Welcome to Research Scholars for Submission of Latest Volume-8, Issue-3 for November-December 2023

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING Sep-Oct 2016 Volume-6, Issue-5

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1An Analytical Framework for Enhancement of Distorted Video Traffic in Wireless Multihop Networks
R.Lakshmi Durga, K.Gowtham
IJRCSE/V6/5-2301Download
2Integrated Framework for Multi-User Encrypted Query Operations on Cloud Database Services
Addanki Ramasatya Sureshbabu, G.Nageswara Rao
IJRCSE/V6/5-2302Download
3Prediction Policy Based Technique for Multimedia Content Sharing in Social Networking Sitess
M.Nageswara Rao, A.Sudhakar
IJRCSE/V6/5-2303Download
4Secured Personalized Web Search Using Adopted Algorithms
Cherku Poorna Venkata Srinivasa Rao, M.Sribala
IJRCSE/V6/5-2304Download
5Development of Employee Attendance System Based on RFID and Face Recognition
B.Ramya, S.Rajesh
IJRCSE/V6/5-2305Download
6An Efficient Approach for Converting Relational Queries to Spread Sheets
K.Sai Jyotshna, B.Veeramallu
IJRCSE/V6/5-2306Download
7A New Encryption and Decryption for 3D MRT Images
Akula Pedda Venkata Subba Rao, P.P.S.Naik
IJRCSE/V6/5-2307Download
8Trust Assessment for Cloud Infrastructure with META Approach
Sk.Sherina Parvin, I.Tabhita
IJRCSE/V6/5-2308Download
9A NOVEL Approach for Mobile APP and Discovery of Ranking Fraud Detection
Abhishikth Nanduri, Ch.Nagaraju
IJRCSE/V6/5-2309Download
10Public Auditing for Regenerating-Code-Based Cloud Storage-on Efficient Privacy Preserving
Sanitha.P, M.Samba Siva Rao,Sravan Kumar.P
IJRCSE/V6/5-2310Download
11Efficient Key Management for Privacy in Cloud Environment
Gera Avinash, M.Gargi
IJRCSE/V6/5-2311Download
12An Integrated Router Security Framework Using Cipher-SMS Protocol
Mounikakari, G.Sumalatha
IJRCSE/V6/5-2312Download
13Multimodal Image Search Engine with Reranking Process
Manchineni Nageswara Rao, N.Zareena
IJRCSE/V6/5-2313Download
14Clamping the Dataset from Warehouse Using Big Data
Adabala.Venkataramteja, R.Veerababu
IJRCSE/V6/5-2314Download
15Precise Information Obtained by Using Exploratory OLAP
Chintala Sridhar Babu, N.Zareena
IJRCSE/V6/5-2315Download
16Online Phishing Attack Detecting Through Efficient Modeling
Bandreddy Srinivas, R.Veerababu
IJRCSE/V6/5-2316Download
17Infrequent Weighted Itemset Mining Using Frequent Pattern Growth and Fuzzy Set
Kalapala Bhavani, Parasa Nagamani
IJRCSE/V6/5-2317Download
18Intrusion Detection and Hop By Hop Message Authentication in Wireless Active and Passive Networks
G.Lakshmi Sravya, K.Jairam
IJRCSE/V6/5-2318Download
19Anonymous Attribute-Based Encryption Control Cloud Data Access
Anitha Ramisetti, D.Hari Krishna, L.Venkateswara Rao
IJRCSE/V6/5-2319Download
20EATRCM for hybrid Data Storage and Processing
Bapatla Suneetha, T.P.V.V. Srinivasa Rao, J.Srinivasa Rao
IJRCSE/V6/5-2320Download