ISSN 2229-3515
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTER, ELECTRICAL AND ELECTRONICS ENGINEERING
Volume: 01 Issue: 01 October 2011 – March 2012
CONTENTS
| 1. Extreme Programming (XP) Metaphor Evaluation and Architecture | 1-5 |
| Phani Krishna, Ch and Dr. Rajasekhar Rao, K | |
| 2. Data Replication Techniques in Mobile Adhoc Networks | 6-10 |
| Mohammed Qayyum., Subhash, P and Dr. Md. Ekramul Hamid | |
| 3. Query Extraction by using Concept and Click Based Methods | 11-15 |
| Prakash Reddy, G., Vinay Kumar, B., Ajay Kumar, J., Dr. Raja Prakash Rao, P | |
| 4 .Cache for Peer-to-Peer (P2P) Networks with Layered Design | 16-20 |
| Mamatha, P., Vinod Kumar, P and Dr. Srinivasa Kumar, C | |
| 5 .The dominating-set-based routing technique in ad hoc networks | 21-25 |
| Pratap Singh, S., Swapna Sri, S., Anupama, Ch and Satish, R | |
| 6. Classification of the Data Mining Algorithms and its Uses | 26-29 |
| Srikanth Yadav , M., Satya sree, KPNV, Ranjith Kumar,Ch and Dr. Naganjaneyulu, K, V., | |
| 7. Software, Platform and Infrastructure as a Services in Cloud Computing | 35-40 |
| Kiran Kumar,KRN, Srilatha,V., Rajesh,GV., Satish Kumar,K & Ashok Kumar,I | |
| 8. A New Hybrid Active Power Filter with Injection Circuit and Fuzzy Generalized PI-Control Method | 41-47 |
| Teja Sreenu, T., Koti Reddy, G., Srinivasa Rao, N., Girinath Babu, K., Kishore Kumar, N | |
| 9. Application of DSP DWT and Genetic algoritham based fault classification of transmission system and restoration of uninterrupted power supply | 48-54 |
| askar Reddy, B., Maheswari, L., Rajagopal, K., Amarendra, M | |
| 10. Shortest Path Routing in networks & its security | 55-59 |
| Ajay Kumar, J ., Mohammad Umar and Syed Rehmath | |
| 11. A Robust Video Watermarking With Digital Design | 60-66 |
| Uma Sankar,Ch., Gopala Krishna,M., Neelima,S & Ranga Rao,Orugu. | |
| 12.On Line Analytical Processing (OLAP) Cube and its Queries | 67-70 |
| Pavan Kumar, Y., Ravi Kumar, T and Saritha, M | |
| 13. Opinion mining with the Hourglass of Emotions Model | 71-74 |
| Ajay Kumar, J., Kiran Kumar, K and Nirusha, M | |
| 14. Security Constraints in Cloud Computations | 75-80 |
| Srinivasa Rao, K., Dr.Shaik Nazeer and Kiran Kumar, N | |
| 15. Whole–Local Method Implementation for Water Body Detection in Landsat Images | 81-85 |
| Praveen Kumar, B., Jayaprakash, P and Durga Rao, P | |
| 16. Key Management Protocols for the Security of the Networks | 86-89 |
| Dr. Raja PrakashaRao, P., Suresh, K and Kiran Jetty | |
| 17. Investigation of Combustion Parameters for different Injection timings on a LHR Extended Expansion Diesel Engine | 90-95 |
| Siva Kumar, Dr. Maheswar, D and Dr. Vijaya Kumar Reddy, K |




