Welcome to Research Scholars for Submission of Latest Volume-8, Issue-3 for November-December 2023

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING Jul-Aug 2014 Volume-4, Issue-4

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1Data Extraction User Used Information In Online
Shaik Sher Ali , Shahida Shaik
IJRCSE/V4/4-801Download
2Balanced Usage of Provable Data Possession (PDP) in Cloud for Effective Functioning
I.Naresh, G.Mallikharjuna Rao
IJRCSE/V4/4-802Download
3Minersoft and its Features for Efficient Working of Cloud
Narne Srikanth, E.Sambasiva Rao
IJRCSE/V4/4-803Download
4Effective Controlling of Video Traffic by using Scalable Video Code
D.Prasannanjaneyulu, K.Swarooparani
IJRCSE/V4/4-804Download
5Dynamic Mobile Streaming in Cloud Mov for Encoding Services
D.Venkatesh Babu, E.Sambasiva Rao
IJRCSE/V4/4-805Download
6Dynamic Authentication for Virtual Machine in Cloud Computing using SIP Servers
M. Radhika, SK.Shahida
IJRCSE/V4/4-806Download
7Attribute-Based Encryption for Access Control of Outsourced Data in Cloud Computing
A. Adi Lakshmi, K. Sudhakara Babu
IJRCSE/V4/4-807Download
8Functional Usage Observation Node Position In Wireless Sensor Networks
B.Prathusha , E.Sambasiva Rao
IJRCSE/V4/4-808Download
9Dynamic Crowd Sourcing using Active Learning Approach
I.Sruthi, N. Hari Krishna
IJRCSE/V4/4-809Download
10Dynamic GPS Settings in User Search Histories
P.Lakshminarayana, G.Mallikharjuna Rao
IJRCSE/V4/4-810Download
11Extracting Feedback Process Generation In Customized System Operations In Online Social Networks
M.Radhika, N.Hari Krishna
IJRCSE/V4/4-811Download
12Preventing Unauthorized Information Inference Attacks on Social Networks
K.Praveena, K.Swaroopa Rani
IJRCSE/V4/4-812Download
13Dynamic Message Authentication in OSN Networks
D.Nalini, K.SudhakaraBabu
IJRCSE/V4/4-813Download
14Information Security Using Cryptography Techniques In Steganography Applications
K.Pavani Srivalli, E.Sambasiva Rao
IJRCSE/V4/4-814Download
15A Synchronized Processing on Vampire Attacks Using MAC Protocols
S. Bala Gopala Raju, N. Veeranjaneyulu
IJRCSE/V4/4-815Download
16Maintains Construction Development Through Predictability Study
N.Avinash, N.Veeranjaneyulu
IJRCSE/V4/4-816Download
17Cross Domain Privacy Preserving Firewall Optimization Using Secure Multi-Party Computation In Networks
Raghavendrao. Birapuneni, N. Hari Krishna
IJRCSE/V4/4-817Download
18Safety Locate Formations Identification System For Improvised Mobile Wireless Networks
Kethineni Satyanarayana, N. Hari Krishna
IJRCSE/V4/4-818Download
19A Secure Multi-Hop Routing In Wireless Sensor Networks
K.Saidi Reedy, N.Satish
IJRCSE/V4/4-819Download
20Improved AFAST Clustering based FeatureSelection using Genetic Algorithm
Y. Siva Kumar, G. John Samuel Babu
IJRCSE/V4/4-820Download
21Implementing characteristic Selection Algorithm for High Dimensional Data Using Self-Supervised Learning and Fuzzy Logic
Kulkarni Tejaswini, Lalitha Manglaram
IJRCSE/V4/4-821Download
22Multidimensional Reduction Principal Component Analysis for Anomaly Detection
V.Neelima,G.L.Sravanthi, V.Tejaswi
IJRCSE/V4/4-822Download
23An Effective Classification System to Detect Packed and Encrypted Malware
C.Deepika, A.Swarna, Ravi Mathey
IJRCSE/V4/4-823Download
24Information Security Using Human Visual System Model in Steganography Applications
P.kiranmaie, R.Phani Kishore
IJRCSE/V4/4-824Download
25A Review of Implementing Web Mining and Knowledge Discovery of Usage Patterns for Personalization and Usage Mining
Gujarathi Alaikya, Anitha sri ramoju
IJRCSE/V4/4-825Download
26Micro data Protection Using Tuple Grouping Components
Mundru.Govindarajulu, Jetty Kiran Kumar, M. Swati
IJRCSE/V4/4-826Download
27Solving Optimality and Storage Constraint Problem in Data Staging using Dynamic Programming
B.Naga Anusha, M. Narasimha Raju
IJRCSE/V4/4-827Download
28Secured Query Processing By Optimizing Performance Factors
P. S. S. N. Madhuri, P. J. R. Shalem Raju
IJRCSE/V4/4-828Download
29Dynamic Site Distribution and Factor Balancing for Privacy Preserving Information Brokering
Siva Sankar Siripurapu, T.Nirosh kumar
IJRCSE/V4/4-829Download
30Providing Security in Public Auditing for Cloud Storage
P.Neelima, B.Rajini Kanth
IJRCSE/V4/4-830Download
31An Efficient Security Scheme against Vampire Flacks in Ad Hoc Sensor Networks
Dr S.V.N.Srinivasu
IJRCSE/V4/4-831Download
32Trickling of Undesirable Messages in Online Social Networks Using Content based Message Filtering and Short Text Classifier
Dr S.V.N.Srinivasu
IJRCSE/V4/4-832Download
33Association rule mining based on Product Sales Algorithm
Sampath Kumar Kommineni, S.N.Tirumala Rao
IJRCSE/V4/4-833Download