1 | CSP And Enables Indirect Mutual Trust Between Cloud-Based Storage Scheme A. Siva Rama Krishna, S. Suresh | IJRCSE/V4/5-901 | |
2 | Complementary To The Privacy-Preserving Public Auditing Scheme Amgoth Rajkumar, P. Karunakar Reddy, S. Suresh | IJRCSE/V4/5-902 | |
3 | A New Framework For Anonymity In Sensor Networks Mogili Ranjith Kumar, P. Karunakar Reddy, S. Suresh | IJRCSE/V4/5-903 | |
4 | A New Intrusion-Detection System Named Enhanced Adaptive Acknowledgment Swamy Ayyappa Jalluri, P. Nageswara Rao, S. Suresh | IJRCSE/V4/5-904 | |
5 | Comprehensive Survey Of Xml Tree Patterns T Narayana Rao, P. Nageswara Rao, S. Suresh | IJRCSE/V4/5-905 | |
6 | An Optimal Strategy Based On Aspiration-Based Learning B Venkatesh Mariyadala, P. Nageswara Rao, S. Suresh | IJRCSE/V4/5-906 | |
7 | Mitigating Vendor Lock-In To The Meta cloud Narasaiah Gallamalla, S. Suresh | IJRCSE/V4/5-907 | |
8 | Efficient Information Retrieval For Ranked Query (EIRQ) Schemes Satunoori Anil Kumar, P. Karunakar Reddy, S. Suresh | IJRCSE/V4/5-908 | |
9 | Cloud-Based Novel Mobile Social TV System Vijjineni Praveen Kumar, P. Nageswara Rao, S. Suresh | IJRCSE/V4/5-909 | |
10 | Aloha Algorithm For Neighbor Discovery In Wireless Networks Rajasekhar Lalichetti, S. Suresh | IJRCSE/V4/5-910 | |
11 | Traverse The Design Space Of Multichannel Peer-To-Peer Live Video Streaming Systems Spoorthi Pandalaneni, S. Suresh | IJRCSE/V4/5-911 | |
12 | Combined And Differentiated Localization Approach For Localization Vemireddy Sitharavamma, P. Nageswara Rao, S. Suresh | IJRCSE/V4/5-912 | |
13 | Multimedia Answer Generation by Harvesting Web Information Algorithms S. Somasekhar, D. Kumar, P. Pedda Sadhu Naik | IJRCSE/V4/5-913 | |
14 | Business Events and Temporal Constraints as aService S. Lakshmi Devi, D. Kumar, P. Pedda Sadhu Naik | IJRCSE/V4/5-914 | |
15 | Predicate-Based data Sharing on Mobile Network Y.Bhargavi Devi, D. Kumar, P. Pedda Sadhu Naik | IJRCSE/V4/5-915 | |
16 | Packets Routing by back Pressure based Adaptive Routing in Networks D. Sivaparvathi, D. Kumar, P. Pedda Sadhu Naik | IJRCSE/V4/5-916 | |
17 | Privacy and Secured Broadcasting In Network Routing Scheme P. Suresh Babu, D. Kumar, P. Pedda Sadhu Naik | IJRCSE/V4/5-917 | |
18 | Safe Multi Possessor Information Allocation For Vibrant Associations In The Cloud T. Swetha, B. Thirupathi Kumar | IJRCSE/V4/5-918 | |
19 | Adjust Processing on European folklore Using MAC Protocols B.CH.Talluri, j.Mahalakshmi | IJRCSE/V4/5-919 | |
20 | Discovery And Verification Of Neighbour Positions In Mobile Unintentional Networks Sk.Rasool, j.Mahalakshmi | IJRCSE/V4/5-920 | |
21 | Trading System Based On Bond- Automotive Engineers With Store-and-Forward Manner Dodda.ChennaReddy, M. Gnana Vardhan | IJRCSE/V4/5-921 | |
22 | MANET Routing Attacks with Risk-Aware Mitigation P.Nageswara Rao, S. Jalaiah, P.Pedda Sadhu Naik | IJRCSE/V4/5-922 | |
23 | Dynamic Control OF Network Security For Continual, Packet Arrivals In DTNS Balaji Veluguri, S. Jalaiah, P.Pedda Sadhu Naik | IJRCSE/V4/5-923 | |
24 | Translations User Surveillance Of Node Location In Wireless Sensor Networks D. Chinna Kasi Reddy, S. Jalaiah, P.Pedda Sadhu Naik | IJRCSE/V4/5-924 | |
25 | Security Analysis Of One Sign-On Mechanism For Distributed Networks R.Manthru Naik, S. Jalaiah, P.Pedda Sadhu Naik | IJRCSE/V4/5-925 | |
26 | Consideration of Energy Resources for Maintaining Virtual Machines Y.Deepika, S.Shravani | IJRCSE/V4/5-926 | |
27 | Implementation of Privacy Protection Methods in Online Social Network Ramidi Santhosh Kumar , P. Kiran Kumar, Ravi Mathey | IJRCSE/V4/5-927 | |
28 | An Approach to Efficiently Maintain Outsourced Cloud Data D. Vikram Paul, A. Swarna Reddy, Ravi Mathey | IJRCSE/V4/5-928 | |
29 | Using Gene appearance Data for Mining order Preserving Sub matrices Mahesh Pentela, A. Swarna Reddy, Ravi Mathey | IJRCSE/V4/5-929 | |
30 | Investigation of Insiders Attack Mitigation Strategies in cloud Computing Nakka Pradeep, P Jagadeeswara Rao, Sayeed Yasin | IJRCSE/V4/5-930 | |
31 | Implementing Advanced Attribute Based Encryption for Content Access in Cloud Assisted
Networks J.Shravan Kumar, Sajja Suneel | IJRCSE/V4/5-931 | |
