A COMPARATIVE ANALYSIS OF HYBRID ENCRYPTION TECHNIQUE FOR IMAGES IN THE CLOUD ENVIRONMENT
Miss.KASU SIVANI ,
Page No :1-7
A DATA ANALYTICS APPROACH TO THE CYBERCRIME UNDERGROUND ECONOMY
Mr. K RUPESH,Mr. A J RAJASEKHAR ,
Page No :8-15
A DATA SHARING PROTOCOL TO MINIMIZE SECURITY AND PRIVACY RISKS OF CLOUD STORAGE IN BIG DATA ERA
Miss. YABAKU NIKHITHA,Mr. S. CHOUDAIAH ,
Page No :16-22
A SECURE DATA DYNAMIC AND PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
Mr S. CHOUDAIAH,Mr S. VENKATA MANOHAR ,
Page No :23-29
ACTIVE ONLINE LEARNING FOR SOCIAL MEDIA ANALYSIS TO SUPPORT CRISIS MANAGEMENT
Mr. B.NAVEEN ,
Page No :30-35
DATA MINING BASED MODEL FOR DETECTION OF FRAUDULENT BEHAVIOR IN WATER CONSUMPTION
Dr.E.SREEDEVI,Miss. RALLAPALLI SWATHI ,
Page No :43-48
BUTTER WORTH FILTER HEALTH MONITORING BY USING INTERNET OF THINGS
Mr. Y DINESH REDDY,Mr. A J RAJASEKHAR ,
Page No :49-57
Dr.E.SREEDEVI,Miss. GORRE SWAPNA ,
Page No :58-63
PREDICTION OF STOCK PRICES AND RESEARCH DASHBOARD
Mr. Y. PURUSHOTHAM,Mr. V. RAHAMATHULLA ,
Page No :70-74
SECURE DATA TRANSFER AND DELETION FROM COUNTING BLOOM FILTER IN CLOUD COMPUTING
Mr B. DEVENDRA KUMAR ,
Page No :80-87
TRAFFIC PREDICTION FOR INTELLIGENT TRANSPORTATION SYSTEM USING ML
Mr. B SRINATH,Mr. A J Rajasekhar ,
Page No :88-93
TRUST BASED COLLABORATIVE PRIVACY MANAGEMENT IN ONLINE SOCIAL NETWORKS
Miss. G.JYOTHIPRIYA,Mr. S.CHOWDAIAH ,
Page No :94-100
BLOCK CHAIN BASED DOCUMENT MANAGEMENT SYSTEM
Mr. S. CHOUDAIAH,Mr. U. CHANDRASELHAR ,
Page No :101-106
DATA DRIVEN ENTREPRENEUR ANALYSIS FOR BUSINESS OPPORTUNITY EVALUATION
Mr. P.JAGADESWARA REDDY,Mr. V.Rahamatulla ,
Page No :107-114
REDUCTION OF SURFACE WAVES IN MICROSTRIP PATCH ANTENNA USING EBG STRUCTURE
M Abhiram¹ | D Saketh² | G Ravi Raja³ | P Nagesh Kumar4 | Ch Gowri * ,
Page No :143-152
AN AREA-EFFICIENT MEMORY-BASED FFT PROCESSOR USING RADIX-22 FEED-FORWARD ARCHITECTURE
K.Vivekananda Swamy1, K. Naga Shankar Reddy2 ,
Page No :153-158
SecDedup: Providing data security and checking Deduplication With Dynamic Ownership Updating
Mr.V.Chandrasekhar1, Ms T.Sujilatha2 ,
Page No :159-165
Design Modification And Analysis For Suspension Frame Using Finite Element Analysis
Kanugadda Hanumanthu,Mr. Sridhar akarapu ,
Page No :166-171
Securing Password Using Dynamic Password Policy Generator
1Areddy Rekha, 2K.Rubiya Alam ,
Page No :172-178
A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
1Areddy Priyanka, 2T.Baba ,
Page No :179-185
Overview on Cloud computing and its integration to a mobile controlled remote vehicle
Gali Lalith Kumar1 , Abhijeeth Varanasi2 and Varun Rudra3 ,
Page No :186-194
DEVELOPMENT OF INJECTION MOULDING AND IT’S STATICALLY METHOD STUDY DURING THE MANUFACTURING PROCESS
