CONFERENCE DATE: Guntur, India 07-04-2017 |
Swarm Intelligence (SI) based Profiling and Scheduling of Big Data Applications | |||||||||||
Page(s): | 1-6 | ||||||||||
Author | Anand Rao D., Ayyappa Chakravarthi M | ||||||||||
|
Advanced LSB Inherited Algorithm for Data Hiding with in an Audio File | |||||||||||
Page(s): | 7-10 | ||||||||||
Author | K.Nagaseshu, S.Krishnaveni, M. Markandeyulu | ||||||||||
|
Partial Replacement of Cement With GGBS and Metakaolin | |||||||||||
Page(s): | 11-15 | ||||||||||
Author | Rama Tulasi B., Sushmanjali B., Ayyappa Chakravarthi M. | ||||||||||
|
Holistic Disaster Recovery Approach for Big Data NoSQL Workloads | |||||||||||
Page(s): | 16-20 | ||||||||||
Author | Ayyappa Chakravarthi M., Srinivas O., Siva Nagaraju M | ||||||||||
|
Enabling Proactive Self-Healing by Data Mining Network Failure Logs | |||||||||||
Page(s): | 21-28 | ||||||||||
Author | Panthagani Vijaya Babu, Jajjara Bhargav Ramudu, Narne Srikanth | ||||||||||
|
Network Routing Protocols in IOT | |||||||||||
Page(s): | 29-33 | ||||||||||
Author | Alahari Hanumat Prasad, T.Hema Bharat | ||||||||||
|
Cryptanalysis of Modified Caesar Cipher using Rectangular Method for Enhanced Security - A Chosen Plaintext Attack | |||||||||||
Page(s): | 34-36 | ||||||||||
Author | Bhuvaneswari. J, Lakshmi Rishitha. V, Sandhya Rechal. K, Ravi Shankar. N | ||||||||||
|
Comprehensive Analysis of Various Rough Set Tools for Data Mining | |||||||||||
Page(s): | 37-42 | ||||||||||
Author | Alekhya Cherukri, Madhuri Doguparthi | ||||||||||
|
Data Mining Technique for Reduction of Association Rules in Distributed System | |||||||||||
Page(s): | 43-46 | ||||||||||
Author | Satyanarayana Challa, Dhana Lakshmi Popuri | ||||||||||
|
Knowledge Discovery, Analysis and Prediction in Healthcare using Data Mining and Analytics | |||||||||||
Page(s): | 47-50 | ||||||||||
Author | Srinivasa Durga Prasad G., Siva Sankar Uppala | ||||||||||
|
Proficient and Susceptible Routing Procedure for VANETs | |||||||||||
Page(s): | 51-54 | ||||||||||
Author | Kiran Kumar Kaveti, K.Jhacny Rani | ||||||||||
|
Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks | |||||||||||
Page(s): | 55-58 | ||||||||||
Author | N. Phani Kumar, Sabitha Jetty, Kurremula Jyothi | ||||||||||
|
Analysis on Big Data Quarrying Algorithms | |||||||||||
Page(s): | 59-64 | ||||||||||
Author | Sk. Mubeena Sultana, B. Nagaeswari | ||||||||||
|
Optimization & Quality of Service Based Routing Protocols for Manet | |||||||||||
Page(s): | 65-69 | ||||||||||
Author | Yallamati Prakasarao, Jagajeevan Nandigama, G Ramachandra Rao, M Markedeyulu | ||||||||||
|
Client Side Encryption and Allocation of Cloud Data for Multiple Owners | |||||||||||
Page(s): | 70-72 | ||||||||||
Author | Anusha Mallireddy, Shaik Mubeena Sultana | ||||||||||
|
Identifying Scalable Data and Increasing Efficiency of Spectral Clustering | |||||||||||
Page(s): | 73-78 | ||||||||||
Author | Sk Najmus Sahar, P Vijayababu | ||||||||||
|
Performance Appraise of Data Mining Classifiers from Bayes, Function, Lazy, Rule and Tree Family for Video Classification Using Linde Buzo Gray Vector Quantization Codebooks | |||||||||||
Page(s): | 79-82 | ||||||||||
Author | Manasa Kavuri, Soujanya Kumari Maddu | ||||||||||
|
Prediction for Satellite Communication Based on Data Mining | |||||||||||
Page(s): | 83-86 | ||||||||||
Author | K.Pratap Joshi, D.Ramya Krishna, P. Vijaya Babu | ||||||||||
|
