1. |
Study of Traditional Upstream Congestion Control
Algorithm with various Metrics in Realistic WSN Scenarios
Pages : 2473-2478
V. Vijaya Raja, R. Rani Hemamalini and A. Jose Anand
Abstract | PDF |
2. |
Active Queue Management for Flow Congestion Control in wireless network
Pages : 2479-2481
Kiran babu Kommu, Kakara Ravi Kumar, Srinivasa Rao S
Abstract | PDF |
3. |
Dynamic Bandwidth for Minimum Delay Peer-to-peer Streaming
Pages : 2482-2484
K. Venkata Ganesh Babu, K. Ravi Kumar
Abstract | PDF |
4. |
An Adaptive Rate Control based QoS Provisioning
in Mobile Ad hoc Networks
Pages : 2485-2491.
S.Venkatasubramanian
Abstract | PDF |
5. |
Emotion Recognition System for English Dialects using Dimensional Theory
Pages : 2492-2495.
M. Chinna Rao, A.V.S.N. Murthy
Abstract | PDF |
6. |
High Secure Crypto Biometric Authentication Protocol
Pages : 2496-2502
K Hemanth, Srinivasulu Asadi, Dabbu Murali, N Karimulla and M Aswin
Abstract | PDF |
7. |
Performance Evaluation of Grid Computing in Trust
Related Environment
Pages : 2503-2506.
V.Vijayakumar, R.S.D.Wahidabanu
Abstract | PDF |
8. |
Design a MNUR method for Finding Similarity between
Fingerprint Images Based on Fingerprint Detection Technique -1
Pages : 2507-2509
Jitendra Singh Sengar, Jasvinder Pal Singh, Niresh Sharma
Abstract | PDF |
9. |
Article Removed
Pages : 2510-2516
Article Removed
Abstract | PDF |
10. |
BiFree: An Efficient Biclustering Technique for
Gene Expression Data Using Two Layer Free
Weighted Bipartite Graph Crossing Minimization
Pages : 2517-2524
Suvendu Kanungo, Gadadhar Sahoo, Manoj Madhava Gore
Abstract | PDF |
11. |
Seamless handoff in Next Generation Wireless
System
Pages : 2525-2530
Poonam B. Bhilare, Santosh S. Sambare
Abstract | PDF |
12. |
Real Time Security Control System
For Smoke and Fire Detection Using
ZigBee
Pages : 2531-2540.
Suneel Mudunuru, V. Narasimha Nayak, G.Madhusudhana Rao, K.Sreenivasa Ravi
Abstract | PDF |
13. |
Dynamic Approch to Retrive the Web Pages
Pages : 2541-2547
Muthe V Satya Nagaraju, U. Nanaji
Abstract | PDF |
14. |
Using Hybrid And LQR Method Control Of A
Self-Erecting Rotary Inverted Pendulum System
Based On PIC 18F4431
Pages : 2548-2553
Huu Chan Thanh Nguyen, An Wen Shen
Abstract | PDF |
15. |
Adaptive MIMO-OFDM Scheme to Reduce Complexity and Optimize User Data Rate Over Fading Channel in Wireless Sensor Networks
Pages : 2554-2561
L.C.Siddanna Gowd A. Natarajan , M.Manikandan and R.Pavendiran
Abstract | PDF
|
16. |
Detecting the Age of the Fish through Image
Processing using its Morphological Features
Pages : 2562-2567
G.T.Shrivakshan , C. Chandrasekar
Abstract | PDF |
17. |
Node Localization in Wireless
Sensor Networks
Pages : 2568-2572
P.K Singh, Bharat Tripathi, Narendra Pal Singh
Abstract | PDF |
18. |
Image segmentation-MR Images Segmentation with
A Modified Gaussian Mixture Model
Pages : 2573-2578
P.Daniel Ratna Raju, G.Neelima, K.Prasada Rao
Abstract | PDF |
19. |
An Approach to Improve the Security of Online
System using Crypto System
Pages: 2579-2583
M.V.B.T.Santhi, K.Deepthi, Ch.Satya Keerthi .N.V.L, P.Lakshmi Prasanna
Abstract | PDF |
20. |
A Review on LBG Algorithm for Image
Compression
Pages: 2584-2589
Asmita A.Bardekar, P.A.Tijare
Abstract | PDF |
21. |
Secure Employee Information System to Manage
Integrated Network Services
Pages : 2590-2595
P.Rama Rao, O.Obulesu
