Welcome to Research Scholars for Submission of Latest Volume-8, Issue-3 for November-December 2023

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING NCRTIAC2K16,30th APRIL 2016-IJRCSE SPECIAL ISSUE

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1Automated Electronic Toll Collection System with Fraudulent Control using IOT
G Soujanya, R Deepthi
IJRCSE/SP/I-1Download
2Comparison between Structured and Semi-Structured data for Inverted Index Compression
B.Usharani
IJRCSE/SP/I-2Download
3Interactive image segmentation by using Bayesian belief Network Model–BBN model
CH.Kiran Kumar
IJRCSE/SP/I-3Download
4Best Practices in Vulnerability Management
Mr.Kattupalli Sudhakar,Mr.G.Rambabu,Mr.VSRK.Prasad.G
IJRCSE/SP/I-4Download
5An endorsement for a phonological based friend matching using systematic metric
Bhavya Kondamudi,R. Sony Krishna
IJRCSE/SP/I-5Download
6Locked Community Cloud Storage With Open Auditing through Privacy
H.Sowjanya
IJRCSE/SP/I-6Download
7Overlay Routing Using BPGRouting, TCP Improvement, AND VOIP Applications
K.Kalyani,V.Lakshman Narayana
IJRCSE/SP/I-7Download
8Tamper-Proof secured Cloud Storage using Decentralized Access Control with OTP
V.Shanmukha Rao,K.Sivaji,B.Kishore,V.Krishnachand,A.Gopinath
IJRCSE/SP/I-8Download
9Comparing of Pig Hive Jaql Map Reducing Queries
P.Pavan Kumar,K.Siva Rama Krishna
IJRCSE/SP/I-9Download
10A Comparative Analysis of Efficient Panorama Image Stitching
Devana N Rajeswari,K.Sitamahalakshmi
IJRCSE/SP/I-10Download
11A Methodical Approaches for outlier detection in high dimensional Data – Survey
SriRupa Danam,Ch.Nagamani
IJRCSE/SP/I-11Download
12A Secured Source Routing in Autonomous Systems
B.Sarath Chandra,A.Chandra Mouli,S.Babu Rajendra Prasad
IJRCSE/SP/I-12Download
13Advanced wicked Performance Exposure and Preclusion Structure for MANET’s Using Fusion Cryptography
Sk.Johny Basha,B.Bhanu Pratap Reddy
IJRCSE/SP/I-13Download
14An Energy Efficient Key Establishing based on routing for Heterogeneous Sensor Networks
L.V.Krishna rao,K.Pavan Kumar
IJRCSE/SP/I-14Download
15Better Safety and Efficiency in Attribute Based Data Sharing
CH. Srikanth,D. Abdulla,R.Srikanth
IJRCSE/SP/I-15Download
16Data Sharing Scheme for Mobile Ad Hoc Network
Alaparthi.Jitendra,Nalajala.Anusha,Pachipala.Yellamma
IJRCSE/SP/I-16Download
17Design of Data Deduplication framework using apache spark
K.Yacob Raju,M.Tanooj Kumar
IJRCSE/SP/I-17Download
18Discovery of Ranking Fraud for Mobile Apps
A.Mary Lavanya,Prof.Mohana Deepthi
IJRCSE/SP/I-18Download
19Green solutions for computer electronic waste management
V.V.Prabhakar Rao
IJRCSE/SP/I-19Download
20Enticement Compatible Privacy Protective Data Analysis
K.Venkateswara Rao,T.Kishore Babu,M.V.P.UmamaheswaraRao
IJRCSE/SP/I-20Download
21Passive IP Traceback Disclosing the Locations Of IP Spoofers from Path BackScatter
PremaNaidu.Ratnala,Dr.Ksmv.Kumar
IJRCSE/SP/I-21Download
22Preference Selection in dissimilar locations on mobile devices with seclusion defense
L.K.N Chandrika,V.Lakshman Narayana
IJRCSE/SP/I-22Download
23Privacy Preserve and Data Protecting in any Location Based Queries and its Security issues
Zainab khan,Rajesh.Y,Rajesh.T
IJRCSE/SP/I-23Download
24Progressive Duplicate Detection
K.Santhivineela,K.Sireesha
IJRCSE/SP/I-24Download
25Public Auditing With Privacy for Secure Public Cloud Storage
M.Vijay Kumar,Ch.Srinivasa Rao
IJRCSE/SP/I-25Download
26Secrecy Strategy Extrapolation of User-Uploaded Images on Content Distribution Sites
K.Lavanya,A.Koteswara Rao
IJRCSE/SP/I-23Download
27Upholding Key Performance Indicators While Designing Secure Clouds
Archana.K,Sivaramakrishna.K
IJRCSE/SP/I-27Download
28Graphical predicting of user personality by Facebook data Mining
N.Raghavendra Sai,Dr.K.Satya Rajesh
IJRCSE/SP/I-28Download
29Implementation to provide security for data in cloud By using a Compression Technique
B.Anil Babu,K.Venkateswara Rao
IJRCSE/SP/I-29Download
30IoT Routing classification and protocols with Autonomous Systems of Things
S.Babu Rajendra Prasad,B.Sarath Chandra,K.Sudhakar
IJRCSE/SP/I-23Download
31SMS Based wireless device remote control system Android Application
M.Renuka Sri,M.Sravani,G.Srinivasavi
IJRCSE/SP/I-31Download
32Certificate Revocation Validation for Mobile Ad Hoc Network Based on huddle Technique
M.Baby Anusha
IJRCSE/SP/I-32Download
33Poignant Targets and Track Detection using Replication Process in Wireless Sensor Networks
P.Keerthi,K.NageswaraRao
IJRCSE/SP/I-33Download
34Emergency Handling System
M.Chandrika,K.Sasi Priya,J.Sri Swathi,I.Anitha Rani
IJRCSE/SP/I-34Download
35Recognizing Faces and Human Gestures in Natural Expressions on Mobile Devices by Considering Computer Vision Techniques
M Ashok Kumar,Dr.R.R.Tewari
IJRCSE/SP/I-35Download
36Warehouse Management System based on Enterprise Framework
Bhavani Buthukuri,Sivaram Rajeyyagari
IJRCSE/SP/I-36Download