Frequency

6 issues per year (February , April, June , August, October, December)

Publication Charges

Indian Authors : Rs.1500

Foreign Authors : USD 50

Published by

The World Academy of Research in Science and Engineering

  ARCHIVES

Special Issue of ICACSSE 2014

Article-1 Title Software Testing, Analysis and Objectives 01 - 04
Authors Dr. Leelavathi Rajamanickam   PDF
Article-2 Title A naive Fuzzy Clustering Method for Pixel Segmentation by using Differential Evolution 05 - 10
Authors A. Srikrishna, V. Sesha Srinivas , V. Rajiv Jetson   PDF
Article-3 Title Multi-Recipient Action Based Tapping in Email Communication 11-16
Authors Kusha Chopra, Ajay Jain   PDF
Article-4 Title Performance of Modified Jacobi Sequences with Good Merit Factor 17-24
Authors K. Gurumurty, D.TirumalaRao, G. ManmadhaRao   PDF
Article-5 Title Traffic Management Using Fuzzy Control System in Net 25-28
Authors P.Manikanta, T.N Shankar   PDF
Article-6 Title High Speed and Low Power Implementation of FIR Filter Design using DADDA & WALLACE Tree Multiplier 29-34
Authors D.G.Jignash, Jami Venkata Suman   PDF
Article-7 Title Removal of low and high density salt and pepper noise using combination of Fuzzy logic and Median Filter 35-39
Authors B.Sravani, Dr.M.V.Nageswara Rao   PDF
Article-8 Title DESIGN OF A SYNTHESIZABLE PIPELINED MIPS CORE FOR EMBEDDED APPLICATIONS 40-44
Authors Venkateswarlu Kota, D.Tirumala Rao   PDF
Article-9 Title An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain 45-48
Authors K.Babyrani , T.Geetamma   PDF
Article-10 Title DIGITAL IMAGE NOISE FILTERING USING EVOLVABLE HARDWARE 49-53
Authors T.Jenny, T.Geetamma   PDF
Article-11 Title Power Saving and Reducing Transmission Delay in WSN using DMP Scheme 54-59
Authors T.Venkata Sateesh Babu, B.Anil Kumar   PDF
Article-12 Title GNU Radio Based BIST for SDR Performance Measurement 60-63
Authors Remya P S, Prof. B I Neelgar, Shibu R M   PDF
Article-13 Title Prioritized Coding of Multiple ROIs on Medical Image 64-67
Authors D.Vasanta, S. Sri Durgakameswari   PDF
Article-14 Title Lifting Bi-orthogonal Wavelet Transform Based Edge Feature Extraction 68-71
Authors S.Devendra, P.M.K.Prasad   PDF
Article-15 Title Optimal Location of STATCOM for Voltage Security Enhancement Using PSO 72-76
Authors K.Praveena kumari, V.Srikanth Babu   PDF
Article-16 Title Importance of Load Balancing in Cloud Computing Environment: A Review 77-82
Authors Yadaiah Balagoni, Dr.R.Rajeswara Rao   PDF
Article-17 Title 128-bit Advanced Encryption Standard Algorithm implementation on FPGA 83-88
Authors P.Ravisankararao, Dr. M.V.Nageswararao   PDF
Article-18 Title Security Based Intrusion-Detection System for Ad hoc mobile wireless networks 89-93
Authors Addanki Kalyani, Dr. P. Harini   PDF
Article-19 Title Supervision termination for multipath routing with intervention detection in wireless sensor networks 94-97
Authors Anil kumar.K, Eswar.K   PDF
Article-20 Title A Novel Framework Lime Lighting Dedup Over Caches in an Tacit Dope Center 98-104
Authors B. SriLakshmi , Dr P. Harini   PDF
Article-21 Title An Efficient Secure Parallel Distributed Control Protocol for Content Delivery Networks 105-110