P. Durga Ravi Prasad ,
Page No :195-204
BLOCKCHAIN AND AI ENABLE PERSONAL DATA PRIVACY
KARRI SATYANARAYANA REDDY, CHIRAPARAPU SRINIVASA RAO ,
Page No :206-213
1N. Sravani, 2 S. Sushma ,
Page No :214-220
Utility Current Compensation by PV-Active Power Filter with Fuzzy Logic MPPT: A Review
Miss. Apeksha I. Raipure1, Prof. H S. Sheikh2 ,
Page No :221-224
Protecting The Privacy Of Keyword Search In Cloud Through Access Control
1Kaniki Yashwanth, 2M. Dharani Kumar ,
Page No :225-234
Duru Hemanth Kumar1 , Mr. CH Chinna Veeraiah2 ,
Page No :235-250
Chennu Revanth Varma, Ch Chinna Veeraiah ,
Page No :251-259
Simulation of UPQC Based Power Quality Improvement Method In Hybrid Power System
Praveen Vinjam1 , Mr P.Venkateswara Rao 2 . ,
Page No :260-268
Design and Analysis of Customizable ear cushions for TWS Devices
Mugatha Surya Vardhan 1, Indra Karan Reddy Pati 2., Sri Harsha Rajuri 3 ,
Page No :269-281
IMPLEMENTATION OF PV BASED ASYMMETRIC MULTILEVEL INVERTERS AND COMPARES WITH SYMMETRIC
1 BOYA SATHEESH KUMAR,2 DR.K.CHITHAMBARAIAH SETTY ,
Page No :282-288
VEHICLE-TO-GRID TECHNOLOGY IN A MICRO GRID USING DC FAST CHARGING ARCHITECTURE
K. VINAY1, Dr. MD. QUTUBUDDIN2 ,
Page No :289-297
EYEBALL MOVEMENT BASED CURSOR CONTROL
CHILUKURI SAI DURGA NARENDRA, B.N.SRINIVASA GUPTA ,
Page No :298-304
MANDRA UHASRI1 , N. KEERTHI , POLU VEERARAGHAVA REDDY ,
Page No :303-313
AN IMPROVED DISTRIBUTED POWER FLOW CONTROLLER IN A GRID CONNECTED PHOTOVOLTAIC SYSTEM
B.HARISH1 , Mr. A. ANJAIAH2 ,
Page No :315-325
Simulation And Design of Novel System for BLDC Motor Using Advanced Drive System Converter Circuit
K. Tejaswini1 , Dr. MD. QUTUBUDDIN2 ,
Page No :326-332
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
GUBBALA HIMA BINDU, PADALA SRINIVASA REDDY ,
Page No :333-343
PILLI VEDA SAI SILPA, A.N.RAMAMANI* ,
Page No :344-354
A STUDY ON EFFECTIVENESS OF PROMOTIONAL ACTIVITES WITH REFERENCE TO HERO MOTO CORP
1KOLPULA MANOHAR, 2Dr. HAREESH R ,
Page No :355-360
A STUDY ON IMPACT OF ADVERTISEMENT ON CONSUMER BUYING BEHAVIOUR WITH REFERENCE TO AIRTEL
1PESARI BABA, 2Dr. HAREESH R ,
Page No :361-366
A STUDY ON CAPITAL BUDGETING WITH REFERENCE TO ULTRATECH
1RAMIDI HARISHA , 2K. VENKATESHAM ,
Page No :372-376
A STUDY ON COMPETENCY MAPPING WITH REFERENCE TO HARSHA TOYATA
1KANNAVENI SHYLAJA, 2T. SUNDEEP ,
Page No :377-381
A STUDY ON EMPLOYEE MOTIVATION WITH REFERENCE TO HERO MOTORS
1NALLALA SWAPNA, 2DR. D. SATHISH KUMAR ,
Page No :382-388
A STUDY OF EMPLOYEE WELFARE WITH REFERENCE TO HYUNDAI MOTORS
1SYEDA ADIBA QUADRI , 2Dr. D. SATHISH KUMAR ,
Page No :389-394
A STUDY ON FINANCIAL SATEMENT ANALYSIS WITH REERENCE TO KESORAM
