DigitalXplore

CONFERENCE DATE:
Guntur, India 07-04-2017
 
Proceeding Detail

INTERNATIONAL CONFERENCE ON SCIENCE, TECHNOLOGY, ENGINEERING AND MANAGEMENT - Computer Science Engineering


Swarm Intelligence (SI) based Profiling and Scheduling of Big Data Applications
Page(s): 1-6  
Author Anand Rao D., Ayyappa Chakravarthi M  
Quick Abstract  Add To Library PDF  
WRL Cited By- 8
Advanced LSB Inherited Algorithm for Data Hiding with in an Audio File
Page(s): 7-10  
Author K.Nagaseshu, S.Krishnaveni, M. Markandeyulu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 5
Partial Replacement of Cement With GGBS and Metakaolin
Page(s): 11-15  
Author Rama Tulasi B., Sushmanjali B., Ayyappa Chakravarthi M.  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
Holistic Disaster Recovery Approach for Big Data NoSQL Workloads
Page(s): 16-20  
Author Ayyappa Chakravarthi M., Srinivas O., Siva Nagaraju M  
Quick Abstract  Add To Library PDF  
WRL Cited By- 5
Enabling Proactive Self-Healing by Data Mining Network Failure Logs
Page(s): 21-28  
Author Panthagani Vijaya Babu, Jajjara Bhargav Ramudu, Narne Srikanth  
Quick Abstract  Add To Library PDF  
WRL Cited By- 5
Network Routing Protocols in IOT
Page(s): 29-33  
Author Alahari Hanumat Prasad, T.Hema Bharat  
Quick Abstract  Add To Library PDF  
WRL Cited By- 5
Cryptanalysis of Modified Caesar Cipher using Rectangular Method for Enhanced Security - A Chosen Plaintext Attack
Page(s): 34-36  
Author Bhuvaneswari. J, Lakshmi Rishitha. V, Sandhya Rechal. K, Ravi Shankar. N  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Comprehensive Analysis of Various Rough Set Tools for Data Mining
Page(s): 37-42  
Author Alekhya Cherukri, Madhuri Doguparthi  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
Data Mining Technique for Reduction of Association Rules in Distributed System
Page(s): 43-46  
Author Satyanarayana Challa, Dhana Lakshmi Popuri  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
Knowledge Discovery, Analysis and Prediction in Healthcare using Data Mining and Analytics
Page(s): 47-50  
Author Srinivasa Durga Prasad G., Siva Sankar Uppala  
Quick Abstract  Add To Library PDF  
WRL Cited By- 5
Proficient and Susceptible Routing Procedure for VANETs
Page(s): 51-54  
Author Kiran Kumar Kaveti, K.Jhacny Rani  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks
Page(s): 55-58  
Author N. Phani Kumar, Sabitha Jetty, Kurremula Jyothi  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Analysis on Big Data Quarrying Algorithms
Page(s): 59-64  
Author Sk. Mubeena Sultana, B. Nagaeswari  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Optimization & Quality of Service Based Routing Protocols for Manet
Page(s): 65-69  
Author Yallamati Prakasarao, Jagajeevan Nandigama, G Ramachandra Rao, M Markedeyulu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 5
Client Side Encryption and Allocation of Cloud Data for Multiple Owners
Page(s): 70-72  
Author Anusha Mallireddy, Shaik Mubeena Sultana  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Identifying Scalable Data and Increasing Efficiency of Spectral Clustering
Page(s): 73-78  
Author Sk Najmus Sahar, P Vijayababu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Performance Appraise of Data Mining Classifiers from Bayes, Function, Lazy, Rule and Tree Family for Video Classification Using Linde Buzo Gray Vector Quantization Codebooks
Page(s): 79-82  
Author Manasa Kavuri, Soujanya Kumari Maddu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Prediction for Satellite Communication Based on Data Mining
Page(s): 83-86  
Author K.Pratap Joshi, D.Ramya Krishna, P. Vijaya Babu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 2
Discovery of Ranking Fraud for Mobile Apps
Page(s): 87-90  
Author K.Bhavani, K. Ramesh Babu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Securing Photo Sharing Mechanism with User Granted Permissions on Social Network Data
Page(s): 91-93  
Author Kunchala Jaya Lakshmi, Shaik Mubeena Sultana  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Lightweight Feature Selection Methods Based on Standardized Measure of Dispersion for Mining Big Data
Page(s): 94-99  
Author Arun Kumar Pulipaka, Swathi Odugu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Understanding Short Cipher Text by using CP-ABE Encryption Technique
Page(s): 100-104  
Author Ravi Kumar Pole, Ramesh Karyamsetty  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Detecting Malicious Facebook Applications
Page(s): 105-121  
Author G K Kishore Babu, G Bharath Kumar, K Aruna Kumari, M Markendeyulu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
A Symmetric Key Broadcast Encryption (ASKBE) for Transferring data Over Dynamic Group Members
Page(s): 122-125  
Author Jasty Venkateswarlu, Miriyala Markandeyulu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
Booster in High Dimensional Data Classification
Page(s): 126-129  
Author G. Shiva Kumar, M. Markandeyulu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
Removing Auditor for Verification of Users Data using Deniable ABE
Page(s): 130-133  
Author D.Sukanya, K. Kiran Kumar  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
Identifying Fraud Apps in Social Networks
Page(s): 134-138  
Author Maram Anusha, B. Nagaeswari  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
Computerized Isolation and Little Privilege in Net Assistances
Page(s): 139-155  
Author P.Subba Rao, Sk. John Sydulu, Ch.Jyosthna Devi, M Markendeyulu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
Mining User Aware Rare Sequential Topic Pattrens In Document Streams
Page(s): 156-159  
Author A Pavani, Ayyappa Chakravarthi  
Quick Abstract  Add To Library PDF  
WRL Cited By- 5
Efficient Way of Retrieving Users Secure Data in Cloud Using Multi Keyword
Page(s): 160-163  
Author Munneli Sri Kavya, Ayyappa Chakravarthi M  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Page(s): 164-170  
Author G Pavani, M Ratna Raju, Sk Shabbir Hussain, M Markendeyulu  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
DNA Probe Signal Processing for identification of Abnormal Gene Regulation and Pathogenetic Understanding - A Data Mining Approach
Page(s): 171-178  
Author Akhilesh Reddy Male, Vaibhav Reddy G J N  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Implementation of Robust Video Object Steganographic Mechanism over Wireless Networks
Page(s): 179-183  
Author Katragadda Kalyani, K. Senthil Kumar, D. Malathi, J. D. Dorathi Jayaseeli  
Quick Abstract  Add To Library PDF  
WRL Cited By- 3
Qos Service Management Scheme for Increasing Profit for Cloud Users
Page(s): 184-187  
Author T.Bhavani, K.Kiran Kumar  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
Minimizing Data Loss in Fraud Environment
Page(s): 188-191  
Author Gopidesi Hema Latha, Alahari. Hanumat Prasad  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
A Secure Scheme for Identifying and Verifying Origin Forgery in Wan Networks
Page(s): 192-195  
Author Shaik.Jameer Khasim, Bodapati Nagaeswari  
Quick Abstract  Add To Library PDF  
WRL Cited By- 4
A Cellular Logic Array Based Data Mining Framework for Object Detection in Video Surveillance System
Page(s): 196  
Author Nagarjuna Gorantla, Bhavitha Priya Maddineni  
Quick Abstract  Add To Library PDF  
WRL Cited By- 5