Welcome to Research Scholars for Submission of Latest Volume-8, Issue-3 for November-December 2023

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING Jan-Feb 2015 Volume-5, Issue-1

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1A Noval Approch for Load Balancing Model Based on Cloud Segregate for the Public Cloud
Gudidevuni Bhagyasree goud, M Santhi Sudha
IJRCSE/V5/1-1201Download
2Security and Authentication on Data Transfer Under the Cloud Computing
Ashraf Sabri Waheed Alameri
IJRCSE/V5/1-1202Download
3Materialistic Load Neutralize With Service Lag Attestation for Data Center Energy Cost Enhancement
Shravankumar Daddolu, P. Tejaswi , D.Krishna
IJRCSE/V5/1-1203Download
4Security by using Key Pre-Distribution Scheme for Wireless Sensor Networks
Keerthi Guttikonda, G.Vijayadeep
IJRCSE/V5/1-1204Download
5A System for Profile Matching in Social Media with Mobile
D.Praveen kumar, M.N Satish Kumar
IJRCSE/V5/1-1205Download
6A Secure Approach for Data Retrieval in Decentralized Disruption-Tolerant Military Networks
Divyasri.Yallanki, Srikanth.V, Madhira Srinivas
IJRCSE/V5/1-1206Download
7A Secure Fast Transmission Based On Key Management in Clustered Networks
Md.Reshma, Adi Lakshmi.Yannam
IJRCSE/V5/1-1207Download
8Novel Search Algorithm by Incorporating User Search Goal Using Feedback Sessions
Y.KarunaManjusha, D.Nalini Kumari
IJRCSE/V5/1-1208Download
9Effective Communication to Remote Collective Association by using secure key Pattern
M.David Valas, M.V.Sumanth
IJRCSE/V5/1-1209Download
10Privacy Preserving for Collaborative data Distribution by using m-privacy
Surya Prakash.B, P.Pavan Kumar
IJRCSE/V5/1-1210Download
11Multi-path Wireless Routing Protocol for Detecting Malicious Node Based on Minimum Cost
A.H.Anusha, Mrs. Adilakshmi.Yannam
IJRCSE/V5/1-1211Download
12Data Packets Arriaval Approach in Delay Tolerant Networks
Abdul Samadh, K.Srinivas
IJRCSE/V5/1-1212Download
13A System for Enabling Indirect Mutual Trust with Dynamic Data in Cloud Storage Area
N.Santosh Kumar, K.Kiran
IJRCSE/V5/1-1213Download
14Information Aggregation by Using WSN
Arshad Shareef
IJRCSE/V5/1-1214Download
15An Efficient Authentication for Cloud Storage with Public Auditing
B.Rajesh Kumar, K.Kiran
IJRCSE/V5/1-1215Download
16A New Algorithm for Inferring User Search Goals with Feed Back Session
G.Mahender, J. Swapna
IJRCSE/V5/1-1216Download
17Security Enhanced Location Identity Updating Approach
Kommuri Naga Namratha, G.Vijayadeep
IJRCSE/V5/1-1217Download
18Expression and Face Recognition by Using LDN Pattern
N.Rangasree, Dr.M.BabuRao
IJRCSE/V5/1-1218Download
19Access Control for Multi-Authority Cloud Storage with Efficient Expressive and Revocable Data
M.Gopi Krishna, T.Ravi Kumar
IJRCSE/V5/1-1219Download
20Dynamic Histogram Shifting and Invariant Image Classification by Using Reversible Watermarking
T.V.Anusha, S.SeshaSai Priya
IJRCSE/V5/1-1220Download
21Texture based Inpainting by using Super-Resolution
K.Bindumadhavi, Y.V.N.Tulasi
IJRCSE/V5/1-1221Download