By using the power aware heterogeneous routing protocol to establish routes between heterogeneous nodes. Protocol used to analyze the nodes residual energy and power cost. The existence of multiple routes between nodes, selecting the node with less power consumption is used to select the appropriate route to maintain interoperability between nodes. The source to destination communication...
Paper Information
Authors K S Ranjith
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 30

Creating any standard protocol having 2 or more QoS limitations might be described as an NP-complete. Swarm technology is used to solve such problem. Even so, to fix difficult problems using swarm algorithms, how many iterations essential is going to be proportional for you to problem complexity. In this a standard protocol is presented depending on hybrid swarm algorithm standard protoc...
Paper Information
Authors L.Yoga Vishnu, V.V. Rama Prasad
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 23

The mobile ad-hoc networks (MANET) are infrastructure less and decentralized group of mobile nodes where the routers and mobile hosts are connected over wireless links. In MANET, nodes communicate with each other using multi-hop communication system. The nodes and routers are free to move within the network and it is a difficult task to maintain the network topology as it changes every t...
Paper Information
Authors P. Kranthi Kumar,Dr. V. V. Rama Prasad
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 40

Distributed Denial-of-Service (DDoS) assaults are a developing danger crosswise over Internet, disturbing access to Information and administrations. Presently days, these assaults are focusing on the application layer. Aggressors are utilizing systems that are exceptionally hard to recognize and relieve. In this task propose another technique to recognize AL-DDoS assaults. This work sepa...
Paper Information
Authors R.Sreenath, E.S.Phalgunakrishna
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 14

As with the progression of the IT technological innovation, the quantity of gathered information is also increasing. It has led to lots of information saved in information source, manufacturing facilities and other databases. Thus the Data exploration comes into picture to discover and evaluate the information source to draw out the interesting and previously unidentified styles and rule...
Paper Information
Authors Manisha Kundal, Dr. Parminder Kaur
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 35

Medical imaging is widely used in detection of tumors and other diseases. In medicine, the enormous use of digital imaging, the quality of images becomes an important issue. The basic problem found in it is the introduction various kinds of noises whose removal becomes difficult. The technologies are working on civilizing the excellence and resolution of images but these forms as one of ...
Paper Information
Authors Manasi Rana
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 19

Steganography helps in communication of secured data in several carries like images, videos and audio. It undergoes many useful applications and well known for ill intentions. It was mainly proposed for the security techniques in the increase of computational power, in order to have security awareness like individuals, groups, agencies etc. The factors that are separated from cryptograph...
Paper Information
Authors Dr. M Kameswara Rao, Pradeep Reddy K, Eepsita Saranya K
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 16

Cloud computing has recently emerged being a compelling paradigm that pertains to managing and delivering services over the web. The particular prevalent problem connected with cloud is confidentiality, security, as well as reliability etc., in which how the cloud provider assures. To recognize this, a novel architecture is usually introduced that will integrates cloud database services ...
Paper Information
Authors P Jagadeeswaraiah, M.R. Pavan Kumar
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

Here in this paper we devised a novel orthogenesis evolution based GA technique for QoS fitness scope aware routing in Mobile Ad hoc Networks. The past decade research towards route discovery strategies for mobile ad hoc networks is continuing with magnitude speed. However, the majority of the routing solutions devised in past are dealing only with the optimality of the data transmission...
Paper Information
Authors M.L.Ravi ChandraDr.P.Chandra Sekhar Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 10

This paper presents the MRI brain diagnosis support system for structure segmentation and its analysis using spatial fuzzy clustering algorithm. The method is proposed to segment normal tissues such as white Matter, Gray Matter, Cerebrospinal Fluid and abnormal tissue like tumor part from MR images automatically. These MR brain images are often corrupted with Intensity Inhomogeneity arti...
Paper Information
Authors Mohammed Rifaie Mohammed, Prof. E. Sreenivasa Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 34