
|
|
|
|
|
|
Article - 85 |
Title |
An Empirical Model of Secure Data Sharing between Multi Data Owners |
Pages :427-430 |
|
Authors |
Padmashree, V. Vidya Sagar |
|
|
|
|
|
|
Article - 86 |
Title |
Frequent Pattern Comparative Analysis of Apriori and FLAG Matrix |
Pages :431-434 |
|
Authors |
Vysyaraju Raisha,V. Sangeetha |
|
|
|
|
|
|
Article - 87 |
Title |
Privacy Preserving Data Storage of Intermediate Data Sets over Cloud |
Pages :435-438 |
|
Authors |
T.N.S.Satyavani, Cheekatla Swapna Priya |
|
|
|
|
|
|
Article - 88 |
Title |
An Efficient Filtering Technique over Undesirable Data of OSN User Walls |
Pages :439-442 |
|
Authors |
Rakesh Singampalli, K.Vinaykumar |
|
|
|
|
|
|
Article - 89 |
Title |
A Secure Self-Destructive Active Storage Framework for Data Confidentiality |
Pages :443-446 |
|
Authors |
Balla Rajendra, V.Sangeeta |
|
|
|
|
|
|
Article - 90 |
Title |
An Evolutionary approach for Candidate Set generation with String Transformation Technique |
Pages :447-450 |
|
Authors |
B. Srinivas Reddy, V.Vidyasagar |
|
|
|
|
|
|
Article - 91 |
Title |
A Framework for Attaining Uncertainty and Traceability in WMN |
Pages :451-455 |
|
Authors |
G.Vinay Reddy, V.VisweswaraRao |
|
|
|
|
|
|
Article - 92 |
Title |
Design of Optimized 64 Bit MAC Unit for DSP Applications |
Pages :456-460 |
|
Authors |
Shaik.Masthan Sharif ,D.Y.V.Prasad |
|
|
|
|
|
|
Article - 93 |
Title |
TRI-DCT BASED FAST BACK PROPAGATION ALGORITHM |
Pages :461 - 465 |
|
Authors |
G.Visalakshi, K.Chiranjeevi |
|
|
|
|
|
|
Article -94 |
Title |
Performance Analysis of High Speed DDR3 SDRAM |
Pages :466-469 |
|
Authors |
G.B.S.R.Naidu , U.Venkata Rao |
|
|
|
|
|
|
Article - 95 |
Title |
MIMO-OFDM DOWNLINK WIRELESS SYSTEM WITH REDUCED PAPER |
Pages :470-475 |
|
Authors |
Ch.Naveen Kumar, D.Srinivasa Rao |
|
|
|
|
|
|
Article - 96 |
Title |
MIMO RADAR PERFORMANCE USING SWERLING SCATTERING MODELS
|
Pages :504-480 |
|
Authors |
P. JYOTSNA, D. TIRUMALA RAO |
|
|
|
|
|
|
Article -97 |
Title |
CAPSULE IMAGE RETRIEVAL USING EDGE BASED ALGORITHMS |
Pages :481-484 |
|
Authors |
Chesti Altaff Hussain, Dr.D. Venkata Rao, B.Venkata Sekhar Babu, J.Chiranjeevi Revanth |
|
|
|
|
|
|
Article - 98 |
Title |
Artificial Neural Network Model for the Prediction of Thrombo-embolic Stroke |
Pages :485-492 |
|
Authors |
K..Suneetha,Ch.Hephzibah, D.V. Chandra Sekhar |
|
|
|
|
|
|
Article - 99 |
Title |
Review on Classification Techniques in Data Mining |
Pages :493-497 |
|
Authors |
Hari Krishna Kanagala, Dr JayaramakrishnaiahVemula , Prof. Ramchand H Rao Kolasani |
|
|
|
|
|
|
Article - 100 |
Title |
Opinion Mining and Sentiment Analysis: A Survey
|
Pages :498-502 |
|
Authors |
Chandra Sekhar Reddy Mukkarapu, Dr.v. Jaya Rama Krishnaiah Vemula |
|
|
|
|
|
|
Article - 101 |
Title |
A New System to Generate Simplified Decision Trees for applicability in the domain of Health Care |
Pages :503-507 |
|
Authors |
Abdul Ahad Md, Dr. Suresh Babu Y , Rajesh Chandra G |
|
|
|
|
|
|
Article - 102 |
Title |
A PROTOTYPE FOR DIAGNOSING CANCER DISEASE USING ADVANCED MINING TECHNIQUE |
Pages :508-514 |
|
Authors |
A.D.P.Swaroop, L.Padmavathi |
|
|
|
|
|
|
Article - 103 |
Title |
Secure Communication using Modified S-DES with Steganography |
Pages :515-518 |
|
Authors |
Prashanti.G, Sandhyarani.K |
|
|
|
|
|
|
Article - 104 |
Title |
A Survey on gap between SQL and DMQL |
Pages :519-525 |
|
Authors |
S. POOJITA, P.THRIDHARA |
|
|
|
|
|
|
Article - 105 |
Title |
Detecting Outliers in Large Dataset using Distributed Method
|
Pages :526-528 |
|
Authors |
D.Madhavi, Ch. Sreenubabu |
|
|
|
|
|
|
Article - 106 |
Title |
Mobile Sensor and Destination Tracking in Wireless Sensor Networks |
Pages :529-532 |
|
Authors |
Dr Y. SURESH BABU , P. VIJAY KUMAR, Y. Gokul |
|
|
|
|
|
|
Article - 107 |
Title |
Classification of Diabetic Retinopathy Using Image Processing and Soft Computing Techniques |
Pages :533-537 |
|
Authors |
Muppidi Venkatesh, V Sree Ramamurthy |
|
|
|
|
|
|
|