1 | Design and Implementation of Trust and Energy Aware Routing Protocol in Wireless Sensor Network Sushma.P, Y.V Adi Satya Narayana | IJRCSE/V2/2-201 |  |
2 | Analysis of Authentication Schemes for Filtering Injected False Data in WSN N Kumar Babu.M, Y.V Adi Satya Narayana | IJRCSE/V2/2-202 |  |
3 | A Novel Approach for Detecting the Smile Yalamanda Rao.Vemula, Subba Reddy.Borra P.P.S Nayak | ijrcse/22/1/203 |  |
4 | Automatic Image Pixel Clustering using Genetic Algorithms Koreddi Venkatesh, G.Sudhakar, A.Prakashnipr | IJRCSE/V2/2-204 |  |
5 | Efficiently Prediction of Collective Behavior of a User in Social Network Bitra.Nagendra babu, S.Rajesh | IJRCSE/V2/2-205 |  |
6 | Developing a Generic Model and Ordering Test Cases for Embedded Software V.Srilakshmi, M.Satyanarayana, B.Srivara Prasad | IJRCSE/V2/2-206 |  |
7 | Modelling of Web Content using Social Tagging Systems Venkata Sri Harsha Karna, G.Satish | IJRCSE/V2/2-207 |  |
8 | Classification of ECG Heart Beats K.Jeevan Kumar, O.Sambasiva Rao, V.Ganesh Dutt | IJRCSE/V2/2-208 |  |
9 | Efficiently Maintaining the Data Reliability and Consistency in Cloud System Gopi Kishore Ala, Yenumula Sankararao | IJRCSE/V2/2-209 |  |
10 | Efficiently Maintaining & Searching User Histories Raja Ravi Chandra.K, Yenumula Sankara Rao | IJRCSE/V2/2-210 |  |
11 | Entropy Based Data Compression for Effective Results in Data Transmission Reshma Penmetsa, K.N.V.Devendra Kumar | IJRCSE/V2/2-211 |  |
12 | An Efficient Verification of the Data Integrity Proofs in Multi Cloud Storage System A.Lakshmi, Goda.Srinivasa Rao | IJRCSE/V2/2-212 |  |
13 | Object Tracking in Real Time Scene Using SPARCE Coding M.V.S.Naresh, Uma Maheswara Rao | IJRCSE/V2/2-213 |  |
14 | Improved Version of Web Crawler for Efficient Domain Specific Search Prasanti Supriya Bhavana, K.N.V.Devendra Kumar | IJRCSE/V2/2-214 |  |
15 | Fastest & Efficient Searching Technique by User Login Histories G.Vasundhara, B.Subba Reddy, P.Pedda Sadhu Naik | IJRCSE/V2/2-215 |  |
16 | Data Security in Cloud Computing Using Digital Signature with RSA Encryption K.Raja Reddy, Dr.G.Manjunath | IJRCSE/V2/2-216 |  |
17 | Effectively Monitoring the Traffic Control Problems in Network Ch. Lakshmi Deepika,P.P.S.Naik | IJRCSE/V2/2-217 |  |
18 | An Efficient & Interactive Query Formulation Language-MashQL Rama Rao Pooti, Chinna Babu Galinki | IJRCSE/V2/2-218 |  |
19 | Fastest & Professional Searching Method by User Login Histories P.Venkata Lakshmi, K.Govardhana Babu | IJRCSE/V2/2-219 |  |
20 | Fast and Professional Recovery from Link and Node Failures in Networks T.Swarna Latha, S.Jalaiah | IJRCSE/V2/2-220 |  |
21 | Proficiently Maintaining the Authentication, Access and User Control in Cloud G. Sarat Babu, S.Anil Kumar, Dr P. Harini | IJRCSE/V2/2-221 |  |
22 | An Efficiently Mining the User Related Data Using Inductive Rule Mining Ch.Sankar, S.Anil Kumar, Dr P. Harini | IJRCSE/V2/2-222 |  |
23 | Effeciently Controlling the Traffic Problems in Network Poornachand Kommu, Eswar Kodali, Dr P. Harini | IJRCSE/V2/2-223 |  |
23 | Effeciently Controlling the Traffic Problems in Network Poornachand Kommu, Eswar Kodali, Dr P. Harini | IJRCSE/V2/2-223 |  |