Discovery of Ranking Fraud for Mobile Apps | |||||||||||
Page(s): | 87-90 | ||||||||||
Author | K.Bhavani, K. Ramesh Babu | ||||||||||
|
Securing Photo Sharing Mechanism with User Granted Permissions on Social Network Data | |||||||||||
Page(s): | 91-93 | ||||||||||
Author | Kunchala Jaya Lakshmi, Shaik Mubeena Sultana | ||||||||||
|
Lightweight Feature Selection Methods Based on Standardized Measure of Dispersion for Mining Big Data | |||||||||||
Page(s): | 94-99 | ||||||||||
Author | Arun Kumar Pulipaka, Swathi Odugu | ||||||||||
|
Understanding Short Cipher Text by using CP-ABE Encryption Technique | |||||||||||
Page(s): | 100-104 | ||||||||||
Author | Ravi Kumar Pole, Ramesh Karyamsetty | ||||||||||
|
Detecting Malicious Facebook Applications | |||||||||||
Page(s): | 105-121 | ||||||||||
Author | G K Kishore Babu, G Bharath Kumar, K Aruna Kumari, M Markendeyulu | ||||||||||
|
A Symmetric Key Broadcast Encryption (ASKBE) for Transferring data Over Dynamic Group Members | |||||||||||
Page(s): | 122-125 | ||||||||||
Author | Jasty Venkateswarlu, Miriyala Markandeyulu | ||||||||||
|
Booster in High Dimensional Data Classification | |||||||||||
Page(s): | 126-129 | ||||||||||
Author | G. Shiva Kumar, M. Markandeyulu | ||||||||||
|
Removing Auditor for Verification of Users Data using Deniable ABE | |||||||||||
Page(s): | 130-133 | ||||||||||
Author | D.Sukanya, K. Kiran Kumar | ||||||||||
|
Identifying Fraud Apps in Social Networks | |||||||||||
Page(s): | 134-138 | ||||||||||
Author | Maram Anusha, B. Nagaeswari | ||||||||||
|
Computerized Isolation and Little Privilege in Net Assistances | |||||||||||
Page(s): | 139-155 | ||||||||||
Author | P.Subba Rao, Sk. John Sydulu, Ch.Jyosthna Devi, M Markendeyulu | ||||||||||
|
Mining User Aware Rare Sequential Topic Pattrens In Document Streams | |||||||||||
Page(s): | 156-159 | ||||||||||
Author | A Pavani, Ayyappa Chakravarthi | ||||||||||
|
Efficient Way of Retrieving Users Secure Data in Cloud Using Multi Keyword | |||||||||||
Page(s): | 160-163 | ||||||||||
Author | Munneli Sri Kavya, Ayyappa Chakravarthi M | ||||||||||
|
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data | |||||||||||
Page(s): | 164-170 | ||||||||||
Author | G Pavani, M Ratna Raju, Sk Shabbir Hussain, M Markendeyulu | ||||||||||
|
DNA Probe Signal Processing for identification of Abnormal Gene Regulation and Pathogenetic Understanding - A Data Mining Approach | |||||||||||
Page(s): | 171-178 | ||||||||||
Author | Akhilesh Reddy Male, Vaibhav Reddy G J N | ||||||||||
|
Implementation of Robust Video Object Steganographic Mechanism over Wireless Networks | |||||||||||
Page(s): | 179-183 | ||||||||||
Author | Katragadda Kalyani, K. Senthil Kumar, D. Malathi, J. D. Dorathi Jayaseeli | ||||||||||
|
Qos Service Management Scheme for Increasing Profit for Cloud Users | |||||||||||
Page(s): | 184-187 | ||||||||||
Author | T.Bhavani, K.Kiran Kumar | ||||||||||
|
Minimizing Data Loss in Fraud Environment | |||||||||||
Page(s): | 188-191 | ||||||||||
Author | Gopidesi Hema Latha, Alahari. Hanumat Prasad | ||||||||||
|
A Secure Scheme for Identifying and Verifying Origin Forgery in Wan Networks | |||||||||||
Page(s): | 192-195 | ||||||||||
Author | Shaik.Jameer Khasim, Bodapati Nagaeswari | ||||||||||
|
A Cellular Logic Array Based Data Mining Framework for Object Detection in Video Surveillance System | |||||||||||
Page(s): | 196 | ||||||||||
Author | Nagarjuna Gorantla, Bhavitha Priya Maddineni | ||||||||||
|