Volume-07, May 2017 Special Issue / ISSN 2249-9598
First International Conference On Recent Innovations in Engineering and Technology, 22-23 December 2016.
Organized and Hosted by Aurora’s Scientific Technology and Research Academy, Chandrayangutta, Hyderabad, Andhra Pradesh, India
Total Research Papers: 57
SUBJECT: COMPUTER SCIENCE AND ELECTRONICS
SECTION I : COMPUTER SCIENCE
Table of contents
Sr.No |
Name of The Research Paper |
Table of contents [Full Text PDF] | |
1 |
Construct A Secure Cloud Framework For Mobile Computing In MobiCloud Application….Page.No- 01-12 Ch. Ravi Shankar, JKR Sastry[Full Text PDF] |
2 | Internet of Things (IOT): to Deliver Smart Living Services….Page.No- 13-18
Jayashree S,Abhaykumar Inchal,Farzana. N Nadaf[Full Text PDF] |
3 |
Ensuring Multi Factor Authentication Services for Smart Card in the Network….Page.No- 19-25 G.Rajeshwari, Radhika Thalla Swapna Motupally,[Full Text PDF] |
4 |
An Agile Development Model with Enhanced Security for Change Oriented Software Process….Page.No-26-35 D. Hema Latha , D. Rama Krishna Reddy, Azmath Mubeen[Full Text PDF] |
5 | Protecting data in the cloud – A Customer Approach….Page.No-36-42
M A Mujeeb, S.Shalini[Full Text PDF] |
6 |
Recommendation Engine Using Apache Mahaout and MongoDB….Page.No-43-48 Abhishek Girme, Akshay Ashtekar, Aishwarya Dhamale, Devayani Deshmukh, Mayura Kulkarni[Full Text PDF] |
7 |
Object Discovery and Identification by Using Extended Robust Feature….Page.No- 49-57 ANK Prasannanjaneyulu, Ravi Prakash Achanta[Full Text PDF] |
8 | A Challenge Over Migrating Data in Cloud Computing….Page.No-58-61
Ashish D. Musale , Pradeep G. Khot[Full Text PDF] |
9 | Concept and Various Types of Video Segmentation….Page.No- 62-66
AslamYakubSuriya, S. B. Kishor[Full Text PDF] |
10 |
Implementation of Destination Sequence Distance Vector (DSDV) Routing Protocol in Vehicular Adhoc Network ….Page.No-67-74 Avinash Jadhao, D.N.Chaudhari [Full Text PDF] |
11 | An Approach To Big Data Analytics And Its Significance….Page.No- 75-83
Ayesha Mariyam, Sk. Altaf Hussain Basha[Full Text PDF] |
12 | Software Reliability Using Growth Models….Page.No-84-89
B.Indira, V Aruna[Full Text PDF] |
13 |
A Study on Resource Innovation in Grid Computing using Fuzzy Logic.….Page.No-90-97 M.Bhavani[Full Text PDF] |
14 | Fragmentation Issues in Distributed Database ….Page.No-98-103
D.S.Hiremath, S.B.Kishor[Full Text PDF] |
15 |
An Approach for Faults Recover occur due to Mobility in Distributed Computing System….Page.No-104-110 N Ramesh Babu[Full Text PDF] |
16 |
Secure distribution of secret key to group nodes using SPSS model for Threshold Cryptography in MANETs .….Page.No-111-118 P.Swetha, P.Premchand [Full Text PDF] |
17 |
High Reliability of Data Presentation in Network Using NDS Approach….Page.No-119-128 M Vijayapal Reddy, K Satyanna[Full Text PDF] |
18 |
Implementation of Data Mining Techniques in Network System for Detecting Intrusion….Page.No- 129-134 Mettu Jhansi Rani, Kaveti Gowtham , K.Prashanth[Full Text PDF] |
19 |
An Approach to protect the Cluster Attacks in Ad-hoc Network Security….Page.No-135-143 Pradosh Chandra Patnaik, M V Ramana Muthy, S B Kishor[Full Text PDF] |
20 |
An Ideal Detection Strategy to Identify Malicious Nodes in NETS….Page.No-144-148 Raghavender.K.V, Dr.P.Premchand [Full Text PDF] |
21 |
Comparative Study on Various Machine Learning Techniques for Early Diagnosis of Breast Cancer….Page.No- 149-156 Keerti Yeulkar, Rahila Sheikh[Full Text PDF] |
22 |
Empirical Study of Key Authentication Scheme in Public Key Cryptography….Page.No- 157-168 P.Kumaraswamy,C.V.Guru Rao,V.Janaki [Full Text PDF] |
23 |
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing At Location-Based Service….Page.No-169-177 Pallela Archana, Pradosh Chandra Patnaik[Full Text PDF] |
24 | A Novel Verifiable Secret Sharing Scheme over Bilinear Groups ….Page.No- 178-184
Asha Jyothi Ch, G Narsimha, J Prathap[Full Text PDF] |
25 | Splines on Wheel Graphs Over ℤ mod pkℤ….Page.No- 185-195
Radha Madhavi Duggaraju, Lipika Mazumdar[Full Text PDF] |
26 | GRM for Data Transfer in AdHoc Networks….Page.No- 196-204
A. Nagender,Shaik Imran Pasha,Ramakanth.K[Full Text PDF] |
27 |
Empowering Innovations of the Recent Technology through Convergence of IoT Big Data and Cloud….Page.No-205-216 Syeda Imrana Fatima, A.Bakiyalakshmi,Sayeedakhanum Pathan[Full Text PDF] |
28 |
Correlation Analysis of Aodv and B-AODV AD HOC Routing Protocols….Page.No-217-225 S.Shalini,K.Naresh,Imran Pasha Shaik [Full Text PDF] |