Authors VARDHANA KUMAR CHELLI, YEZARLA CHITTI BABU   PDF
Article-22 Title Defending against Flood Attacks in Distraction Unbiased Networks 111-115
Authors CHINTHA ANKI REDDY, AVS SUDHAKARA RAO   PDF
Article-23 Title EMAP: A Novel Approach for Providing the Security in the Vehicular Ad Hoc Network (VANET) 116-121
Authors S.Durga Bhavani, Dr. P. Harini   PDF
Article-24 Title ELEVATED RECITAL COMMUNICATION IN MIMO ADHOC ASSOCIATIONS BY MANIPULATING SUPPORTIVE CONVEY 122-125
Authors G.SamuelPramod, Eswar. K   PDF
Article-25 Title A Person and Proclamation identification by using Local Directional Number Pattern 126-131
Authors G Ganeshbabu, Y Sowjanya Kumari   PDF
Article-26 Title AN EXTREMELY ASCENDIBLE KEY PRE-DISTRIBUTION THEME FOR WIRELESS DEVICE NETWORKS 132-137
Authors G.V.Abhiram, T.Y. Srinivasa Rao   PDF
Article-27 Title Least Outlay Jamming Obstruction In Multi Path Wireless Routing Protocols 138-142
Authors GOVATHOTI BIKSHALU, YEZARLA CHITTI BABU   PDF
Article-28 Title Presumable Study of Single Sign-on Technique for Distributed Network Systems 143-147
Authors GurralaVenkataMohana Sai, Dr P.Harini   PDF
Article-29 Title Efficient Distributed Profile Matching Using Multi-Party Computation in Mobile Social Networks 148-151
Authors V.Himabindu, , Dr P.Harini   PDF
Article-30 Title Energy-Efficient Cooperative Video Distribution with applied mathematics QoS Provisions over Wireless Networks 152-157
Authors Sk. Jilani, Y. Chitti Babu   PDF
Article-31 Title Communication Networks Based on Price Differentiation 158-163
Authors K. Uma Maheswara Rao, T .Y. Srinivasa Rao   PDF
Article-32 Title Node Stateless In Mantes Network Management By Using Statistics And Security Identifies Protocol 164-168
Authors K Maheshbabu, Y Sowjanya Kumari   PDF
Article-33 Title Exemplar rooted digital inpainting image 169-172
Authors K Ramesh, Y Sowjanya Kumari   PDF
Article-34 Title PRECLUDING SPAMS BY USING REVOCABLE DATA SMACKING IN ENCRYPTED IMAGES 173-177
Authors K.Siddhartha, Eswar.K   PDF
Article-35 Title Query Generation for Multimedia Data Selection and Presentation 178-183
Authors M Suresh, Y Sowjanya Kumari   PDF
Article-36 Title Defending Computer Networks from Covert Operations using Chaos Theory 184-188
Authors Meruga Vishal Bharadwaj, AVS Sudhakara Rao   PDF
Article-37 Title ICMP: A Novel Profile Matching Scheme in Mobile Social Networks 189-194
Authors Prabhakara Rao Motan, Dr. P. Harini   PDF
Article-38 Title WIRELESS AD HOC NETWORKS CREATION BASED ON SECURE PROTOCOL 195-202
Authors KP.V.L.N Swaamy, Dr.R P.Harini   PDF
Article-39 Title Firewall Optimization for Privacy-Preserving With Cross Domain 203-206
Authors NarendraKaranam, S.Anil Kumar   PDF
Article-40 Title A Pragmatic Intervention Model For Network Consistency Evaluation In Wireless Networks 207-211
Authors PALLAPATI SOLMON , YEZARLA CHITTI BABU   PDF
Article-41 Title Attribute-Aware information Aggregation exploitation Potential-Based Dynamic Routing in Wireless detector Networks 2212-217
Authors P Sivaparvathi, Y Sowjanya Kumari   PDF
