International Journal of Computers Electrical and Advanced Communications Engineering (IJCEACE)
VOLUME 4 ISSUE 8 (August 2015 – December 2015)
CONTENTS
1.UNIFIED CONTROL STRATEGY FOR THREE-PHASE INVERTER IN DISTRIBUTED GENERATION
Mr.PRASHANTH REDDY VAKITI , Dr.SAMALLA KRISHNA , Ms.KATKURI LAXMI CHAITNAYA
2.PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE, SCALABLE, AND FINE-GRAINED DATA ACCESS CONTROL IN CLOUD COMPUTING
M SWETHA , Dr.M V SIVA PRASAD , P SANDEEP
3.A FRAMEWORK FOR MULTITARGET TRACKING IN PERFORMANCE EVALUTION
Dr. N.RAJSEKHAR , R.VASAVI , A.MANISHA GOUD
4.ONLINE CLIENT ASSIGNMENT IN DISTRIBUTED INTERACTIVE APPLICATIONS
CH.SAI SWAROOP , K.MANOHAR
5.FACILITATING DOCUMENT ANNOTATION FOR INFORMATION EXTRACTION
G.KARTHIK , SK.ASLAM
6.CONTENT LEAKAGE FINDING BY USING TRAFFIC PATTERN FOR TRUSTED CONTENT DELIVERY NETWORKS
KAMULU PRASHANTH , M.LALITHA
7.PROGRAMMED GENERATION OF PLATFORMS IN CLOUD COMPUTING
ADAPA PRATAPA REDDY , MALAPATI NARESH
8.REMOTE SENSOR NETWORKS AND RFID INTEGRATION FOR CONTEXT COGNIZANT ACCOMMODATIONS
MANDULA CHINA PENTU SAHEB , Mr.N.GOPALA KRISHNA
9.A SURVEY ON RE-RANKING WEB IMAGE PREDICTION BY MULTI FEATURE FUSION WITH LEARNING OF IMAGE RETRIEVAL
GADDAM PRATHAP , Mr. N. ANJANEYULU
10.PRESERVING THE PRIVACY PUBLIC AUDITING FOR SECURE DATA IN CLOUD STORAGE WITH A FOCUS ON USER REVOCATION
GEDDEBOINA SURESH, Mrs.M.KHAMAR
11.A SURVEY OF MULTI CLOUD PLATFORMS USING PRIORITY ASSIGNMENT WITH HIGH PERFORMANCE AND COST EFFECTIVE WORKFLOW
K.PRASANTH KUMAR , Mr.G.GURU PRASAD
12.SECURING PRIMITIVE BASED GRAPHICAL PASSWORD STRATEGY AGAINST SPYWARE BY USING CAPTCHA
KAKUMANU.ASHOK KUMAR , Mr. N.GOPALA KRISHNA
13.MULTIFARIOUS INFORMATION COVERING UP IN VIEW OF VQ COM-SQUEEZED PICTURES
DAMMALAPATI. KOMALI , Mr.N.ANJANEYULU
14.ANALYSIS OF SECURITY IN CLOUD USING KEY AGGREGATION CRYPTOSYSTEM FOR DATA SHARING
MERUGUMALLI PRASANNANJANEYULU , Mrs.M.KHAMAR
15.INDEPENDENT DEVICE MODEL FOR TEST PACKET GENERATION AND MONITORING NETWORKS BY USING ATPG
P.MOUNIKA , Mr.G.GURU PRASAD
16.A SURVEY OF PRIVACY EFFICIENT AUTHENTICATION FOR MOBILE AND PERVASIVE COMPUTING
PASUPULETI NAGALAKSHMI , Mr.N.GOPALA KRISHNA
17.A SURVEY OF INTENSIFYING WEB SERVICE COMPOSITION FROM PRIVACY ATTACKS USING DYNAMIC PRIVACY MODEL
RACHABATHUNI PRUDVI KANTH , Mr.N.ANJANEYULU
