HIGH SPEED ROBUST VEDIC MULTIPLIER USING 4-2 AND 5-2 COMPRESSORS
1 P.A. REKHA,2 L. PRABHAVATHI ,
Page No :1-5
RE RANKING MODEL FOR WEB IMAGE USING CLOUD TECHNIQUES
Bethala Shirisha,Dr.V. Kamakshi prasad ,
Page No :6-13
A Scalable Scheme for Storing Data in Cloud Using Access Management
Dr.T.N.Srinivas Rao ,
Page No :14-24
EMPHERICAL APPROACH IN FINDING THE PREDICTION TO DEPRESSION LEVELS USING SOCIAL MEDIA
B.VENKATA SRINIVASULU,Dr. VINOD MORESHWAR VAZE ,
Page No :
EFFICIENT PARAMETERS DEVELOPMENT FOR POSTCOLONIAL INDIAN DIASPORA FICTION IN ENGLISH: KEY ISSUES
Dr. K Gouthami ,
Page No :41-44
Examination of Integrating Wireless Sensor Networks with Cloud Computing
Yallamati Sobhan Babu1 , Archana Panda2 , Jagannath Ray2 ,
Page No :49-60
1Dr. CHANDRA REKHA POTLURI, 2Mrs. KANDUKURU CHANDRAKALA ,
Page No :61-67
PRIVACY-PRESERVING CROWD-SOURCED STATISTICAL DATA PUBLISHING WITH AN UNTRUSTED SERVER
1MURALI PONAGANTI, 2Sagaram Srinivas ,
Page No :68-74
A PRACTICAL ATTRIBUTE-BASED DOCUMENT COLLECTION HIERARCHICAL ENCRYPTION SCHEME
1Murali Ponaganti, 2Audurthi Gouthami ,
Page No :75-80
SOCI-RANK IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
1D.Sai Krishna, 2G. Pranaya ,
Page No :81-86
USER VITALITY RANKING AND PREDICTION IN SOCIAL NETWORKING SERVICES A DYNAMIC NETWORK PERSPECTIVE
1S. Vijay Kumar, 2U. Soujanya ,
Page No :87-93
ONLINE PUBLIC SHAMING ON TWITTER DETECTION ANALYSIS AND MITIGATION
1D.SAI KRISHNA, 2Guguloth Raj Kumar ,
Page No :101-105
ACOMPUTATIONAL-DYNAMIC-TRUST-MODEL-FOR-USERAUTHORIZATION-DOCX
1D.SAI KRISHNA, 2Sayabugari Susmitha ,
Page No :106-109
DETECTION OF FAKE ONLINE REVIEWS USING SEMI SUPERVISED AND SUPERVISED LEARNING.DOCX
1D.SAI KRISHNA, 2Konduri Nikitha ,
Page No :116-119
1MURALI PONAGANTI, 2Vangala Shireesha ,
Page No :120-125
SPAMMER DETECTION AND FAKE USER IDENTIFICATION ON SOCIAL NETWORK
1S. VIJAY KUMAR , 2Kadarla SaiJyothi ,
Page No :126-130
DCCR DEEP COLLABORATIVE CONJUNCTIVE RECOMMENDER FOR RATING PREDICTION
1G.Soumya, 2Taduka Shirisha ,
Page No :131-137
SEARCHABLE SYMMETRIC ENCRYPTION WITH FORWARD SEARCH PRIVACY
1G.Soumya, 2Vilasagaram Mamatha ,
Page No :138-143
AN ATTRIBUTE-BASED CONTROLLED COLLABORATIVE ACCESS CONTROL SCHEME FOR PUBLIC CLOUD STORAGE
1D.Sai Krishna, 2Chittimalla Harika ,
Page No :149-153
A LIGHTWEIGHT SECURE AUDITING SCHEME FOR SHARED DATA IN CLOUD STORAGE
1S. Vijay Kumar , 2Ejjagiri Vijayalaxmi ,
Page No :154-158
A SECURE SEARCHABLE ENCRYPTION FRAMEWORK FOR PRIVACY-CRITICAL CLOUD STORAGE SERVICES
1S. VIJAY KUMAR , 2Pokala Sanath Kumar ,
Page No :159-162