8978425042,

Info.ijiemr@gmail.com

S.NoTitlePage NoDownload
1 An Improved Privacy Policy Inference over the Socially Shared Images
Authors: A.MAMATHA, M.SHIRISHA
01 to 15 Download
2 PACKET CLASSIFICATION WITH LOW MEMORY CONSUMPTION
Authors: K.BRAHMA CHARY,B.SARITHA
16 to 34 Download
3 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
Authors: Ch.SRINATH, K.SRINIVAS
35 to 47 Download
4 Content Caching and Scheduling in Wireless Networks
Authors: R.JYOTHSNA, CH.RAVINDER
59 to 64 Download
5 Design A Highly Efficient Image Encryption The Compression System Using Lossless and Lossy Compression
Authors: K.RAJU, MR.N.PRASAD
65 to 76 Download
6 AN ADVANCED SCALABLE AND RECIABLE CONTENT MATCHING SERVICE FOR PUBLISH SUBSCRIBE SYSTEM
Authors: S.KAVYA, R.VARUN
77 to 87 Download
7 Data Sharing in Cloud Storage Using Key Aggregate Cryptosystem
Authors: M.SHALINI, P.MAIPAL REDDY
88 to 95 Download
8 Secure and Efficient Data Retriveral Over Encrypted Data Using Attribute Based Encryption Cloud Storage
Authors: N.RAJESH, K.REKA DEVI
95 to 106 Download
9 Control and Manage of Cloud and Sensor Networks Integration
Authors: SALEHA NASREEN, K.SHEKAR
107 to 116 Download
10 A Routing Protocol for Improving QOS in Hybrid Wireless Networks
Authors: P.ANUSHA, SHAILAJA
117 to 126 Download
11 Improving Multicast Capacity in Infrastructured Ad hoc Networks
Authors: K.RAJA SHEKAR, R.VARUN
127 to 138 Download
12 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
Authors: B. Sai Chander, A. Ramesh Babu
139 to 147 Download
13 A Novel Distributed Load Balancing in Content Delivery Network
Authors: N.SRIKANTH, S.THARUN REDDY
148 to 162 Download
14 The Two Level Auditing Architecture for Cloud Consistency
Authors: N.UGENDER, K.SRINIVAS
163 to 173 Download
15 COLLABORATIVE FILTERING BASED ON OBJECTIVE TIPICALITY FOR NEIGHBOUR RECOMMENDATION
Authors: A. MUKESH, Mr. B. SRAVAN KUMAR
01 to 09 Download
16 A Tamper-Proof Delegation of Computational Work to Remote Servers in Cloud With Policy Attribute-Based Encryption
Authors: T.Annapurna, Mr.K.Goutham Raju
10 to 17 Download
17 Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner
Authors: T. ANUSHA, Dr. T. SRINIVAS CHARY
18 to 29 Download
18 Multivariate Correlation Analysis Based Denial of Service Attack Detection System
Authors: D.ASHWINI
30 to 42 Download
19 Optimizing the Capacity of Hybrid Wireless Network Using Distributed Three hop Routing Protocol
Authors: M.ASHWINI,Mr. K. BHANU PRASAD
43 to 49 Download
20 Cost effective dynamic migration of content into hybrid clouds
Authors: B.BHAVANI,B.SRAVAN KUMAR
50 to 62 Download
21 ACHIEVING DATA CONSISTENCY THROUGH QUERIES
Authors: N.Navya Deepthi, B.Saritha
63 to 76 Download
22 An Online Vacation Package Recommendation System
Authors: Md.Asma Kousar,A.Madhavi
77 to 87 Download
23 Anonymous Authentication Using Cloud Based Decentralized Access Control Scheme
Authors: K.SHIRISHA, A.SWETHA
88 to 93 Download
24 An Advance Scalable & Reliable Matching Service For Content Based Systems
Authors: N.SRAVAN KUMAR,Dr.V.JANAKI
94 to 101 Download
25 A Novel Family of Graphical Password Systems Integrating Captcha Technology
Authors: P. DIVYA,Mr.K.GOUTHAM RAJU
102 to 115 Download
