Special Issue of ICACSSE 2014

Article-1

Title

Software Testing, Analysis and Objectives

01 - 04

Authors

Dr. Leelavathi Rajamanickam

PDF

Article-2

Title

A naive Fuzzy Clustering Method for Pixel Segmentation by using Differential Evolution

05 - 10

Authors

A. Srikrishna, V. Sesha Srinivas , V. Rajiv Jetson

PDF

Article-3

Title

Multi-Recipient Action Based Tapping in Email Communication

11-16

Authors

Kusha Chopra, Ajay Jain

PDF

Article-4

Title

Performance of Modified Jacobi Sequences with Good Merit Factor

17-24

Authors

K. Gurumurty, D.TirumalaRao, G. ManmadhaRao

PDF

Article-5

Title

Traffic Management Using Fuzzy Control System in Net

25-28

Authors

P.Manikanta, T.N Shankar

PDF

Article-6

Title

High Speed and Low Power Implementation of FIR Filter Design using DADDA & WALLACE Tree Multiplier

29-34

Authors

D.G.Jignash, Jami Venkata Suman

PDF

Article-7

Title

Removal of low and high density salt and pepper noise using combination of Fuzzy logic and Median Filter

35-39

Authors

B.Sravani, Dr.M.V.Nageswara Rao

PDF

Article-8

Title

DESIGN OF A SYNTHESIZABLE PIPELINED MIPS CORE FOR EMBEDDED APPLICATIONS

40-44

Authors

Venkateswarlu Kota, D.Tirumala Rao

PDF

Article-9

Title

An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain

45-48

Authors

K.Babyrani , T.Geetamma

PDF

Article-10

Title

DIGITAL IMAGE NOISE FILTERING USING EVOLVABLE HARDWARE

49-53

Authors

T.Jenny, T.Geetamma

PDF

Article-11

Title

Power Saving and Reducing Transmission Delay in WSN using DMP Scheme

54-59

Authors

T.Venkata Sateesh Babu, B.Anil Kumar

PDF

Article-12

Title

GNU Radio Based BIST for SDR Performance Measurement

60-63

Authors

Remya P S, Prof. B I Neelgar, Shibu R M

PDF

Article-13

Title

Prioritized Coding of Multiple ROIs on Medical Image

64-67

Authors

D.Vasanta, S. Sri Durgakameswari

PDF

Article-14

Title

Lifting Bi-orthogonal Wavelet Transform Based Edge Feature Extraction

68-71

Authors

S.Devendra, P.M.K.Prasad

PDF

Article-15

Title

Optimal Location of STATCOM for Voltage Security Enhancement Using PSO

72-76

Authors

K.Praveena kumari, V.Srikanth Babu

PDF

Article-16

Title

Importance of Load Balancing in Cloud Computing Environment: A Review

77-82

Authors

Yadaiah Balagoni, Dr.R.Rajeswara Rao

PDF

Article-17

Title

128-bit Advanced Encryption Standard Algorithm implementation on FPGA

83-88

Authors

P.Ravisankararao, Dr. M.V.Nageswararao

PDF

Article-18

Title

Security Based Intrusion-Detection System for Ad hoc mobile wireless networks

89-93

Authors

Addanki Kalyani, Dr. P. Harini

PDF

Article-19

Title

Supervision termination for multipath routing with intervention detection in wireless sensor networks

94-97

Authors

Anil kumar.K, Eswar.K

PDF

Article-20

Title

A Novel Framework Lime Lighting Dedup Over Caches in an Tacit Dope Center

98-104

Authors

B. SriLakshmi , Dr P. Harini

PDF

Article-21

Title

An Efficient Secure Parallel Distributed Control Protocol for Content Delivery Networks

105-110

Authors

VARDHANA KUMAR CHELLI, YEZARLA CHITTI BABU

PDF

Article-22

Title

Defending against Flood Attacks in Distraction Unbiased Networks

111-115

Authors

CHINTHA ANKI REDDY, AVS SUDHAKARA RAO

PDF

Article-23

Title

EMAP: A Novel Approach for Providing the Security in the Vehicular Ad Hoc Network (VANET)

