INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING TECHNOLOGY(Volume-6,Issue-2, July - December 2016)
|
Sl.NO | Paper Title | Download |
1. |
Assessment-Allowed Haze Loading Through Deniable Characteristic-Created Cipher Text
P.H.Shiva Kumar and L.Praveen Kumar |
|
2. |
Manipulator-Distinct Secrecy Network Scheme for Incessant Position-Grounded Facilities
I.Vinod Kumar and L.Praveen Kumar |
|
3. |
A Calculation Active Conviction Prototypical for Consumer Permission
S.Thirupathi Reddy and Koganti Bhavani |
|
4. |
Discretion-Protective and Straight Discovery of Container Rising Rounds Trendy Wireless Ad-Hoc Nets
Degavath Raju and L.Praveen Kumar |
|
5. |
Measurement Configuration Shredding for Effective Duplicate Hunt
Mohammad Rubeena and Koganti Bhavani |
|
6. |
A Viscount-To-Viscount Founded Enormous-Weighbridge Documents Treating Stage
Manish Chandra Singh and L.Praveen Kumar |
|
7. |
Tolerant Replacement Recognition
N.Narrahari Singh |
|
8. |
Regionalized Admittance Regulator Through Unidentified Verification of Information Deposited Now Gasses
Nalla Anil Kumar |
|
9. |
A Method for Face Analysis and Recognition of Face Expression
D. Mounika |
|
10. |
An Effective Method for Understanding Multi level Server in Cloud Environment
K. Raghava Raju |
|
11. |
Improvised Technique for Telugu Text Summarization using Maximal Marginal Relevance technique
Sudi Ravi Kumar and Dr.S.K.Mohan Rao |
|
12. |
Phase Congruency
V.E.Chandra Sekhar and Dr NSSR Murthy |
|
13. |
An Approach to Identify the Grievance and its Handling Procedure
Swarnalatha Malyala |
|