26 Public Key Cipher Scheme For Rapid Keyword Search
Authors: G.HARIKA,M.SWAPNA
116 to 130 Download
27 A Security Model for Protecting Location Based Queries
Authors: N.PRASANNA,K.MAHESH
131 to 142 Download
28 To create convincing fake user secrets to protect user privacy
Authors: N.NISHMA,Mr.B.Krishna
143 to 149 Download
29 An Approach for Preserving Privacy of Shared Data in the Cloud
Authors: R.BHARATH, E.PRAVEEN
150 to 160 Download
30 Designing High Performence Web Based Computing Services To Promote Tele Medicine Database Management System
Authors: V.SAHITHI,M.SWAPNA
01 to 12 Download
31 Maximizing P2P File Access Availability in Mobile Ad hoc Networks through Replication for Efficient File Sharing
Authors: A. Sirisha,P. Shailaja
13 to 23 Download
32 Automatically Diversifies XML Keyword Search
Authors: S.Sreedhari Sharma,B.Krishna
24 to 30 Download
33 Protecting Outsourced Data in Cloud Storage against Corruptions
Authors: M.Swathi ,G.Aruna Kranti
31 to 39 Download
34 A Novel Approach for Protecting Location Information in Geosocial Applications
Authors: SYEDA SOBIA FAREES ,M.SURESH KUMAR
40 to 44 Download
35 Distortion Detection and Rectification in Fingerprint Based Security Systems
Authors: V.SRAVANI,N.PRASAD
45 to 53 Download
36 DESKTOP BASED EYE TRACER
Authors: E.VARUN,M.SUKESH
54 to 62 Download
37 HLA Based Public Auditing Architecture for Wireless Ad hoc Networks
Authors: YOUSUF ANEESA,B.RAJITHA
63 to71 Download
38 A Novel Based Friend Recommendation System for Social Networks
Authors: B.RAMYA SREE ,N.RAJENDER REDDY
72 to 80 Download
39 Competition of Efficient Data Access in Disruption Tolerant Networks
Authors: A.Spandana,K.Rajesh Khanna
81 to 90 Download
40 IDENTIFYING IDEAL CLOUD SERVICE PROVIDER
Authors: T.SRIVIDYA , THANVEER JHAN
91 to 100 Download
41 Online Shortest Path Computation
Authors: K.Saresh ,A.Madhavi
101 to 113 Download
42 Discriminative Affinity Based Effective Face Detection
Authors: Ch. HIMABINDU,G.RAMKRISHNA REDDY
48 to 58 Download
43 An Optimized Design of High-Speed and Energy- Efficient Carry Skip Adder with Variable Latency Extension operating under a wide range of supply voltage levels
Authors: Md. KURSHEEDA AFREEN, Mr. T. SAMMAIAH,Mr. G.BABU
174 to 184 Download
44 Optimized Test compression bandwidth management for Ultra-large-Scale System-on-Chip Architectures performing Scan Test Bandwidth Management
Authors: P.ANNAPURNA ,Mr.T.RAJASHEKAR ,Mr.G.BABU
185 to 195 Download
45 An Algorithm to Implement Combinational Logic Cells with Reduced Number of Switches
Authors: B.Swathi ,Mr.B.Balaji,Mr.M.Devadas
196 to 205 Download
46 Implementation of Dual Modulus Prescaler in True Single Phase Clock (TSPC)
Authors: Ch.Priyanka,Mr.K.Thirupathi,Mr.M.Devadas
206 to 212 Download
47 An Overview of Fault Models and Testing Approaches for Reversible Logic
Authors: D.MOUNIKA ,Mr.Ch.ANIL KUMAR
213 to 232 Download
48 Enhanced Penta MTJ Based Combinational and Sequential Circuits
Authors: K.LATHA SRI,B.HARI KRISHNA
233 to 243 Download
49 CMOS REALIZATION OF LOW POWER MIXING DRIVERS IN CLOCK TREE
Authors: M.RADHIKA ,B.SANTHOSH KUMAR ,T.SAMMAIAH
244 to 256 Download
50 Design of Reversible LFSR for Cryptographic Application
Authors: O.Swapna ,G.Babu
