Welcome to Research Scholars for Submission of Latest Volume-8, Issue-3 for November-December 2023

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING Sep-Oct 2014 Volume-4, Issue-5

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1CSP And Enables Indirect Mutual Trust Between Cloud-Based Storage Scheme
A. Siva Rama Krishna, S. Suresh
IJRCSE/V4/5-901Download
2Complementary To The Privacy-Preserving Public Auditing Scheme
Amgoth Rajkumar, P. Karunakar Reddy, S. Suresh
IJRCSE/V4/5-902Download
3A New Framework For Anonymity In Sensor Networks
Mogili Ranjith Kumar, P. Karunakar Reddy, S. Suresh
IJRCSE/V4/5-903Download
4A New Intrusion-Detection System Named Enhanced Adaptive Acknowledgment
Swamy Ayyappa Jalluri, P. Nageswara Rao, S. Suresh
IJRCSE/V4/5-904Download
5Comprehensive Survey Of Xml Tree Patterns
T Narayana Rao, P. Nageswara Rao, S. Suresh
IJRCSE/V4/5-905Download
6An Optimal Strategy Based On Aspiration-Based Learning
B Venkatesh Mariyadala, P. Nageswara Rao, S. Suresh
IJRCSE/V4/5-906Download
7Mitigating Vendor Lock-In To The Meta cloud
Narasaiah Gallamalla, S. Suresh
IJRCSE/V4/5-907Download
8Efficient Information Retrieval For Ranked Query (EIRQ) Schemes
Satunoori Anil Kumar, P. Karunakar Reddy, S. Suresh
IJRCSE/V4/5-908Download
9Cloud-Based Novel Mobile Social TV System
Vijjineni Praveen Kumar, P. Nageswara Rao, S. Suresh
IJRCSE/V4/5-909Download
10Aloha Algorithm For Neighbor Discovery In Wireless Networks
Rajasekhar Lalichetti, S. Suresh
IJRCSE/V4/5-910Download
11Traverse The Design Space Of Multichannel Peer-To-Peer Live Video Streaming Systems
Spoorthi Pandalaneni, S. Suresh
IJRCSE/V4/5-911Download
12Combined And Differentiated Localization Approach For Localization
Vemireddy Sitharavamma, P. Nageswara Rao, S. Suresh
IJRCSE/V4/5-912Download
13Multimedia Answer Generation by Harvesting Web Information Algorithms
S. Somasekhar, D. Kumar, P. Pedda Sadhu Naik
IJRCSE/V4/5-913Download
14Business Events and Temporal Constraints as aService
S. Lakshmi Devi, D. Kumar, P. Pedda Sadhu Naik
IJRCSE/V4/5-914Download
15Predicate-Based data Sharing on Mobile Network
Y.Bhargavi Devi, D. Kumar, P. Pedda Sadhu Naik
IJRCSE/V4/5-915Download
16Packets Routing by back Pressure based Adaptive Routing in Networks
D. Sivaparvathi, D. Kumar, P. Pedda Sadhu Naik
IJRCSE/V4/5-916Download
17Privacy and Secured Broadcasting In Network Routing Scheme
P. Suresh Babu, D. Kumar, P. Pedda Sadhu Naik
IJRCSE/V4/5-917Download
18Safe Multi Possessor Information Allocation For Vibrant Associations In The Cloud
T. Swetha, B. Thirupathi Kumar
IJRCSE/V4/5-918Download
19Adjust Processing on European folklore Using MAC Protocols
B.CH.Talluri, j.Mahalakshmi
IJRCSE/V4/5-919Download
20Discovery And Verification Of Neighbour Positions In Mobile Unintentional Networks
Sk.Rasool, j.Mahalakshmi
IJRCSE/V4/5-920Download
21 Trading System Based On Bond- Automotive Engineers With Store-and-Forward Manner
Dodda.ChennaReddy, M. Gnana Vardhan
IJRCSE/V4/5-921Download
22MANET Routing Attacks with Risk-Aware Mitigation
P.Nageswara Rao, S. Jalaiah, P.Pedda Sadhu Naik
IJRCSE/V4/5-922Download
23Dynamic Control OF Network Security For Continual, Packet Arrivals In DTNS
Balaji Veluguri, S. Jalaiah, P.Pedda Sadhu Naik
IJRCSE/V4/5-923Download
24Translations User Surveillance Of Node Location In Wireless Sensor Networks
