Volume-07, May 2017 Special Issue [First International Conference On Recent Innovations in Engineering and Technology, 22-23 December 2016]

cover new

Volume-07, May 2017 Special Issue / ISSN 2249-9598

First International Conference On Recent Innovations in Engineering and Technology, 22-23 December 2016.

Organized and Hosted by Aurora’s Scientific Technology and Research Academy, Chandrayangutta, Hyderabad, Andhra Pradesh, India

Total Research Papers: 57

SUBJECT: COMPUTER SCIENCE AND ELECTRONICS

SECTION I : COMPUTER SCIENCE

                                                                                         Table of contents

Sr.No

Name of The Research Paper

  Table of contents [Full Text PDF]
1

Construct A Secure Cloud Framework For Mobile Computing In MobiCloud Application….Page.No- 01-12

Ch. Ravi  Shankar, JKR Sastry[Full Text PDF]

2 Internet of Things (IOT): to Deliver Smart Living Services….Page.No- 13-18

Jayashree S,Abhaykumar Inchal,Farzana. N Nadaf[Full Text PDF]

3

Ensuring Multi Factor Authentication Services for Smart Card in the Network….Page.No- 19-25

G.Rajeshwari, Radhika Thalla Swapna Motupally,[Full Text PDF]

4

An Agile Development Model with Enhanced Security for Change Oriented Software Process….Page.No-26-35

D. Hema Latha , D. Rama Krishna Reddy, Azmath Mubeen[Full Text PDF]

5 Protecting data in the cloud – A Customer Approach….Page.No-36-42

M A Mujeeb, S.Shalini[Full Text PDF]

6

Recommendation Engine Using Apache Mahaout and MongoDB….Page.No-43-48

Abhishek Girme, Akshay Ashtekar, Aishwarya Dhamale, Devayani Deshmukh, Mayura Kulkarni[Full Text PDF]

7

Object Discovery and Identification by Using Extended Robust Feature….Page.No- 49-57

ANK Prasannanjaneyulu, Ravi Prakash Achanta[Full Text PDF]

8 A Challenge Over Migrating Data in Cloud Computing….Page.No-58-61

Ashish D. Musale , Pradeep G. Khot[Full Text PDF]

9 Concept and Various Types of Video Segmentation….Page.No- 62-66

AslamYakubSuriya, S. B. Kishor[Full Text PDF]

10

Implementation of Destination Sequence Distance Vector (DSDV) Routing Protocol in Vehicular Adhoc Network ….Page.No-67-74

Avinash Jadhao,  D.N.Chaudhari [Full Text PDF]

11 An  Approach To Big Data Analytics And Its Significance….Page.No- 75-83

Ayesha Mariyam, Sk. Altaf Hussain Basha[Full Text PDF]

12 Software Reliability Using Growth Models….Page.No-84-89

B.IndiraV Aruna[Full Text PDF]

13

A Study on Resource Innovation in Grid Computing using Fuzzy Logic.….Page.No-90-97

M.Bhavani[Full Text PDF]

14 Fragmentation Issues in Distributed Database ….Page.No-98-103

D.S.Hiremath, S.B.Kishor[Full Text PDF]

15

An Approach for Faults Recover occur due to Mobility in Distributed Computing System….Page.No-104-110

N Ramesh Babu[Full Text PDF]

16

Secure distribution of secret key to group nodes using SPSS model for Threshold Cryptography in MANETs .….Page.No-111-118

P.Swetha, P.Premchand [Full Text PDF]

17

High Reliability of Data Presentation in Network Using NDS Approach….Page.No-119-128

M Vijayapal Reddy, K Satyanna[Full Text PDF]

18

Implementation of Data Mining Techniques in Network System for Detecting Intrusion….Page.No- 129-134

Mettu Jhansi Rani, Kaveti Gowtham , K.Prashanth[Full Text PDF]

19

An Approach to protect the Cluster Attacks in Ad-hoc Network Security….Page.No-135-143

Pradosh Chandra Patnaik, M V Ramana Muthy, S B Kishor[Full Text PDF]

20

An Ideal Detection Strategy to Identify Malicious Nodes in NETS….Page.No-144-148

Raghavender.K.V, Dr.P.Premchand [Full Text PDF]

21

Comparative Study on Various Machine Learning Techniques for Early Diagnosis of Breast Cancer….Page.No- 149-156

Keerti Yeulkar,  Rahila Sheikh[Full Text PDF]

22

Empirical Study of Key Authentication Scheme in Public Key Cryptography….Page.No- 157-168

P.Kumaraswamy,C.V.Guru Rao,V.Janaki [Full Text PDF]

23

Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing At Location-Based Service….Page.No-169-177

Pallela Archana, Pradosh Chandra Patnaik[Full Text PDF]

24 A Novel Verifiable Secret Sharing Scheme over Bilinear Groups ….Page.No- 178-184

Asha Jyothi Ch,  G Narsimha,  J Prathap[Full Text PDF]

25 Splines on Wheel Graphs Over ℤ mod pkℤ….Page.No- 185-195

Radha Madhavi Duggaraju, Lipika Mazumdar[Full Text PDF]

26 GRM for Data Transfer in AdHoc Networks….Page.No- 196-204

A. Nagender,Shaik Imran Pasha,Ramakanth.K[Full Text PDF]

27

Empowering Innovations of the Recent Technology through Convergence of IoT Big Data and Cloud….Page.No-205-216

Syeda Imrana Fatima, A.Bakiyalakshmi,Sayeedakhanum Pathan[Full Text PDF]

28

Correlation Analysis of Aodv and B-AODV AD HOC Routing Protocols….Page.No-217-225

