ISSN ( ONLINE ) : 2278 - 3091
6 issues per year (February , April, June , August, October, December)
Indian Authors : Rs.1500
Foreign Authors : USD 50
The World Academy of Research in Science and Engineering
Article-1 | Title | Software Testing, Analysis and Objectives | 01 - 04 |
Authors | Dr. Leelavathi Rajamanickam |
Article-2 | Title | A naive Fuzzy Clustering Method for Pixel Segmentation by using Differential Evolution | 05 - 10 |
Authors | A. Srikrishna, V. Sesha Srinivas , V. Rajiv Jetson |
Article-3 | Title | Multi-Recipient Action Based Tapping in Email Communication | 11-16 |
Authors | Kusha Chopra, Ajay Jain |
Article-4 | Title | Performance of Modified Jacobi Sequences with Good Merit Factor | 17-24 |
Authors | K. Gurumurty, D.TirumalaRao, G. ManmadhaRao |
Article-5 | Title | Traffic Management Using Fuzzy Control System in Net | 25-28 |
Authors | P.Manikanta, T.N Shankar |
Article-6 | Title | High Speed and Low Power Implementation of FIR Filter Design using DADDA & WALLACE Tree Multiplier | 29-34 |
Authors | D.G.Jignash, Jami Venkata Suman |
Article-7 | Title | Removal of low and high density salt and pepper noise using combination of Fuzzy logic and Median Filter | 35-39 |
Authors | B.Sravani, Dr.M.V.Nageswara Rao |
Article-8 | Title | DESIGN OF A SYNTHESIZABLE PIPELINED MIPS CORE FOR EMBEDDED APPLICATIONS | 40-44 |
Authors | Venkateswarlu Kota, D.Tirumala Rao |
Article-9 | Title | An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain | 45-48 |
Authors | K.Babyrani , T.Geetamma |
Article-10 | Title | DIGITAL IMAGE NOISE FILTERING USING EVOLVABLE HARDWARE | 49-53 |
Authors | T.Jenny, T.Geetamma |
Article-11 | Title | Power Saving and Reducing Transmission Delay in WSN using DMP Scheme | 54-59 |
Authors | T.Venkata Sateesh Babu, B.Anil Kumar |
Article-12 | Title | GNU Radio Based BIST for SDR Performance Measurement | 60-63 |
Authors | Remya P S, Prof. B I Neelgar, Shibu R M |
Article-13 | Title | Prioritized Coding of Multiple ROIs on Medical Image | 64-67 |
Authors | D.Vasanta, S. Sri Durgakameswari |
Article-14 | Title | Lifting Bi-orthogonal Wavelet Transform Based Edge Feature Extraction | 68-71 |
Authors | S.Devendra, P.M.K.Prasad |
Article-15 | Title | Optimal Location of STATCOM for Voltage Security Enhancement Using PSO | 72-76 |
Authors | K.Praveena kumari, V.Srikanth Babu |
Article-16 | Title | Importance of Load Balancing in Cloud Computing Environment: A Review | 77-82 |
Authors | Yadaiah Balagoni, Dr.R.Rajeswara Rao |
Article-17 | Title | 128-bit Advanced Encryption Standard Algorithm implementation on FPGA | 83-88 |
Authors | P.Ravisankararao, Dr. M.V.Nageswararao |
Article-18 | Title | Security Based Intrusion-Detection System for Ad hoc mobile wireless networks | 89-93 |
Authors | Addanki Kalyani, Dr. P. Harini |
Article-19 | Title | Supervision termination for multipath routing with intervention detection in wireless sensor networks | 94-97 |
Authors | Anil kumar.K, Eswar.K |
Article-20 | Title | A Novel Framework Lime Lighting Dedup Over Caches in an Tacit Dope Center | 98-104 |
Authors | B. SriLakshmi , Dr P. Harini |
Article-21 | Title | An Efficient Secure Parallel Distributed Control Protocol for Content Delivery Networks | 105-110 |
