Welcome to Research Scholars for Submission of Latest Volume-8, Issue-3 for November-December 2023

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING Nov-Dec 2015 Volume-5, Issue-6

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1Calibers Service Scheme Applications Integration in Cloud Computing Reproduction
J.Lakshmi Devi, P.Yejdani Khan, Revathi Pokuri
IJRCSE/V5/6-1701Download
2Stability and Facility Auditing Cloud Remote System
Maguluri.Bramarambha, Revathi Pokuri, P.Yejdani Khan
IJRCSE/V5/6-1702Download
3Transfer Superabundant Resource Assignment in Different Routing Nodes
Perala.Padma, Tata.Venkateswarlu
IJRCSE/V5/6-1703Download
4Rapid Accessible Contiguous Investigation with Different Queries
Nalagatla Ravi Krishna Yadav, B.Salmon Raju
IJRCSE/V5/6-1704Download
5Security Sharing Service Sincerity Declaration for Cloud Computing
B.Aruna Kumari, Revathi Pokuri, P.Yejdani Khan
IJRCSE/V5/6-1705Download
6Secure Data Collection in Wireless Sensor Networks Remove out of Attacker Effect
D.Seethamma, K.V.V.N.Babu, Revathi Pokuri
IJRCSE/V5/6-1706Download
7Established and Synchronous Sufficient Data Security Outsourcing in Cloud Computing
M.S.V.Ravindra Babu, P.Saritha Hepsibha
IJRCSE/V5/6-1707Download
8Provide Service Level Agreement in Cloud Computing and Security Strategy
Gurram Rajesh Kumar, Mohammad Sirajuddin
IJRCSE/V5/6-1708Download
9Security Inaugurate Data Destitutions and Useful Admin in Cloud Computing
P.Vijaya Kumar Reddy, P.Yejdani Khan, Revathi Pokuri
IJRCSE/V5/6-1709Download
10Authority Spasm Reign with Impersonal Security and Data Stored in Clouds
A.Susmitha, P.Yejdani Khan, Revathi Pokuri
IJRCSE/V5/6-1710Download
11Systematic Data Cluster for Small-Security Mobile Quality Requisition
N.NaveenTeja, M.KiranKumar, Revathi Pokuri
IJRCSE/V5/6-1711Download
12Per-to- Per Message Identifying and Applications Security in WSN Using MAC
S.Swarna Sravanthi, M.KiranKumar, Revathi Pokuri
IJRCSE/V5/6-1712Download
13Protection Launch Content Sharing and Functional Index in Cloud Computing
Shaik Sikindar, Sk.Ahamad Sharif
IJRCSE/V5/6-1713Download
14Efficient Security and Independent Keyword Queries with Higher Databases
Syed Jhani Basha, Goda Srinivasa Rao
IJRCSE/V5/6-1714Download
15Predominance Shrinkage Rule with Impartial Security and Data Denote in Cloud Storage
Kosanam Janardhan Rao, Goda Srinivasa Rao
IJRCSE/V5/6-1715Download
16Packet Cache and Position in Wireless Networks with Object and Medium Transmission
Bhimavarapu Lokesh Reddy, B.Salmon Raju
IJRCSE/V5/6-1716Download
17Principal Collection and Security Service is Modify Data Sharing in Cloud Techniques
M.Chandra Rao, P.Yejdani Khan, Revathi Pokuri
IJRCSE/V5/6-1717Download
18Collect Generation Location Commission Routing and Node Relay Algorithms
NagaAnusha Konagalla, G.J.Sunny Deol
IJRCSE/V5/6-1718Download
19Instinctive Quality Container in the Node Group in Wireless Networks
Yedluri Deepika, M.Gargi
IJRCSE/V5/6-1719Download
20Congregate Group Resources Assignment Node Transfer and Routing Techniques
