International Journal of
Advanced
Computer Communications &
Control
Volume 02, Number 01, January 2014 | |
Title: Authors: Pages: |
Design and Implementation of Wireless Sensor
Network for Smart Grids Sanaullah Ahmad, Babar Noor, Fazal Wahab Karam 1-8 |
Title: Authors: Pages: |
Design and analysis of an algorithm using
Asymmetric keys and Hashing techniques for
Information Security Sk. Shabbeer Hussain, Ch. Rupa 9-12 |
Title: Authors: Pages: |
Design of a model to tune the PL/SQL program
and improve the performance of DBMS Vamsi Krishna Myalapalli 13-16 |
Title: Authors: Pages: |
TUI based touch-spam detection in mobile
applications to increase the security from
advertisement networks M. Sree Vani, R. Bhramaramba, D. Vasumati, O. Yaswanth Babu 17-22 |
Title: Authors: Pages: |
Implementation of FLOSS based Library
Automation Software “Koha” in Pragati
Engineering College Soma Sekhar Turangi, M. V. Rajesh 23-29 |
Title: Authors: Pages: |
Comparative Study of Resource Provisioning
in Clouds by an administrator to deploy
applications P.R.S.M. Lakshmi, Ande Prasad 30-34 |
Title: Authors: Pages: |
Improving Security during packet
transmission at Network Layer D. J. Samatha Naidu, A. Prasad 35-37 |
Title: Authors: Pages: |
FPGA Implementation of Hybrid Reconfigurable
Cryptographic Processor A. Chitra, T. Blesslin Sheeba , K. Sangeethalakshmi, S. Seshavidya 38-43 |
Volume 02, Number 02, April 2014 | |
Title: Authors: Pages: |
An Adaptive Kmeans Clustering Algorithm
Using Mixture Model G. Chamundeswari, G. P. Sardhi Varma 44-47 |
Title: Authors: Pages: |
A Survey on Virtual Honey nets to secure
network from intrusions M. Solomon Zemene, P. S. Avadhani 48-55 |
Title: Authors: Pages: |
AODV based efficient routing methodologies
for Wireless Ad hoc Networks M. V. Sai Deepak, I. Kiran Krishna 56-62 |
Title: Authors: Pages: |
Collaborative Technique to Detect and
Prevent SQL Injection Attacks Sammangi Gowtam Pratap Kumar, Akula Sai Chanukya, Ayinavalli Venkata Ramana 63-68 |
Title: Authors: Pages: |
Effect of Hyper-Threading on Memory Mapped
Files Anuradha T., Jyothsna L., Lakshmi Kavya A. 69-74 |
Title: Authors: Pages: |
A Comparative study on Different Resource
Allocation Strategies using Machine Learning Anitha N., Anirban Basu 75-78 |
Title: Authors: Pages: |
Message Manager (MM): A Novel SMS
Classification System Shantanu Pathak, D. Rajeswara Rao, Smita Haral, Mayuri Gangarde, Priti Bhand 79-84 |
Title: Authors: Pages: |
A survey on possible solutions addressing
all these challenges related to cloud
computing Koushik Akkinapalli, R. Rajeswara Rao 85-88 |
Title: Authors: Pages: |
A Fusion of PLSB and SVD based Image
Watermarking Approach R. Sailaja, Ch. Rupa, A.S.N. Chakravarthy 89-91 |
Title: Authors: Pages: |
Multimedia database for attainment targets Anuradha T., Hima Bindu M., Kalyan Kumar Reddy M. 92-94 |
Volume 02, Number 03, July 2014 | |
Title: Authors: Pages: |
Ameliorating the security of Palm Print
Biometric template using FEC G. Madhavi, S. Viswanadha Raju, P. Vidyasree 95-98 |
Title: Authors: Pages: |
A Novel and cost-effective approach for
privacy, storage and computation of
intermediate data sets in Cloud S. L. M. Deepthi, G. Yamini, P. Srinivasa Rao, K. Siva Rama Krishna 99-102 |
Title: Authors: Pages: |
A Report on cyber security attacks and
countermeasures S. Suresh Kumar, P.D.S.S. Lakshmi Kumari 103-105 |
Title: Authors: Pages: |
A Study on various approaches of Inter-Cloud
K. Santhi Sri, Ande Prasad 106-109 |
Title: Authors: Pages: |
Data management to support network security Susmitha Gutha, Vamsi Krishna Maddula, Khasim Md. 110-114 |
Title: Authors: Pages: |
Study of importance of digital forensics and
interpretation of forensic tools in
Linux-platform Santosh Naidu P., Amulya Patcha 115-120 |
Title: Authors: Pages: |
Incident Response in Android Forensics M. A. Eswar Reddy, J. Srinivas Babji, Srikanth Vavilla 121-125 |
Volume 02, Number 04, October 2014 | |
Title: Authors: Pages: |
An Innovative Progress Approach for Quantity
Mining of Itemsets Prathyusha Kanakam, A.S.N. Chakravarthy 126-130 |
Title: Authors: Pages: |
A Note on Speckle Noise Removal using
Mathematical Morphology in Ultrasound
Imaging A. R. Anil, R. Rajesh 131-133 |
Title: Authors: Pages: |
Neural Network based mathematical models for
Gold Price Prediction K. Dasharathraj Shetty, Annappa K., Prakash Aithal, Vrishika Melenta 134-138 |
Title: Authors: Pages: |
An Integrated Approach to Provide Security
and Resist Thefts on Digital Data Finger
Vein Biometric Match-on Smartcards S. Mahaboob Hussain, A.S.N. Chakravarthy 139-147 |
Title: Authors: Pages: |
Energy detection based spectrum sensing in
cognitive radio network: GSM band Maheshkumar S. Pandit, Arjav A. Bavarva 148-150 |
Title: Authors: Pages: |
Avoiding multiple overlapped detection of
single pedestrian N. K. Ragesh, R. Rajesh 151-155 |