Authors | VARDHANA KUMAR CHELLI, YEZARLA CHITTI BABU |
Article-22 | Title | Defending against Flood Attacks in Distraction Unbiased Networks | 111-115 |
Authors | CHINTHA ANKI REDDY, AVS SUDHAKARA RAO |
Article-23 | Title | EMAP: A Novel Approach for Providing the Security in the Vehicular Ad Hoc Network (VANET) | 116-121 |
Authors | S.Durga Bhavani, Dr. P. Harini |
Article-24 | Title | ELEVATED RECITAL COMMUNICATION IN MIMO ADHOC ASSOCIATIONS BY MANIPULATING SUPPORTIVE CONVEY | 122-125 |
Authors | G.SamuelPramod, Eswar. K |
Article-25 | Title | A Person and Proclamation identification by using Local Directional Number Pattern | 126-131 |
Authors | G Ganeshbabu, Y Sowjanya Kumari |
Article-26 | Title | AN EXTREMELY ASCENDIBLE KEY PRE-DISTRIBUTION THEME FOR WIRELESS DEVICE NETWORKS | 132-137 |
Authors | G.V.Abhiram, T.Y. Srinivasa Rao |
Article-27 | Title | Least Outlay Jamming Obstruction In Multi Path Wireless Routing Protocols | 138-142 |
Authors | GOVATHOTI BIKSHALU, YEZARLA CHITTI BABU |
Article-28 | Title | Presumable Study of Single Sign-on Technique for Distributed Network Systems | 143-147 |
Authors | GurralaVenkataMohana Sai, Dr P.Harini |
Article-29 | Title | Efficient Distributed Profile Matching Using Multi-Party Computation in Mobile Social Networks | 148-151 |
Authors | V.Himabindu, , Dr P.Harini |
Article-30 | Title | Energy-Efficient Cooperative Video Distribution with applied mathematics QoS Provisions over Wireless Networks | 152-157 |
Authors | Sk. Jilani, Y. Chitti Babu |
Article-31 | Title | Communication Networks Based on Price Differentiation | 158-163 |
Authors | K. Uma Maheswara Rao, T .Y. Srinivasa Rao |
Article-32 | Title | Node Stateless In Mantes Network Management By Using Statistics And Security Identifies Protocol | 164-168 |
Authors | K Maheshbabu, Y Sowjanya Kumari |
Article-33 | Title | Exemplar rooted digital inpainting image | 169-172 |
Authors | K Ramesh, Y Sowjanya Kumari |
Article-34 | Title | PRECLUDING SPAMS BY USING REVOCABLE DATA SMACKING IN ENCRYPTED IMAGES | 173-177 |
Authors | K.Siddhartha, Eswar.K |
Article-35 | Title | Query Generation for Multimedia Data Selection and Presentation | 178-183 |
Authors | M Suresh, Y Sowjanya Kumari |
Article-36 | Title | Defending Computer Networks from Covert Operations using Chaos Theory | 184-188 |
Authors | Meruga Vishal Bharadwaj, AVS Sudhakara Rao |
Article-37 | Title | ICMP: A Novel Profile Matching Scheme in Mobile Social Networks | 189-194 |
Authors | Prabhakara Rao Motan, Dr. P. Harini |
Article-38 | Title | WIRELESS AD HOC NETWORKS CREATION BASED ON SECURE PROTOCOL | 195-202 |
Authors | KP.V.L.N Swaamy, Dr.R P.Harini |
Article-39 | Title | Firewall Optimization for Privacy-Preserving With Cross Domain | 203-206 |
Authors | NarendraKaranam, S.Anil Kumar |
Article-40 | Title | A Pragmatic Intervention Model For Network Consistency Evaluation In Wireless Networks | 207-211 |
Authors | PALLAPATI SOLMON , YEZARLA CHITTI BABU |
Article-41 | Title | Attribute-Aware information Aggregation exploitation Potential-Based Dynamic Routing in Wireless detector Networks | 2212-217 |
Authors | P Sivaparvathi, Y Sowjanya Kumari |
Article-42 | Title | A Joint Congestion Control and Scheduling Algorithm for Decreasing the Delay in Multihop Wireless Networks | 218-222 |
