1 | Efficient Adaptive Background Subtraction Based On Multi - Resolution Background Modeling and Updating Mrs. S.Hemalatha, Mr. A. Sreenivasa Rao | IJRCSE/V4/1-501 | |
2 | Scalable and Protected Sharing of Customer Medical Records in Cloud Dr. Naga Srinivasu V. Sirasanagondla | IJRCSE/V4/1-502 | |
3 | Maximization of Profit in Cloud Computing Using M/M/M Queuing Model Pragna.D, M.Rajasekaran | IJRCSE/V4/1-503 | |
4 | Efficiently Eliminating Inconsistency and Redundancy in Web Service Policies Swathi.Molakalapalli, Kanmani S P | IJRCSE/V4/1-504 | |
5 | Embedded Extended Visual Cryptography Schemes for Sharing Secret Images using Halftone Algorithm Mrs. Uppalapati Srilakshmi, Mr. Jampani Satish Babu, Mr. Kancherla Balakrishna | IJRCSE/V4/1-505 | |
6 | Privacy Awareness Of Spam E-Mails P.Anusha Reddy | IJRCSE/V4/1-506 | |
7 | An Unobservable Routing Protocol without Worm Hole Attack Divya Babu, Shanthi M | IJRCSE/V4/1-507 | |
8 | Personalized Mobile Search Engine using Click through Data Sunil Kumar Arutla, Naveen Adusumilli | IJRCSE/V4/1-508 | |
9 | A System For Filtering Unwanted Messages From Online Social Network (OSN) User Walls Using Machine Learning Techniques Gabbeta Srishyalam, Sateesh Nagavarapu | IJRCSE/V4/1-509 | |
10 | Discovering Of Misbehaving Forwards By Using
Node Categorization Algorithm Gummadi Vijaya Kumar, P Satya Narayana | IJRCSE/V4/1-510 | |
11 | Improving Embedding Capability Of Digital Stegno Images Suresh Medapati, Medida Nagaraju | IJRCSE/V4/1-511 | |
12 | Mitigate the Gang Injecting False Data Attack in Wireless Sensor Networks Potula Vijaya Kumar, Prof. B.R.Sarat Kumar | IJRCSE/V4/1-512 | |
13 | Type Ahead Keyword Query Search In Text Philip Navadeep Kurakula, P Satya Narayana | IJRCSE/V4/1-513 | |
14 | Professionally Measuring Similarities between Objects in Dissimilar views of Hierarchical Clustering B.Pradeep, K.John Paul | IJRCSE/V4/1-514 | |