1 | Design and Implementation of Trust and Energy Aware Routing Protocol in Wireless Sensor Network Sushma.P, Y.V Adi Satya Narayana | IJRCSE/V2/2-201 | |
2 | Analysis of Authentication Schemes for Filtering Injected False Data in WSN N Kumar Babu.M, Y.V Adi Satya Narayana | IJRCSE/V2/2-202 | |
3 | A Novel Approach for Detecting the Smile Yalamanda Rao.Vemula, Subba Reddy.Borra P.P.S Nayak | ijrcse/22/1/203 | |
4 | Automatic Image Pixel Clustering using Genetic Algorithms Koreddi Venkatesh, G.Sudhakar, A.Prakashnipr | IJRCSE/V2/2-204 | |
5 | Efficiently Prediction of Collective Behavior of a User in Social Network Bitra.Nagendra babu, S.Rajesh | IJRCSE/V2/2-205 | |
6 | Developing a Generic Model and Ordering Test Cases for Embedded Software V.Srilakshmi, M.Satyanarayana, B.Srivara Prasad | IJRCSE/V2/2-206 | |
7 | Modelling of Web Content using Social Tagging Systems Venkata Sri Harsha Karna, G.Satish | IJRCSE/V2/2-207 | |
8 | Classification of ECG Heart Beats K.Jeevan Kumar, O.Sambasiva Rao, V.Ganesh Dutt | IJRCSE/V2/2-208 | |
9 | Efficiently Maintaining the Data Reliability and Consistency in Cloud System Gopi Kishore Ala, Yenumula Sankararao | IJRCSE/V2/2-209 | |
10 | Efficiently Maintaining & Searching User Histories Raja Ravi Chandra.K, Yenumula Sankara Rao | IJRCSE/V2/2-210 | |
11 | Entropy Based Data Compression for Effective Results in Data Transmission Reshma Penmetsa, K.N.V.Devendra Kumar | IJRCSE/V2/2-211 | |
12 | An Efficient Verification of the Data Integrity Proofs in Multi Cloud Storage System A.Lakshmi, Goda.Srinivasa Rao | IJRCSE/V2/2-212 | |
13 | Object Tracking in Real Time Scene Using SPARCE Coding M.V.S.Naresh, Uma Maheswara Rao | IJRCSE/V2/2-213 | |
14 | Improved Version of Web Crawler for Efficient Domain Specific Search Prasanti Supriya Bhavana, K.N.V.Devendra Kumar | IJRCSE/V2/2-214 | |
15 | Fastest & Efficient Searching Technique by User Login Histories G.Vasundhara, B.Subba Reddy, P.Pedda Sadhu Naik | IJRCSE/V2/2-215 | |
16 | Data Security in Cloud Computing Using Digital Signature with RSA Encryption K.Raja Reddy, Dr.G.Manjunath | IJRCSE/V2/2-216 | |
17 | Effectively Monitoring the Traffic Control Problems in Network Ch. Lakshmi Deepika,P.P.S.Naik | IJRCSE/V2/2-217 | |
18 | An Efficient & Interactive Query Formulation Language-MashQL Rama Rao Pooti, Chinna Babu Galinki | IJRCSE/V2/2-218 | |
19 | Fastest & Professional Searching Method by User Login Histories P.Venkata Lakshmi, K.Govardhana Babu | IJRCSE/V2/2-219 | |
20 | Fast and Professional Recovery from Link and Node Failures in Networks T.Swarna Latha, S.Jalaiah | IJRCSE/V2/2-220 | |
21 | Proficiently Maintaining the Authentication, Access and User Control in Cloud G. Sarat Babu, S.Anil Kumar, Dr P. Harini | IJRCSE/V2/2-221 | |
22 | An Efficiently Mining the User Related Data Using Inductive Rule Mining Ch.Sankar, S.Anil Kumar, Dr P. Harini | IJRCSE/V2/2-222 | |
23 | Effeciently Controlling the Traffic Problems in Network Poornachand Kommu, Eswar Kodali, Dr P. Harini | IJRCSE/V2/2-223 | |
23 | Effeciently Controlling the Traffic Problems in Network Poornachand Kommu, Eswar Kodali, Dr P. Harini | IJRCSE/V2/2-223 | |