International Journal of Computers Electrical and Advanced Communications Engineering (IJCEACE)
VOLUME 2 ISSUE 3 (January 2013 – July 2013)
CONTENTS
1.AN OPERATING SYSTEM FOR CLOUDS MECHANISMS AND IMPLEMENTATION
K.KRISHNA JYOTHI, DR.R.V.KRISHNAIAH
2.A SHORTEST PATH IDENTIFICATION FOR FEATURE GENERATION AND EXTRACTION FROM MEDLINE
K.NALINI KUMARI, MRS. G.SUBBALAKSHMI
3.WEB CACHE BASED DATA ACCESS IN WIRELESS ADHOC NETWORKS
A. PAVANI, DR. R.V.KRISHNAIAH
4.A FREQUENT PATTERN ANALYSIS FOR TARGETED ACTIVITY PATTERN MINING IN COMPLEX DATA
P.SWATHI, DR. R.V.KRISHNAIAH
5.AN OPERATING SYSTEM FOR MULTI CLOUDS: MECHANISMS AND IMPLEMENTATION
SINDHU DAROJ, DR.R.V.KRISHNAIAH
6.DATA AUTHENTICATION AND VERIFICATION IN CLOUD STORAGE
SHAFIYABEGUM MAHMEDABDUL, M.A.BASEER
7.ENABLING AUDITABILITY OF PROBABILITY OF DATA LEAKAGE BY TRUSTED AGENTS
KONDAPALLI REVATHI, VISWANADHUNI KISHORE, G.RAMA MOHANA RAO
8.AN EFFICIENT LAYERED APPROACH FOR INTRUSION DETECTION SYSTEM
SUNAR MOHAMMAD FAROOQ, MR. JACOB JAYA RAJ
9.EFFICIENT ASSOCIATION RULE MINING USING INDEXING SUPPORT
N.NAVANEETHA, S.KALYANI
10.MAINTAINING THE SUPPORT REQUESTS IN OSS PROJECTS
M L NARASIMHA REDDY
11.AUTHENTICATION BASED ON FINGER PRINTS
MD.ZUBER
12.AN ALGORITHM FOR CONCEPT DRIFTING AND GROUPING CATEGORICAL DATA
CH.SWAROOPA, Mrs.D.LAKSHMI PADMAJA, Mr.VISHNU MURTHY G
13.DATA DYNAMICS AND FLEXIBILITY OF CLOUD STORAGE
BOJJA VAMSHIKRISHNA, D. RAMAN
14.RISK ASSESSMENT FOR IDENTIFYING INTRUSION DETECTION USING DS-EVIDENCE THEORY IN MANET
D.RAMAN, M. SIVA SHANKAR REDDY, Y. SRINIVAS REDDY
15.EFFECTIVENESS IN PACKET DATA TRANSMISSION IN WIRELESS NETWORKS: A FOREWORD APPROACH
V.CHANDRA SEKHAR, D.RAMAN
16.CLUSTERING PERSPECTIVE IN PEER- PEER DECENTRALIZED NETWORK
YADMA SRINIVAS REDDY, D.RAMAN
17.LOAD BALANCING FOR DISTRIBUTED PARTITIONED DATA FOR DISTRIBUTED RANGE QUERIES IN CLOUD
CH.MOUNIKA, H.VENKATESWARA REDDY
18.IDENTIFYING THE WEB IMAGES THROUGH VISION BASED PAGE SEGMENTATION AND TAGGING ACCORDING TO THE WORDNET
PEDDI KARTHIK, B.KRANTHI KIRAN
19.APPLYING DELAY CONTROL IN PACKET DISTRIBUTION
RAJESH KUMAR INJAMALA , P.SAMATHA, AHMED ALI
20.DATA DISSEMINATION AND DATA SHARING ANONYMOUS DATABASE BY PROVIDING DATA SECURITY
M. SAILAJA
21.ANONYMOUS QUERY LOGS: A WEB MINING SEARCH ENGINES FOR PRIVACY AND CONSISTENCY
D.SRIVALLI, H.VENKATESWARA REDDY
22.EXISTENCE AND SURVIVABILITY IN FIBER OPTICS NETWORKS
K.VINDYAVALI, CH.PAVAN KUMAR, K.JYOTHSNA, RINCY SARA LUKA
23.UNDAMPED FORCED OSCILLATION
P.K.SHARMA
24.MIX DESIGN OF STRUCTURAL CONCRETE WITH PARTIAL REPLACEMENT OF CEMENT BY FLYASH / BLAST FURNACE SLAG
B.JAYARAMI REDDY
25.DETECTION OF INTRUSION IN MULTITIER WEB APPLICATION: A PERSPECTIVE VIEW
BOGADHI SWETHA, A .KALYAN KUMAR
26.A NOVAL IMAGE RESOLUTION ENHANCEMENT METHOD WITH COMPOSITION OF STATIONARY WAVELETS
DR. P.V. NAGANJANEYULU, A. RAVI, S. KRISHNA PRIYA.D
27.A CLOSED LOOP SPEED CONTROL OF A SWITCHED RELUCTANCE MOTOR WITH A NEW CONVERTER TOPOLOGY
G. MADHUSUDHANA RAO
28.A SCALABLE DECENTRALIZED RECCOMENDATION CHAINS FOR DISTRIBUTED LARGE SCALE P2P SYSTEMS
YANNAM BHARATH, G.KALPANA