| 1. |
DANCE - Data Accordance by Nodal Cloud Emission |
SarathChand P.V., Dr.Balraju M., Benarji T., Vishvapathi P. |
PDF |
| 2. |
Localize Individuals in Spaces of Interaction – Analysis of Online Review Processes |
Gilbert Ahamer |
Accepted (Payment Awaiting) |
| 3. |
A Case for Operating Systems |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
| 4. |
An Investigation of 8 Bit Architectures with MYOMA |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
| 5. |
An Understanding of Evolutionary Programming |
Kantipudi MVV Prasad, Dr. D. Subbarao |
Accepted (Payment Awaiting) |
| 6. |
Authenticated, Wearable Theory |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
| 7. |
Deconstructing Agents |
Kantipudi MVV Prasad, Dr. D. Subbarao |
Accepted (Payment Awaiting) |
| 8. |
Decoupling I/O Automata from 802.11B in SMPs |
Kantipudi MVV Prasad, Dr. D. Subbarao |
Accepted (Payment Awaiting) |
| 9. |
DevexJay: A Methodology for the Simulation of Smalltalk that Would Allow for Further Study into Local-Area Networks |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
| 10. |
Evaluating Systems and Massive Multiplayer Online Role-Playing Games |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
| 11. |
On the Theoretical Unification of Markov Models and Boolean Logic |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
| 12. |
Towards the Synthesis of Virtual Machines |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
| 13. |
WASH: Compact, Secure Information |
Kantipudi MVV Prasad, Dr. D. Subbarao |
Accepted (Payment Awaiting) |
| 14. |
Optimisation of Buffer Size for Enhancing QoS of Video Traffic using Cross Layered Hybrid Transport Layer Protocol approach |
Matilda.S, B.Palaniappan |
Accepted (Payment Awaiting) |
| 15. |
Moving from AMBA AHB to AXI Bus in SoC Designs: A Comparative Study |
Priyanka Gandhani, Charu Patel |
Accepted (Payment Awaiting) |
| 16. |
Policy Levels Concerning Database Security |
Khaleel Ahmad, Jayant Shekhar, Nitesh Kumar, K.P. Yadav |
Accepted (Payment Awaiting) |
| 17. |
LMI condition for synchronization of neural network with parameter |
Lu Dianchen, Qi Qiaoxia |
Accepted (Payment Awaiting) |
| 18. |
Active Networks Considered Harmful |
Justin Sophia. I, N.Rama |
Accepted (Payment Awaiting) |
| 19. |
A Methodology for the Development of Thin Clients |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 20. |
Enabling Model Checking and Telephony Using NaresReft |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
| 21. |
Emulating Virtual Machines Using Replicated Communication |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
| 22. |
Decoupling Virtual Machines from Architecture in Architecture |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 23. |
Decoupling Randomized Algorithms from 802.11 Mesh Networks in the Partition Table |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 24. |
Deconstructing Expert Systems |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 25. |
Deconstructing Agents |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 26. |
Constructing Online Algorithms and Reinforcement Learning Using Lyre |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
| 27. |
Cooperative Configurations for Telephony |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 28. |
Constructing Cache Coherence and Access Points |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 29. |
Classical Configurations for IPv7 |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
| 30. |
BudgyPinniped: A Methodology for the Investigation of the Ethernet |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 31. |