D. Chinna Kasi Reddy, S. Jalaiah, P.Pedda Sadhu Naik
IJRCSE/V4/5-924Download
25Security Analysis Of One Sign-On Mechanism For Distributed Networks
R.Manthru Naik, S. Jalaiah, P.Pedda Sadhu Naik
IJRCSE/V4/5-925Download
26Consideration of Energy Resources for Maintaining Virtual Machines
Y.Deepika, S.Shravani
IJRCSE/V4/5-926Download
27Implementation of Privacy Protection Methods in Online Social Network
Ramidi Santhosh Kumar , P. Kiran Kumar, Ravi Mathey
IJRCSE/V4/5-927Download
28An Approach to Efficiently Maintain Outsourced Cloud Data
D. Vikram Paul, A. Swarna Reddy, Ravi Mathey
IJRCSE/V4/5-928Download
29Using Gene appearance Data for Mining order Preserving Sub matrices
Mahesh Pentela, A. Swarna Reddy, Ravi Mathey
IJRCSE/V4/5-929Download
30Investigation of Insiders Attack Mitigation Strategies in cloud Computing
Nakka Pradeep, P Jagadeeswara Rao, Sayeed Yasin
IJRCSE/V4/5-930Download
31Implementing Advanced Attribute Based Encryption for Content Access in Cloud Assisted Networks
J.Shravan Kumar, Sajja Suneel
IJRCSE/V4/5-931Download
32A Background Subtraction For Visual Surveillance Applications In Security Places
V. Pallavi, A.Nanda Gopal
IJRCSE/V4/5-932Download
33Maximize the network lifetime with minimizing data gathering delay in Wireless Sensor Network
Monica Yaddanapudi, Chaganti B N Lakshmi
IJRCSE/V4/5-933Download
34Providing Security For Cloud Storage With Public Auditing Algorithm In Manets
Togati Rammohan, T.Shankar, M.Laxman
IJRCSE/V4/5-934Download
35Scalable Video Data Streaming And Sharing In Cloud
M. Naresh, D. Sailaja, Ravi Mathey
IJRCSE/V4/5-935Download
36Active Multitude Sourcing using Apriori Algorithm Approach
Srikanth. Bolla, G. Nageswararao
IJRCSE/V4/5-936Download
37Attribute-Based Encryption for Access Control of Outsourced Data
Ch.Harshavardhan reddy, R.V.Kishore kumar
IJRCSE/V4/5-937Download
38A Mining to Filter Unwanted Data from OSN User Walls
T Soujanya, K.Nageswara rao
IJRCSE/V4/5-938Download
39Random Object Detection By Using Background Subtraction
M.Sujitha, Ravi Mathey
IJRCSE/V4/5-939Download
40Energy Aware Priority Packet Scheduling For Wireless Sensor Network
Bhaskarla Sandya Rani, Chaganti B N Lakshmi
IJRCSE/V4/5-940Download
41Efficient Moving Object Detection By Using K-Means Algorithm
Vejandla Srikanth, Jetti Kumar , P. Rambabu
IJRCSE/V4/5-941Download
42Target chase and Mobile sensing element Finding in Wireless Sensor Networks
Ravindrababu Mullapudi, P.V.Naganjaneyulu
IJRCSE/V4/5-942Download
43Objective Uses of possible Facts Asset in Cloud Functioning
Srinivasa Rao Pratti, Goda Srinuvasa Rao
IJRCSE/V4/5-943Download
44Design Based Pre- Distribution Schemes for Wireless Sensor Networks Using Scalable key
P.N.Siva Rama Krishna Pilla, P.V.Naganjaneyulu
IJRCSE/V4/5-944Download
45Effective Usage Detection Of Node Location In Wireless Sensor Networks
Ashoka Rao Gottipati, T.Anusha
IJRCSE/V4/5-945Download
46Multiple Steering Pattern Based On Bond- Vehicle Engineers Forward Manner
Shajahan syed, Jajam. Nagaraju, Shaik. Abdul
IJRCSE/V4/5-946Download
47Order-Optimal Per-Flow Delay in Multihop Wireless Networks with the use of A Low Complexity Congestion Control and Scheduling Algorithm
Shaik Nagoor Shareef , Jajam.Nagaraju, Shaik.Abdul
IJRCSE/V4/5-947Download