29 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud….Page.No-226-233 M. Mamatha, K. Ramakanth [Full Text PDF] |
30 | An Efficient Data Mining Technique on Cloud Storage ….Page.No-234-242
B.Chithra, Ch.Srivalli, S Archana[Full Text PDF] |
31 |
Strategic Based Encryption for Protecting Storage Data in Cloud Service Provider….Page.No-243-249 G.Sudhakar, M. Swapna [Full Text PDF] |
32 | Analytics of Big Data – Study on Supply Chain Metamorphosis….Page.No-250-260
T.Malathi, K.Venkatesh, Neelam Sriram Kumar [Full Text PDF] |
33 |
Implementation of GSM Technology and Cloud Computing Concepts on Various Organisations….Page.No-261-270 Venugopal S. Narsingoju, S.B. Kishor, Bhavana V. Narsingoju[Full Text PDF] |
34 |
JK TOOLS for Detection and Correction Erroneous Data from Database….Page.No-271-277 Jay Kumar M.Purohit, S.B.Kishor, Ajay S. Kushwaha[Full Text PDF] |
SECTION II : ELECTRONICS
|
|
35 | Novel Preservation Path for Internet of Things….Page.No-278-288
Aleti Ravichandra,Shekar Chiluveru,Kumar Keshamoni[Full Text PDF] |
36 | Maculopathy Detection and Grading in Digital Retinal Images….Page.No-289-300
B.Anupama,Ramakrishna Seemakurti[Full Text PDF] |
37 | Automatic and Improved Method for Diabetic Retinopathy Detection….Page.No-301-307
Kovoori Arinika, Swetha[Full Text PDF] |
38 |
Design Of Novel High Speed and Low Area 15:4 Compressors Using Xilinx Tool ….Page.No-308-318 Sharea Takreem,M.Manasa, Ch.Veeranjaneyulu[Full Text PDF] |
39 |
Segmenting and Detecting the Area of A True Retina and Diagnosing Its Retinal Disease Using SLO….Page.No-319-327 Ch.Shravan Kumar, L.Nandini[Full Text PDF] |
40 |
A Novel Assistive Navigation Framework for the Visually Impaired Utilizing Visible Light Communications under Indoor MIMO….Page.No-328-349 Dasari Subbarao, N.S.Murti Sarma[Full Text PDF] |
41 |
Face and Facial Expression Detection using viola-jones and PCA algorithm….Page.No-350-357 Drakshayani Desai, Ramakrishna Seemakurti[Full Text PDF] |
42 |
Random Number Generation for High Security using 3 Level DWT Steganography and ECC Encryption – A Survey….Page.No-358-366 Inusha M M, Y Manjula, M Z Kurian[Full Text PDF] |
43 |
Single Image Super Reslution Using Fixed Budget- Kernel Recursive Least Square ….Page.No-367-370 Jesna Anver, Abdulla P[Full Text PDF] |
44 |
Higher Order Radix Algorithm Based VLSI Architecture for Parallel MAC ….Page.No-371-381 K.Sandeep Kumar,R.Sravanthi, Abdul Raheem[Full Text PDF] |
45 |
A New Technique of Hiding Data Using Genetic and Integer Wavelet Algorithms with OPAP Process….Page.No-382-393 M. A. Khader Khan, Sadia Najmus Saher, Syed Abdul Sattar, [Full Text PDF] |
46 |
Energy Saving Scheme of Optimized by Green Communication Technology Based on Multicarrier Base Stations Using OFDMA ….Page.No-394-401 P.Veena[Full Text PDF] |
47 |
Survey on Decimal Floating Point Multiplier Accumulator Unit Using FMA ….Page.No-402-406 Pallavi C M, Divya Prabha, M Z Kurian [Full Text PDF] |
48 |
High performance matrix multiplication using exact systolic array with Wallace multiplier-A Survey….Page.No-407-413 Praphulla T R,Vinutha C B,M Z Kurian [Full Text PDF] |
49 |
A Comprehensive Survey on Various Reversible Data Hiding Methods ….Page.No-414-421 Shruthi N, Savitha C, M Z Kurian [Full Text PDF] |
50 |
Energy Efficient Automation System for Smart Task Scheduling….Page.No-422-428 K Priyanaka, K V Sai Ashik, Subha Sri Thiruveedhi[Full Text PDF] |
51 |
Advance Security Preservation System with Entry Level Image Monitoring ….Page.No-429-435 Itharaju Jyothi,Kumar Keshamoni,Mohammed Imaduddin[Full Text PDF] |
52 |
Human Body Extraction and Activities Observation from Still images for High Security systems….Page.No-436-447 Y.B.T Sundari, D.Veena, K.V.Mohan[Full Text PDF] |
53 | FPGA Implementation on A Self Organizing Map….Page.No-448-453
M.Pratussha , Aman kumar, K.Satish Babu[Full Text PDF] |
54 |
Enhancement of Videos Captured Under Low Light Conditions through ICD Approach Using Savitzky-Golay Filter ….Page.No-454-462 R.Priyakanth, Mahesh Babu Katta,Abburi Radha[Full Text PDF] |
55 |
Synthesis And Realization of Linear Feedback Shift Register Using Reversible Logic….Page.No-463-473 S Rahul Kumar[Full Text PDF] |
56 |
Interference Suppression in Cognitive Relay Network Using Compressive Sensing ….Page.No-474-483 Rajkumar Samikkannu, Chinnam Mahesh, P.Santhosh[Full Text PDF] |
57 |
Advanced Microcontroller Bus Architecture Associate on Ahb Arbiteration and APB Bridge….Page.No-484-492 Anendhar, C.Srilatha [Full Text PDF] |