An Improvement of Multicast Algorithms with Las |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 32. |
A Methodology for the Visualization of Wide-Area Networks |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
| 33. |
A Methodology for the Simulation of Robots |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 34. |
A Methodology for the Refinement of the World Wide Web |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
| 35. |
A Deployment of Neural Networks with Ammonal |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 36. |
A Case for Interrupts |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
| 37. |
Emulating Virtual Machines Using Replicated Communication |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
| 38. |
Harnessing Public-Private Key Pairs Using Encrypted Modalities |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 39. |
Debt: Distributed, Amphibious Information |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
| 40. |
The Evaluation of Efficient IP Trace Back with Specified Probability by Inattentive Network Model |
Babu.S, Kranthi Kumar.G, V N V Phani Kumar .V |
Accepted (Payment Awaiting) |
| 41. |
Content Filtering using Internet Proxy Servers |
Nitesh Kaushik, Ashish Verma, Vivek Sharma |
Accepted (Payment Awaiting) |
| 42. |
Growing Hierarchical Adaptive Self-Organizing Map for Phoneme Classification |
Chiraz Jlassi, Najet Arous, Noureddine Ellouze |
Accepted (Payment Awaiting) |
| 43. |
A Novel Dangerous Vehicle Detection Protocol For Safety Application |
K. Prema Kumar, B. M. Kusuma Kumari, M. Kanti Kiran, Dr. K. Sri Ramakrishna |
Accepted (Payment Awaiting) |
| 44. |
Fractional Partition |
M.P.Chaudhary |
Accepted (Payment Awaiting) |
| 45. |
Performance Comparison of Features Reduction Techniques for Intrusion Detection System |
Rupali Datti, Shilpa lakhina, Bhupendra verma |
Accepted (Payment Awaiting) |
| 46. |
A New Scheme for Detecting CMFs and Excluding Faulty Sensor Nodes from the Network |
Hamideh Jafarian, Shahram Babaie, Ali Hosseinalipour |
Accepted (Payment Awaiting) |
| 47. |
Contemporary Technology for Hearing Conservation Audiometric Monitoring |
Amol U. Khobragade, V. T. Gaikwad |
Accepted (Payment Awaiting) |
| 48. |
Desgin issues in developing a common GUI for Operating Systems |
Chandramouli Choudhary, Rohit Gautam, Abhimanyu Garg, Anmol Mehrotra, Jitendra Kr. Seth |
Accepted (Payment Awaiting) |
| 49. |
Context Aware Health Care Application |
Shankari Bhattacharyya, RA.K Saravanaguru, Arunkumar Thangavelu |
Accepted (Payment Awaiting) |
| 50. |
A Novel Expert System for PC Network Troubleshooting and Maintenance |
Akhil Kaushik, Manoj Barnela, Satvika Khanna, Harish Kumar, |
Accepted (Payment Awaiting) |
| 51. |
Improving Speech Recognition with the help of compression using Vector Quantization |
Namrata Pachori, M. Rajasekhara Babu |
Accepted (Payment Awaiting) |
| 52. |
Total Power-Speed Optimization using Multi-Threshold voltage (Mvt) Library and Vt Swapping Flow |
Miloni Ganatra, Niraj Jani, Jigneshpanwala |
Accepted (Payment Awaiting) |
| 53. |
An Efficient Key Agreement Scheme in Multilevel Security Model for Wireless Sensor Network |
Kapil Kumar, Ashwani Kumar, Ravindara Bhatt |
Accepted (Payment Awaiting) |
| 54. |
Issues in Developing Open Source Licensing Tool for Controllers in the Context of BA (Building Automation) |
Shah Ujval, M Rajasekhara Babu, M Khalid |
Accepted (Payment Awaiting) |
| 55. |
Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad-hoc Mobile Networks |
