S.No.

Title of Paper

Page No.
1.

HIGHLY SCALABLE TWO-PHASE TDS APPROACH FOR DATA ANONYMIZATION ON CLOUD

Authors: N Naveen Kumar, T Narasimha Rao   

1- 7
2.

HUMAN ROBOT MOTIONS WITH FINGERS BY USING MEMS

Authors: Mattupalli.Amaravani, S. Surendra   

8- 11
3.

A METHODOLOGY FOR OPTIMIZED DESIGN OF SECURE DIFFERENTIAL LOGIC GATES FOR DPA RESISTANT CIRCUITS

Authors: D. Kalpana, K. Madhava Rao   

12- 18
4.

PERFORMANCE OF IMPROVED ACTIVE POWER FILTER WITH AN INTELLIGENT CONTROLLER FOR RENEWABLE POWER GENERATION SYSTEMS

Authors: K. Surya, Mr. V. Veera Nagi Reddy   

19- 25
5.

ANALYTICAL OFDM PERFORMANCE BASED ON WAVELET TRANSFORM OVER CONVENTIONAL FFT TRANSFORM WITH VARIOUS MODULATION TECHNIQUES

Authors: A. Thirumala Babu, D. C. Vinod Ratnakumar   

26- 35
6.

A NOVEL POWER-CONSTRAINED CONTRAST ENHANCEMENT ALGORITHM FOR OLED EMISSIVE DISPLAY BASED ON MULTI SCALE RETINEX APPROACH

Authors: Setty Rajeswari, M. Koteshwar Rao   

36- 46
7.

ASSISTIVE SYSTEM FOR PRODUCT LABEL DETECTION WITH VOICE OUTPUT FOR BLIND USERS

Authors: S. Srikanth, S. V. S. Prasad, Kundharapu Srikanth Reddy   

47- 52
8.

ANALYTICAL RESEARCH WORK HIGH EQUIPPED DATA HIDING ALGORITHM BASED ON SECRET FRAGMENT VISIBLE MOSAIC IMAGES AND PIXEL COLOR TRANSFORMATIONS FOR SECURE IMAGE TRANSMISSION

Authors: Pendyala Koteswari Devi, M. Koteshwar Rao   

53- 62
9.

A NOVEL BASED ON POWER QUALITY IMPROVEMENT AND MITIGATION BY USING DISTRIBUTED POWER FLOW CONTROLLER IN A TRANSMISSION SYSTEM

Authors: Srikanth Banda, Laxmi Devambatla   

63- 70
10.

THROUGH REMOTE LOCATION FIND APPLICATION OF ACQUSITION SYSTEM FOR SUPER CONDUCTING QUANTUM INTERFACE DEVICE(SQUID)

Authors: Swapna Kota, D. Prasanth, S. A. Muzeer   

71- 76
11.

PROVIDING PRIVACY TO USERS IN PERSONALIZED WEB SEARCH

Authors: V. Umarani, Golla Pragathi   

77- 82
12.

A NEW PCCE APPROACH FOR OLED EMISSIVE DISPLAYS BY MSR

Authors: Dyama Veerendra Kumar, Dr. K. Suresh Reddy   

83- 93
13.

THE IMPLEMENTATION OF DATA INTEGRITY AND DYNAMIC STORAGE IN DATABASE

Authors: Dr. K. Rameshwaraiah, P. Swetha   

94- 98
14.

PROTECTION OF VEHICLES FROM MALWARE USING RFID

Authors: V. Manasa, J. Vamshi Krishna   

99- 102
15.

GREEN WAVE SYSTEM FOR STOLEN VEHICLES BY USING RFID

Authors: Boorugu Anitha, J. Vamshi Krishna, D. Prashanth, Dr. S. A. Muzeer   

103- 106
16.

ADVANCED AUTOMOTIVE CRASH PREDICTION WITH WIRELESS COMMUNICATION

Authors: B. Likeetha Rani, M. Krishna, D. Srikar   

107- 110
17.

