Welcome to Research Scholars for Submission of Latest Volume-8, Issue-3 for November-December 2023

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING Nov-Dec 2014 Volume-4, Issue-6

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1Improve Image Quality Using Dynamic Histogram and Information Hiding Technique
U.Sivanagalakshmi, T.T.Rajeswara Rao
IJRCSE/V4/6-1101Download
2Expression and Face Recognition with the Use of LDN Pattern
N.Sravanthi , T.T.Rajeswara Rao
IJRCSE/V4/6-1102Download
3Mobile Health Care Privacy by Using Cloud Computing
Thota Devendara Venkata Satish
IJRCSE/V4/6-1103Download
4A Systematic and Changed Multi Frequency plan to Remove Trespass nodes in Wireless Sensor Networks
Gubbala Mohan Sankar, Raja Rajeswari Jetti
IJRCSE/V4/6-1104Download
5A Distributed Network Intrusion Detection and Prevention Framework for Zombie Detection in a Cloud Computing Environment
Shaik Khaja Hussain, S.Asif
IJRCSE/V4/6-1105Download
6Assumption Safety in Communal Analyse for Cloud Area Algorithm in Manets
K.K.Subramanyaeswararao
IJRCSE/V4/6-1106Download
7An Intelligent System to Learn to Optimize Web Forums
V.N.V.Haritha, K. Surya Ram Prasad, D. D. D. Suribabu
IJRCSE/V4/6-1107Download
8Dynamic Content Delivery Scheme Using Data Staging Concept
V.Guru Kumar, P.Nanna Babu, K.Pradeep Kumar
IJRCSE/V4/6-1108Download
9Destination Nodes Tracking For Multicasting of Messages in Wireless Networks
K.Venkateswararao, K.Surendra, T.Soma Sekhar
IJRCSE/V4/6-1109Download
10Bootstrapping Ontologies Based on Web Services
Nirmitee N. Kurhekar, L. J. Sankpal
IJRCSE/V4/6-1110Download
11Secure Data Sharing With Privacy Protection by Assigning an ID
Nathani Sravya, Ramdev Reddy
IJRCSE/V4/6-1111Download
12Intrusion-Detection System by Using Ad hoc Mobile Networks
Deepika.Mohanan, Sachin Godse
IJRCSE/V4/6-1112Download
13Keyword Based Caption Generation by Using Image Annotation
Ch. Sathwik, Dr T.V. Rajinikanth
IJRCSE/V4/6-1113Download
14A Providing Security for Encrypted Data Using JPEG Stenography
S.Nagarani, Mr.M.V.DurgaRao
IJRCSE/V4/6-1114Download
15An Efficient Fuzzy Single and Multi Keyword Automatic Search Technique in RDBMS
Puppala Devaki, Nuthakki.Anil Kumar
IJRCSE/V4/6-1115Download
16Effectively Minimizing Improper Messages in Social Networks
I.V. Siva Kumar, A S N V Bhogesh
IJRCSE/V4/6-1116Download
17HEA: A Novel Approach for Well-Organized Access Control and Secure Storage in Cloud
Rayavarapu Mahesh, G.Satyanarayana
IJRCSE/V4/6-1117Download
18Reversible Watermarking using Dynamic Histogram Shifting
S.Edukondalu, M.Srinivasa Rao
IJRCSE/V4/6-1118Download
19Protecting Privacy of Location Proof Updating System
Annam.Mounika, Md.Ameer Raza
IJRCSE/V4/6-1119Download
20A Novel Intruder Detecting System to Enhance the Security Levels in MANETs
A.V.P.Rajesh, S.V.C. Gupta
IJRCSE/V4/6-1120Download
21An Effectively Managing Balancing Load in Cloud
Chitri Rami Naidu, Md.Ahmed
IJRCSE/V4/6-1121Download
22An Efficient Intruder Detection System using Data Mining Techniques
Pamarthi Sunil Kumar, Katru Rama Rao
IJRCSE/V4/6-1122Download
23Secure Information Assortment in Wireless Device Networks Victimisation Irregular Dispersive Routes
R.V. Swathi, M.Rama Krishna
