Karnam Sreenu

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
w w w . i j c s t . c o m Abstract In this paper, we present Services which are identified during Service-Based System Design using UML. Recently, there has been a proliferation of service-based systems, i.e., software systems that are composed of autonomous services but can also use software code. In order to support the development of these systems, it is(More)
w w w . i j c s t . c o m Abstract Audio information stored in the undulations of grooves in a medium such as a phonograph record may be reconstructed, with no or minimal contact, by measuring the groove shape using precision metrology methods and digital image processing. The effects of damage, wear, and contamination may be compensated, in many cases,(More)
One of the important steps in cloud computing is the task scheduling. The task scheduling process needs to schedule the tasks to the virtual machines while reducing the makespan and the cost. Number of scheduling algorithms are proposed by various researchers for scheduling the tasks in cloud computing environments. This paper proposes the task scheduling(More)
w w w . i j c s t . c o m Abstract With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities and states throughout the U.S. are adopting paperless electronic voting systems from a number of different vendors. We present a security analysis of the source code to one such machine used in a(More)
w w w . i j c s t . c o m Abstract Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. While this transformation has driven major advancements in efficiency and safety, it has also introduced a range of new potential risks. In this(More)
Salinity induced physiological changes were investigated in two BC2F6–7 high yielding rice introgression lines (ILs) derived from advanced backcross populations of O. sativa (IR58025A/KMR3) × O. rufipogon. Plants were subjected to 150 mM NaCl treatment throughout the germination stage to early seedling stage for 10 days. The study revealed high root(More)
w w w . i j c s t . c o m Abstract A web-based stock prediction system is developed based on a fuzzy neural network by using the past stock data to discover fuzzy rules and make future predictions. The learning algorithm is implemented. Input data to each network are the moving averages of the weekly stock data, which are obtained from [Online] Available(More)
w w w . i j c s t . c o m Abstract Networks become more complex practically in terms of offered services such as electronic commerce. As a result, networks are more and more subject to various kinds of complex security attacks. Existing security system responses have reached their limits in detecting and defending against various network attacks because(More)
  • 1