Authors | Poluri Koteswararao, K Subbarao |
Article-43 | Title | Robust Satellite Image Resolution Enhancement using Double Density Dual Tree Complex Wavelet Transform | 223-228 |
Authors | G.Prasanthi, Dr. P. Harini |
Article-44 | Title | Companionate Data in Wireless Sensor Network with Prune Delay | 229-233 |
Authors | RAJESH BABU KETHAMALA, YEZARLA CHITTI BABU, Dr.P.HARINI |
Article-45 | Title | Scalable Reliable Multicasting in Delay Tolerant Networks with Erasure Correction | 234-238 |
Authors | P.S. Naveen Kumar, Dr. P.Harini |
Article-46 | Title | DYNAMIC MANAGEMENT OF CRYPTOGRAPHY FOR PROGRESSIVE PACKET ARRIVALS IN DTNS | 239-243 |
Authors | V.Sivakrishna, Dr.P.Harini |
Article-47 | Title | Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control | 244-248 |
Authors | Sajja Srinivas, Dr P Harini |
Article-48 | Title | Noise Removing for Enhanced Images using Wavelet Transform | 249-253 |
Authors | KATHI SYAM DAIVA KRUPA, K. SUBBA RAO |
Article-49 | Title | Secure sharing in distributed information Management Applications | 254-259 |
Authors | Thota Beula, Eswar Kodali |
Article-50 | Title | Facilitating Indirect Mutual Trust for Cloud Storage Systems | 260 -266 |
Authors | Vaddepati Venkata Srikanth, Eswar Kodali |
Article-51 | Title | OPPORTUNISTIC MANETS: QUALITY WILL FRAME FOR LOW TRANSMISSION POWER | 267-271 |
Authors | K.Venu, T .Y. Srinivasa Rao |
Article-52 | Title | Face Ascertain Based Method For Accessible By Pardons Words | 272-277 |
Authors | YAGNANARAYANANAKKALA,SATHUPATI ANIL KUMAR |
Article-53 | Title | SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management | 278-281 |
Authors | Y.SHEILA, Dr.P.HARINI |
Article-54 | Title | Cloud based Structure Approach of Content-As-A-Service for Supplier Impartial of Mobile Gadgets | 282-287 |
Authors | Maddali M. V. M. Kumar, Rajesh Ghanta |
Article-55 | Title | Comparing Performance of Kalman Filtering and DWT based Speech Enhancement Techniques | 288-293 |
Authors | K.Raghavendra Rao , Suneel Miriyala |
Article-56 | Title | Instinctive Digital Snapshot - Graph Matching for Character Identification | 294-299 |
Authors | Anudeep AKS, Dr.P.Harini |
Article-57 | Title | Nonlinear Approximations in Sigmoid Transfer Function for Improved Statistical Pattern Recognition Based on PNN Bayesian Approach | 300-305 |
Authors | R. Murugadoss, Dr.M. Ramakrishnan |
Article-58 | Title | Repetition Administration of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks | 306-309 |
Authors | N.ANOHU, P.V.SUBBARAMASARMA |
Article-59 | Title | An Efficient Key Exchange Authentication using Browser based Security | 310-315 |
Authors | T.ANUSHA, S.AMARNATH BABU |
Article-60 | Title | CREATION OF DYNAMIC QUERY FOR MINING HIGHLY OPTIMIZED TRANSACTIONAL DATABASES | 316-320 |
Authors | K . Chaitanya, M .Lakshmi Bai |
Article-61 | Title | High-Limit Reversible Information Stowing away In Double Pictures by Utilizing Example Substitution | 321-326 |
Authors | G Ashok, K Subba Rao |
Article-62 | Title | Web Image Re-ranking using Query Log Data and visual photo Quality Assessment | 327-331 |
Authors | P.GULZAR, A.THIRUPATHAIAH |
Article-63 | Title | Artificial Intelligence in Cyber Defense | 332-336 |