IJRCSE/V4/6-1123Download
24Secure Certainty for Quantities in Cloud Systems
SK.Shammi Munnisa, Ch.Ranjith Kumar
IJRCSE/V4/6-1124Download
25Automatic Image Deed and Distinction Enhancement Exploitation Gaussian Mixture Modelling
SK.Gousia Begum, A.Veera RaghavaRao
IJRCSE/V4/6-1125Download
26Memory Management by Using the Heap and the Stack in Java
S.Poornima, Dr. C.V. Guru Rao, Nazia Thabassum, Dr. S.P. Anandaraj
IJRCSE/V4/6-1126Download
27Efficient Approach to Balancing Performance Factors in Processing of Query in Public Data
Srinivas Velichety, V.Yuvaraju Chinnam
IJRCSE/V4/6-1127Download
28An Effectively Managing the Mobile Relaying in Data Incentives Wireless Sensor Network
Ch. Rajesh, B.S.N.V.Satyanarayana
IJRCSE/V4/6-1128Download
29An Advanced Learning to Crawling Web Forums
K. Giridhar, B.S.N.V.Satyanarayana
IJRCSE/V4/6-1129Download
30A Secure Acknowledgement Scheme to Provide Security from Intruders in Wireless MANETs
K. Ramya krishna, G.Tatayya Naidu
IJRCSE/V4/6-1130Download
31A Novel Approach for Balancing the Load in Cloud
K. Santoshi lakshmi, V.Swami Naidu
IJRCSE/V4/6-1131Download
32A Novel Approach for Extracting the Secreted Data from Digital Media
M.Narasimha Raju, G.Tatayya Naidu
IJRCSE/V4/6-1132Download
33Protecting Privacy in Mobile Health Data Monitoring in Cloud
P. Satyamurthy, G.Tatayya Naidu
IJRCSE/V4/6-1133Download
34A Novel Approach for Pruning Malicious Messages in Social Network
S.Tanusha, M.Sailaja
IJRCSE/V4/6-1134Download
35Dynamic Secure Multi Owner Group to Share the data in Cloud
G.Venkata Vara Prasad, V.Swami Naidu
IJRCSE/V4/6-1135Download
36An Efficiently Detecting and Solving the Vampire Attacks in Wireless Network
A. Suribabu, B.S.N.V.Satyanarayana
IJRCSE/V4/6-1136Download
37ALP - Automated Learning Process for Filtering Unwanted Messages in OSN
M.T.V.K.S.Vijaya Raju, K. Surya Ram Prasad, D. D. D. Suribabu
IJRCSE/V4/6-1137Download
38An Enhanced Intensified Data Hiding In Encrypted Images by Separable Reversible Encryption
M.Yesu Raju, D.D.D. Suribabu
IJRCSE/V4/6-1138Download
39A Novel Approach for Data Storage and Access Control Policies in Cloud System
B.Rajasekhar, Mr.M.Gopinath Reddy
IJRCSE/V4/6-1139Download
40An Efficient Intrusion Detection System to Provide Security in Wireless MANETs
N.Ramakrishna, Mr. K. Tulasi Ram
IJRCSE/V4/6-1140Download
41A Novel Approach to Optimize the Traffic Control in Network
Nalla Yesubabu, M.Sailaja
IJRCSE/V4/6-1141Download
42Optimization of Balancing Load in Cloud
G.Prudhvi Raju, Mr. K.K.Krishnaiah
IJRCSE/V4/6-1142Download
43Node Capture Attacks in Data Aggregation by using Wireless Sensor Networks
Rohini Kumar.Talasila, P Srinivasu Varma
IJRCSE/V4/6-1143Download
44Preventing Unauthorized Data and Inference Attacks on Social Networks
Nancharaiah Chatti, S.Shravani
IJRCSE/V4/6-1144Download
45Implementing Dynamic Query Forms using Queries besides the Click Feedback
Jada Srinivas, G.Ravi
IJRCSE/V4/6-1145Download
46Effective Mining Scheme for Large Streams Personalized data Using Sparse data
D.Narsimha Reddy, B.Sivaiah
IJRCSE/V4/6-1146Download
47Assure and Orderly Methodical System Extending Wireless Sensor Networks
Puvvada Kusa Kumar, Pasupuleti Eswaraiah
IJRCSE/V4/6-1147Download