116-121

Authors

S.Durga Bhavani, Dr. P. Harini

PDF

Article-24

Title

ELEVATED RECITAL COMMUNICATION IN MIMO ADHOC ASSOCIATIONS BY MANIPULATING SUPPORTIVE CONVEY

122-125

Authors

G.SamuelPramod, Eswar. K

PDF

Article-25

Title

A Person and Proclamation identification by using Local Directional Number Pattern

126-131

Authors

G Ganeshbabu, Y Sowjanya Kumari

PDF

Article-26

Title

AN EXTREMELY ASCENDIBLE KEY PRE-DISTRIBUTION THEME FOR WIRELESS DEVICE NETWORKS

132-137

Authors

G.V.Abhiram, T.Y. Srinivasa Rao

PDF

Article-27

Title

Least Outlay Jamming Obstruction In Multi Path Wireless Routing Protocols

138-142

Authors

GOVATHOTI BIKSHALU, YEZARLA CHITTI BABU

PDF

Article-28

Title

Presumable Study of Single Sign-on Technique for Distributed Network Systems

143-147

Authors

GurralaVenkataMohana Sai, Dr P.Harini

PDF

Article-29

Title

Efficient Distributed Profile Matching Using Multi-Party Computation in Mobile Social Networks

148-151

Authors

V.Himabindu, , Dr P.Harini

PDF

Article-30

Title

Energy-Efficient Cooperative Video Distribution with applied mathematics QoS Provisions over Wireless Networks

152-157

Authors

Sk. Jilani, Y. Chitti Babu

PDF

Article-31

Title

Communication Networks Based on Price Differentiation

158-163

Authors

K. Uma Maheswara Rao, T .Y. Srinivasa Rao

PDF

Article-32

Title

Node Stateless In Mantes Network Management By Using Statistics And Security Identifies Protocol

164-168

Authors

K Maheshbabu, Y Sowjanya Kumari

PDF

Article-33

Title

Exemplar rooted digital inpainting image

169-172

Authors

K Ramesh, Y Sowjanya Kumari

PDF

Article-34

Title

PRECLUDING SPAMS BY USING REVOCABLE DATA SMACKING IN ENCRYPTED IMAGES

173-177

Authors

K.Siddhartha, Eswar.K

PDF

Article-35

Title

Query Generation for Multimedia Data Selection and Presentation

178-183

Authors

M Suresh, Y Sowjanya Kumari

PDF

Article-36

Title

Defending Computer Networks from Covert Operations using Chaos Theory

184-188

Authors

Meruga Vishal Bharadwaj, AVS Sudhakara Rao

PDF

Article-37

Title

ICMP: A Novel Profile Matching Scheme in Mobile Social Networks

189-194

Authors

Prabhakara Rao Motan, Dr. P. Harini

PDF

Article-38

Title

WIRELESS AD HOC NETWORKS CREATION BASED ON SECURE PROTOCOL

195-202

Authors

KP.V.L.N Swaamy, Dr.R P.Harini

PDF

Article-39

Title

Firewall Optimization for Privacy-Preserving With Cross Domain

203-206

Authors

NarendraKaranam, S.Anil Kumar

PDF

Article-40

Title

A Pragmatic Intervention Model For Network Consistency Evaluation In Wireless Networks

207-211

Authors

PALLAPATI SOLMON , YEZARLA CHITTI BABU

PDF

Article-41

Title

Attribute-Aware information Aggregation exploitation Potential-Based Dynamic Routing in Wireless detector Networks

2212-217

Authors

P Sivaparvathi, Y Sowjanya Kumari

PDF

Article-42

Title

A Joint Congestion Control and Scheduling Algorithm for Decreasing the Delay in Multihop Wireless Networks

218-222

Authors

Poluri Koteswararao, K Subbarao

PDF

Article-43

Title

Robust Satellite Image Resolution Enhancement using Double Density Dual Tree Complex Wavelet Transform