Authors | I.Yallamanda Reddy, A.Thirupathaiah |
Article-64 | Title | Adaptable Face Picture Recovery utilizing Quality Upgraded Meager Code words | 337-341 |
Authors | J Durga, Dr. P Harini |
Article-65 | Title | Novel Techniques for Transmissions to Communication Jamming Denial-of-Service Attacks | 342-346 |
Authors | JOGI SUVARNA BHARATHA RAJU, Dr. P. HARINI |
Article-66 | Title | Secure Mining of Affiliation Runs in Evenly Disseminated Databases | 347-351 |
Authors | K.SAMYUKTHA, M. LAKSHMI BAI |
Article-67 | Title | A VISUAL CRYPTOGRAPHY SCHEME WITH LAYERED EXPANSION FOR SECRETHALFTONE IMAGES | 352-356 |
Authors | M. KarthikBabu , S. Amarnath Babu |
Article-68 | Title | An Exteriorized Itinerant Search Portal | 357-360 |
Authors | M Lavanya, K.Subba Rao |
Article-69 | Title | C-Privacy: Collaborative Data Publishing to Preserve Integrity in Data Dissemination | 361-366 |
Authors | N.LALITHA, S.AMARNATH BABU |
Article-70 | Title | Access Approach Union for Occasion Preparing Frameworks | 367-371 |
Authors | N.Ramesh, Dr.P.Harini |
Article-71 | Title | GENETIC ALGORITHM TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE IN MODULE SYSTEM | 372-375 |
Authors | NORI.VENKATA YASASWI, P.V.SUBBARAMA SARMA |
Article-72 | Title | On The Node Clone Detection Using DHT and RDE | 376-379 |
Authors | PASUPULETI R A N PRASAD, Dr.P.Harini |
Article-73 | Title | An Efficient Reversible Data Hiding Technique using Reserving Room before Encryption for Data Hiding in Encrypted Images | 380-384 |
Authors | P.SHAKIRA, Dr.P.HARINI |
Article-74 | Title | Fault Node Identification Using Comparison Models | 385-388 |
Authors | K.V.Sudhakar, N. Lakshmi Narayana |
Article-75 | Title | A Hybrid Intrusion Detection System for Identification of Anonymous Behavior | 389-391 |
Authors | K.Sasidhar, N.Sagar Pavan Kumar |
Article-76 | Title | Answering General Time Sensitive Queries | 392-394 |
Authors | O.Ramesh, V. Vidya Sagar |
Article-77 | Title | Service Oriented application based search Engine for Mobile | 395-398 |
Authors | G.Jyothi Kishore, V.Srikanth |
Article-78 | Title | Privacy Preserving and Optimal Keyword Search Over Out Sourced Data | 399-402 |
Authors | J. Satyanarayana Swamy, V. Visweswararao |
Article-79 | Title | An Empirical Model of Data Monitoring Service over cloud | 403-407 |
Authors | N.Sowjanya, Ch. Swapna Priya |
Article-80 | Title | An efficient Privacy Preserving Data Clustering over distributed Networks | 408-410 |
Authors | G. Kananka Maha Laksmi, V.Visweswara Rao |
Article-81 | Title | A Novel Intrusion Detection System with Classification and Signature approach | 411-413 |
Authors | Y. Keerthi, CH . SwapnaPriya |
Article-82 | Title | A Double Layer Security Scheme for Conserving Private Data in Cloud Services | 414-418 |
Authors | M.Santhoshi, V.Srikanth |
Article-83 | Title | A Novel classification approach for Firewall Log data Analysis | 419-422 |
Authors | P.Sowjanya, V.Srikanth |
Article-84 | Title | A Genetic Based Pattern Mining approach for Search engine optimization | 423-426 |
Authors | K.Satya Srivalli, V. Vidya Sagar |
Article-85 | Title | An Empirical Model of Secure Data Sharing between Multi Data Owners | 427-430 |
Authors | Padmashree, V. Vidya Sagar |