48Trusted DB: Database Engine for a Trusted Hardware
Mohammad Fayazullakhan, Jajam.Nagaraju
IJRCSE/V4/6-1148Download
49An Application for Providing Primary Maternity Healthcare Services in Developing Countries
R Shalini, B.Satish Kumar
IJRCSE/V4/6-1149Download
50Analysis Engine for machine-driven Health Checks, Early Drawback Detection and Advanced Drawback Determination
M N Ramya, V Suresh
IJRCSE/V4/6-1150Download
51Cloud Ticket Validation by Using Android
P.S.Gajapathi Raju, H.Appala Naidu
IJRCSE/V4/6-1151Download
52Learning Gamified Platform for a City
P Sitaram Das, M Kamalakar
IJRCSE/V4/6-1152Download
53Data Mining Techniques for Physicians to Diagnose Diseases
B Bhavani, T P R Vital
IJRCSE/V4/6-1153Download
54Mobile and Web-Based Application for Blood Requisition within Blood Supply Chain
M Rupali, A Sai Krishna
IJRCSE/V4/6-1154Download
55Monitoring System by Using Fuzzy Synthetic Evaluation, Fuzzy Ordering, Preferences and Consesus
K.Venkata Ramana Rao, K Venkata Subrahmanyam
IJRCSE/V4/6-1155Download
56The Potential of ICTs for Empowering Rural Women
S Girisha, S Appala Raju
IJRCSE/V4/6-1156Download
57Secure Authentication for Supporting Healthcare with Wireless Sensor Networks
Ch Sravani, A Durga Praveen Kumar
IJRCSE/V4/6-1157Download
58Automatic Profiles Creation with Evolving User Behavior
Chiriki V N Kumar Giri, Mr.Chinna Babu Galinki
IJRCSE/V4/6-1158Download
59Dynamic Data Module Management Using Logic-Based Approach
Kalisetty.Narendra, V.V.A.S.Lakshmi
IJRCSE/V4/6-1159Download
60Online Auction Fraud DetectionSystem with Modeling of Proactive Moderation
S Roohul Ameen, S.Asif, J.Nagaraju
IJRCSE/V4/6-1160Download
61Dynamic Load Balancing to Drift Application to the Cloud
T. Ravi Chandra, T. Soma Sekhar
IJRCSE/V4/6-1161Download
62Detection of Malware Accuracy after Conversion into Attribute Relation File Format
Y.Vijitha, K.Sirisha
IJRCSE/V4/6-1162Download
63Predicting School Failure with Clasification
A Bichamma, J. Sudhakar
IJRCSE/V4/6-1163Download
64Fully Load Rebalancing for Distributed Encrypted File Systems in Clouds
P. Neena Rao, P.S Murthy
IJRCSE/V4/6-1164Download
65Effective and Intelligent Traffic Service Management for High Speed Networks Using Fuzzy
R.Venkanna Babu, Mr. Sayeed Yasin
IJRCSE/V4/6-1165Download
66Ascribe-Based Effective for Access Entrance Command Obtaing Data in Cloud Computing
Madasu Daniel , M.Gnana Vardhan
IJRCSE/V4/6-1166Download
67Mobile Broad Cast Structure in Data Accelerated Wireless Sensor Networks
Pasala Siva Krishna, Mr.Sayeed Yasin
IJRCSE/V4/6-1167Download
68Protection and Prevention from DDoS Attacks using Advanced Cracking Algorithm
Jeldi Vijay Praksh, Katta Ramesh
IJRCSE/V4/6-1168Download
69Effective Implementation of Privacy Preserved Profile Matching in Mobile Social Networks
Jonnala Kumar Reddy, K.Venkata Ratnam
IJRCSE/V4/6-1169Download
70Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption
Syed Qurban Ali Quadri, A.Hanuman Prasad
IJRCSE/V4/6-1170Download
71Secure Data Sharing In Cloud Computing for Personal Health Care Information
Lakkampelli Rakesh, P.Ramesh
IJRCSE/V4/6-1171Download
72Reversible Watermarking Based on Data Encryption and Decryption
R.Naveen Kumar, B.Seva Naik
