1 | Automated Electronic Toll Collection System with Fraudulent Control using IOT G Soujanya, R Deepthi | IJRCSE/SP/I-1 | |
2 | Comparison between Structured and Semi-Structured data for Inverted Index Compression B.Usharani | IJRCSE/SP/I-2 | |
3 | Interactive image segmentation by using Bayesian belief Network Model–BBN model CH.Kiran Kumar | IJRCSE/SP/I-3 | |
4 | Best Practices in Vulnerability Management Mr.Kattupalli Sudhakar,Mr.G.Rambabu,Mr.VSRK.Prasad.G | IJRCSE/SP/I-4 | |
5 | An endorsement for a phonological based friend matching using systematic metric Bhavya Kondamudi,R. Sony Krishna | IJRCSE/SP/I-5 | |
6 | Locked Community Cloud Storage With Open Auditing through Privacy H.Sowjanya | IJRCSE/SP/I-6 | |
7 | Overlay Routing Using BPGRouting, TCP Improvement, AND VOIP Applications K.Kalyani,V.Lakshman Narayana | IJRCSE/SP/I-7 | |
8 | Tamper-Proof secured Cloud Storage using Decentralized Access Control with OTP V.Shanmukha Rao,K.Sivaji,B.Kishore,V.Krishnachand,A.Gopinath | IJRCSE/SP/I-8 | |
9 | Comparing of Pig Hive Jaql Map Reducing Queries P.Pavan Kumar,K.Siva Rama Krishna | IJRCSE/SP/I-9 | |
10 | A Comparative Analysis of Efficient Panorama Image Stitching Devana N Rajeswari,K.Sitamahalakshmi | IJRCSE/SP/I-10 | |
11 | A Methodical Approaches for outlier detection in high dimensional Data – Survey SriRupa Danam,Ch.Nagamani | IJRCSE/SP/I-11 | |
12 | A Secured Source Routing in Autonomous Systems B.Sarath Chandra,A.Chandra Mouli,S.Babu Rajendra Prasad | IJRCSE/SP/I-12 | |
13 | Advanced wicked Performance Exposure and Preclusion Structure for MANET’s Using Fusion Cryptography Sk.Johny Basha,B.Bhanu Pratap Reddy | IJRCSE/SP/I-13 | |
14 | An Energy Efficient Key Establishing based on routing for Heterogeneous Sensor Networks L.V.Krishna rao,K.Pavan Kumar | IJRCSE/SP/I-14 | |
15 | Better Safety and Efficiency in Attribute Based Data Sharing CH. Srikanth,D. Abdulla,R.Srikanth | IJRCSE/SP/I-15 | |
16 | Data Sharing Scheme for Mobile Ad Hoc Network Alaparthi.Jitendra,Nalajala.Anusha,Pachipala.Yellamma | IJRCSE/SP/I-16 | |
17 | Design of Data Deduplication framework using apache spark K.Yacob Raju,M.Tanooj Kumar | IJRCSE/SP/I-17 | |
18 | Discovery of Ranking Fraud for Mobile Apps A.Mary Lavanya,Prof.Mohana Deepthi | IJRCSE/SP/I-18 | |
19 | Green solutions for computer electronic waste management V.V.Prabhakar Rao | IJRCSE/SP/I-19 | |
20 | Enticement Compatible Privacy Protective Data Analysis K.Venkateswara Rao,T.Kishore Babu,M.V.P.UmamaheswaraRao | IJRCSE/SP/I-20 | |
21 | Passive IP Traceback Disclosing the Locations Of IP Spoofers from Path BackScatter PremaNaidu.Ratnala,Dr.Ksmv.Kumar | IJRCSE/SP/I-21 | |
22 | Preference Selection in dissimilar locations on mobile devices with seclusion defense L.K.N Chandrika,V.Lakshman Narayana | IJRCSE/SP/I-22 | |
23 | Privacy Preserve and Data Protecting in any Location Based Queries and its Security issues Zainab khan,Rajesh.Y,Rajesh.T | IJRCSE/SP/I-23 | |
24 | Progressive Duplicate Detection K.Santhivineela,K.Sireesha | IJRCSE/SP/I-24 | |
25 | Public Auditing With Privacy for Secure Public Cloud Storage M.Vijay Kumar,Ch.Srinivasa Rao | IJRCSE/SP/I-25 | |
26 | Secrecy Strategy Extrapolation of User-Uploaded Images on Content Distribution Sites K.Lavanya,A.Koteswara Rao | IJRCSE/SP/I-23 | |
27 | Upholding Key Performance Indicators While Designing Secure Clouds Archana.K,Sivaramakrishna.K | IJRCSE/SP/I-27 | |
28 | Graphical predicting of user personality by Facebook data Mining N.Raghavendra Sai,Dr.K.Satya Rajesh | IJRCSE/SP/I-28 | |
29 | Implementation to provide security for data in cloud By using a Compression Technique B.Anil Babu,K.Venkateswara Rao | IJRCSE/SP/I-29 | |
30 | IoT Routing classification and protocols with Autonomous Systems of Things S.Babu Rajendra Prasad,B.Sarath Chandra,K.Sudhakar | IJRCSE/SP/I-23 | |
31 | SMS Based wireless device remote control system Android Application M.Renuka Sri,M.Sravani,G.Srinivasavi | IJRCSE/SP/I-31 | |
32 | Certificate Revocation Validation for Mobile Ad Hoc Network Based on huddle Technique M.Baby Anusha | IJRCSE/SP/I-32 | |
33 | Poignant Targets and Track Detection using Replication Process in Wireless Sensor Networks P.Keerthi,K.NageswaraRao | IJRCSE/SP/I-33 | |
34 | Emergency Handling System M.Chandrika,K.Sasi Priya,J.Sri Swathi,I.Anitha Rani | IJRCSE/SP/I-34 | |
35 | Recognizing Faces and Human Gestures in Natural Expressions on Mobile Devices by Considering Computer Vision Techniques M Ashok Kumar,Dr.R.R.Tewari | IJRCSE/SP/I-35 | |
36 | Warehouse Management System based on Enterprise Framework Bhavani Buthukuri,Sivaram Rajeyyagari | IJRCSE/SP/I-36 | |