1 | Design of QSD Number System Addition using Delayed Addition Technique
Authors: S.Mallesh, Dr.C.V.Narasimhulu | 1-4 |
2 | Identity Based Detection of Spoofing Attackers in Wireless Networks and Practical Solutions
Authors: M.Venkateshwarlu, P.Rajendra Prasad, T.Madhu, Dr.T.Siva Sankar Reddy
| 5-11 |
3 | Data Mining Techniques for School Failure and Dropout System
Authors: K.Swathi, D.Sujatha | 12-15 |
4 | The Architecture Design for Find Outing Vehicle Position System using Communication Networks
Authors: Sayed Shoyeb Mohiuddin, B. Satish Chandra | 16-20 |
5 | Congestion control using Image Processing
Authors: Nagaraj Eshwaraj, Jagdish Mulge | 21-23 |
6 | A High Speed Wallace Tree Multiplier Using Modified Booth Algorithm for Fast Arithmetic Circuits
Authors: S Sapna, Vamshi U R | 24-28 |
7 | A Time-Area-Power Efficient High Speed Vedic Mathematics Multiplier using Compressors
Authors: Kishan.P, G. Sai Kumar | 29-34 |
8 | Implementation of Area Effective Carry Select Adders
Authors: Narender. J, T. Naga Raju | 35-42 |
9 | MIST Effective Masquerade Attack Detection in the Cloud
Authors: Tallapaneni Madhavi | 43-46 |
10 | Privacy Preserving Based Cloud Storage System
Authors: V.Shravani, T.V.Ramanamma | 47-50 |
11 | Preventing SQL Injection Attacks in Web Application
Authors: D.Spandana, Devi Prasad Mishra, Dr. S. Sreenatha Reddy ,Dr. Sandeep Singh Rawat | 51-57 |
12 | Assessment of Raw Milk Quality by Neural Networking (N-N) Model in Macedonia Dairy Farms
Authors: Vesna Karapetkovska Hristova, Julijana Tomovska,M. Ayaz Ahmad,Biljana Trajkovska,Georgi Bonev | 58-61 |
13 | Resource Allocation in MIMO – OFDM Communication System under Signal Strength Analysis
Authors: Shivageetha, G. Parameshwar | 62-66 |
| Paper uploading is in progress. Author(S) are requested to complete their paper formalities. | |