Article-42 Title A Joint Congestion Control and Scheduling Algorithm for Decreasing the Delay in Multihop Wireless Networks 218-222
Authors Poluri Koteswararao, K Subbarao   PDF
Article-43 Title Robust Satellite Image Resolution Enhancement using Double Density Dual Tree Complex Wavelet Transform 223-228
Authors G.Prasanthi, Dr. P. Harini   PDF
Article-44 Title Companionate Data in Wireless Sensor Network with Prune Delay 229-233
Authors RAJESH BABU KETHAMALA, YEZARLA CHITTI BABU, Dr.P.HARINI   PDF
Article-45 Title Scalable Reliable Multicasting in Delay Tolerant Networks with Erasure Correction 234-238
Authors P.S. Naveen Kumar, Dr. P.Harini   PDF
Article-46 Title DYNAMIC MANAGEMENT OF CRYPTOGRAPHY FOR PROGRESSIVE PACKET ARRIVALS IN DTNS 239-243
Authors V.Sivakrishna, Dr.P.Harini   PDF
Article-47 Title Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control 244-248
Authors Sajja Srinivas, Dr P Harini   PDF
Article-48 Title Noise Removing for Enhanced Images using Wavelet Transform 249-253
Authors KATHI SYAM DAIVA KRUPA, K. SUBBA RAO   PDF
Article-49 Title Secure sharing in distributed information Management Applications 254-259
Authors Thota Beula, Eswar Kodali   PDF
Article-50 Title Facilitating Indirect Mutual Trust for Cloud Storage Systems 260 -266
Authors Vaddepati Venkata Srikanth, Eswar Kodali   PDF
Article-51 Title OPPORTUNISTIC MANETS: QUALITY WILL FRAME FOR LOW TRANSMISSION POWER 267-271
Authors K.Venu, T .Y. Srinivasa Rao   PDF
Article-52 Title Face Ascertain Based Method For Accessible By Pardons Words 272-277
Authors YAGNANARAYANANAKKALA,SATHUPATI ANIL KUMAR   PDF
Article-53 Title SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management 278-281
Authors Y.SHEILA, Dr.P.HARINI   PDF
Article-54 Title Cloud based Structure Approach of Content-As-A-Service for Supplier Impartial of Mobile Gadgets 282-287
Authors Maddali M. V. M. Kumar, Rajesh Ghanta   PDF
Article-55 Title Comparing Performance of Kalman Filtering and DWT based Speech Enhancement Techniques 288-293
Authors K.Raghavendra Rao , Suneel Miriyala   PDF
Article-56 Title Instinctive Digital Snapshot - Graph Matching for Character Identification 294-299
Authors Anudeep AKS, Dr.P.Harini   PDF
Article-57 Title Nonlinear Approximations in Sigmoid Transfer Function for Improved Statistical Pattern Recognition Based on PNN Bayesian Approach 300-305
Authors R. Murugadoss, Dr.M. Ramakrishnan   PDF
Article-58 Title Repetition Administration of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks 306-309
Authors N.ANOHU, P.V.SUBBARAMASARMA   PDF
Article-59 Title An Efficient Key Exchange Authentication using Browser based Security 310-315
Authors T.ANUSHA, S.AMARNATH BABU   PDF
Article-60 Title CREATION OF DYNAMIC QUERY FOR MINING HIGHLY OPTIMIZED TRANSACTIONAL DATABASES 316-320
Authors K . Chaitanya, M .Lakshmi Bai   PDF
Article-61 Title High-Limit Reversible Information Stowing away In Double Pictures by Utilizing Example Substitution 321-326
Authors G Ashok, K Subba Rao   PDF
Article-62 Title Web Image Re-ranking using Query Log Data and visual photo Quality Assessment 327-331
Authors P.GULZAR, A.THIRUPATHAIAH   PDF
Article-63 Title Artificial Intelligence in Cyber Defense 332-336
