AUGUST VOLUME 3 – ISSUE 3 (AUGUST 2017) A Method IBE Interfaced With Private Key Generation and Public Key Infrastructure to Achieve High Data Security Alaa Sahl Jaafer & amp; Abdali Abdulkareem Abdali Expand the Association Rule Mining Technique for Finding Related Medication to Risk of Diabetes Yegireddy Anil Kumar & Konni Srinivasa Rao An Efficient Secure End to End Routing Protocol Based on Authentication and Encryption for wireless Sensor Network Telugu Ramaraju & Chintada Sunil Kumar An Optimal Output Feedback Controller Design Method for the Load Frequency Control of A Realistic Power System with Multi-Source Power Generation K.Jeevana & Mr.B.Naga Raju A Novel Method to Manage Direct Flux and Torque Control of Induction Motor Drive using PI and Fuzzy Logic Controllers I Mohan Rao & Mr.B.Naga Raju An Efficient UPF Rectifier for a Stand-Alone Wind Energy Conversion System P Venkateswarlu, D.Sivanaga Raju & Mr.B.Naga Raju Role of Artificial Intelligence in Cyber Security Jagadeeshwar Podishetti & Kadapala Anjaiah