CONTENTS
Volume 5 Issue 2 (Jan-June 2016)



S.No
Paper Title and Name of Author(s)
Page No.

01
Secured Activity Based Authentication System
Y Ragavendra Rao, Annapurna G, Ravindra Ch, T Janrandhan Rao
01
02
A Uniform and Efficient Algorithmic approach for Allocation and Administration of Distributed Data Processing in Cloud Computing
Muzammil H Mohammed , Faiz Baothman
05
03
Deploying Journaling File Systems Using Secure Models
T. Sai Vara Prasad, A. Kavitha, J. Naresh Kumar
11
04
Vulnerability Analysis and Network Intrusion Detection of Application Layer Using KDD Data Set
Swarnjeet kaur , Harmandeep Singh
16
05
An Efficient Churn Mining Using Particle Swarm Based Boosted Tree
Sarbinder Pal Singh, Kiranbir Kaur, Sandeep Sharma
21
06
A Survey for the Implementation of Information and Communication Technology in Rural Areas
SVP. Raviteja, Manikanta Tallapaka
27
07
Robust Quantum Key Distribution Based on Two Level QRNA Technique to Generate Encrypted Key
Dr. C. Naga Raju, D Praveen Kumar, D.Hussenappa, N. Narendra
30
08
Auditing Shared Data in Cloud through Privacy Preserving Mechanisms: A Survey
Varugu Ramesh Babu, Swetha EnReddy
35
09
Ensemble Based Classification Methods for Twitter Sentiment Analysis
M.Govindarajan
38
10
TCP SACK Protocol Enhancement in Mobile Adhoc Network
Sk Bhadar, Arun Singh Kaurav, Dr. Basant Tiwari, C Rajeev
44