Velaga Lakshmi Sowjanya, K.Vivek
IJRCSE/V5/6-1720Download
21Privacy Preserving Delegated Access Control in Public Clouds
K.Nalini, Md.Amanatulla
IJRCSE/V5/6-1721Download
22Enhancing Video Dissemination Using Cellular and ADHOC Network
S.Supriya Polisetti,S.N.V.Satyanarayana.B
IJRCSE/V5/6-1722Download
23A Novel Approach for Business Process Mining
K.Naga lalithadevi, M.Srinivasa Rao
IJRCSE/V5/6-1723Download
24A Blended Mechanism for Traveler Package Recommendation System
M.V.V.Pradeep, S.S.V.Appa Rao
IJRCSE/V5/6-1724Download
25Systematic Security of Different Keyword Queries Higher Databases
Ravanamma, B.V.PraveenKumar
IJRCSE/V5/6-1725Download
26Connection Destruction Perception Location in Delay Tolerant Networks
P.Radha Manohar, V.V.A.S.Lakshmi
IJRCSE/V5/6-1726Download
27Regarding Individual Query Services and Specified Systematic in Clouds Computing
A.Yugandhar Reddy
IJRCSE/V5/6-1727Download
28Artificial Routing and Medium Access Control Fixed Methods in AD-HOC Wireless Networks
Chappidi Surekha, V.Sri Harsh
IJRCSE/V5/6-1728Download
29Secure Data Collection in Wireless Sensor Networks to Separate Out of Attacker Reaction
Poorni Lakshmi Triveni, M.Gargi
IJRCSE/V5/6-1729Download
30Fastest Nearest Location Keyword Search
G.Sridevi, V.Swamy Naidu
IJRCSE/V5/6-1730Download
31Data Mining with Large Amount of Data
V.Rajitha, V.Swamy Naidu
IJRCSE/V5/6-1731Download
32Certain Knowledge Routing in Straightforward Flexible Communication Networks
P.Venkateswarlu, V.Sri Harsh
IJRCSE/V5/6-1732Download
33Strength and Merger Scrutinize Cloud Impassive System
Praveen Mathangi, V.Anjali
IJRCSE/V5/6-1733Download
34A Novel Secured Retrieval Method for Ad Hoc Disruption- Tolerant Networks using CP-ABE Technique
Vijaya Raju Motru, Penmetsa V Krishna Raja,Kondapalli Beulah, Gudikandhula Narasimha Rao
IJRCSE/V5/6-1734Download
35A Novel Approach for Creation of Dynamic Form using Database Queries
K.Chaitanya, G.Tatayya Naidu
IJRCSE/V5/6-1735Download
36A Novel Approach for Online Nearer Path Computation
Rongala Jnana Deepika, G.Sanjay Gandhi
IJRCSE/V5/6-1736Download
37A Novel Approach for Improving Anomaly Intrusion Detection System
J.S.Kumar, M.Gopinath Reddy
IJRCSE/V5/6-1737Download
38A Novel Approach for Secure Data Accessing in Military Network
K.Krishna, N.Nagendra Gopal
IJRCSE/V5/6-1738Download
39Live Video Distribution Using Hybrid Cellular and AD HOC Networks
Ch.Sri Lakshmi, G.Sanjay Gandhi
IJRCSE/V5/6-1739Download
40Seclusion Security and Data Protecting Position Based Search
Yellinedi Hari Krishna, M.Aparna
IJRCSE/V5/6-1740Download
41Suitable Operation in ARQ Model Container Desert in Content Delivery Networks
Addanki Pavan Kumar, A.Rajesh
IJRCSE/V5/6-1741Download
42Efficient Service Transportation in Cloud Storage System for Multimedia Distribution
T.Venkateswara Reddy, J.L.Alekhya, Revathi Pokuri
IJRCSE/V5/6-1742Download
43A Novel Approach for Accurate Best Location Search Using Keywords
N.Lavanya, S.S.V.Apparao
IJRCSE/V5/6-1743Download