257 to 266 Download
51 Efficient Implementation of Non-binary Low Density Parity Check (LDPC) Decoder in VLSI
Authors: S.Sahaja,Mr.B.Ranjith Kumar,Mr.M.Devadas
276 to 290 Download
52 Enhanced Vlsi Architecture For Montgomery Modular Multiplication In Digital Filters
Authors: E.Shirisha , D.SrinivasRao,Mr.G.Babu
291 to 302 Download
53 VLSI Implementation of Reconfigurable Low Power Fir Filter Architecture
Authors: A.SUDHA RANI,U.RAJITHA
303 to 311 Download
54 Design of An Efficient Aging-Aware Reliable Multiplier Based On Adaptive Hold Logic
Authors: V.SUSMITHA,P.RAJANI
312 to 323 Download
55 An Optimized Design of High-Speed and Energy- Efficient Carry Skip Adder with Variable Latency Extension
Authors: S.SWATHI,B.SHIVA KUMAR
324 to 334 Download
56 Power Optimized Implementation of PRPG with Low Transition Test Compression Technique
Authors: B.Udayini,Mr.M.Mahesh,Mr.M.Devadas
335 to 353 Download
57 Input-Based Dynamic Reconfiguration of Video Encoding by Approximate Arithmetic Units
Authors: M. UJWALA,Mr.M.Devadas
354 to 365 Download
58 PERFORMANCE IMPROVEMENT OF OFDM SYSTEM BY USING ICI SELF CANCELLATION TECHNIQUE
Authors: G.PRIYANKA,M.SHIVA PRASAD
366 to 374 Download
59 Pilot-Symbol-Aided Iterative Channel Estimation for OFDMBased Systems
Authors: K.Laxman Reddy,V.Sabitha
375 to 385 Download
60 Implementation of Biomedical Device to Measure Heart Rate and Temperature
Authors: Uzma, K.Raj Kumar
114 to 119 Download
61 Exact Lower Bound for the Number of Switches in Series to Implement a Combinational Logic
Authors: Mr.P.Kiran ,Mr.G.Sakru
01 to 11 Download
62 A Design Approach for Compressor Based Approximate Multipliers
Authors: D.SUNIL SURESH ,P.AISHWARYA
12 to 20 Download
63 Electronic Auto Information quiery System in Educational Institutions
Authors: R.Ramya,G.Koteshwar Rao
30 to 36 Download
64 Control and Measure System from Air Pollution by Co2 Exhaust in Vehicles and ECU
Authors: E. Roja,A. Bharath Kumar
37 to 42 Download
65 Automatic Irrigation System Based On IOT and Embedded Linux High End Processor
Authors: FEROZABHANU,G.RADHIKA
43 to 48 Download
66 PRIVACY-PRESERVING PROTOCOL TO OBTAIN THE SUM AGGREGATE OF TIME-SERIES DATA
Authors: BODA MAHESH , LEELASRAVANTHI
1-8 Download
67 ONLINE BLOOD BANK
Authors: T. Sangeetha, **Ilham Abdullah, ***Farheen Jawed
1-8 Download
68 BUG TRACKING SYSTEM
Authors: *Kashif Hassan,** Md javed khan,***Suraj Kumar
1-7 Download
69 DATA LEAKAGE DETECTION
Authors: *SAIMA FAIYAZ, **M.JYOTHI, ***G.VAISHNAVI
1-8 Download
70 Train Collision Avoidance Using by ARM and Collision Sensor
Authors: T.VENKATA HARSHA **M.RAMU
1-5 Download
71 ddd
Authors: ss
ss Download
72 ddd
Authors: ss
ss Download
73 Implementation of Average based PCA method for Face Recognition
Authors: Suresh ,
1-4 Download
74 hj
Authors: hhj
hjjjjjjjjjjjjjjjjj Download
75 fddd
Authors: sd
ds Download
76 MANAGEMENT INFORMATION SYSTEM FOR TRAINING PROGRAMMES – NAARM EXPERIENCES
Authors: VV SUMANTHKUMAR, 2ABHISHEK G
161-166. Download
77 ry t
Authors: yrbry
btr Download
78
Authors: qqqqqqqq
1 Download
79 A NOVEL METHOD OF RETRIVAL OF NOISY IMAGES BASED ON REDUCED TEXTURE SPECTRUM
Authors: *P. S. V. SRINIVASA RAO **J. AJAY SHARMA
386-398 Download