S.Shalini,K.Naresh,Imran Pasha Shaik [Full Text PDF]

29

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud….Page.No-226-233

M. Mamatha, K. Ramakanth [Full Text PDF]

30 An Efficient Data Mining Technique on Cloud Storage ….Page.No-234-242

B.Chithra, Ch.Srivalli, S Archana[Full Text PDF]

31

Strategic Based Encryption for Protecting Storage Data in Cloud Service Provider….Page.No-243-249

G.Sudhakar, M. Swapna [Full Text PDF]

32 Analytics of Big Data – Study on Supply Chain Metamorphosis….Page.No-250-260

T.Malathi, K.Venkatesh, Neelam Sriram Kumar [Full Text PDF]

33

Implementation of GSM Technology and Cloud Computing Concepts on Various Organisations….Page.No-261-270

Venugopal S. Narsingoju, S.B. Kishor, Bhavana V. Narsingoju[Full Text PDF]

34

JK TOOLS for Detection and Correction Erroneous Data from Database….Page.No-271-277

Jay Kumar M.Purohit, S.B.Kishor, Ajay S. Kushwaha[Full Text PDF]

   

SECTION II : ELECTRONICS

 

35 Novel Preservation Path for Internet of Things….Page.No-278-288

Aleti Ravichandra,Shekar Chiluveru,Kumar Keshamoni[Full Text PDF]

36 Maculopathy Detection and Grading in Digital Retinal Images….Page.No-289-300

B.Anupama,Ramakrishna Seemakurti[Full Text PDF]

37 Automatic and Improved Method for Diabetic Retinopathy Detection….Page.No-301-307

Kovoori Arinika, Swetha[Full Text PDF]

38

Design Of Novel High Speed and Low Area 15:4 Compressors Using Xilinx Tool ….Page.No-308-318

Sharea Takreem,M.Manasa, Ch.Veeranjaneyulu[Full Text PDF]

39

Segmenting and Detecting the Area of A True Retina and Diagnosing Its Retinal Disease Using SLO….Page.No-319-327

Ch.Shravan Kumar, L.Nandini[Full Text PDF]

40

A Novel Assistive Navigation Framework for the Visually Impaired Utilizing Visible Light Communications under Indoor MIMO….Page.No-328-349

Dasari Subbarao, N.S.Murti Sarma[Full Text PDF]

41

Face and Facial Expression Detection using viola-jones and PCA algorithm….Page.No-350-357

Drakshayani Desai, Ramakrishna Seemakurti[Full Text PDF]

42

Random Number Generation for High Security using 3 Level DWT Steganography and ECC Encryption – A Survey….Page.No-358-366

Inusha M M, Y Manjula,  M Z Kurian[Full Text PDF]

43

Single Image Super Reslution Using Fixed Budget- Kernel Recursive Least Square ….Page.No-367-370

 Jesna Anver,   Abdulla P[Full Text PDF]

44

Higher Order Radix Algorithm Based VLSI Architecture for Parallel MAC ….Page.No-371-381

K.Sandeep Kumar,R.Sravanthi, Abdul Raheem[Full Text PDF]

45

A New Technique of Hiding Data Using Genetic and Integer Wavelet Algorithms with OPAP Process….Page.No-382-393

M. A. Khader Khan, Sadia Najmus Saher, Syed Abdul Sattar, [Full Text PDF]

46

Energy Saving Scheme of Optimized by Green Communication Technology Based on Multicarrier Base Stations Using OFDMA ….Page.No-394-401

P.Veena[Full Text PDF]

47

Survey on Decimal Floating Point Multiplier Accumulator Unit Using FMA  ….Page.No-402-406

Pallavi C M,  Divya Prabha,  M Z Kurian [Full Text PDF]

48

High performance matrix multiplication using exact systolic array with Wallace multiplier-A Survey….Page.No-407-413

Praphulla T R,Vinutha C B,M Z Kurian [Full Text PDF]

49

A Comprehensive Survey on Various Reversible Data Hiding Methods ….Page.No-414-421

Shruthi N,  Savitha C,  M Z Kurian [Full Text PDF]

50

Energy Efficient Automation System for Smart Task Scheduling….Page.No-422-428

K Priyanaka,   K V Sai Ashik,   Subha Sri Thiruveedhi[Full Text PDF]

51

Advance Security Preservation System with Entry Level Image Monitoring ….Page.No-429-435

Itharaju Jyothi,Kumar Keshamoni,Mohammed Imaduddin[Full Text PDF]

52

Human Body Extraction and Activities Observation from Still images for High Security systems….Page.No-436-447

Y.B.T Sundari, D.Veena, K.V.Mohan[Full Text PDF]

53 FPGA Implementation on A Self Organizing Map….Page.No-448-453

M.Pratussha ,  Aman kumar,  K.Satish Babu[Full Text PDF]

54

Enhancement of Videos Captured Under Low Light Conditions through ICD Approach Using Savitzky-Golay Filter ….Page.No-454-462

R.Priyakanth, Mahesh Babu Katta,Abburi Radha[Full Text PDF]

55

­­Synthesis And Realization of Linear Feedback Shift Register Using Reversible Logic….Page.No-463-473

S Rahul Kumar[Full Text PDF]

56

Interference Suppression in Cognitive Relay Network Using Compressive Sensing ….Page.No-474-483

Rajkumar Samikkannu, Chinnam Mahesh, P.Santhosh[Full Text PDF]

57

Advanced Microcontroller Bus Architecture Associate on Ahb Arbiteration and APB Bridge….Page.No-484-492

Anendhar, C.Srilatha [Full Text PDF]