44Drugs Analyzed With the Help of Probabilistic Aspect Mining Model
K.Jai Prakash, K.K.Krishnaiah
IJRCSE/V5/6-1744Download
45An Incentive Structure for Mobile Traffic Offloading
Sheik.Rasool, N.Nagendra Gopal
IJRCSE/V5/6-1745Download
46Fastest Keyword Query Routing
P.Raghu Pavan, K.K.Krishnaiah
IJRCSE/V5/6-1746Download
47Friend proposed Recommendation System for Social Networks
B.Raju, N.Nagendra Gopal
IJRCSE/V5/6-1747Download
48Efficient Dynamic Cellular Traffic Offloading in Delay Tolerant Networks
M.Vikram, G.T.Naidu
IJRCSE/V5/6-1748Download
49Building Private and Systematic Query Services in the Cloud with RASP Data Perturbation
P.N.V.Sai Chaitanya, S.S.V.Apparao
IJRCSE/V5/6-1749Download
50GIS-GPS Based City Information System through Cloud
Ch.Sravanthi Sowdanya, N.Supriya
IJRCSE/V5/6-1750Download
51Superiority Destitute Model with Security and Data Indicate in Cloud Storage
Mutyala Satish, G.J.Sunny Deol
IJRCSE/V5/6-1751Download
52Efficient Approachable Contiguous Inspection with Request Queries
Desu Siva Sankar, G.J.Sunny Deol
IJRCSE/V5/6-1752Download
53Retreat Security and Data Protecting in Resources Based Protocol
Essak Shaik, G.J.Sunny Deol
IJRCSE/V5/6-1753Download
54Best Tour Travel Recommendation System
M.Surya Prakash, G.Tatayya.Naidu
IJRCSE/V5/6-1754Download
55Best Path Computation in Online
D.Surendra Balu, Satyanarayana
IJRCSE/V5/6-1755Download
56Protection and Systematic Serving in Public Data Investigate and Destitution in Cloud Computing
Jasti Bindu, Thupakula Venkatrao
IJRCSE/V5/6-1756Download
57Collect Propertied Resources Commission Routing and Node Relocate Technique
Nersu.Neeraja, V.Padmaja, Sayeed Yasin
IJRCSE/V5/6-1757Download
58Capability Shrinkage Privacy with Impersonal Security and Data Deposit in Clouds
Savva Bhagya lakshmi, V.Srinivasa Rao
IJRCSE/V5/6-1758Download
59Share Mobile Surface Enables in Wireless Sensor Networks
Ramadugu PavanKumar, P.Yejdani Khan, Revathi Pokuri
IJRCSE/V5/6-1759Download
60A Novel Approach for Offloading Mobile Traffic in Network
ManiKumar Karri, J.Raja Rajeswari
IJRCSE/V5/6-1760Download
61A Novel Approach for Nearest Path in Online
K.Divya Rekha, J.Raja Rajeswari
IJRCSE/V5/6-1761Download
62Regard Individualistic Query Services and Accept Systematic in Clouds Computing
Sunil Kumar Bondu, G.J.Sunny Deol
IJRCSE/V5/6-1762Download
63A Fastest and Secure Data Transmission in Wireless Network
S.M.V.Gopikrishna, J.Raja Rajeswari
IJRCSE/V5/6-1763Download
64Performance of Boundary Cutting for Decision-treebased Packet Classification
S.Vijaya Nirmala, K.Santoshi Lakshmi
IJRCSE/V5/6-1764Download
65Certainty and Compound Investigate Cloud Undemonstrative System
S.Sriraghavendra, G.Guru Kesava Dasu
IJRCSE/V5/6-1765Download
66Regard Unconventional Query Services and Recognize Standard in Clouds Computing
Sucharitha Peddinti, V.Srinivasa Rao
IJRCSE/V5/6-1766Download
67A Secure In-Network Data Aggregation in Wireless Sensor Networks
G.Geetavani, N.N.Gopal
IJRCSE/V5/6-1767Download
