Welcome to Research Scholars for Submission of Latest Volume-8, Issue-3 for November-December 2023

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING Nov-Dec 2016 Volume-6, Issue-6

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1Distributed Deduplication Systems with Security and Improved Reliability
Dittakavi.Damodar Babu, Chandra Sekhar Muttangi
IJRCSE/V6/6-2401Download
2A Confidential Privacy Policy for Protecting User Images Uploaded on Shared Web Sites
P.Rajesh, Dr.M.S Babu
IJRCSE/V6/6-2402Download
3Hybrid Feature Descriptor for Image Data Retrieval Using Hadoop Method
V.Jagadish Kumar, Ms.Rajyalakshmi Matta
IJRCSE/V6/6-2403Download
4An Enhanced Multi-Layered Cryptosystem Based Secure and Authorized Deduplication Model in Cloud Storage System
Rajulapati Anusha, M.Siva Sankar Naik
IJRCSE/V6/6-2404Download
5Analyzing Drifts Using Event Logs
Melimi. Radha Meghana, Ch.Chandra Mohan
IJRCSE/V6/6-2405Download
6Supervise Data Service in Multi-Cloud Storage Using Cryptographic Model
Sambireddy Gottam, B.Bhanu Pratap Reddy
IJRCSE/V6/6-2406Download
7Objectivity User Transfer Data on Content Sharing Sites Using Access Control Mechanism
Rayipudi Raghu Varma, Dr.Uma Devi
IJRCSE/V6/6-2407Download
8Climate Change and Weather Prediction Based on Decision Tree Using Data Mining Techniques
Tanna Anusha, P.Lalitha Raja Rajeswari
IJRCSE/V6/6-2408Download
9A Parity Relationship Agitate Objected Scheme in Smartphone Mobile Networks
Sriharsha Vikruthi, JanardhanReddyDevarapalli
IJRCSE/V6/6-2409Download
10Assurance and Stable Detection of Packet Pursue Attacks in Mobile Ad Hoc Networks
Maddineni Kasi Viswanatham, Sridhar Kodali
IJRCSE/V6/6-2410Download
11A Reliable Implements of Index Appliance
Shaik Jilani Basha, Vellaturi Gopi Krishna
IJRCSE/V6/6-2411Download
12Putrefaction Substructure for Image Denoising Using Clustering Methods
V.V.Praveen Kumar, U.Jayaram
IJRCSE/V6/6-2412Download
13Spirited Audit Method and File Data Administer in Cloud Storage
Kancharla. Chaitanya, G.J. Sunny
IJRCSE/V6/6-2413Download
14Keyword Search Result Based Facet Mining from Web Pages
AmarthaluriKarunasri, B.V.V.S.Prasad
IJRCSE/V6/6-2414Download
15Finest Keyword Nearest Neighbor Search
J.S.S.Bharathi, Dr.N.K.Kameswara Rao
IJRCSE/V6/6-2415Download
16Quantitative Analysis of Magnetic Resonance Images for Segmentation Applications
B.Srinivasa Rao
IJRCSE/V6/6-2416Download
17Dealing with Concept Drift in Process Mining
Anuharika Channamsetti, N.N.Gopal
IJRCSE/V6/6-2417Download
18A Novel Approach on Bug Triage in Huge Repository Files
M.KasiAnnapoorna, S.V.V.Apparao
IJRCSE/V6/6-2418Download
19Supervised Clustering
Ch.Likitha, S.V.V.Apparao
IJRCSE/V6/6-2419Download
20Online Live Traffic Shortest-Path Computation
Suma Veni.Veerla, P.C.S.Nagendra Setty
IJRCSE/V6/6-2420Download
21Confidential Privacy Policy to Protect Sharing Images Across Various Social Sites
P.S.V.Surya Kumar, K.Rajani Kumari
IJRCSE/V6/6-2421Download
22Sentiment Analysis on Social Data: A Survey
G.V.Lakshmi, N.N.Gopal
IJRCSE/V6/6-2422Download
23A Secure in-Network Data Aggregation in Wireless Sensor Networks
M.Ganesh Gowd, P.V.Vijaya Durga
IJRCSE/V6/6-2423Download
24A Novel Approach for Business Process Mining
K.Ambica Kishan, P.V.Vijaya Durga
IJRCSE/V6/6-2424Download
25A Novel Approach for Managing Secure Data in Decentralized Wireless Sensor Networks