48Adaptive timeserving Routing for Wireless Ad Hoc Networks
Dasari.RamaDevi, B.V.Praveen Kumar
IJRCSE/V4/5-948Download
49A Cryptosystem Based Privacy Methodical System in Wireless Sensor Networks
Sunkesula.Ramu, Jajam.Nagaraju, Shaik.Abdul
IJRCSE/V4/5-949Download
50Social Wireless Networks for Distributed Cooperative Caching
V.Hari Naik, B.V.PraveenKumar
IJRCSE/V4/5-950Download
51Efficient Search In Database for Query Based Mining Elements
Ch.Rajani, T.Anusha
IJRCSE/V4/5-951Download
52Website Structure Improvement Through Entropy Analysis
C. K.Raja Jujjuru, P. Ratna Babu
IJRCSE/V4/5-952Download
53Performance Evaluation of a XML Tree Patterns
Koteswara Rao.Valem, P.Ratna Babu
IJRCSE/V4/5-953Download
54Image Mining User Used Queries In Online System
Ch.Anuradha, P.V.Naganjaneyulu
IJRCSE/V4/5-954Download
55Clustering Implementation of Incremental Crawling approach in Web Forums
Kamarapu Rohith , A. Swarna Reddy, Ravi Mathey
IJRCSE/V4/5-955Download
56Extracting Feedback Process Generation In Customized System Operations In Online Social Networks
Sk. Khaja Mohiddin Basha, M.Suresh
IJRCSE/V4/5-956Download
57Adjust Preserve On Translation Fiercely Using MAC System Rules
K. Chinababu, Tata Enkateswarlu
IJRCSE/V4/5-957Download
58Effective Information Aspect Using Active knowledge View Point
Balaraju Rudrapogu, Tata Enkateswarlu
IJRCSE/V4/5-958Download
59Information Security Using Data Hiding Technique In Steganography Applications
P. Vijaya Lakshmi, B. Radha Krishna Murthy
IJRCSE/V4/5-959Download
60A System for Load Balancing in Cloud Partitioning for the Public Cloud
Satyaprakash Kalari, Goda Srinuvasa Rao
IJRCSE/V4/5-960Download
61Query Adaptive Image Retrieval System With Hash Codes
M.Murali , P.Pedda Sadhu Naik, B.Subba Reddy
IJRCSE/V4/5-961Download
62Quantity Q Image Grouping And Histogram Shifting Using Reversible Watermarking
S.Srinivas Reddy , P.Pedda Sadhu Naik, B.Subba Reddy
IJRCSE/V4/5-962Download
63A System for Filtering Unwanted Messages from Online Social Network (OSN) by Using Machine Learning Techniques
P. Preethi, K Subash Chandra
IJRCSE/V4/5-963Download
64Privacy-Preserving Firewall Optimization for Cross Domain
Y. Prasanna, K Subash Chandra
IJRCSE/V4/5-964Download
65Verification And Verification Of Neighbour Positions In Mobile Networks
A. Radhika, B. Maheswari
IJRCSE/V4/5-965Download
66Dynamic Resource Allocation Exploitation With Virtual Machines In Cloud Computing
V. Swathi, K Chandra Bhushan
IJRCSE/V4/5-966Download
67A New Key Management Paradigm For Fast Transmission
G. L. Sowjanya, K Subhash Chandra
IJRCSE/V4/5-967Download
68Data-Intensive with Mobile Relay Configuration by Using Wireless Sensor Networks
SK. Sufiabhanu, K Chandra Bhushan
IJRCSE/V4/5-968Download
69Privacy Protection In OSN By Using Three Approaches
P. Sravani, K Chandra Bhushan
IJRCSE/V4/5-969Download
70High-Speed Network Traffic Management Service By Using Fuzzy Logic Control
K. Bagya Laxmi, B Maheswari
IJRCSE/V4/5-970Download
71Providing Security Against Vampire Attackes In Ad Hoc Sensor Networks
A.Yasoda, B. Maheswari
IJRCSE/V4/5-971Download
72Retrieving Hidden Data from Digital Media with Spread Spectrum
K. Hemabala, K Subhash Chandra
IJRCSE/V4/5-972Download
73IPTV Services Through Cloud Resources With Optimisation And Virtualization
V. Haritha, K Chandra Bhushan
IJRCSE/V4/5-973Download