Abstract | PDF |
22. |
An inference routing tree topology algorithm for
reducing overhead in packet probing
Pages : 2596-2601
V. Srujana and Vadlamudi Rajesh
Abstract | PDF |
23. |
Throughput Enhancement by Robust Routing in
MANET
Pages : 2602-2606
Manikonda Aparna, Motahar Reza
Abstract | PDF |
24. |
A Mechanism for Recognition & Eradication of
Gray Hole Attack using AODV routing protocol in
MANET
Pages : 2607-2613
Onkar V. Chandure, V. T. Gaikwad
Abstract | PDF |
25. |
Analysis of Optimal Route Algorithms Under Constraint Conditions
Pages : 2614-2619
M.V.Mawale, Y.B.Gandole
Abstract | PDF |
26. |
Network Delay: Network Analyzer and
Opnet Simulation Tool
Pages : 2620-2626
Sandhya Rani.S, Chandrasekhar.G
Abstract | PDF |
27. |
A Review of Security Metrics in Software
Development Process
Pages : 2627-2631
Smriti Jain, Maya Ingle
Abstract | PDF |
28. |
Performance Evaluation of ATM Networks in
Computer Simulation
Pages : 2632-2636
A. Ghaddar , Y. Mohanna , M. Dbouk , O. Bazzi
Abstract | PDF |
29. |
Article Withdrawn
Pages : 2637-2644
xxx,xxx
Abstract | PDF |
30. |
Reducing End to End per Packet Energy
Consumption
Pages : 2645-2649
N.Annapurna#1, M.V.Vijaya Saradhi
Abstract | PDF |
31. |
Smart Sensor System for Agricultural Chronology
Pages : 2650-2658
K.Srinivasa Ravi, K.Tapaswi, B.Lokesh, G.Sai Krishna
Abstract | PDF |
32. |
A Novel Iris Recognition System Using Statistical
Feature Analysis By Haar Wavelet
Pages : 2659-2662
S.Balaji, G.Gayathri, K.Lokesh, S.Sindhu
Abstract | PDF |
33. |
Reduced -Reference Image
Quality Assessment
Pages : 2663-2665
Shraddha N. Utane, V. K. Shandilya
Abstract | PDF |
34. |
A Controller Based Approach for Web Services
Virtualized Instance Allocation
Pages : 2666-2670
Sandesh Tripathi , S Q Abbas , Rizwan Beg
Abstract | PDF |
35. |
Solution of Time Constrained Vehicle Routing Problems using Multi-Objective
Hybrid Genetic Algorithm
Pages : 2671-2676
Bhawna Minocha, Saswati Tripathi
Abstract | PDF |
36. |
Mining frequent item sets without candidate
generation using FP-Trees
Pages : 2677-2685
G.Nageswara Rao, Suman Kumar Gurram
Abstract | PDF |
37. |
A Novel Approach of Watershed Segmentation of
Noisy Image Using Adaptive Wavelet Threshold
Pages : 2686-2690
Nilanjan Dey, Arpan Sinha, Pranati Rakshit
Abstract | PDF |
38. |
Privacy-Preserving Public Auditing In Cloud
Storage Security
Pages : 2691-2693
D. Srinivas
Abstract | PDF |
39. |
Enhancement of Diabetic Retinopathy Imagery
Using Contrast Limited Adaptive Histogram
Equalization
Pages : 2694-2699
Saikat Kumar Shome, Siva Ram Krishna Vadali
Abstract | PDF |
40 |
Dynamic Congestion control for TCP in
Peer - to - Peer Network
Pages : 2700-2702
D. Raghu, Thatha Reddy Karri ,Ch. Raja Jacob
Abstract | PDF |
41. |
Route Management Protocol for Misbehavior
in Ad Hoc Networks
Pages : 2703-2709
A. Shalini,Krishna Rao, Sridhar G
Abstract | PDF |
42. |
A Comparison of Rule based and Distance Based
Semantic Video Mining
Pages : 2710-2713
D.Raghu, K.sandeep , CH. Raja Jacob
Abstract | PDF |
43.. |
Implementation study of Hybrid caching
scheme in Wireless P2P networks with
Asymmetric Cooperative caching
Pages : 2714-2718
B.S.V.N.L.Gayatri M.H.M. Krishna Prasad
Abstract | PDF |
44. |
Face Detection by Fine Tuning the
Gabor Filter Parameter
Pages : 2719-2724
Suraj Prakash Sahu , Vibhav Anand, Nitin Kumar*, Pavan Chakraborty and G.C.Nandi