K.Suresh Kumar, P.V.Vijaya Durga
IJRCSE/V6/6-2425Download
26Redundancy Elimination in Clustering
Ananta Kumar, P.V.Vijaya Durga
IJRCSE/V6/6-2426Download
27Privacy and Preserving Cloud Data Distribution using Cloud Key Bank
K.Vinaya Sree Bai, B.Usha Rani
IJRCSE/V6/6-2427Download
28Enabling Cloud Storage Auditing with Key-Exposure Resistance
Kodandaramu Karroti, Ch.Raja Jacob
IJRCSE/V6/6-2428Download
29Efficient Clustering of Text Document Using Spherical K-Means Algorithm
A.Harini, P.HemaVenkataRamana
IJRCSE/V6/6-2429Download
30Improvement of Aomdv Routing Protocol in Manet and Performance Analysis of Security Attacks
Anusha Papasani, Nagaraju Devarakonda
IJRCSE/V6/6-2430Download
31A Study on Similarity Measure for Text Classification and Clustering Using SMO, KMeans and Bisecting K-Means
Meduri.Haritha, Nagaraju.Devarakonda
IJRCSE/V6/6-2431Download
32A New Grid Connected Power System Using Alternative Phase Shift Based PWM for DC-DC Converter
L.Sk.Laljani Basha, Sk.Shaheen, Dr.Abdul Ahad
IJRCSE/V6/6-2432Download
33New Mechanisam for Secure the Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
Shiva Mondi, Kancharla Kalpana
IJRCSE/V6/6-2433Download
34Recognition and Rectification of Unclear Fingerprints
G.Satya Deepika, Dr.M.S.Babu
IJRCSE/V6/6-2434Download
35A Novel Method for Detecting Duplicates
N.Mounika, Dr.M.S.Babu
IJRCSE/V6/6-2435Download
36A Novel Performance of Supervised Attributes Clustering of Dimensionality Reduction in Irrelevent Data
V.Sivaramakrishna, M.Revathi
IJRCSE/V6/6-2436Download
37A Novel Approach for Integrity Auditing and Group User Revocation for Shared Dynamic Cloud Data Access
K.N.Suhasini,Ch.Lavanya Susanna,Sayeed Yasin
IJRCSE/V6/6-2437Download
38Spirited Audit Method and File Allocate Data in Cloud Storage
Boddu Teja Sree, N.Vijaya Gopal
IJRCSE/V6/6-2438Download
39Inspect Cloud Storage Security Using Identity-Based Encryption
Chintapanti.Anusha, A.Harsha Vardhan
IJRCSE/V6/6-2439Download
40Productive Routing for Packet Examination and Recognize Resources in Wireless Sensor Networks
K.Asha, Dr.K.S.M.V.Kumar
IJRCSE/V6/6-2440Download
41Secure and Reliable Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks
Pamula Harathi, Y.Rajesh Babu
IJRCSE/V6/6-2441Download
42Communicatethe Locations of Secured IP Deception Using Trace Back Scheme
Koteswari Yarru, N.Vijaya Gopal
IJRCSE/V6/6-2442Download
43Insistent Audit Approach and File Security Data in Cloud Storage
D.Niveditha Rani, Ch.Kiran Babu
IJRCSE/V6/6-2443Download
44Segregation Approach End of User Conduct Data on Content Sharing Sites
G.Lalitha Devi, S.V.Kishore Babu
IJRCSE/V6/6-2444Download
45Secure Auditing for Assign Cloud Data with Message Authentication Code
M.Sravana Sandhya, U.Usha Rani
IJRCSE/V6/6-2445Download
46Ensemble Semantic Frequent Pattern Mining Discovery using Virtualization
S.Jayaprada, P.Bala Krishna Prasad, R.Satya Prasad
IJRCSE/V6/6-2446Download
47A New Approach for Integrating Social Data into Groups of Interest
Dr.M.Kameswara Rao, Dr.Mohammad Rasool
IJRCSE/V6/6-2447Download
48A Novel Approach for Bug Triage with Classification and Data Reduction Techniques
Ramanjaneyulu.Pragada, Yuvraju.Chinnam
IJRCSE/V6/6-2448Download
49Effective Reduction of Cluster
Koyya Lavanya Kumari, Yuvraju.Chinnam
IJRCSE/V6/6-2449Download
50A Shortest Path Live Traffic Index
Rokkam Ashok, Yuvraju.Chinnam
IJRCSE/V6/6-2450Download