223-228

Authors

G.Prasanthi, Dr. P. Harini

PDF

Article-44

Title

Companionate Data in Wireless Sensor Network with Prune Delay

229-233

Authors

RAJESH BABU KETHAMALA, YEZARLA CHITTI BABU, Dr.P.HARINI

PDF

Article-45

Title

Scalable Reliable Multicasting in Delay Tolerant Networks with Erasure Correction

234-238

Authors

P.S. Naveen Kumar, Dr. P.Harini

PDF

Article-46

Title

DYNAMIC MANAGEMENT OF CRYPTOGRAPHY FOR PROGRESSIVE PACKET ARRIVALS IN DTNS

239-243

Authors

V.Sivakrishna, Dr.P.Harini

PDF

Article-47

Title

Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control

244-248

Authors

Sajja Srinivas, Dr P Harini

PDF

Article-48

Title

Noise Removing for Enhanced Images using Wavelet Transform

249-253

Authors

KATHI SYAM DAIVA KRUPA, K. SUBBA RAO

PDF

Article-49

Title

Secure sharing in distributed information Management Applications

254-259

Authors

Thota Beula, Eswar Kodali

PDF

Article-50

Title

Facilitating Indirect Mutual Trust for Cloud Storage Systems

260 -266

Authors

Vaddepati Venkata Srikanth, Eswar Kodali

PDF

Article-51

Title

OPPORTUNISTIC MANETS: QUALITY WILL FRAME FOR LOW TRANSMISSION POWER

267-271

Authors

K.Venu, T .Y. Srinivasa Rao

PDF

Article-52

Title

Face Ascertain Based Method For Accessible By Pardons Words

272-277

Authors

YAGNANARAYANANAKKALA,SATHUPATI ANIL KUMAR

PDF

Article-53

Title

SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management

278-281

Authors

Y.SHEILA, Dr.P.HARINI

PDF

Article-54

Title

Cloud based Structure Approach of Content-As-A-Service for Supplier Impartial of Mobile Gadgets

282-287

Authors

Maddali M. V. M. Kumar, Rajesh Ghanta

PDF

Article-55

Title

Comparing Performance of Kalman Filtering and DWT based Speech Enhancement Techniques

288-293

Authors

K.Raghavendra Rao , Suneel Miriyala

PDF

Article-56

Title

Instinctive Digital Snapshot - Graph Matching for Character Identification

294-299

Authors

Anudeep AKS, Dr.P.Harini

PDF

Article-57

Title

Nonlinear Approximations in Sigmoid Transfer Function for Improved Statistical Pattern Recognition Based on PNN Bayesian Approach

300-305

Authors

R. Murugadoss, Dr.M. Ramakrishnan

PDF

Article-58

Title

Repetition Administration of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

306-309

Authors

N.ANOHU, P.V.SUBBARAMASARMA

PDF

Article-59

Title

An Efficient Key Exchange Authentication using Browser based Security

310-315

Authors

T.ANUSHA, S.AMARNATH BABU

PDF

Article-60

Title

CREATION OF DYNAMIC QUERY FOR MINING HIGHLY OPTIMIZED TRANSACTIONAL DATABASES

316-320

Authors

K . Chaitanya, M .Lakshmi Bai

PDF

Article-61

Title

High-Limit Reversible Information Stowing away In Double Pictures by Utilizing Example Substitution

321-326

Authors

G Ashok, K Subba Rao

PDF

Article-62

Title

Web Image Re-ranking using Query Log Data and visual photo Quality Assessment

327-331

Authors

P.GULZAR, A.THIRUPATHAIAH

PDF

Article-63

Title

Artificial Intelligence in Cyber Defense

332-336

Authors

I.Yallamanda Reddy, A.Thirupathaiah

PDF

Article-64

Title

Adaptable Face Picture Recovery utilizing Quality Upgraded Meager Code words

337-341

Authors

J Durga, Dr. P Harini

PDF

Article-65

Title

Novel Techniques for Transmissions to Communication Jamming Denial-of-Service Attacks

