Professional Approach

Any situation. He tells you is a game at the very requirements.

Precise Methods

Any situation. He tells you is a game at the very requirements.

Mesurable Results

Any situation. He tells you is a game at the very requirements.

Previous Issue

S.NO
Title/Author (April-June-2013)
PAGE NO.
PDF
1
A STUDY OF ESSENTIAL LEARNING, SKILLS TOWARDS LEADERSHIP DEVELOPMENT AND TALENT MANAGEMENT ARE NOT FOR RICH POSITION OR STATUS
N Subbu Krishna Sastry
91-100
2
LOW-POWER AND AREA-EFFICIENT CARRY SELECT ADDER.
V.Hari Prasad*1, Dr. L. Rangaiah2
101-106
pdf
3
CORPORATE SOCIAL RESPONSIBILITY (CSR) AND ITS COMPLIANCE BY MAHARATNA AND NAVARATNA CPSES IN INDIA .
Bidhu Bhusan Mishra*1, Mahendra Kunku2
107-114
4
A STUDY ON ISSUES PERTAINING TO INTERNAL PROMOTION OF EMPLOYEE, RELATED TO WORKPLACE HARASSMENT AND TALENT MANAGEMENT. .
N Subbu Krishna Sastry
115-121
5
ICA BASED FACE RECOGNITION: APPLICATIONS.
Meenakshi Ad*1, Prof. Prashant Jain2
122-127
6
ENHANCING REVERSIBLE DATA HIDING SCHEMES FOR MARKED COVERS. .
Kanthi Kiran Karasla*1, Syed Akhtar2, P.Babu3
128-136
7
A SECURE ERASURE CBCS SYSTEM WITH DATA FORWARDING TECHNIQUE.
K.Srinivasa Murthy1, B.Ramesh Babu2
137-141
8
DETECTING SEQUENTIAL IRREGULARITY THROUGH FILTERING AND HEDGING. .
Sudeep Samuelson Ezra*1, Syed Akhtar 2, P.Babu3
142-146
9
Generic Lossless Visible Watermarking.
K.Sundeep*1, P.Muna Swamy2
147-151
10
SEPARABLE REVERSIBLE INFORMATION TROUNCING IN ENCRYPTED IMAGE. .
Ch.D.Sunil Kumar*1, B.Ramesh Babu2
152-158
11
SPHIT ALGORITHM COMBINED WITH VARIABLE LENGTH ENCODER TO ENHANCE THE PERFORMANCE OF THE IMAGE COMPRESSION TECHNIQUE.
Venkateshu V C*1, M.Muralidhar2
159-161
12
ADAPTIVE OVERLAP-AND-ADD TECHNIQUE IN MB-OFDM BASED UWB RECEIVER DESIGN .
G VENKATESH*1, K SAGAR REDDY2
162-167
13
Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing .
k.venkateswarlu*1, K.Venkata subbaiah2
122-127
14
SYSTEMATIC DETECTION AND RESOLUTION OF FIREWALL POLICY ANOMALIES .
SHAIK NAZEER BASHA*1, SK.KARIMULLA2, P.BABU
128-136
15
TRADITIONAL GROUP BASED POLICY MANAGEMENT APPROACH FOR ONLINE SOCIAL NETWORKS .
G.CHANDRA SEKHAR*1, SK.KARIMULLA2, P.BABU3
137-146
16
Defend seclusion against Location based personal recognition in mobile services .
A.Nagarjuna*1,CH.Subbarao2, P.BABU3
147-161
17
Online Modeling of Proactive Moderation System for Auction Fraud Detection .
Joel Srideep Bandi*1,Abdul Haq2
162-170
18
Detecting Flash Crowds Using Traffic Pattern .
Sirish Kumar.M*1,SYED AKHTAR2
171-177
19
COMPATIBLE MAPPING OF COMMON FIXED POINT THEORY IN METRIC SPACES.
C.S.Chauhan
178-185