Abstract | PDF |
45. |
Improving User Experience by Mining Usage
Patterns
Pages : 2725-2727
J.Isabella,R.M.Suresh
Abstract | PDF |
46. |
Virtual Instrumentation as an Effective
Enhancement to Laboratory Experiment
Pages : 2728-2733
Yogendra B.Gandole
Abstract | PDF |
47. |
Dynamic Vision-Based Approach in
Web Data Extraction
Pages : 2734-2736
D.Raghu, V.Sridhar Reddy, Ch.Raja Jacob
Abstract | PDF |
48. |
Article Removed
Pages : 2737-2739
xxxx, xxxx
Abstract | PDF |
49. |
An Efficient Channel Allocation in
Mobile Computing
Pages : 2740-2747
A.S.C.Padma, M.Chinnaarao
Abstract | PDF |
50. |
RSVP protocol in Multimedia Networks
Pages :2748-2751
T. SaiDurga, D. V.Manjula
Abstract | PDF |
51. |
Design and Performance Evaluation of Transmitted
Reference BPSK UWB Receiver using SIMULINK
Pages : 2752-2760
Alpana P. Adsul , Shrikant. K. Bodhe
Abstract | PDF |
52. |
A New Low Power 9T SRAM Cell based on
CNTFET at 32nm Technology Node
Pages : 2761-2764
Rajendra Prasad S, Dr. B K Madhavi, Dr. K Lal Kishore
Abstract | PDF |
53. |
Neural Network Based Authentication and Verification
for Web Based Key Stroke Dynamics
Pages : 2765-2772
D. RAGHU, CH. RAJA JACOB, Y.V.K.D.BHAVANI
Abstract | PDF |
54. |
Medical Image Classification Using Information
Gain for Global Feature Reduction
Pages : 2773-2775
T.Baranidharan, Dr.D.K.Ghosh
Abstract | PDF |
55. |
ANT COLONY OPTIMIZATION ROUTING to
MOBILE AD HOC NETWORKS in URBAN
ENVIRONMENTS
Pages : 2776-2779
Manjula Poojary, B.Renuka
Abstract | PDF |
56. |
Efficient way of Detecting Malicious Packet Losses
Pages : 2780-2783
K Bala murali Krishna,K Prasada Rao
Abstract | PDF |
57. |
A Review of Security and Privacy Issues in
Social Networking
Pages : 2784-2787
A. A. Sattikar, Dr. R. V. Kulkarni
Abstract | PDF |
58. |
Efficient Apriori Mend Algorithm for
Pattern Extraction Process
Pages : 2788-2791
D.Magdalene Delighta Angeline ,I.Samuel Peter James
Abstract | PDF |
59. |
ESDPMANT: Efficient Service Discovery
Protocols for Mobile Ad Hoc Networks.
Pages : 2792-2795
Raghu.Devarapalli, Jeevan babu.Vara, Raja Jacob.Chidipi, Lakshman babu.Didde
Abstract | PDF |
60. |
The Performance of Parallel Algorithms by
Amdahl's Law, Gustafson's Trend
Pages : 2796-2799
Juby Mathew, Dr.R Vijayakumar
Abstract | PDF |
61. |
Network Security through SSL in Cloud
Computing Environment
Pages : 2800-2803
Pankaj Patidar, Arpit Bhardwaj
Abstract | PDF |
62. |
Comparative Study of DECIM-128 and DECIMV2
in relation to Compact Hash-based Message
Authentication Code
Pages : 2804-2806
P.Venkateswara Rao, K.Seetha Devi, CH.V. Phani Krishna, Dr. K.Subrahmanyam
Abstract | PDF |
63. |
A Mobile IPv6-Based Architecture for Mobility
of Mobile Terminals in Heterogeneous Networks
Pages : 2807-2810
G.Praveen,M.RajaRamesh
Abstract | PDF |
64. |
Provably Secure Quantum Key Distribution
Protocols in 802.11 Wireless Networks
Pages : 2811-2815
R.Lalu Naik , Dr.P.Chenna Reddy , U.Sathish Kumar
Abstract | PDF |
65. |
Model Driven Design Method for Software
Architecture
Pages : 2816-2821
Thodeti Srikanth, Dachepally Ravi Kumar , Mahi Naveen Kumar
Abstract | PDF |
66. |
Information technology in Tourism
Pages : 2822-2825
Vidyullata Shekhar Jadhav,Shivaji D. Mundhe
Abstract | PDF |
67. |
Wireless Communication Networks – A Study & Emergence of Multipath Dissemination