IJRCSE/V4/6-1172Download
73Distributed Self Organization Using Load Balancing Technique
Ramasani Govardhan Reddy, M Sreenivas Reddy
IJRCSE/V4/6-1173Download
74Centroid Formation for Computer Inspection Using Dynamic Clustering
Rajesh.G
IJRCSE/V4/6-1174Download
75Attribute-Based Data Sharing by Improving Security and Efficiency
Praveen.V, Ravi Babu Arangi
IJRCSE/V4/6-1175Download
76Profile Matching in Mobile Social Networks with Privacy Enhancement
Ansar Ali, Ravi Babu Arangi
IJRCSE/V4/6-1176Download
77Privacy Preserving Delegated Access Control in Public Clouds
Mohd Haseebuddin, Ravi Babu Arangi
IJRCSE/V4/6-1177Download
78Disease Prediction Using Data Mining
Gandam Kommalu, M Swapna
IJRCSE/V4/6-1178Download
79Image Re-Ranking Using Data Mining Techniques
Indira Jerripothu, M.S.RadhaManga Mani
IJRCSE/V4/6-1179Download
80Tracking Moving Objects for Multicasting Messages in Wireless Networks
A.Charles, P.Nanna Babu
IJRCSE/V4/6-1180Download
81A Novel Approach for Automatic Search in RDBMS
Dodda Rajagopal, B.S.N.V.Satyanarayana
IJRCSE/V4/6-1181Download
82Peer to Peer Architecture for Cloud Downloading Service
S.Sriraghavendra, G. Guru Kesava Dasu
IJRCSE/V4/6-1182Download
83Moving Object Tracking Using Background Subtraction
B.Mahalakshmidevi, K.HimaBindu
IJRCSE/V4/6-1183Download
84Secure Log Data Storage in Cloud by Using AES Algorithm
Ch.Sandeep, D.Swapna, A.Divya
IJRCSE/V4/6-1184Download
85MOBI-SYNC Efficient Time Synchronization for Mobile Underwater Sensor Networks
P.Raghu Vamshi, B.Manasa
IJRCSE/V4/6-1185Download
86Aggressive and Supervision Coding for Accurate Packet Arrivals in DTNS
Rajesh Peddakotla, Md.Amanutulla
IJRCSE/V4/6-1186Download
87Enhancing Scalable Database-Driven Reverse Dictionary
Ch.V.N.S. Swathi, R.V.Satyanarayana
IJRCSE/V4/6-1187Download
88Implementing Energy Efficient load Balancing in Cloud Computing
M.Sravan Kumar Babu, PDL Narasimha Rao
IJRCSE/V4/6-1188Download
89Genetic Algorithmic Approach to Improve Performance of Query Processing
K.Rajesh, G. Kumari, D.Sirisha
IJRCSE/V4/6-1189Download
90Automatic Tolerance of Memory Leaks in C and C++ Applications by Using Plug
Chinnala Mounika, Dr. S.P. Anandaraj, Dr. C.V. Guru Rao, S.Poornima
IJRCSE/V4/6-1190Download
91Image Retrieval System with Hash Codes based on Adaptive Query
Y.Manasa, M.BabuRao, CH.Kavitha
IJRCSE/V4/6-1191Download
92A Novel Frame Work for Intrusion Detection System
M.Mohanrao, S.Karthik
IJRCSE/V4/6-1192Download
93A Novel Approach for Detecting Intruders using Data mining Techniques
D.Janaki Ramaiah, G.Tatayya Naidu
IJRCSE/V4/6-1193Download
94A System for Preventing Unauthorized Information Inference Attacks on Social Networks
Vudumula.Divya, P.Pedda Sadhu Naik
IJRCSE/V4/6-1194Download
95Building an Efficient Database Driven Reverse Mapping Dictionary
N.Sujatha
IJRCSE/V4/6-1195Download
96A Survey on Security Issues with Possible Solutions in Cloud Computing
Konduri Bhagavan
IJRCSE/V4/6-1196Download
97Strong Association rules by using Market datasets
Srinivasa Rao Kongarana, V.Kamakshi Prasad
IJRCSE/V4/6-1197Download
98Recognizing Gesture considering digital image Correlation , Mahalanobis Distance
M Ashok Kumar, Dr.R.R.Tewari,
IJRCSE/V4/6-1198Download