342-346

Authors

JOGI SUVARNA BHARATHA RAJU, Dr. P. HARINI

PDF

Article-66

Title

Secure Mining of Affiliation Runs in Evenly Disseminated Databases

347-351

Authors

K.SAMYUKTHA, M. LAKSHMI BAI

PDF

Article-67

Title

A VISUAL CRYPTOGRAPHY SCHEME WITH LAYERED EXPANSION FOR SECRETHALFTONE IMAGES

352-356

Authors

M. KarthikBabu , S. Amarnath Babu

PDF

Article-68

Title

An Exteriorized Itinerant Search Portal

357-360

Authors

M Lavanya, K.Subba Rao

PDF

Article-69

Title

C-Privacy: Collaborative Data Publishing to Preserve Integrity in Data Dissemination

361-366

Authors

N.LALITHA, S.AMARNATH BABU

PDF

Article-70

Title

Access Approach Union for Occasion Preparing Frameworks

367-371

Authors

N.Ramesh, Dr.P.Harini

PDF

Article-71

Title

GENETIC ALGORITHM TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE IN MODULE SYSTEM

372-375

Authors

NORI.VENKATA YASASWI, P.V.SUBBARAMA SARMA

PDF

Article-72

Title

On The Node Clone Detection Using DHT and RDE

376-379

Authors

PASUPULETI R A N PRASAD, Dr.P.Harini

PDF

Article-73

Title

An Efficient Reversible Data Hiding Technique using Reserving Room before Encryption for Data Hiding in Encrypted Images

380-384

Authors

P.SHAKIRA, Dr.P.HARINI

PDF

Article-74

Title

Fault Node Identification Using Comparison Models

385-388

Authors

K.V.Sudhakar, N. Lakshmi Narayana

PDF

Article-75

Title

A Hybrid Intrusion Detection System for Identification of Anonymous Behavior

389-391

Authors

K.Sasidhar, N.Sagar Pavan Kumar

PDF

Article-76

Title

Answering General Time Sensitive Queries

392-394

Authors

O.Ramesh, V. Vidya Sagar

PDF

Article-77

Title

Service Oriented application based search Engine for Mobile

395-398

Authors

G.Jyothi Kishore, V.Srikanth

PDF

Article-78

Title

Privacy Preserving and Optimal Keyword Search Over Out Sourced Data

399-402

Authors

J. Satyanarayana Swamy, V. Visweswararao

PDF

Article-79

Title

An Empirical Model of Data Monitoring Service over cloud

403-407

Authors

N.Sowjanya, Ch. Swapna Priya

PDF

Article-80

Title

An efficient Privacy Preserving Data Clustering over distributed Networks

408-410

Authors

G. Kananka Maha Laksmi, V.Visweswara Rao

PDF

Article-81

Title

A Novel Intrusion Detection System with Classification and Signature approach

411-413

Authors

Y. Keerthi, CH . SwapnaPriya

PDF

Article-82

Title

A Double Layer Security Scheme for Conserving Private Data in Cloud Services

414-418

Authors

M.Santhoshi, V.Srikanth

PDF

Article-83

Title

A Novel classification approach for Firewall Log data Analysis

419-422

Authors

P.Sowjanya, V.Srikanth

PDF

Article-84

Title

A Genetic Based Pattern Mining approach for Search engine optimization

423-426

Authors

K.Satya Srivalli, V. Vidya Sagar

PDF

Article-85

Title

An Empirical Model of Secure Data Sharing between Multi Data Owners

427-430

Authors

Padmashree, V. Vidya Sagar

PDF

Article-86

Title

Frequent Pattern Comparative Analysis of Apriori and FLAG Matrix

431-434

Authors

Vysyaraju Raisha,V. Sangeetha

PDF

Article-87

Title

Privacy Preserving Data Storage of Intermediate Data Sets over Cloud

435-438

Authors

T.N.S.Satyavani, Cheekatla Swapna Priya

PDF

Article-88

Title

An Efficient Filtering Technique over Undesirable Data of OSN User Walls

439-442

Authors

Rakesh Singampalli, K.Vinaykumar

PDF

Article-89

Title

A Secure Self-Destructive Active Storage Framework for Data Confidentiality

443-446

Authors

Balla Rajendra, V.Sangeeta

PDF

Article-90

Title

An Evolutionary approach for Candidate Set generation with String Transformation Technique