Article-86 | Title | Frequent Pattern Comparative Analysis of Apriori and FLAG Matrix | 431-434 |
Authors | Vysyaraju Raisha,V. Sangeetha |
Article-87 | Title | Privacy Preserving Data Storage of Intermediate Data Sets over Cloud | 435-438 |
Authors | T.N.S.Satyavani, Cheekatla Swapna Priya |
Article-88 | Title | An Efficient Filtering Technique over Undesirable Data of OSN User Walls | 439-442 |
Authors | Rakesh Singampalli, K.Vinaykumar |
Article-89 | Title | A Secure Self-Destructive Active Storage Framework for Data Confidentiality | 443-446 |
Authors | Balla Rajendra, V.Sangeeta |
Article-90 | Title | An Evolutionary approach for Candidate Set generation with String Transformation Technique | 447-450 |
Authors | B. Srinivas Reddy, V.Vidyasagar |
Article-91 | Title | A Framework for Attaining Uncertainty and Traceability in WMN | 451-455 |
Authors | G.Vinay Reddy, V.VisweswaraRao |
Article-92 | Title | Design of Optimized 64 Bit MAC Unit for DSP Applications | 456-460 |
Authors | Shaik.Masthan Sharif ,D.Y.V.Prasad |
Article-93 | Title | TRI-DCT BASED FAST BACK PROPAGATION ALGORITHM | 461 - 465 |
Authors | G.Visalakshi, K.Chiranjeevi |
Article-94 | Title | Performance Analysis of High Speed DDR3 SDRAM | 466-469 |
Authors | G.B.S.R.Naidu , U.Venkata Rao |
Article-95 | Title | MIMO-OFDM DOWNLINK WIRELESS SYSTEM WITH REDUCED PAPER | 470-475 |
Authors | Ch.Naveen Kumar, D.Srinivasa Rao |
Article-96 | Title | MIMO RADAR PERFORMANCE USING SWERLING SCATTERING MODELS | 504-480 |
Authors | P. JYOTSNA, D. TIRUMALA RAO |
Article-97 | Title | CAPSULE IMAGE RETRIEVAL USING EDGE BASED ALGORITHMS | 481-484 |
Authors | Chesti Altaff Hussain, Dr.D. Venkata Rao, B.Venkata Sekhar Babu, J.Chiranjeevi Revanth |
Article-98 | Title | Artificial Neural Network Model for the Prediction of Thrombo-embolic Stroke | 485-492 |
Authors | K..Suneetha,Ch.Hephzibah, D.V. Chandra Sekhar |
Article-99 | Title | Review on Classification Techniques in Data Mining | 493-497 |
Authors | Hari Krishna Kanagala, Dr JayaramakrishnaiahVemula , Prof. Ramchand H Rao Kolasani |
Article-100 | Title | Opinion Mining and Sentiment Analysis: A Survey | 498-502 |
Authors | Chandra Sekhar Reddy Mukkarapu, Dr.v. Jaya Rama Krishnaiah Vemula |
Article-101 | Title | A New System to Generate Simplified Decision Trees for applicability in the domain of Health Care | 503-507 |
Authors | Abdul Ahad Md, Dr. Suresh Babu Y , Rajesh Chandra G |
Article-102 | Title | A PROTOTYPE FOR DIAGNOSING CANCER DISEASE USING ADVANCED MINING TECHNIQUE | 508-514 |
Authors | A.D.P.Swaroop, L.Padmavathi |
Article-103 | Title | Secure Communication using Modified S-DES with Steganography | 515-518 |
Authors | Prashanti.G, Sandhyarani.K |
Article-104 | Title | A Survey on gap between SQL and DMQL | 519-525 |
Authors | S. POOJITA, P.THRIDHARA |
Article-105 | Title | Detecting Outliers in Large Dataset using Distributed Method | 526-528 |
Authors | D.Madhavi, Ch. Sreenubabu |
Article-106 | Title | Mobile Sensor and Destination Tracking in Wireless Sensor Networks | 529-532 |
Authors | Dr Y. SURESH BABU , P. VIJAY KUMAR, Y. Gokul |
Article-107 | Title | Classification of Diabetic Retinopathy Using Image Processing and Soft Computing Techniques | 533-537 |
Authors | Muppidi Venkatesh, V Sree Ramamurthy |