Pages : 2826-2829
B.Sailaja, N.Sujata Gupta
Abstract | PDF |
68. |
Investigation of Classification Accuracy using Fast
Hartley Transform for Feature Extraction
Pages : 2830-2834
V.Baby Deepa, Dr. P. Thangaraj
Abstract | PDF |
69. |
NETWORK EVOLUTION in 3G / 4G:
APPLICATIONS and SECURITY ISSUES
Pages : 2835-2837
Veera RaghavaRao Atukuri, RamaKrishna Mathe,Mrunalini Pamidipati
Abstract | PDF |
70. |
Comparison of Frequent Item Set Mining
Algorithms
Pages : 2838-2841
J.R.Jeba,S.P.Victor
Abstract | PDF |
71. |
Design and Realization of Augmented Reality
Based Navigation Assistance System
Pages : 2842-2846
Veeraraghavulu Nakka, A Kabirdas
Abstract | PDF |
72. |
An Accomplishment of Web Personalization
Using Web Mining Techniqu
Pages : 2847-2851
Y.Raju m B.Prashanth Kumar ,.D.Suresh Babu
Abstract | PDF |
73. |
Node Localization for Wireless Sensor
Networks
Pages : 2852-2856
P.K Singh, Bharat Tripathi, Narendra Pal Singh
Abstract | PDF |
74. |
FaceMovie - A Novel Approach to Post the
Mining Classification Data
Pages : 2857-2861
Venkata Ramana Adari ,Ch.Diwakar , P.Suresh Varma
Abstract | PDF |
75. |
Web Usage Mining: An Incremental Positive and
Negative Association Rule Mining Approach
Pages : 2862-2866
Anuradha veleti, T.Nagalakshmi
Abstract | PDF |
76. |
Spatial Clustering Simulation on Analysis of
Spatial-Temporal Crime Hotspot for
Predicting Crime activities
Pages : 2867-2874
M.Vijaya Kumar,C.Chandrasekar
Abstract | PDF |
77. |
Scheduling in Wi-MAX Networks
Pages : 2875-2879
A. P.Vikram , B. T.Lakshmi Deepak ,and C. S.Deepthi
Abstract | PDF |
78. |
Detecting Application Denial-of-Service Attacks
: A Dynamic Group-Testing-Based Approach
Pages : 2880-2884
Sikakolanu Hareesh Kumar, U. Nanaji
Abstract | PDF |
79. |
Analysis and Automation of Security Management
System for Remote Terminals Based on Advanced
Finger Print Reorganization Algorithm
Pages : 2885-2888
Sai Kumar Nadakudhiti, A KabirDas
Abstract | PDF |
80. |
A Novel Approach for Subjective Content
Accessibility Mining using Lib Mart & Web
Mart Classification having Multilayered
Architecture
Pages : 2889-2893
Sachin Yele, Ravindra Gupta
Abstract | PDF |
81. |
A Process for Data Storage security in Cloud
Computing
Pages : 2894-2897
Durgarajesh Rachamsetty, Prof Ramakrishna Rao TK
Abstract | PDF |
82. |
Mining Accurate Information on Web Using
Truth Algorithm
Pages : 2898-2901
K.Vijaya Lakshmi , B.Jayanag, Dr. V.Srinivasa Rao
Abstract | PDF |
83. |
Security Issues on Inter-Vehicle
Communications
Pages : 2902-2905
M.V.B.T.Santhi, K.Deepthi, Ch.Satya Keerthi .N.V.L,P.Lakshmi Prasanna
Abstract | PDF |
84. |
Warehouse Management for Improved
Efficiency in A Small Warehouse
Pages : 2906-2908
M. Srikanth Yadav, Y. Eswara Rao, P. Sudhakar, Allada Aparna
Abstract | PDF |
85. |
Revocation and Self Healing of keys in Hierarchical
Wireless Sensor Network
Pages : 2909-2914
G.N.Purohit,Asmita Singh Rawat
Abstract | PDF |
86. |
Software Quality Assurance in CMM and XPA
Comparative Study
Pages : 2915-2919
CH.V. Phani Krishna and Dr. K.Rajasekhara Rao
Abstract | PDF |
87. |
Broadcasting Through UDG in Manets by GPS
Assistance
Pages : 2920-2923
A. P.Vikram , B. K.Renuka ,and C. P.VenkataNaveen
Abstract | PDF |
88. |
Performance Analysis of Parallel
Programming Tools
Pages : 2924-2931
Md Firoj Ali, Rafiqul Zaman Khan
Abstract | PDF |