Welcome to Research Scholars for Submission of Latest Volume-8, Issue-3 for November-December 2023

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING Sep-Oct 2015 Volume-5, Issue-5

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1A Framework and Graphical Development Environment for Business Events
Udaya Kiran Kurapati, M.Prasanna
IJRCSE/V5/5-1601Download
2An Efficient Mining Approach for Text Data with Side Information
Rukmini.G, V.Rajashekar
IJRCSE/V5/5-1602Download
3Clustering with Multiple Reference Points Based Similarity Measure
K.V.Prasad, G.Sanjay Gandhi, S.Balaji
IJRCSE/V5/5-1603Download
4A Novel Approach for Node Failures and Recover in Wireless Sensor Network
Hari Inapakurthi, Madhava Rao Batteri
IJRCSE/V5/5-1604Download
5Efficient Personalized Web Search using Hierarchical Clustering
M.BharathKumar, V.Rajashekar
IJRCSE/V5/5-1605Download
6Secure Multi keyword Top-K Retrieval over the Compressed Encrypted Cloud Data
Kola Pavithra, V.A Radhika, Anusha.M
IJRCSE/V5/5-1606Download
7Previous Data Collection Based Intrusion Detection for Advanced Critical Medical Cyber Physical Systems
M.Raghava Priyanka, J.Srinivasa Rao, Anusha.M
IJRCSE/V5/5-1607Download
8Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks using KNN
Parasa Somanya, V.A Radhika, J.Srinivasa Rao
IJRCSE/V5/5-1608Download
9Protection for Location in Geo social Applications
Rajmaleswara Rao, Hari Krishna Deevi, K.Rama Krishnaiah
IJRCSE/V5/5-1609Download
10Provided QoS and Share Routing Protocol in Hybrid Wireless Networks
Dubala Srilatha, M.Pragathi
IJRCSE/V5/5-1610Download
11Security Maintain different Cipher Model Search Data in Cloud Computing
K.Prasanthi, T.venkatrao, V.lakshmi
IJRCSE/V5/5-1611Download
12Inferring User Image Search Goals under the Implicit Guidance of Users
V.Ashvini, K.Venkateswara Reddy
IJRCSE/V5/5-1612Download
13An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring in Real World Limited Bandwidth Networks
V.Hima Bindu, K.Venkateswara Reddy
IJRCSE/V5/5-1613Download
14Web Accelerator for Wireless Networks using BIT Reduction Algorithm
K.Sudha Rani, M.Sailaja
IJRCSE/V5/5-1614Download
15Secured Profile Matching in Social Networks Using Machine Learning
B.Aruna, D.Sree Lakshmi
IJRCSE/V5/5-1615Download
16A New Data Mining Approach for Software Bug Prediction
Srilakshmi Balagam, G.PardhaSaradhiVarma
IJRCSE/V5/5-1616Download
17Multi-Attribute Group Decision Making Models on XML Data by Using Fuzzy
Sujatha.Polaki, A.Divya
IJRCSE/V5/5-1617Download
18Pre-Eminence Service Strategy Application in Cloud Computing and Security Scheme
J.Venkata Prasad, P.Pedda SadhuNaik
IJRCSE/V5/5-1618Download
19Fetch Productive Resource Assignment in Different Routing Transfer Nodes
Sayed Arief, S.Jalaiah
IJRCSE/V5/5-1619Download
20A Relating Establish Friend Suggestion System for Social Networks
SK.Beebavali, Anantha Rao Gottimukkala
IJRCSE/V5/5-1620Download
21An Information Security Scheme Based on Steganography Using Muilt-Key Generation
N.Swathi, Swapna.Donepudi
IJRCSE/V5/5-1621Download
22Implementation of Genetic Algorithm to Optimize Query Processing
Chindada.Gopi, Mr.V.V.Gopala Rao
IJRCSE/V5/5-1622Download
23Portions and Preserve Data Guard Situation Based Services
Soma Nageswara Rao, P.Pedda Sadhu Naik
IJRCSE/V5/5-1623Download
24Authorized Designer Cloud Services between Remote Sensing the Entirety Users
Syed Bismilla Jabeen, P.Pedda Sadhu Naik
IJRCSE/V5/5-1624Download
25Pattern Discovery Taxonomy for Effective Text Mining
Kalapala Raj Pradeep, V.Sowjanya
IJRCSE/V5/5-1625Download
26Secured Medical Data Publication by Using Earth Mo ver Distance (EMD)
Kalapala Raji Anusha, J.Ramadevi
IJRCSE/V5/5-1626Download
27Regulation Path Direct Passing and Route Calculation
Pedapudi Nagababu, Mohammad Sirajuddin
IJRCSE/V5/5-1627Download
28An Efficient Approach on Privacy Preserving of the data using EMD
N.Aswani, B.Bhanu Prakash
IJRCSE/V5/5-1628Download
29Relating Damage Perception Finding in Delay Tolerant Networks
Dampuru Ramesh, P.Pedda Sadhu Naik
IJRCSE/V5/5-1629Download
30Security and Grouping of Data Sharing System Using Social Network Model Scheme
V.Mounika, G.Radhika Deepthi
IJRCSE/V5/5-1630Download
31Reliability and Adornment Database with Security and Information Access
Budhati Sandhya, M.Jahir Pasha
IJRCSE/V5/5-1631Download
32Web Scheme Commendation Resource Position and QoS Rapid Growth
K.V.L.Nagamani, Pasupuleti.Eswaraiah
IJRCSE/V5/5-1632Download
33Security and Destitutions Locations Integrity Communication in Cloud Computing Using MVC
Manikanta Rudravarapu, Shaik Mohammad Rafi
IJRCSE/V5/5-1633Download
34Generating Positive and Negative Tweets Using Opinoin Mining in Social Networking Sites
B.Navya Sree, V.Siva Parvathi
IJRCSE/V5/5-1634Download
35A Species Cloud Nears and Traditional Agreement Data Compression
Bussareddy.Haritha, N.Madhava Rao
IJRCSE/V5/5-1635Download
36IOR Based Routing Model for Relay Nodes in Overlay Networks
Alluri Annapurna, Kavuri Karunakar
IJRCSE/V5/5-1636Download
37Resource Process in ARQ Model Packet Disappear in Content Delivery Networks
N.V.Ramanareddy, Mohammad Sirajuddin
IJRCSE/V5/5-1637Download
38Collateral and Systematic Portion Information Inspect in Public Cloud Auditing
Nimmagadda Murali Krishna, Mohammad Sirajuddin
IJRCSE/V5/5-1638Download
39Structure Security and Systematic Query Services in Data Deviation
R.Padma Saranya, N.Venkateswara Reddy
IJRCSE/V5/5-1639Download
40Divination for Web Image Semantic Characterized Exceptional Coding
Sujith Sudha Nemalikanty, V.Anjali
IJRCSE/V5/5-1640Download