2nd National Conference Recent Advances in Computer Science and Engineering Chalapathi Institute of Engineering and Technology, Chalapathi Nagar, Lam, Guntur, Andhra Pradesh. |
||
S.No. | Title of Paper | Page No. |
1. | A Secure Mechanism for Public Auditing and Retrieving Users Cloud Information by Means of Multiple Ranking System Authors: Thodella Pushpalatha and M.Markandeyulu |
1-5 |
2. | A Comprehensive Review on Error Control Coding mechanisms in High Speed Wireless Transmission System Authors: Rajesh.Y and Praveen Kumar Yechuri |
6-13 |
3. | A Study on Deployment of Web Applications Require Strong Consistency using Multiple Clouds Authors: P.R.S.M.Lakshmi, K.Santhi Sri and Dr.N.Veeranjaneyulu |
14-17 |
4. | A Survey on Hybrid Cloud with De-Duplication Authors: Ch.Jyosthna Devi, Dasari Lucky Living Ston and Madatala Keerthi |
18-26 |
5. | Electronic Public Access Catalogue (EPAC) Authors: Dr. K.Kiran Kumar, B.V.Nagalakshmi, Rochana and G.Sai Teja |
27-31 |
6. | A Trusted Framework for Authentication and Security for Business Applications in Cloud Authors: B.Veerendra and Y.V.VDurga Prasad |
32-35 |
7. | An Advance Privacy Sharing Using Arbitrary Visual Privacy Distributing Authors: G K Kishore Babu, V.Alekhya and L.Srikavya |
36-39 |
8. | An Outsourced Cloud Data with High Secured Ranked Keyword Search Authors: Shabbir Hussain Shaik, Prasad U and Shanmukha Sai Y |
40-45 |
9. | Finding of Interesting Rules from Association Mining by Ontology and Page Ranking Authors: D.Saravanam, Dr.S.Vijayalakshmi and Dennis Joseph |
46-50 |
10. | Android Technology:Stepping into the Next Level of Mobile Internet Authors: Mr.Sachin Manohar Pangare and Dr.M.Vinaya Babu |
51-53 |
11. | Cloud Computing using Amazon Web Services Authors: Bharath Kumar Gowru, Adusumalli Sriharsha and D. Nagaumamaheshwara Rao |
54-58 |
12. | Concealment Freeze Third Party Auditing for Secure Cloud Storage Authors: E.Akhil and G.K.Kishore Babu and Ch.Jyosthna Devi |
59-66 |
13. | Smart Security Solutions based on Internet of Things (IoT) Authors: B.Vaishnavi, K.Suresh Babu, G.Rama Chandra Rao, Sk.John Sydulu |
67-71 |
14. | Data Recognition and Diffusion in Wireless Sensor Authors: A.Sudarsana Rao, S. Venkata Ramana Goud and M.Deepika |
72-78 |
15. | DDoS Attacks, Detection Parameters and Mitigation in Cloud Environment Authors: K.Santhi Sri and PRSM Lakshmi |
79-82 |
16. | Different Heuristics for Static RWA Algorithms in Fiber Optical WDM Networks Authors: P.Krishnaiah |
83-86 |
17. | Document Annotation and Retrieval Using Content and Querying Value Authors: G.Ventakeswara Rao, Suresh Bandi and Jagajeevan Nandigama |
87-91 |
18. | Efficient Adjacent Neighbor Expansion Search Keyword Authors: Samuel Chepuri, Yallamati Prakasarao and Jagajeevan Nandigama |
92-97 |
19. | Time-Bound Anonymous Authentication for Roaming Networks Authors: K. Aruna Kumari, T.Lavanya and P.Ashok Chakravarthi |
98-103 |
20. | Feature Ranking Based Data Classification for Large Scale Data Analysis Using J48 Algorithm Authors: Dr.A.Veeraswamy, A V S Sudhakara Rao and T.Krishna Kishore |
104-107 |
21. | Improving and Understandability of Programming using RAPTOR Authors: S.Phani Kumar, K.Narendra Kumar and P.V.V.S.Eswar Rao |
108-113 |
22. | New Non-Parametric Model for Automatic Annotations of Images in Annotation Based Image Retrieval Authors: G.Nageswara Rao, K Sivaram Prasad and P.Subbarao |
114-119 |
23. | Moodle The E-Learning Portal Authors: Bharath Kumar Gowru, Venkata Sumathi and Deena Margret G |
120-124 |
24. | Security Issues in Cloud Computing Authors: P.S.V. Sainadh, U.Satish Kumar and S.Haritha Reddy |
125-130 |
25. | Enhancing Personalized Web Search with Privacy Protection Authors: Mallela Ratna Raju, Jeevan Ratnakar Kondru and Kotapati Upendra |
131-137 |
26. | Novel Privacy-Preserving k-NN Classification Protocol Over Encrypted Data in the Cloud Authors: N. Phani Kumar, Sireesha.D and Vankudoth Saidulu |
138-141 |
27. | Raspberry Pi Technology Authors: V.Trivenu, G.Sumana and N.Kumar Raja |
142-143 |
28. | NANO Technology Authors: Kavuri Sindhuja, Muppalla Madhulatha and Milogi Sirisha |
144-148 |
29. | Some Studies on of Raaga Emotions of Singers Using Gaussian Mixture Model Authors: B.Tarakeswara Rao, P.Lakshmikanth and E.Ramesh |
149-153 |
30. | Open Source Solution for Mobile GIS and Location Intelligence Authors: L.Vijaya Varma, Srinivasarao Chanda and Sitha Kumari.K |
154-158 |
31. | Language Expert-Rendering Unicode Text on ASCII Editor for Indian Languages with Language Engine Authors: C.Siva Jyothi, Samuel Chepuri and Jaga Jeevan Nandigama |
159-163 |
32. | NEXT GEN INTERNET PROTOCOL Authors: Panthagani Vijayababu, Jajjara Bhargav and Narne Srikanth |
164-167 |
33. | An Advance Privacy Sharing Using Arbitrary Visual Privacy Distributing Authors: G.K.Kishore Babu, G.Pavani, V.Alekhya and L.Srikavya |
168-171 |