1 | Data Extraction User Used Information In Online Shaik Sher Ali , Shahida Shaik | IJRCSE/V4/4-801 |  |
2 | Balanced Usage of Provable Data Possession (PDP) in Cloud for Effective Functioning I.Naresh, G.Mallikharjuna Rao | IJRCSE/V4/4-802 |  |
3 | Minersoft and its Features for Efficient Working of Cloud Narne Srikanth, E.Sambasiva Rao | IJRCSE/V4/4-803 |  |
4 | Effective Controlling of Video Traffic by using Scalable Video Code D.Prasannanjaneyulu, K.Swarooparani | IJRCSE/V4/4-804 |  |
5 | Dynamic Mobile Streaming in Cloud Mov for Encoding Services D.Venkatesh Babu, E.Sambasiva Rao | IJRCSE/V4/4-805 |  |
6 | Dynamic Authentication for Virtual Machine in Cloud Computing using SIP Servers M. Radhika, SK.Shahida | IJRCSE/V4/4-806 |  |
7 | Attribute-Based Encryption for Access Control of Outsourced Data in Cloud Computing A. Adi Lakshmi, K. Sudhakara Babu | IJRCSE/V4/4-807 |  |
8 | Functional Usage Observation Node Position In Wireless Sensor Networks B.Prathusha , E.Sambasiva Rao | IJRCSE/V4/4-808 |  |
9 | Dynamic Crowd Sourcing using Active Learning Approach I.Sruthi, N. Hari Krishna | IJRCSE/V4/4-809 |  |
10 | Dynamic GPS Settings in User Search Histories P.Lakshminarayana, G.Mallikharjuna Rao | IJRCSE/V4/4-810 |  |
11 | Extracting Feedback Process Generation In Customized System Operations In Online Social
Networks M.Radhika, N.Hari Krishna | IJRCSE/V4/4-811 |  |
12 | Preventing Unauthorized Information Inference Attacks on Social Networks K.Praveena, K.Swaroopa Rani | IJRCSE/V4/4-812 |  |
13 | Dynamic Message Authentication in OSN Networks D.Nalini, K.SudhakaraBabu | IJRCSE/V4/4-813 |  |
14 | Information Security Using Cryptography Techniques In Steganography Applications K.Pavani Srivalli, E.Sambasiva Rao | IJRCSE/V4/4-814 |  |
15 | A Synchronized Processing on Vampire Attacks Using MAC Protocols S. Bala Gopala Raju, N. Veeranjaneyulu | IJRCSE/V4/4-815 |  |
16 | Maintains Construction Development Through Predictability Study N.Avinash, N.Veeranjaneyulu | IJRCSE/V4/4-816 |  |
17 | Cross Domain Privacy Preserving Firewall Optimization Using Secure Multi-Party Computation In Networks Raghavendrao. Birapuneni, N. Hari Krishna | IJRCSE/V4/4-817 |  |
18 | Safety Locate Formations Identification System For Improvised Mobile Wireless Networks Kethineni Satyanarayana, N. Hari Krishna | IJRCSE/V4/4-818 |  |
19 | A Secure Multi-Hop Routing In Wireless Sensor Networks K.Saidi Reedy, N.Satish | IJRCSE/V4/4-819 |  |
20 | Improved AFAST Clustering based FeatureSelection using Genetic Algorithm Y. Siva Kumar, G. John Samuel Babu | IJRCSE/V4/4-820 |  |
21 | Implementing characteristic Selection Algorithm for High Dimensional Data Using Self-Supervised
Learning and Fuzzy Logic Kulkarni Tejaswini, Lalitha Manglaram | IJRCSE/V4/4-821 |  |
22 | Multidimensional Reduction Principal Component Analysis for Anomaly Detection V.Neelima,G.L.Sravanthi, V.Tejaswi | IJRCSE/V4/4-822 |  |
23 | An Effective Classification System to Detect Packed and Encrypted Malware C.Deepika, A.Swarna, Ravi Mathey | IJRCSE/V4/4-823 |  |
24 | Information Security Using Human Visual System Model in Steganography Applications P.kiranmaie, R.Phani Kishore | IJRCSE/V4/4-824 |  |
25 | A Review of Implementing Web Mining and Knowledge Discovery of Usage Patterns for Personalization and Usage Mining Gujarathi Alaikya, Anitha sri ramoju | IJRCSE/V4/4-825 |  |
26 | Micro data Protection Using Tuple Grouping Components Mundru.Govindarajulu, Jetty Kiran Kumar, M. Swati | IJRCSE/V4/4-826 |  |
27 | Solving Optimality and Storage Constraint Problem in Data Staging using Dynamic Programming B.Naga Anusha, M. Narasimha Raju | IJRCSE/V4/4-827 |  |
28 | Secured Query Processing By Optimizing Performance Factors P. S. S. N. Madhuri, P. J. R. Shalem Raju | IJRCSE/V4/4-828 |  |
29 | Dynamic Site Distribution and Factor Balancing for Privacy Preserving Information Brokering Siva Sankar Siripurapu, T.Nirosh kumar | IJRCSE/V4/4-829 |  |
30 | Providing Security in Public Auditing for Cloud Storage P.Neelima, B.Rajini Kanth | IJRCSE/V4/4-830 |  |
31 | An Efficient Security Scheme against Vampire Flacks in Ad Hoc Sensor Networks Dr S.V.N.Srinivasu | IJRCSE/V4/4-831 |  |
32 | Trickling of Undesirable Messages in Online Social Networks Using Content based Message Filtering
and Short Text Classifier Dr S.V.N.Srinivasu | IJRCSE/V4/4-832 |  |
33 | Association rule mining based on Product Sales Algorithm Sampath Kumar Kommineni, S.N.Tirumala Rao | IJRCSE/V4/4-833 |  |