1 | Data Extraction User Used Information In Online Shaik Sher Ali , Shahida Shaik | IJRCSE/V4/4-801 | |
2 | Balanced Usage of Provable Data Possession (PDP) in Cloud for Effective Functioning I.Naresh, G.Mallikharjuna Rao | IJRCSE/V4/4-802 | |
3 | Minersoft and its Features for Efficient Working of Cloud Narne Srikanth, E.Sambasiva Rao | IJRCSE/V4/4-803 | |
4 | Effective Controlling of Video Traffic by using Scalable Video Code D.Prasannanjaneyulu, K.Swarooparani | IJRCSE/V4/4-804 | |
5 | Dynamic Mobile Streaming in Cloud Mov for Encoding Services D.Venkatesh Babu, E.Sambasiva Rao | IJRCSE/V4/4-805 | |
6 | Dynamic Authentication for Virtual Machine in Cloud Computing using SIP Servers M. Radhika, SK.Shahida | IJRCSE/V4/4-806 | |
7 | Attribute-Based Encryption for Access Control of Outsourced Data in Cloud Computing A. Adi Lakshmi, K. Sudhakara Babu | IJRCSE/V4/4-807 | |
8 | Functional Usage Observation Node Position In Wireless Sensor Networks B.Prathusha , E.Sambasiva Rao | IJRCSE/V4/4-808 | |
9 | Dynamic Crowd Sourcing using Active Learning Approach I.Sruthi, N. Hari Krishna | IJRCSE/V4/4-809 | |
10 | Dynamic GPS Settings in User Search Histories P.Lakshminarayana, G.Mallikharjuna Rao | IJRCSE/V4/4-810 | |
11 | Extracting Feedback Process Generation In Customized System Operations In Online Social
Networks M.Radhika, N.Hari Krishna | IJRCSE/V4/4-811 | |
12 | Preventing Unauthorized Information Inference Attacks on Social Networks K.Praveena, K.Swaroopa Rani | IJRCSE/V4/4-812 | |
13 | Dynamic Message Authentication in OSN Networks D.Nalini, K.SudhakaraBabu | IJRCSE/V4/4-813 | |
14 | Information Security Using Cryptography Techniques In Steganography Applications K.Pavani Srivalli, E.Sambasiva Rao | IJRCSE/V4/4-814 | |
15 | A Synchronized Processing on Vampire Attacks Using MAC Protocols S. Bala Gopala Raju, N. Veeranjaneyulu | IJRCSE/V4/4-815 | |
16 | Maintains Construction Development Through Predictability Study N.Avinash, N.Veeranjaneyulu | IJRCSE/V4/4-816 | |
17 | Cross Domain Privacy Preserving Firewall Optimization Using Secure Multi-Party Computation In Networks Raghavendrao. Birapuneni, N. Hari Krishna | IJRCSE/V4/4-817 | |
18 | Safety Locate Formations Identification System For Improvised Mobile Wireless Networks Kethineni Satyanarayana, N. Hari Krishna | IJRCSE/V4/4-818 | |
19 | A Secure Multi-Hop Routing In Wireless Sensor Networks K.Saidi Reedy, N.Satish | IJRCSE/V4/4-819 | |
20 | Improved AFAST Clustering based FeatureSelection using Genetic Algorithm Y. Siva Kumar, G. John Samuel Babu | IJRCSE/V4/4-820 | |
21 | Implementing characteristic Selection Algorithm for High Dimensional Data Using Self-Supervised
Learning and Fuzzy Logic Kulkarni Tejaswini, Lalitha Manglaram | IJRCSE/V4/4-821 | |
22 | Multidimensional Reduction Principal Component Analysis for Anomaly Detection V.Neelima,G.L.Sravanthi, V.Tejaswi | IJRCSE/V4/4-822 | |
23 | An Effective Classification System to Detect Packed and Encrypted Malware C.Deepika, A.Swarna, Ravi Mathey | IJRCSE/V4/4-823 | |
24 | Information Security Using Human Visual System Model in Steganography Applications P.kiranmaie, R.Phani Kishore | IJRCSE/V4/4-824 | |
25 | A Review of Implementing Web Mining and Knowledge Discovery of Usage Patterns for Personalization and Usage Mining Gujarathi Alaikya, Anitha sri ramoju | IJRCSE/V4/4-825 | |
26 | Micro data Protection Using Tuple Grouping Components Mundru.Govindarajulu, Jetty Kiran Kumar, M. Swati | IJRCSE/V4/4-826 | |
27 | Solving Optimality and Storage Constraint Problem in Data Staging using Dynamic Programming B.Naga Anusha, M. Narasimha Raju | IJRCSE/V4/4-827 | |
28 | Secured Query Processing By Optimizing Performance Factors P. S. S. N. Madhuri, P. J. R. Shalem Raju | IJRCSE/V4/4-828 | |
29 | Dynamic Site Distribution and Factor Balancing for Privacy Preserving Information Brokering Siva Sankar Siripurapu, T.Nirosh kumar | IJRCSE/V4/4-829 | |
30 | Providing Security in Public Auditing for Cloud Storage P.Neelima, B.Rajini Kanth | IJRCSE/V4/4-830 | |
31 | An Efficient Security Scheme against Vampire Flacks in Ad Hoc Sensor Networks Dr S.V.N.Srinivasu | IJRCSE/V4/4-831 | |
32 | Trickling of Undesirable Messages in Online Social Networks Using Content based Message Filtering
and Short Text Classifier Dr S.V.N.Srinivasu | IJRCSE/V4/4-832 | |
33 | Association rule mining based on Product Sales Algorithm Sampath Kumar Kommineni, S.N.Tirumala Rao | IJRCSE/V4/4-833 | |