74Implementing Secure Agent Based Distributed Information Sharing
Thumalapenta Eswaramma, G. Prasuna
IJRCSE/V4/5-974Download
75Anonymous Id Delegation Supported Privacy Preserving Data Sharing
Lakshmi Purnachandh B, S. Rama Krishna
IJRCSE/V4/5-975Download
76Cloud Supported Content Distribution Networks Based On Attribute Access To Scalable Media
Koganti Rajesh, S. Rama Krishna
IJRCSE/V4/5-976Download
77The Endangered Entity Stalking In Mobile Sensor Networks
Thadi Tej Charan, Prasuna Grandhi
IJRCSE/V4/5-977Download
78Sophisticated Attribute-Based Encryption In Cloud Computing For Scalable And Secure Sharing Of Personal Health Records
Venu Babu Gali, G. Prasuna
IJRCSE/V4/5-978Download
79Random Object Detection By Using Background Subtraction
M.Sujitha, Ravi Mathey
IJRCSE/V4/5-979Download
80 Providing password Security by using Shamir Secret Sharing Scheme
E. Sushma, J. Swapna
IJRCSE/V4/5-980Download
81A Link_Local Address In Manets By Network Management And Security Label Protocol
Irugula Satyanarayanareddy, Jajam.Nagaraju, , Shaik.Abdul
IJRCSE/V4/5-981Download
82Mutual Relationship Process Over Group Based On Link Specified Cluster
T.Rupa Rani, K.Vinay Kumar Reddy
IJRCSE/V4/5-982Download
83Secure- Delegating Logging As A Service Management To Cloud
Arati.S.B, K.Roshan
IJRCSE/V4/5-983Download
84An Light Weight Geo-Location Based technique for Hetro MANETs
Syed Irfan, J. Damodhar
IJRCSE/V4/5-984Download
85System To Compress Attacks in Wireless Sensor Networks Using Security algorithms
P. Srinivasa Rao, Raja Rajeswari Jetti
IJRCSE/V4/5-985Download
86Biased Query Evaluation in Dynamic Query Formation
S.S.Dileep Roy, V.V.A.S.Lakshmi
IJRCSE/V4/5-986Download
87Template Extraction from HeterogeneousText Clustering in Web Pages
K.Srinija, Madduru Sambasivudu
IJRCSE/V4/5-987Download
88A Novel Approach for Identifying the Face Analysis using Local Directive Patterns
Kypa Ramanjaneya Reddy, B.V.Srinivasulu
IJRCSE/V4/5-988Download
89Convergence Auto Configuration In Manets By Using Systematic And Security Label Protocol
N. Kiran Kumar, Sriharsha.Vikruthi
IJRCSE/V4/5-989Download
90Scalable and Strong Detection of the Breakages in Wireless Sensor Networks
Suhalekhya.Immadisetty, J.V.Anil Kumar
IJRCSE/V4/5-990Download
91QOS Aware Intelligent Hybrid MAC Protocol for Wireless Sensor Networks
D.Nikhila, K. Ashok Babu
IJRCSE/V4/5-991Download
92Ad hoc mobile wireless networks for Security Based on Intrusion-Detection System
Y. Srinivasa Raju, J. Raja Rajeswari
IJRCSE/V4/5-992Download
93Moving object detection based on background subtraction by comparing background and foreground image
B. Pranay, Dr T.V. Rajinikanth
IJRCSE/V4/5-993Download
94Distributed Recovery Method For Multiple Node Failures In Wireless Sensor And Actor Networks
Santhosh.Y, V. Harini
IJRCSE/V4/5-994Download
95Resourceful Scope For Location Reliable Data In Mobile Setting
M. Priyanka, Ch. Srinivas, S. Anitha Reddy
IJRCSE/V4/5-995Download
96A New Framework for Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
K. Tejaswini, D. D. D. Suribabu
IJRCSE/V4/5-996Download
97Automatic Annotation based Profile Matching for Mobile Social Networks (MSNs)
Penmatsa V V Rama Krishnam Raju, P. Srinivas, D. D. D. Suribabu
IJRCSE/V4/5-997Download
98Automatic Relay Configuration in Data-Intensive Wireless Sensor Networks
