1 | Enhancement of Highly Secure Video Surveillance System with Wireless
Communication T.R Arun, K. Dhanasree, Dr.R.V.Krishnaiah | IJRCSE/V3/2-401 |  |
2 | Implementation of Data Hiding in Encrypted Image by Using Independent
Revocable Method Boda Pranay, Naresh Kumar Sripada | IJRCSE/V3/2-402 |  |
3 | Document Clustering Analysis Based on Hybrid PSO+K-means
Algorithm G.Chandrarao, Mr. A Satya Mallesh | IJRCSE/V3/2-403 |  |
4 | A Load Balancer for Sip Server Clusters Based Transaction Least-Work-Left (TLWL) M.Rajitha, K. Nageshwara Rao | IJRCSE/V3/2-404 |  |
5 | SAFEQ and Sink for Preserving Range Queries in Sensor Networks G.Sudharani, K. Nageshwara Rao | IJRCSE/V3/2-405 |  |
6 | RIHT: Hybrid IP Trace Back Schemes Demanding Less Storage but Requiring A Longer Search A. Lavanya, K. Nageshwara Rao | IJRCSE/V3/2-406 |  |
7 | A High Step-Up Interleaved DC-DC Converter with a Voltage Multiplier Module for a Photovoltaic grid System Ebbin Daniel, V. Balaganesh, P.Anusuya, K.Poovizhi | IJRCSE/V3/2-407 |  |
8 | Refinement on Botnets with Secure Derivation on DDOS Attacks Dr.J. Srinivasa Rao, Mr.G. Sudhir | IJRCSE/V3/2-408 |  |
9 | Control Speed of Permanent Magnet Sensor Devices over VHDL Dr. Pandurangan Ravi, Dr. G. Sreenivasula Reddy, Dr. V. P. C. Rao | IJRCSE/V3/2-409 |  |
10 | Educational Data Management System for OPNET Simulator Dr. G. Sreenivasula Reddy, Dr. Pandurangan Ravi, Dr. V. P. C. Rao | IJRCSE/V3/2-410 |  |
11 | Detection of Moving Object by using Support Vector Machine K.Bala jyothi, V.V.Ranganadh | IJRCSE/V3/2-411 |  |
12 | Data Leakage Detection with M-Score Dunna.Madhuri, Meshineni Rambhupal | IJRCSE/V3/2-412 |  |
13 | Web Security by Using Spelling based CAPTCHA T.Anil Kumar, Gudivada Sasi Bhushana Rao | IJRCSE/V3/2-413 |  |
14 | Association Rule Analysis of Query Groups in Web 2.0 T.Siva Lakshmaiah, M.Naga Raju | IJRCSE/V3/2-414 |  |
15 | Discovering Patterns of Human Behaviour by Using Decision Tree Learning K. Mahesh, G. Guru Kesava Das | IJRCSE/V3/2-415 |  |
16 | Location Based Services over a Smart phone in Cloud Environment Mr.A.M.J.Muthukumaran, Srikanth Reddy E | IJRCSE/V3/2-416 |  |
17 | Hiding Sensitive Data based on Association rule Mining Srinivasa Rao Kongarana , V.Kamakshi Prasad | IJRCSE/V3/2-417 |  |