ENERGY MANAGEMENT SYSTEM BY USING WIRELESS SENSOR NETWORK

Authors: P. Srilatha, T. Ravi Kumar   

111- 115
18.

ANALYTICAL APPROACH FOR CFO ESTIMATION BY WEIGHTED SUB SPACE FITTING IN OFDM COMMUNICATIONS SYSTEM

Authors: Padma Shravani, Prakash J Patil, Dr B. R. Vikram   

116- 124
19.

3-AXIS ORIENTATION/MOTION DETECTION SENSOR

Authors: S. Anusha, N. Kavita   

125- 135
20.

WIRELESS SENSOR NETWORK FOR INDUSTRIAL ENVIRONMENT MONITORING IN IOT APPLICATIONS

Authors: S. Nazma Naz, Mohammad Mohasinul Huq N   

136- 140
21.

MULTIFUNCTION RESIDUE ARCHITECTURES FOR CRYPTOGRAPHY

Authors: Laxmi Triveni. D, P. V. Varaprasad Rao   

141- 146
22.

EFFICIENT FPGA AND ASIC REALIZATION OF A DA-BASED RECONFIGURABLE FIR DIGITAL FILTER

Authors: Jhansi Bai P, P. V. Varaprasad Rao   

147- 152
23.

ON THE SYSTEMATIC CREATION OF FAITHFULLY ROUNDED TRUNCATED MULTIPLIERS AND ARRAYS

Authors: G. Sony, G. Satya Prabha   

153- 157
24.

WEB OF THINGS BASED DOMESTIC LUMINESCENCE ORGANIZATION VIA WIFI

Authors: G. Bhagya Laxmi, Mr. D. Prashanth, S. A. Muzeer, N. Veda Kumar   

158- 162
25.

VEHICLE TRACKING SYSTEM BY USING GSM AND GPS

Authors: K.Swapna, J. Vamshi Krishna, D. Prashanth, Dr. S. A. Muzeer   

163- 166
26.

VOLTAGE MODULATIONSTRATEGY FOR 11-LEVEL MULTILEVEL CASCADE INVERTER UNDER UNBALANCEDDC SOURCES

Authors: N. Vasanthi, P. Buchi Babu   

167- 177
27.

A NEW TOPOLOGY FOR CAPACITOR VOLTAGE REGULATION IN CASCADED H-BRIDGE MULTILEVEL CONVERTERS WITH FUZZY LOGIC CONTROLLER

Authors: S. Rajani, K. Swarnalatha   

178- 186
28.

DESIGN OF PARALLEL SELF-TIMER ADDER WITHOUT CARRY CHAIN PROPAGATION

Authors: B. Nagamani, G. Sathya Prabha   

187- 192
29.

EFFICIENT ROUTING RESOURCE ALLOCATION FOR OVERLAY RELAY NODES

Authors: Ch. Anitha, Mr. N. Naveen Kumar   

193- 197
30.

RELIABLE MILITARY INFORMATION RETRIEVAL USING CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION

Authors: Dr. K Suresh Babu, Ramesh Pawar   

198- 202
31.

GEOGRAPHIC ADHOC- ON -DEMAND DISTANCE VECTOR ROUTING PROTOCOL AGAINST BLACK HOLE ATTACKS IN MANETS

Authors: G. Anusha, M. Vijaya Lakshmi   

203- 207
32.

COMPENSATION OF VOLTAGE SAG AND SWELL USING FUZZY LOGIC CONTROLLED DVR

Authors: G. Hemangini Reddy, G. Ramana Reddy   

208- 217
33.

APPLICATION OF FUZZY BASED THREE-PHASE INVERTER IN DISTRIBUTED GENERATION BY IMPLEMENTING UNIFIED CONTROL STRATEGY

Authors: Mukku Murali, Dr. K Venkateswarlu   

218- 236
34.