V. Suneetha, M. Chandrasekhar Varma, D. D. D. Suribabu
IJRCSE/V4/5-998Download
99A Novel Approach for Secure Intrusion Detection System in Wireless MANETs
K.V.Nagalakshmi, S.Nagavali, P.M.Prasuna
IJRCSE/V4/5-999Download
100A Novel Approach for Secure Access Control and Data Storage in Cloud System
J.Priyanka, K.Kiran Kumar, P.M.Prasuna
IJRCSE/V4/5-1000Download
101A Novel Approach for Minimizing Unnecessary Messages in Social Network
Mekala.Sujatha, O.Shiva Bhagawan, P.M.Prasuna
IJRCSE/V4/5-1001Download
102Protected and Well-Organized Method Under WSN
M.Swathi, Sriharsha.Vikruthi
IJRCSE/V4/5-1002Download
103Positive FTC Environment In User Search Data
Shribas Chandra Sahoo, Ch.Raghu Kumar
IJRCSE/V4/5-1003Download
104Assurance in the Modeling Analysis Using Expedite Message Authentication Protocol (EMAP)
M.Jagadeesh Reddy, J.V.Anil Kumar
IJRCSE/V4/5-1004Download
105Accessing Remote Information of Staff and Student using Android App
Ashok Kumar M, Ramanjaneyulu T, Baji G
IJRCSE/V4/5-1005Download
106College Cybernetic System App in Android
Ashok Kumar M , Baji G , Ramanjaneyulu T
IJRCSE/V4/5-1006Download
107Low Cost Smart Camera Systems for Monitoring Traffic Congestion
S Sriharsha ,Shaik khajavali
IJRCSE/V4/5-1007Download
108Dynamic Multi Attribute String Search Over Spatial Databases
Lella Kranthi Kumar, CH. Chandra Mohan
IJRCSE/V4/5-1008Download
109Time Sensitive Queries Based on Term Frequency and Inverse Document Frequency
T.Durga, J.Rama Devi, M.Tech(Ph.D), B. Lakshmi Ramani,M.Tech(Ph.D)
IJRCSE/V4/5-1009Download
110Implementing Efficient Search Results and Navigation in website
Ganne Anusha, D .Lokesh Sai Kumar
IJRCSE/V4/5-1010Download
111Load Balancing using DWLC
J. Siva Gopi, Mrs.U. Tulasi
IJRCSE/V4/5-1011Download
112Dynamic Query Fusion Generation Over Relational Data Bases
K.Niveditha, U.Sailaja ,V. Siva Parvathi
IJRCSE/V4/5-1012Download
113Dynamic Dedupulication Approach to Handle Dirty Data
T.Syamasree, V. Siva Parvathi, U.Sailaja
IJRCSE/V4/5-1013Download
114Smart Phone based Optical Mark Evaluation
D.Vimala Kumari, K.Syama Sundara Rao
IJRCSE/V4/5-1014Download
115Privacy Preserving over Nested Sub Queries
Bonasi.Murali Krishna, M.V.S.N. Maheswar
IJRCSE/V4/5-1015Download
116Classifier Enforcing Access and Direct Control on Messages in OSN
P.Pallavi, Y.Surekha, G.Lalitha Kumari
IJRCSE/V4/5-1016Download
117Multi Cloud Data Storage Using Byzantine Fault Tolerance
Vangara NagaBrahmani, Mr.I.M.V.Krishna
IJRCSE/V4/5-1017Download
118A Novel Optimal Firewall for Privacy Preserving in Cross Domain
Dr S.V.N.Srinivasu
IJRCSE/V4/5-1018Download
119Development of Virtual Machines in Cloud Computing using Dynamic Resource Parceling
Dr S.V.N.Srinivasu
IJRCSE/V4/5-1019Download
120Mobile Relay Constellation with Data Intensifier Using WSNs
Dr S.V.N.Srinivasu
IJRCSE/V4/5-1020Download
121Optimized Re Encryption Schema over Cloud Storage System
Mary Kamala Kumari, Divya.Adusmilli, M.Tech , D.Swapna,M.tech
IJRCSE/V4/5-1021Download
122Efficient Machine Learning Technique for Disease Treatment Classification
Lakshmi Sowjanya Allamsetti, V.Rajesh, M.Tech
IJRCSE/V4/5-1022Download
123E-mail Authentication mining of Association Rules from Outsourced Transaction Databases
D Raj Kumar,K Naga Divya,D Sree Lakshmi
IJRCSE/V4/5-1023Download