S.No.

Title of Paper

Page No.
1.

IMPLEMENTATION OF IPTV SERVICES DELIVERY THROUGH VIRTUALIZATION IN CLOUD COMPUTING

Authors: B. Lavanya, V. Devasekhar  

1- 5
2.

A NOVEL WAY OF IMPROVING EFFICIENCY IN ASSOCIATION RULES

Authors: B. Sai Kiran,DR Rishi Sayal  

6- 10
3.

HOME STATUS MONITORING AND AUTOMATION THROUGH THE INTEGRATION OF DALI WITH WIRELESS SENSOR NETWORKS

Authors: Bandaru Chiranjeevi, D.Vemana Chary   

11- 15
4.

PERSONALIZING MOBILE HEALTH RECORDS BASED ON CLOUD

Authors: Bharat Raja Savya Sachi Madishetty, S. Madhu   

16- 20
5.

WIRELESS HEARTBEAT DETECTION

Authors: Pushpanjali Dana, Mrs. Komala   

21- 24
6.

CONTROL TO PROVIDE INTELLIGENT TRAFFIC MANAGEMENT SERVICE FOR HIGH SPEED NETWORK BASED ON FUZZY LOGIC

Authors: D. Swetha Reddy, S. Madhu   

25- 31
7.

PRIVACY MECHANISMS TO A HEURISTIC ANONYMIZATION SCHEME USED IN SOCIAL NETWORKS

Authors: Modugu Sathish Reddy, B. Lalunayak  

32- 37
8.

SECURE COMMUNICATION IN ONLINE SOCIAL NETWORKS BY USING COLLABORATIVE MANAGEMENT OF SHARED DATA USING M-CONTROLLER AND SENSITIVITY LEVEL

Authors: P. Sireesha, S. Madhu  

38- 42
9.

AN INTELLIGENT DEFENSE SECURITY SYSTEM FOR ARMORY

Authors: V. K. K. Kishore. Pasumarthi, A. V. Paramkusam  

43- 47
10.

ENSURING SECURITY FOR INTERMEDIATE DATASETS IN CLOUD USING UPPER BOUND HEURISTIC VALUE AND PP ALGORITHM

Authors: Tejaswi Turla, S. Siva Skandha, G. Ravi Kumar  

48- 53
11.

DESIGN OF TWO'S COMPLIMENT MULTIPLIER FOR REDUCING THE COMPUTATION TIME

Authors: V. A. K. Pradeep, A. Jayalakshmi  

54- 58
12.

SELF REGULATING TRUST MODEL FOR PEER 2 PEER SYSTEMS

Authors: Nisar Sultana, Vamsee Krishna. K  

59- 64
13.

A SELF-CONFIGURABLE NEW GENERATION CHILDREN TRACKING SYSTEM

Authors: S Santosh Goud, K. Nishakar  

65- 68
14.

ADVANCED MODILATION STRATEGIES FOR COMMON MODE VOLTAGE REDUCTION FOR A GRID CONNECTED MULTILEVEL COVERTER

Authors: K. Sandheep, Mr. Viswaprakash Babu   

69- 76
15.

RFID & MOBILE FUSION FOR AUTHENTICATED ATM TRANSACTION

Authors: R. Naveen, G. Sreedhar Kumar  

77- 81
17.

ANALYSIS OF MULTI LEVEL DUAL BUCK INVERTER TOPOLOGY

Authors: M. Santhosh, M. Shiva Kumar   

90- 99
18.

A HIGH STEP-UP DC–DC CONVERTER FOR STAND-ALONE PV/BATTERY POWER SYSTEMS USING FUZZY LOGIC CONTROLLER

Authors: K. Nagarjuna, O. Ranjit Kumar  

100- 104
19.

AN EFFICIENT AND PRESERVING APPROACH FOR STORAGE SECURITY IN CLOUD COMPUTING

Authors: Mohammed Hussain, Ravi Mathey   

105- 110
20.