18.A STUDY ON CONFIDENTIAL USER QUERY PROFILE ON SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
M.RAMA KRISHNA , Mrs.M.KHAMAR
19.SECURE PROCESSING TOTALS FOR CHECKING SENSOR SYSTEMS
SK.ABDUL KHADAR , Mr.N.GOPALA KRISHNA
20.AUDIT OF PARALLEL POLYNOMIAL MULTIPLIER IN PERSPECTIVE OF FFT UTILIZING INDIAN VEDIC CALCULATIONS
LAKSHMI , Mr. Y JAIPAL REDDY
21.A CORRELATION OF CMOS CIRCUIT STRATEGIES: DIFFERENTIAL CASCODE VOLTAGE SWITCH RATIONALE VERSUS ORDINARY RATIONALE
D.SUMANTH , K.NAGA LAKSHMI
22.FSM & VAS: CONFIGURATION OF VENDING MACHINE UTILIZING LIMITED STATE MACHINE AND VISUAL AUTOMATA SIMULATOR
K.PADMAJA , Mr. B.NAGAIAH
23.ASSESSMENT OF TRENDS IN ADIABATIC LOGIC FOR LOW POWER CONFIGURATION
M.BALARAMI REDDY , Mr. P.V.SATEESH KUMAR
24.OUTLINE AND EXECUTION OF HIGH PERFORMANCE PARALLEL PREFIX ADDERS
M.SRINIVASA RAO , Mr. Y.JAIPAL REDDY
25.EFFECT OF NBTI ON SRAM ARRAYS FOR PRODUCTIVITY AMELIORATION THROUGH RECUPERATION BOOSTING TECHNIQUE
P.SIVA SANKAR , Mr. B.NAGAIAH
26.MODIFIED BOOTH ALGORITHM: RAPID MATH ARCHITECTURE OF PARALLEL MULTIPLIER–ACCUMULATOR BASED ON RADIX-2 ALTERED BOOTH ALGORITHM
SK.MASTAN VALI , Mr. P.V.SATEESH KUMAR
27.ADVANCED PROCESS FOR AUDIO DATA HIDING
T.NAGA PRASAD REDDY , Mrs. K.NAGA LAKSHMI
28.EFFICIENT AND EVALUATING THE DESIGN OF LOW POWER MODIFIED 32-BIT SQUARE ROOT CARRY SELECT ADDER
SUREDDY V.M.REDDY , K.NAGA LAKSHMI
29.A SURVEY OF LOW POWER CLOCKING SYSTEM WITH EFFICIENT SEQUENTIAL ELEMENTS
K.NAGARJUNA REDDY , Mr. Y.JAIPAL REDDY
30.PROFICIENT DATA RETENTION AND NOISE SUPPRESSION IN MTCMOS CIRCUITS
D NAVEEN , Mr. B NAGAIAH
31.ANALYZING OF LOW POWER FULL ADDER CELL UTILIZING POWER GATING SYSTEMS FOR PORTABLE APPLICATIONS
V SUMANTH , Mr. P.V.SATEESH KUMAR
32.PRINCIPLES AND CHALLENGES IN VEHICULAR AD HOC AND SENSOR NETWORKS
MICHAEL CHOLINES PEDAPUDI , Mrs. VERELLA SAI SPANDANA
33.INVESTIGATION FOR WORD RELATED WELLBEING DANGERS IN SOCIAL INSURANCE
CH.NARESH ,D.RAMA DEVI , SWAPNA SHANTHI B.S
34.IMPLEMENT OF SECURITY FOR COMMON PRIVATE DATA IN THE CLOUD USING SCATTER INFORMATION COUNTABILITY FRAMEWORK
P VENKATESWARLU
35.VOLTAGE STABILITY ANALYSIS BY TCSC & STATCOM
D.MANOHAR, G. THOMAS EDWIN, P.RAMAMOHAN REDDY
36.THREE PHASE POWER FACTOR CORRECTION USING POWER CONVERTERS IN WIND GENERATOR SYSTEMS
N GANGADHAR, V RAMANJANEYULU, S RESHMA