1. |
DANCE - Data Accordance by Nodal Cloud Emission |
SarathChand P.V., Dr.Balraju M., Benarji T., Vishvapathi P. |
PDF |
2. |
Localize Individuals in Spaces of Interaction – Analysis of Online Review Processes |
Gilbert Ahamer |
Accepted (Payment Awaiting) |
3. |
A Case for Operating Systems |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
4. |
An Investigation of 8 Bit Architectures with MYOMA |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
5. |
An Understanding of Evolutionary Programming |
Kantipudi MVV Prasad, Dr. D. Subbarao |
Accepted (Payment Awaiting) |
6. |
Authenticated, Wearable Theory |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
7. |
Deconstructing Agents |
Kantipudi MVV Prasad, Dr. D. Subbarao |
Accepted (Payment Awaiting) |
8. |
Decoupling I/O Automata from 802.11B in SMPs |
Kantipudi MVV Prasad, Dr. D. Subbarao |
Accepted (Payment Awaiting) |
9. |
DevexJay: A Methodology for the Simulation of Smalltalk that Would Allow for Further Study into Local-Area Networks |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
10. |
Evaluating Systems and Massive Multiplayer Online Role-Playing Games |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
11. |
On the Theoretical Unification of Markov Models and Boolean Logic |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
12. |
Towards the Synthesis of Virtual Machines |
Dr. D. Subbarao, Kantipudi MVV Prasad |
Accepted (Payment Awaiting) |
13. |
WASH: Compact, Secure Information |
Kantipudi MVV Prasad, Dr. D. Subbarao |
Accepted (Payment Awaiting) |
14. |
Optimisation of Buffer Size for Enhancing QoS of Video Traffic using Cross Layered Hybrid Transport Layer Protocol approach |
Matilda.S, B.Palaniappan |
Accepted (Payment Awaiting) |
15. |
Moving from AMBA AHB to AXI Bus in SoC Designs: A Comparative Study |
Priyanka Gandhani, Charu Patel |
Accepted (Payment Awaiting) |
16. |
Policy Levels Concerning Database Security |
Khaleel Ahmad, Jayant Shekhar, Nitesh Kumar, K.P. Yadav |
Accepted (Payment Awaiting) |
17. |
LMI condition for synchronization of neural network with parameter |
Lu Dianchen, Qi Qiaoxia |
Accepted (Payment Awaiting) |
18. |
Active Networks Considered Harmful |
Justin Sophia. I, N.Rama |
Accepted (Payment Awaiting) |
19. |
A Methodology for the Development of Thin Clients |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
20. |
Enabling Model Checking and Telephony Using NaresReft |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
21. |
Emulating Virtual Machines Using Replicated Communication |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
22. |
Decoupling Virtual Machines from Architecture in Architecture |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
23. |
Decoupling Randomized Algorithms from 802.11 Mesh Networks in the Partition Table |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
24. |
Deconstructing Expert Systems |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
25. |
Deconstructing Agents |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
26. |
Constructing Online Algorithms and Reinforcement Learning Using Lyre |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
27. |
Cooperative Configurations for Telephony |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
28. |
Constructing Cache Coherence and Access Points |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
29. |
Classical Configurations for IPv7 |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
30. |
BudgyPinniped: A Methodology for the Investigation of the Ethernet |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