447-450

Authors

B. Srinivas Reddy, V.Vidyasagar

PDF

Article-91

Title

A Framework for Attaining Uncertainty and Traceability in WMN

451-455

Authors

G.Vinay Reddy, V.VisweswaraRao

PDF

Article-92

Title

Design of Optimized 64 Bit MAC Unit for DSP Applications

456-460

Authors

Shaik.Masthan Sharif ,D.Y.V.Prasad

PDF

Article-93

Title

TRI-DCT BASED FAST BACK PROPAGATION ALGORITHM

461 - 465

Authors

G.Visalakshi, K.Chiranjeevi

PDF

Article-94

Title

Performance Analysis of High Speed DDR3 SDRAM

466-469

Authors

G.B.S.R.Naidu , U.Venkata Rao

PDF

Article-95

Title

MIMO-OFDM DOWNLINK WIRELESS SYSTEM WITH REDUCED PAPER

470-475

Authors

Ch.Naveen Kumar, D.Srinivasa Rao

PDF

Article-96

Title

MIMO RADAR PERFORMANCE USING SWERLING SCATTERING MODELS

504-480

Authors

P. JYOTSNA, D. TIRUMALA RAO

PDF

Article-97

Title

CAPSULE IMAGE RETRIEVAL USING EDGE BASED ALGORITHMS

481-484

Authors

Chesti Altaff Hussain, Dr.D. Venkata Rao, B.Venkata Sekhar Babu, J.Chiranjeevi Revanth

PDF

Article-98

Title

Artificial Neural Network Model for the Prediction of Thrombo-embolic Stroke

485-492

Authors

K..Suneetha,Ch.Hephzibah, D.V. Chandra Sekhar

PDF

Article-99

Title

Review on Classification Techniques in Data Mining

493-497

Authors

Hari Krishna Kanagala, Dr JayaramakrishnaiahVemula , Prof. Ramchand H Rao Kolasani

PDF

Article-100

Title

Opinion Mining and Sentiment Analysis: A Survey

498-502

Authors

Chandra Sekhar Reddy Mukkarapu, Dr.v. Jaya Rama Krishnaiah Vemula

PDF

Article-101

Title

A New System to Generate Simplified Decision Trees for applicability in the domain of Health Care

503-507

Authors

Abdul Ahad Md, Dr. Suresh Babu Y , Rajesh Chandra G

PDF

Article-102

Title

A PROTOTYPE FOR DIAGNOSING CANCER DISEASE USING ADVANCED MINING TECHNIQUE

508-514

Authors

A.D.P.Swaroop, L.Padmavathi

PDF

Article-103

Title

Secure Communication using Modified S-DES with Steganography

515-518

Authors

Prashanti.G, Sandhyarani.K

PDF

Article-104

Title

A Survey on gap between SQL and DMQL

519-525

Authors

S. POOJITA, P.THRIDHARA

PDF

Article-105

Title

Detecting Outliers in Large Dataset using Distributed Method

526-528

Authors

D.Madhavi, Ch. Sreenubabu

PDF

Article-106

Title

Mobile Sensor and Destination Tracking in Wireless Sensor Networks

529-532

Authors

Dr Y. SURESH BABU , P. VIJAY KUMAR, Y. Gokul

PDF

Article-107

Title

Classification of Diabetic Retinopathy Using Image Processing and Soft Computing Techniques

533-537

Authors

Muppidi Venkatesh, V Sree Ramamurthy

PDF