Authors I.Yallamanda Reddy, A.Thirupathaiah   PDF
Article-64 Title Adaptable Face Picture Recovery utilizing Quality Upgraded Meager Code words 337-341
Authors J Durga, Dr. P Harini   PDF
Article-65 Title Novel Techniques for Transmissions to Communication Jamming Denial-of-Service Attacks 342-346
Authors JOGI SUVARNA BHARATHA RAJU, Dr. P. HARINI   PDF
Article-66 Title Secure Mining of Affiliation Runs in Evenly Disseminated Databases 347-351
Authors K.SAMYUKTHA, M. LAKSHMI BAI   PDF
Article-67 Title A VISUAL CRYPTOGRAPHY SCHEME WITH LAYERED EXPANSION FOR SECRETHALFTONE IMAGES 352-356
Authors M. KarthikBabu , S. Amarnath Babu   PDF
Article-68 Title An Exteriorized Itinerant Search Portal 357-360
Authors M Lavanya, K.Subba Rao   PDF
Article-69 Title C-Privacy: Collaborative Data Publishing to Preserve Integrity in Data Dissemination 361-366
Authors N.LALITHA, S.AMARNATH BABU   PDF
Article-70 Title Access Approach Union for Occasion Preparing Frameworks 367-371
Authors N.Ramesh, Dr.P.Harini   PDF
Article-71 Title GENETIC ALGORITHM TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE IN MODULE SYSTEM 372-375
Authors NORI.VENKATA YASASWI, P.V.SUBBARAMA SARMA   PDF
Article-72 Title On The Node Clone Detection Using DHT and RDE 376-379
Authors PASUPULETI R A N PRASAD, Dr.P.Harini   PDF
Article-73 Title An Efficient Reversible Data Hiding Technique using Reserving Room before Encryption for Data Hiding in Encrypted Images 380-384
Authors P.SHAKIRA, Dr.P.HARINI   PDF
Article-74 Title Fault Node Identification Using Comparison Models 385-388
Authors K.V.Sudhakar, N. Lakshmi Narayana   PDF
Article-75 Title A Hybrid Intrusion Detection System for Identification of Anonymous Behavior 389-391
Authors K.Sasidhar, N.Sagar Pavan Kumar   PDF
Article-76 Title Answering General Time Sensitive Queries 392-394
Authors O.Ramesh, V. Vidya Sagar   PDF
Article-77 Title Service Oriented application based search Engine for Mobile 395-398
Authors G.Jyothi Kishore, V.Srikanth   PDF
Article-78 Title Privacy Preserving and Optimal Keyword Search Over Out Sourced Data 399-402
Authors J. Satyanarayana Swamy, V. Visweswararao   PDF
Article-79 Title An Empirical Model of Data Monitoring Service over cloud 403-407
Authors N.Sowjanya, Ch. Swapna Priya   PDF
Article-80 Title An efficient Privacy Preserving Data Clustering over distributed Networks 408-410
Authors G. Kananka Maha Laksmi, V.Visweswara Rao   PDF
Article-81 Title A Novel Intrusion Detection System with Classification and Signature approach 411-413
Authors Y. Keerthi, CH . SwapnaPriya   PDF
Article-82 Title A Double Layer Security Scheme for Conserving Private Data in Cloud Services 414-418
Authors M.Santhoshi, V.Srikanth   PDF
Article-83 Title A Novel classification approach for Firewall Log data Analysis 419-422
Authors P.Sowjanya, V.Srikanth   PDF
Article-84 Title A Genetic Based Pattern Mining approach for Search engine optimization 423-426
Authors K.Satya Srivalli, V. Vidya Sagar   PDF
Article-85 Title An Empirical Model of Secure Data Sharing between Multi Data Owners 427-430
Authors Padmashree, V. Vidya Sagar   PDF