31. |
An Improvement of Multicast Algorithms with Las |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
32. |
A Methodology for the Visualization of Wide-Area Networks |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
33. |
A Methodology for the Simulation of Robots |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
34. |
A Methodology for the Refinement of the World Wide Web |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
35. |
A Deployment of Neural Networks with Ammonal |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
36. |
A Case for Interrupts |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
37. |
Emulating Virtual Machines Using Replicated Communication |
Kantipudi .M.V.V.Prasad, Dr.D.subbarao |
Accepted (Payment Awaiting) |
38. |
Harnessing Public-Private Key Pairs Using Encrypted Modalities |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
39. |
Debt: Distributed, Amphibious Information |
Dr.D.subbarao, Kantipudi .M.V.V.Prasad |
Accepted (Payment Awaiting) |
40. |
The Evaluation of Efficient IP Trace Back with Specified Probability by Inattentive Network Model |
Babu.S, Kranthi Kumar.G, V N V Phani Kumar .V |
Accepted (Payment Awaiting) |
41. |
Content Filtering using Internet Proxy Servers |
Nitesh Kaushik, Ashish Verma, Vivek Sharma |
Accepted (Payment Awaiting) |
42. |
Growing Hierarchical Adaptive Self-Organizing Map for Phoneme Classification |
Chiraz Jlassi, Najet Arous, Noureddine Ellouze |
Accepted (Payment Awaiting) |
43. |
A Novel Dangerous Vehicle Detection Protocol For Safety Application |
K. Prema Kumar, B. M. Kusuma Kumari, M. Kanti Kiran, Dr. K. Sri Ramakrishna |
Accepted (Payment Awaiting) |
44. |
Fractional Partition |
M.P.Chaudhary |
Accepted (Payment Awaiting) |
45. |
Performance Comparison of Features Reduction Techniques for Intrusion Detection System |
Rupali Datti, Shilpa lakhina, Bhupendra verma |
Accepted (Payment Awaiting) |
46. |
A New Scheme for Detecting CMFs and Excluding Faulty Sensor Nodes from the Network |
Hamideh Jafarian, Shahram Babaie, Ali Hosseinalipour |
Accepted (Payment Awaiting) |
47. |
Contemporary Technology for Hearing Conservation Audiometric Monitoring |
Amol U. Khobragade, V. T. Gaikwad |
Accepted (Payment Awaiting) |
48. |
Desgin issues in developing a common GUI for Operating Systems |
Chandramouli Choudhary, Rohit Gautam, Abhimanyu Garg, Anmol Mehrotra, Jitendra Kr. Seth |
Accepted (Payment Awaiting) |
49. |
Context Aware Health Care Application |
Shankari Bhattacharyya, RA.K Saravanaguru, Arunkumar Thangavelu |
Accepted (Payment Awaiting) |
50. |
A Novel Expert System for PC Network Troubleshooting and Maintenance |
Akhil Kaushik, Manoj Barnela, Satvika Khanna, Harish Kumar, |
Accepted (Payment Awaiting) |
51. |
Improving Speech Recognition with the help of compression using Vector Quantization |
Namrata Pachori, M. Rajasekhara Babu |
Accepted (Payment Awaiting) |
52. |
Total Power-Speed Optimization using Multi-Threshold voltage (Mvt) Library and Vt Swapping Flow |
Miloni Ganatra, Niraj Jani, Jigneshpanwala |
Accepted (Payment Awaiting) |
53. |
An Efficient Key Agreement Scheme in Multilevel Security Model for Wireless Sensor Network |
Kapil Kumar, Ashwani Kumar, Ravindara Bhatt |
Accepted (Payment Awaiting) |
54. |
Issues in Developing Open Source Licensing Tool for Controllers in the Context of BA (Building Automation) |
Shah Ujval, M Rajasekhara Babu, M Khalid |
Accepted (Payment Awaiting) |
55. |
Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad-hoc Mobile Networks |