68Identity Producer in Cloud Services Remote Recognize the Aggregate Users
Raghava Rani Suram, E.Sambasiva Rao
IJRCSE/V5/6-1768Download
69Served Quality Proceed for Subatomic Object Management
Shaik Jakeer Hussain, Shaik Mohammad Rafi
IJRCSE/V5/6-1769Download
70A Secure Self determining, and Simultaneously Accessing the Encrypted Cloud Database
B.V.V.Siva Prasad, J.Raja Rajeswari
IJRCSE/V5/6-1770Download
71Failure Nodes Detection and Solving in Wireless Sensor Network
G.Vinay Kumar, K.Mohan Rao
IJRCSE/V5/6-1771Download
72To Estimate Accuracy by Leveraging the Statistics from Multiple Verification Runs
K.Shireesha, A.Soumya
IJRCSE/V5/6-1772Download
73Efficient Keyword Query Routing System Using Query Expansion
V.SivaNagendra Babu, B.S.N.V.Satyanarayana
IJRCSE/V5/6-1773Download
74Assurance Ranking and Design Semantic Extending Topple
S.Anil Kumar, K.Rama Rao
IJRCSE/V5/6-1774Download
75Identification of Business Process Changes Using Mining Techniques
Mangena Durga Chandra Rao, S.S.V.Apparao
IJRCSE/V5/6-1775Download
76Detection and Resolving Denial of Service Attacks in Network
Tammisetti Srividya, Mallela Ramesh Babu
IJRCSE/V5/6-1776Download
77Locate Extend Discussion in Social Streams using Link Analysis
Kuchipudi Suneetha, Mohammad Sirajuddin
IJRCSE/V5/6-1777Download
78EMAP: A Novel Approach for Providing the Security in the Vehicular Ad Hoc Network(VANET)
Paramata Vivek, K.Ramya Devi
IJRCSE/V5/6-1778Download
79A Novel Network Method to Recover the Failure Nodes in Sensor Network
Y.V.R.Naidu, J.Raja Rajeswari
IJRCSE/V5/6-1779Download
80An Efficient Technique for Best Friends Recommendation in Social Network
P.Naga Sravanthi, Md.Ahmed
IJRCSE/V5/6-1780Download
81Recommend the Friends in Social Network
L.Vinod, K.Santosh Lakshmi
IJRCSE/V5/6-1781Download
82Data Store and Schedule in Wireless Networks Based Object and Medium Transmission
Chinababu Kanaparthi, Tata.Venkateswarlu
IJRCSE/V5/6-1782Download
83Predominance Shrinkage Model and Security Data Retainer in Cloud Computing
Yeluri Veera Venkata Saikuma, M.VamsiKrishna
IJRCSE/V5/6-1783Download
84Data Collection and Validity Service is Improve Data Sharing In Cloud Computing
Kataru Srinu, Goda Srinivasa Rao
IJRCSE/V5/6-1784Download
85Dominance Contraction Rule with Impersonal Security and Data Stored in Clouds
Sai Meghana Maddela, Anantha Rao Gottimukkala
IJRCSE/V5/6-1785Download
86An Efficient Technique to Identifying Fluctuations in Business Process Mining
P.A.Bhargav, G.T.Naidu
IJRCSE/V5/6-1786Download
87Partition Fragment for Packet Classification
Nutakki Naresh, B.Radha Krishna Murthy
IJRCSE/V5/6-1787Download
88Reliable Data Collection in Wireless Sensor Networks and Separate out of Attacker Reaction
Razina Shaik, Madhubala Myneni, V.Sridhar Reddy
IJRCSE/V5/6-1788Download
89Carp a Novel Strategy to Deal with the Well-Known Image Hotspot Problem in Preferred Graphical Password Methods
Chekuri Rama Krishna Raju, D.Srikar
IJRCSE/V5/6-1789Download
90Efficient Image Encryption-Then-Compression System by Using Bilateral Filter