REGULARIZED TRANSCEIVER DESIGNS FOR MULTI-USER MIMO INTERFERENCE CHANNELS

Authors: T V S Prasad Gupta, M.A.S Mohan Raju , D.Ramya  

111- 127
21.

A SURVEY OF SECURITY ISSUES IN MULTI CLOUD COMPUTING ENVIRONMENT

Authors: Abdul Quader Khan, Abdul Majeed   

128- 133
22.

ACHIEVING SECURE PERSONAL HEALTH RECORDS USING ENCRYPTION IN CLOUD ENVIRONMENT

Authors: Abrar Syed Azeemuddin, Abdul Majeed  

134- 137
23.

ENTERPRISE USE CASES AND IMPLEMENTATION ARCHITECTURE OF SEARCH-AS-YOU-TYPE IN DATABASES USING SQL

Authors: Aparna Vedantham, Prof. M. Ganesh Kumar  

138- 141
24.

FACILITATING REMOTE ACCESS CONTROL OF GROUP-ORIENTED COMMUNICATIONS WITHOUT RELYING ON A FULLY TRUSTED SECRET KEY GENERATION CENTER

Authors: Saggurthi. Kiran, E. Venkata Ramana  

142- 146
25.

DYNAMIC APPROACH OF A KEY MANAGEMENT FOR SECURE TRANSMISSION TO ISOLATED GROUPING

Authors: Sravanthi, Ravi Mathey   

147- 151
26.

BLIND EXTRACTION SCHEME FOR DIGITAL MEDIA USING EXTRACTION SPREAD SPECTRUM SEQUENCE

Authors: G. Thanuja Reddy, Imtiyaz Shaik Pasha   

152- 163
27.

A NOVEL APPROACH FOR POWER-CONSTRAINED CONTRAST ENHANCEMENT FOR EMISSIVE DISPLAYS BASED ON HISTOGRAM EQUALIZATION

Authors: S. Priyadarsini, Ravi Kumar   

164- 171
28.

EVABCD: A FRAMEWORK FOR FINDING USER BEHAVIOR PROFILES BY EVABCD

Authors: Omer Ali Khan, Asfia Mubeen   

172- 175
29.

OPTIMAL SOLUTION FOR DATA STAGING IN CLOUD COMPUTING SHARED DATA ACCESS

Authors: V. U. D. P. Vardhani, K .Vijay Kumar   

176- 181
30.

AN PHYSICAL ENVIRONMENT MONITORING AND HOME APPLIANCES CONTROL THROUGH WIFI

Authors: T. Tirupathi, Jyothirmai   

182- 186
31.

PROTECTING PRIVACY DATA FROM PUBLIC AUDITING THROUGH SECURE STORAGE IN CLOUD COMPUTING

Authors: M. Ramesh Babu, K. Narasimhulu  

187- 191
32.

AN EFFICIENT RANGE QUERY SEARCH IN SPATIAL DATASETS

Authors: k. Jeeja, N.V.Subba Reddy  

192- 196
33.

PHYSICAL ENVIRONMENT MONITORING AND CONTROLLING OF HOME AREA NETWORKS

Authors: Shaik Mubeena Yasmin, B. A. Sarath Manohar Babu   

197- 201
34.

ENHANCEMENT OF SOUTH INDIAN INSCRIPTIONS IMAGES USING DE-NOISING AND CHARACTER SPOTTING TECHNIQUES

Authors: Naveen Kumar Talla, E.V Ramana   

202- 201
35.

IMPLEMENTATION OF WEB CRAWLER FRAMEWORK

Authors: Rajagiri Raju, Imran Qureshi, Dr. Sandeep Singh Rawat, Dr. S. Sreenatha Reddy   

202- 206
36.

POWER FACTOR CORRECTION BASED CONTROL STRATEGY FOR FOUR QUADRANT OPERATION OF THREE PHASE BLDC DRIVE

Authors: Mothukuri Rakesh, Ms. R. Rekha  

207- 212