Article-86 Title Frequent Pattern Comparative Analysis of Apriori and FLAG Matrix 431-434
Authors Vysyaraju Raisha,V. Sangeetha   PDF
Article-87 Title Privacy Preserving Data Storage of Intermediate Data Sets over Cloud 435-438
Authors T.N.S.Satyavani, Cheekatla Swapna Priya   PDF
Article-88 Title An Efficient Filtering Technique over Undesirable Data of OSN User Walls 439-442
Authors Rakesh Singampalli, K.Vinaykumar   PDF
Article-89 Title A Secure Self-Destructive Active Storage Framework for Data Confidentiality 443-446
Authors Balla Rajendra, V.Sangeeta   PDF
Article-90 Title An Evolutionary approach for Candidate Set generation with String Transformation Technique 447-450
Authors B. Srinivas Reddy, V.Vidyasagar   PDF
Article-91 Title A Framework for Attaining Uncertainty and Traceability in WMN 451-455
Authors G.Vinay Reddy, V.VisweswaraRao   PDF
Article-92 Title Design of Optimized 64 Bit MAC Unit for DSP Applications 456-460
Authors Shaik.Masthan Sharif ,D.Y.V.Prasad   PDF
Article-93 Title TRI-DCT BASED FAST BACK PROPAGATION ALGORITHM 461 - 465
Authors G.Visalakshi, K.Chiranjeevi   PDF
Article-94 Title Performance Analysis of High Speed DDR3 SDRAM 466-469
Authors G.B.S.R.Naidu , U.Venkata Rao   PDF
Article-95 Title MIMO-OFDM DOWNLINK WIRELESS SYSTEM WITH REDUCED PAPER 470-475
Authors Ch.Naveen Kumar, D.Srinivasa Rao   PDF
Article-96 Title MIMO RADAR PERFORMANCE USING SWERLING SCATTERING MODELS 504-480
Authors P. JYOTSNA, D. TIRUMALA RAO   PDF
Article-97 Title CAPSULE IMAGE RETRIEVAL USING EDGE BASED ALGORITHMS 481-484
Authors Chesti Altaff Hussain, Dr.D. Venkata Rao, B.Venkata Sekhar Babu, J.Chiranjeevi Revanth   PDF
Article-98 Title Artificial Neural Network Model for the Prediction of Thrombo-embolic Stroke 485-492
Authors K..Suneetha,Ch.Hephzibah, D.V. Chandra Sekhar   PDF
Article-99 Title Review on Classification Techniques in Data Mining 493-497
Authors Hari Krishna Kanagala, Dr JayaramakrishnaiahVemula , Prof. Ramchand H Rao Kolasani   PDF
Article-100 Title Opinion Mining and Sentiment Analysis: A Survey 498-502
Authors Chandra Sekhar Reddy Mukkarapu, Dr.v. Jaya Rama Krishnaiah Vemula   PDF
Article-101 Title A New System to Generate Simplified Decision Trees for applicability in the domain of Health Care 503-507
Authors Abdul Ahad Md, Dr. Suresh Babu Y , Rajesh Chandra G   PDF
Article-102 Title A PROTOTYPE FOR DIAGNOSING CANCER DISEASE USING ADVANCED MINING TECHNIQUE 508-514
Authors A.D.P.Swaroop, L.Padmavathi   PDF
Article-103 Title Secure Communication using Modified S-DES with Steganography 515-518
Authors Prashanti.G, Sandhyarani.K   PDF
Article-104 Title A Survey on gap between SQL and DMQL 519-525
Authors S. POOJITA, P.THRIDHARA   PDF
Article-105 Title Detecting Outliers in Large Dataset using Distributed Method 526-528
Authors D.Madhavi, Ch. Sreenubabu   PDF
Article-106 Title Mobile Sensor and Destination Tracking in Wireless Sensor Networks 529-532
Authors Dr Y. SURESH BABU , P. VIJAY KUMAR, Y. Gokul   PDF
Article-107 Title Classification of Diabetic Retinopathy Using Image Processing and Soft Computing Techniques 533-537
Authors Muppidi Venkatesh, V Sree Ramamurthy   PDF