Jonnalagadda Syam Babu
IJRCSE/V5/6-1790Download
91Consider Implementation, Validity, and Quality for Secure Cloud Data Compact
Sandeepkumar Panthagani, M.Sivanaga Raju
IJRCSE/V5/6-1791Download
92Statistical Aspect Mining Model for Drug Reviews
M.Kishore, N.S.V.Satyaaraya B
IJRCSE/V5/6-1792Download
93A Clustering Based Query with Security Data Processing Schedule
K.Gowtham, P.Ashok Kumar
IJRCSE/V5/6-1793Download
94Authorized Trustworthy Service Consideration in Security-Oriented Mobile Social Networks
Shaik Moulali, G.J.Sunny Deol
IJRCSE/V5/6-1794Download
95Consequence Position Extracting and Its Implementation
V.Siva Kumar, N.Anil Kumar
IJRCSE/V5/6-1795Download
96Efficient Search Location Using Keywords
R.Venkatalaluswamy, V.K.Pratap
IJRCSE/V5/6-1796Download
97Improved Query Based Web Image Retrieval with K-Means Clustering and SVM
G.K.Soujanya, Y.Ramu
IJRCSE/V5/6-1797Download
98An Improved Method for Document Retrieval by using Correlation Preserving Indexing with TF/IDF
R.G.Vyshnavi, Y.Ramu
IJRCSE/V5/6-1798Download
99Promptly Approachable Nearly Investigation Individual Queries
P.Satyanarayana, S.Jalaiah
IJRCSE/V5/6-1799Download
100Transactions with Formulation Gather in Process Mining
Radha Lakshmi K, P.Pedda Sadhu Naik
IJRCSE/V5/6-1800Download
101Stratagem Path Linear Passing and Route Estimation
Arunajyothi Narra, M.Aparna
IJRCSE/V5/6-1801Download
102Security and Efficient Portion Data Monitor in Public Cloud Auditing
Muvva Raja Sekhar, Akbarkhan, Md.Amanatulla
IJRCSE/V5/6-1802Download
103A Species Cloud Nears and Established Specified Data Reduction
Manasa N, B.Showri Rayalu
IJRCSE/V5/6-1803Download
104Delineation of MRI Brain Tumor using Unified Fuzzy K-means Clustering Algorithm
Daram Amitha, P.Pedda Sadhu Naik
IJRCSE/V5/6-1804Download
105Distributed Data Analytics Framework for Heterogeneous Cloud Computing Environments
Srinivas Guttina,Nagatirumala Rao S N
IJRCSE/V5/6-1805Download
106An Advanced common Pattern Recognition Algorithm in Bio-Informatics
Ch.Anuradha, K.Sandhya Rani, T.Balamuralikrishna
IJRCSE/V5/6-1806Download
107Data Security and Collection in Wireless Sensor Networks Remove out of Attacker Impacts
Chundru Srinivas, Talatam Veerraju
IJRCSE/V5/6-1807Download
108Web Resource Administration Expedient System and QoS with Ranking Information
T.L.Tejaswini, M.Gnana Vardhan
IJRCSE/V5/6-1808Download
109Authentic and Systematic Data Communication for Cluster-Based Wireless Sensor Networks
S.Venkata Subba Rao, N.Gopala Krishna
IJRCSE/V5/6-1809Download
110Compact Data Received for Single Executive Disruption-Tolerant Networks
L.R.D.Prasad Maddireddi, V.Anantha Lakshmia
IJRCSE/V5/6-1810Download
111Hierarchical Strip Cuts: A Translation, Rotation, Scale and Reflector Invariant Descriptor for Brisk Shape Retrievals
R.Siva Ram Prasad, S.Suresh
IJRCSE/V5/6-1811Download
112Hands and Face Tracking Techniques in Natural Expressions Based on Computer Vision Techniques
M.Ashok Kumar, B.Srinivas, R.R.Tewari,
IJRCSE/V5/6-1812Download