K Ranganath, L.Naveen Kumar, Y.V.Sreevani |
Accepted (Payment Awaiting) |
| 56. |
Representing Function Blocks Using PRET-C |
Vinu E.V, Dr.N.Ch.Sriman Narayana Iyengar |
Accepted (Payment Awaiting) |
| 57. |
Assessment of Mobile Agent Frameworks based on Security |
Dr.Shuchita Upadhyaya, Pooja |
Accepted (Payment Awaiting) |
| 58. |
Survey of Web Usage Mining |
Rakesh kumar malviya, Mahesh Chandra malviya, Ritesh joshi, Preetesh purohit, vinay soni |
Accepted (Payment Awaiting) |
| 59. |
Comparison Three Resource Discovery Algorithms in Grid Computing |
Leyli Mohammad Khanli, Parisa Falahati , shahram babaie |
Accepted (Payment Awaiting) |
| 60. |
Applying Hidden Markov Model to Protein Sequence Alignment |
Er. Neeshu Sharma, Er. Dinesh Kumar, Er. Reet kamal Kaur |
Accepted (Payment Awaiting) |
| 61. |
Biological Sequence Matching using Boolean Algebra |
Nivit Gill, Shailendera Singh |
Accepted (Payment Awaiting) |
| 62. |
RCause - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems |
Er. Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar |
Accepted (Payment Awaiting) |
| 63. |
ISBWSM-Identifying Similarity between web Services Using Metrics |
D.Chandramohan |
Accepted (Payment Awaiting) |
| 64. |
Reconfiguring High Speed Networks |
Naresh Kumar, Renu Vig, Deepak Bagai |
Accepted (Payment Awaiting) |
| 65. |
Development Strategies for e-LMSs |
Vibha Ojha, Neha Sharma, Anand Sharma, Sandesh Jain |
Accepted (Payment Awaiting) |
| 66. |
Enhanced Block Truncation Coding for Gray Scale Image |
Aditya Kumar, Pardeep Singh |
Accepted (Payment Awaiting) |
| 67. |
Design of Generalized Predictive Controller Using Multi-Objective Optimization |
Faten Ben Aicha, Faouzi Bouani, Mekki Ksouri |
Accepted (Payment Awaiting) |
| 68. |
An Optical Neural Network Technique for Mining Frequent Maximal Itemsets In Large Databases |
Divya Bhatnagar, A. S. Saxena |
Accepted (Payment Awaiting) |
| 69. |
A Representation Framework of University Lecture Scheduling for a Multi-Phase Heuristic Sequential Greedy Solver |
Zhenquan Li, Vivnesh Prasad |
Accepted (Payment Awaiting) |
| 70. |
A Heuristic Multi-Phase Sequential Greedy Solver for Constrained University Lecture Scheduling |
Zhenquan Li, Vivnesh Prasad |
Accepted (Payment Awaiting) |
| 71. |
Model Order Reduction using Bio-inspired PSO and BFO Soft -Computing for Comparative Study |
Sudhir Y Kumar, PK.Ghosh, S Mukherjee |
Accepted (Payment Awaiting) |
| 72. |
Implementation of Educational Decision Support System |
Prof. Rajeshkumar Chavan, Mahesh Kokate, Dr. B.B.Meshram |
Accepted (Payment Awaiting) |
| 73. |
Performance Assessment of AMRR and ADCG Metrics in MLIR and IR Systems |
Raju Korra, Pothula Sujatha, Madarapu Naresh Kumar |
Accepted (Payment Awaiting) |
| 74. |
Authentication Using Quantum Cryptography |
Darnasi Veeraiah, P.Shanthi Bala, G.Aghila |
Accepted (Payment Awaiting) |
| 75. |
Secure Routing Based on ECC in Cluster Wireless Sensor Networks |
Rayala Upendar Rao, K Palanivel |
Accepted (Payment Awaiting) |
| 76. |
Secure Routing in Cluster based Wireless Sensor Networks by Symmetric Cryptography with Session Keys |
Rayala Upendar Rao, K.Palanivel |
Accepted (Payment Awaiting) |
| 77. |
Vertical Perimeter Based Enhancement of Streaming Application |
P.Manikandan, R.Kathiresan, Marie Stanislas Ashok |
Accepted (Payment Awaiting) |
| 78. |
Spanning trees recursions for crosses maps |
D. Lot, M. El Marraki |
Accepted (Payment Awaiting) |
| 79. |
g-Closed Sets in Topology |
O. Ravi, S. Ganesan |
PDF |
| 80. |
Decomposition of Continuity Using g#-Closed Sets |
O. Ravi, S. Ganesan, R. Latha |
PDF |