K Ranganath, L.Naveen Kumar, Y.V.Sreevani |
Accepted (Payment Awaiting) |
56. |
Representing Function Blocks Using PRET-C |
Vinu E.V, Dr.N.Ch.Sriman Narayana Iyengar |
Accepted (Payment Awaiting) |
57. |
Assessment of Mobile Agent Frameworks based on Security |
Dr.Shuchita Upadhyaya, Pooja |
Accepted (Payment Awaiting) |
58. |
Survey of Web Usage Mining |
Rakesh kumar malviya, Mahesh Chandra malviya, Ritesh joshi, Preetesh purohit, vinay soni |
Accepted (Payment Awaiting) |
59. |
Comparison Three Resource Discovery Algorithms in Grid Computing |
Leyli Mohammad Khanli, Parisa Falahati , shahram babaie |
Accepted (Payment Awaiting) |
60. |
Applying Hidden Markov Model to Protein Sequence Alignment |
Er. Neeshu Sharma, Er. Dinesh Kumar, Er. Reet kamal Kaur |
Accepted (Payment Awaiting) |
61. |
Biological Sequence Matching using Boolean Algebra |
Nivit Gill, Shailendera Singh |
Accepted (Payment Awaiting) |
62. |
RCause - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems |
Er. Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar |
Accepted (Payment Awaiting) |
63. |
ISBWSM-Identifying Similarity between web Services Using Metrics |
D.Chandramohan |
Accepted (Payment Awaiting) |
64. |
Reconfiguring High Speed Networks |
Naresh Kumar, Renu Vig, Deepak Bagai |
Accepted (Payment Awaiting) |
65. |
Development Strategies for e-LMSs |
Vibha Ojha, Neha Sharma, Anand Sharma, Sandesh Jain |
Accepted (Payment Awaiting) |
66. |
Enhanced Block Truncation Coding for Gray Scale Image |
Aditya Kumar, Pardeep Singh |
Accepted (Payment Awaiting) |
67. |
Design of Generalized Predictive Controller Using Multi-Objective Optimization |
Faten Ben Aicha, Faouzi Bouani, Mekki Ksouri |
Accepted (Payment Awaiting) |
68. |
An Optical Neural Network Technique for Mining Frequent Maximal Itemsets In Large Databases |
Divya Bhatnagar, A. S. Saxena |
Accepted (Payment Awaiting) |
69. |
A Representation Framework of University Lecture Scheduling for a Multi-Phase Heuristic Sequential Greedy Solver |
Zhenquan Li, Vivnesh Prasad |
Accepted (Payment Awaiting) |
70. |
A Heuristic Multi-Phase Sequential Greedy Solver for Constrained University Lecture Scheduling |
Zhenquan Li, Vivnesh Prasad |
Accepted (Payment Awaiting) |
71. |
Model Order Reduction using Bio-inspired PSO and BFO Soft -Computing for Comparative Study |
Sudhir Y Kumar, PK.Ghosh, S Mukherjee |
Accepted (Payment Awaiting) |
72. |
Implementation of Educational Decision Support System |
Prof. Rajeshkumar Chavan, Mahesh Kokate, Dr. B.B.Meshram |
Accepted (Payment Awaiting) |
73. |
Performance Assessment of AMRR and ADCG Metrics in MLIR and IR Systems |
Raju Korra, Pothula Sujatha, Madarapu Naresh Kumar |
Accepted (Payment Awaiting) |
74. |
Authentication Using Quantum Cryptography |
Darnasi Veeraiah, P.Shanthi Bala, G.Aghila |
Accepted (Payment Awaiting) |
75. |
Secure Routing Based on ECC in Cluster Wireless Sensor Networks |
Rayala Upendar Rao, K Palanivel |
Accepted (Payment Awaiting) |
76. |
Secure Routing in Cluster based Wireless Sensor Networks by Symmetric Cryptography with Session Keys |
Rayala Upendar Rao, K.Palanivel |
Accepted (Payment Awaiting) |
77. |
Vertical Perimeter Based Enhancement of Streaming Application |
P.Manikandan, R.Kathiresan, Marie Stanislas Ashok |
Accepted (Payment Awaiting) |
78. |
Spanning trees recursions for crosses maps |
D. Lot, M. El Marraki |
Accepted (Payment Awaiting) |
79. |
g-Closed Sets in Topology |
O. Ravi, S. Ganesan |
PDF |
80. |
Decomposition of Continuity Using g#-Closed Sets |
O. Ravi, S. Ganesan, R. Latha |
PDF |