1AILENI AKHILA , 2S.SWAPNA ,
Page No :395-398
A STUDY ON FUND FLOW STATEMENT ANALYSIS WITH REFERENCE TO HERO
1BODUKAM JYOTHSNA ,2S. SWAPNA ,
Page No :399-402
A STUDY ON JOB ANALYSIS WITH REFERENCE TO HERITAGE
1EMMADOJU LAVANYA , 2T. SUNDEEP ,
Page No :408-413
A STUDY ON MUTUAL FUND PERFORMANCE WITH REFERENCE TO ICICI MUTUAL FUNDS
1VADLAKONDA KEERTHANA, 2E. RAMESH ,
Page No :414-417
A STUDY ON SALES PROMOTIONAL ACTIVITIES WITH REFERENCE TO TATA MOTORS
1TUPTHEWAR APARNA, 2Dr. HAREESH R ,
Page No :418-422
A STUDY ON RATIO ANALYSIS WITH REFERENCE TO HERITAGE
1NADA HALEEM, 2K. VENKATESHAM ,
Page No :423-429
A STUDY ON WORKING CAPITAL WITH REFERENCE TO HERO MOTORS
1THALLAPELLI GANGA BHAVANI, 2E. RAMESH ,
Page No :430-434
A FOG-CENTRIC SECURE CLOUD STORAGE SCHEME
K. MAHESH BABU,A.SRINIJA, C. SINDHU, B.LAKSHMI SOWMYA, K. HEMALATHA ,
Page No :443-447
MULTI-PARTY HIGH-DIMENSIONAL DATA PUBLISHING UNDER DIFFERENTIAL PRIVACY
DR.R.RAJINI, GUNDA AMRUTHA, ARIKERA LIKITHA,BATTULA DRUVANA,AKKI DIVYA ,
Page No :448-452
CELL PHONE TOWER BASE STATION SAFETY AND SECURITY SYSTEM
S. ASLAM SHAREEF, Ganthi Vyshnavi, Mohammed Ayesha Siddiqua, Mabbu Sharanya, Elishetty Supriya ,
Page No :453-458
CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING
J. Mohan Kumar, B.BHAVANA,G.SUSMITHA, I.HARSHITHA, B.ARUNA KUMARI ,
Page No :459-463
DETECTING GROUP SHILLING ATTACKS IN ONLINE RECOMMENDER SYSTEMS BASED ON BISECTING K-MEANS CLUSTERING
KADIYALA VIJAYA KUMAR, UPPALA SRAVANI, MATAM DEEPTHI, MANIYAR HEENA TASKEEN, Y.EESHA PREETHY ,
Page No :464-468
TRUSTBASED COLLABORATIVE PRIVACY MANAGEMENT IN ONLINE SOCIAL NETWORKS
G.FAYAZ HUSSAIN, BOZAI MAHEK KHATOON, KALAGOTLA MOUNIKA,BYSANI RAMYA SRI, KARANAM NITYA CHOWDESWARI ,
Page No :469-473
NOVEL METHOD TO PREDICT HEART DISEASE USING DATA MINING
1 G.Fayaz Hussain 2 V.Manasa 3 R.Jayasree 4 P.Jayasree 5 P.NagaKeerthana ,
Page No :474-486
FAKE ONLINE REVIEWS DETECTION USING MACHINE LEARNING TECHNIQUES
1 Kadiyala Vijaya Kumar 2 Dudekula Thanveer 3Kuruva Mahalakshmi 4 Kuruva Mamatha 5 Chinnamuntala Chaithya ,
Page No :487-493
CLUSTERING BASED COLLOBAORATION FILTERING USING AN INCENTIVE OR PENALIZED USER MODEL
1DR RAJANI RAJALINGAM, 2 K. SUSHMA 3 J.JAHNAVI 4 C.DHARANI ,
Page No :494-498
COMPARATIVE STUDY OF SINGLE PHASE AND THREE PHASE REAL TIME SIMULATION OF EV BATTERY CHARGING SYSTEM
K. Vishnu, N.Vanajakshi ,
Page No :
Implementation of Real Time Intrusion Detection Mechanism in Wireless Ad-hoc Networks
1*CH G V N Prasad, 2 Dr Deepak Kumar Verma ,
Page No :500-506
BigData and Machine Learning for Predictive Analytics
1B Venkateswarulu Naik, 2 Sulochana M, 3Neeraja Balla, 4Arukala Radhika ,
Page No :507-514