ISSUE-3

International Journal of Computers Electrical and Advanced Communications Engineering (IJCEACE)

VOLUME 2 ISSUE 3 (January 2013 – July 2013)

CONTENTS

1.AN OPERATING SYSTEM FOR CLOUDS MECHANISMS AND IMPLEMENTATION
K.KRISHNA JYOTHI, DR.R.V.KRISHNAIAH

2.A SHORTEST PATH IDENTIFICATION FOR FEATURE GENERATION AND EXTRACTION FROM MEDLINE
K.NALINI KUMARI, MRS. G.SUBBALAKSHMI

3.WEB CACHE BASED DATA ACCESS IN WIRELESS ADHOC NETWORKS
A. PAVANI, DR. R.V.KRISHNAIAH

4.A FREQUENT PATTERN ANALYSIS FOR TARGETED ACTIVITY PATTERN MINING IN COMPLEX DATA
P.SWATHI, DR. R.V.KRISHNAIAH

5.AN OPERATING SYSTEM FOR MULTI CLOUDS: MECHANISMS AND IMPLEMENTATION
SINDHU DAROJ, DR.R.V.KRISHNAIAH

6.DATA AUTHENTICATION AND VERIFICATION IN CLOUD STORAGE
SHAFIYABEGUM MAHMEDABDUL, M.A.BASEER

7.ENABLING AUDITABILITY OF PROBABILITY OF DATA LEAKAGE BY TRUSTED AGENTS
KONDAPALLI REVATHI, VISWANADHUNI KISHORE, G.RAMA MOHANA RAO

8.AN EFFICIENT LAYERED APPROACH FOR INTRUSION DETECTION SYSTEM
SUNAR MOHAMMAD FAROOQ, MR. JACOB JAYA RAJ

9.EFFICIENT ASSOCIATION RULE MINING USING INDEXING SUPPORT
N.NAVANEETHA, S.KALYANI

10.MAINTAINING THE SUPPORT REQUESTS IN OSS PROJECTS
M L NARASIMHA REDDY

11.AUTHENTICATION BASED ON FINGER PRINTS
MD.ZUBER

12.AN ALGORITHM FOR CONCEPT DRIFTING AND GROUPING CATEGORICAL DATA
CH.SWAROOPA, Mrs.D.LAKSHMI PADMAJA, Mr.VISHNU MURTHY G

13.DATA DYNAMICS AND FLEXIBILITY OF CLOUD STORAGE
BOJJA VAMSHIKRISHNA, D. RAMAN

14.RISK ASSESSMENT FOR IDENTIFYING INTRUSION DETECTION USING DS-EVIDENCE THEORY IN MANET
D.RAMAN, M. SIVA SHANKAR REDDY, Y. SRINIVAS REDDY

15.EFFECTIVENESS IN PACKET DATA TRANSMISSION IN WIRELESS NETWORKS: A FOREWORD APPROACH
V.CHANDRA SEKHAR, D.RAMAN

16.CLUSTERING PERSPECTIVE IN PEER- PEER DECENTRALIZED NETWORK
YADMA SRINIVAS REDDY, D.RAMAN

17.LOAD BALANCING FOR DISTRIBUTED PARTITIONED DATA FOR DISTRIBUTED RANGE QUERIES IN CLOUD
CH.MOUNIKA, H.VENKATESWARA REDDY

18.IDENTIFYING THE WEB IMAGES THROUGH VISION BASED PAGE SEGMENTATION AND TAGGING ACCORDING TO THE WORDNET
PEDDI KARTHIK, B.KRANTHI KIRAN

19.APPLYING DELAY CONTROL IN PACKET DISTRIBUTION
RAJESH KUMAR INJAMALA , P.SAMATHA, AHMED ALI

20.DATA DISSEMINATION AND DATA SHARING ANONYMOUS DATABASE BY PROVIDING DATA SECURITY
M. SAILAJA

21.ANONYMOUS QUERY LOGS: A WEB MINING SEARCH ENGINES FOR PRIVACY AND CONSISTENCY
D.SRIVALLI, H.VENKATESWARA REDDY

22.EXISTENCE AND SURVIVABILITY IN FIBER OPTICS NETWORKS
K.VINDYAVALI, CH.PAVAN KUMAR, K.JYOTHSNA, RINCY SARA LUKA

23.UNDAMPED FORCED OSCILLATION
P.K.SHARMA

24.MIX DESIGN OF STRUCTURAL CONCRETE WITH PARTIAL REPLACEMENT OF CEMENT BY FLYASH / BLAST FURNACE SLAG
B.JAYARAMI REDDY

25.DETECTION OF INTRUSION IN MULTITIER WEB APPLICATION: A PERSPECTIVE VIEW
BOGADHI SWETHA, A .KALYAN KUMAR

26.A NOVAL IMAGE RESOLUTION ENHANCEMENT METHOD WITH COMPOSITION OF STATIONARY WAVELETS
DR. P.V. NAGANJANEYULU, A. RAVI, S. KRISHNA PRIYA.D

27.A CLOSED LOOP SPEED CONTROL OF A SWITCHED RELUCTANCE MOTOR WITH A NEW CONVERTER TOPOLOGY
G. MADHUSUDHANA RAO

28.A SCALABLE DECENTRALIZED RECCOMENDATION CHAINS FOR DISTRIBUTED LARGE SCALE P2P SYSTEMS
YANNAM BHARATH, G.KALPANA