SECURE VARIOUS-KEYWORD STRATIFIED SEARCH THROUGH ENCRYPTED DATA IN CLOUD

Authors: Sk. Mastan, Radha   

237- 245
35.

A NEW DISTRIBUTED ACCESS CONTROL SCHEMA FOR SECURE DATA STORED IN CLOUDS

Authors: P.Praveen Kumar, Dr. G. Venkata Rami Reddy   

246- 250
36.

A ONE CLASS DECISION TREE APPROACH FOR PERFORMING ONE-MANY DATA LINKAGE

Authors: S. Rajashekhar Reddy, G. Venkata Rami Reddy, S. Surendar Reddy   

251- 256
37.

IMPLEMENTATION OF SECURE AND PRIVACY IN ONLINE SOCIAL NETWORKS

Authors: Medarametla. Namratha, Mekala Sreenivas, Annaluri Srinivasa Rao, Punna Amarnath   

257- 263
38.

FAULT CURRENT INTERRUPTION BYTHE DYNAMIC VOLTAGE RESTORER BASED ON FUZZY LOGIC CONTROLLER

Authors: A. Maneesha, Mr. K. Amaresh   

264- 273
39.

ANALYTICAL ANALYSIS FOR SECURE IMAGE TRANSMISSION BASED ON MOSAIC IMAGE GEENRATION

Authors: Pradeep Kumar Chowlam, M. Sravanthi   

274- 282
40.

VLSI IMPLEMENTATION OFDLMS ADAPTIVE ALGORITHM TO ANALYZE CRITICAL PATH

Authors: Mamatha. A, Santhipriya. S   

283- 292
41.

RESOURCE ALLOCATION OF OVERLAY ROUTING RELAY NODES USING BGP ROUTING SCHEME

Authors: B. Sankar Naik, D. Anuradha   

293- 298
42.

PRIVACY PRESERVING OPPORTUNISTIC COMPUTING (CAM) FRAMEWORK FOR M-HEALTHCARE USING IBE

Authors: Basetti Rajashekhar, M. Vazralu   

299- 304
43.

THREE-PHASE POWER CONVERTER CONNECTED TO A DISTRIBUTION SYSTEM USING FUZZY LOGIC CONTROLLER

Authors: G. Gangadhar Reddy, T. Vamsee Krishna   

305- 312
44.

A NOVEL CLOUD ARCHITECTURE FOR DATA CONFIDENTIALITY BY USING ADAPTIVE ENCRYPTION WITHOUT INTERMEDIATE SERVER

Authors: K. Vamshee Krishna, J. Rachana   

313- 318
45.

SIMULATION OF RECONFIGURABLE SOLAR CONVERTER

Authors: Sheik. Afjal Naj, Mrs. E. Gouthami   

319- 329
46.

OPTIMIZED DATA HIDING ALGORITHM BASED ON SECRET FRAGMENT VISIBLE MOSAIC IMAGES AND PIXEL COLOR TRANSFORMATIONS FOR SECURE IMAGE TRANSMISSION

Authors: Genji Venkateswara Rao, B. Venkatesh   

330- 340
47.

A NEW REVERSIBLE WATERMARKING APPROACH BASED ON LOCAL PREDICTION FOR DIFFERENCE EXPANSION ALGORITHM

Authors: Sobha Ranichella, K. Shekar Babu   

341- 348
48.

INTRODUCING SEED-AND-GROW ALGORITHM TO IDENTIFY USERS FROM AN ANONYMIZED SOCIAL NETWORK

Authors: Kandra Srikanth, Mr. B. Kishore   

349- 352
49.

EFFICIENT PRIVACY CONSERVES ACCESS CONTROL FOR RELATIONAL DATABASE

Authors: Sangisetty Swapna, Dr. M. V. Siva Prasad, Mr. K. Vijay Kumar   

353- 357
50.

ANALYTICAL AUDIO WATERMARKING SCHEME BASED ON EMD

Authors: Gidde Praveen, Mr. P. V. Vara Prasad Rao   

358- 362
 
updating...........