32 | A Background Subtraction For Visual Surveillance Applications In Security Places V. Pallavi, A.Nanda Gopal | IJRCSE/V4/5-932 | |
33 | Maximize the network lifetime with minimizing data gathering delay in Wireless Sensor Network Monica Yaddanapudi, Chaganti B N Lakshmi | IJRCSE/V4/5-933 | |
34 | Providing Security For Cloud Storage With Public Auditing Algorithm In Manets Togati Rammohan, T.Shankar, M.Laxman | IJRCSE/V4/5-934 | |
35 | Scalable Video Data Streaming And Sharing In Cloud M. Naresh, D. Sailaja, Ravi Mathey | IJRCSE/V4/5-935 | |
36 | Active Multitude Sourcing using Apriori Algorithm Approach Srikanth. Bolla, G. Nageswararao | IJRCSE/V4/5-936 | |
37 | Attribute-Based Encryption for Access Control of Outsourced Data Ch.Harshavardhan reddy, R.V.Kishore kumar | IJRCSE/V4/5-937 | |
38 | A Mining to Filter Unwanted Data from OSN User Walls T Soujanya, K.Nageswara rao | IJRCSE/V4/5-938 | |
39 | Random Object Detection By Using Background Subtraction M.Sujitha, Ravi Mathey | IJRCSE/V4/5-939 | |
40 | Energy Aware Priority Packet Scheduling For Wireless Sensor Network Bhaskarla Sandya Rani, Chaganti B N Lakshmi | IJRCSE/V4/5-940 | |
41 | Efficient Moving Object Detection By Using K-Means Algorithm Vejandla Srikanth, Jetti Kumar , P. Rambabu | IJRCSE/V4/5-941 | |
42 | Target chase and Mobile sensing element Finding in Wireless Sensor Networks Ravindrababu Mullapudi, P.V.Naganjaneyulu | IJRCSE/V4/5-942 | |
43 | Objective Uses of possible Facts Asset in Cloud Functioning Srinivasa Rao Pratti, Goda Srinuvasa Rao | IJRCSE/V4/5-943 | |
44 | Design Based Pre- Distribution Schemes for Wireless Sensor Networks Using Scalable key P.N.Siva Rama Krishna Pilla, P.V.Naganjaneyulu | IJRCSE/V4/5-944 | |
45 | Effective Usage Detection Of Node Location In Wireless Sensor Networks Ashoka Rao Gottipati, T.Anusha | IJRCSE/V4/5-945 | |
46 | Multiple Steering Pattern Based On Bond- Vehicle Engineers Forward Manner Shajahan syed, Jajam. Nagaraju, Shaik. Abdul | IJRCSE/V4/5-946 | |
47 | Order-Optimal Per-Flow Delay in Multihop Wireless Networks with the use of A Low Complexity Congestion Control and Scheduling Algorithm Shaik Nagoor Shareef , Jajam.Nagaraju, Shaik.Abdul | IJRCSE/V4/5-947 | |
48 | Adaptive timeserving Routing for Wireless Ad Hoc Networks Dasari.RamaDevi, B.V.Praveen Kumar | IJRCSE/V4/5-948 | |
49 | A Cryptosystem Based Privacy Methodical System in Wireless Sensor Networks Sunkesula.Ramu, Jajam.Nagaraju, Shaik.Abdul | IJRCSE/V4/5-949 | |
50 | Social Wireless Networks for Distributed Cooperative Caching V.Hari Naik, B.V.PraveenKumar | IJRCSE/V4/5-950 | |
51 | Efficient Search In Database for Query Based Mining Elements Ch.Rajani, T.Anusha | IJRCSE/V4/5-951 | |
52 | Website Structure Improvement Through Entropy Analysis C. K.Raja Jujjuru, P. Ratna Babu | IJRCSE/V4/5-952 | |
53 | Performance Evaluation of a XML Tree Patterns Koteswara Rao.Valem, P.Ratna Babu | IJRCSE/V4/5-953 | |
54 | Image Mining User Used Queries In Online System Ch.Anuradha, P.V.Naganjaneyulu | IJRCSE/V4/5-954 | |
55 | Clustering Implementation of Incremental Crawling approach in Web Forums Kamarapu Rohith , A. Swarna Reddy, Ravi Mathey | IJRCSE/V4/5-955 | |
56 | Extracting Feedback Process Generation In Customized System Operations In Online Social Networks Sk. Khaja Mohiddin Basha, M.Suresh | IJRCSE/V4/5-956 | |
57 | Adjust Preserve On Translation Fiercely Using MAC System Rules K. Chinababu, Tata Enkateswarlu | IJRCSE/V4/5-957 | |
58 | Effective Information Aspect Using Active knowledge View Point Balaraju Rudrapogu, Tata Enkateswarlu | IJRCSE/V4/5-958 | |
59 | Information Security Using Data Hiding Technique In Steganography Applications P. Vijaya Lakshmi, B. Radha Krishna Murthy | IJRCSE/V4/5-959 | |
60 | A System for Load Balancing in Cloud Partitioning for the Public Cloud Satyaprakash Kalari, Goda Srinuvasa Rao | IJRCSE/V4/5-960 | |
61 | Query Adaptive Image Retrieval System With Hash Codes M.Murali , P.Pedda Sadhu Naik, B.Subba Reddy | IJRCSE/V4/5-961 | |
62 | Quantity Q Image Grouping And Histogram Shifting Using Reversible Watermarking S.Srinivas Reddy , P.Pedda Sadhu Naik, B.Subba Reddy | IJRCSE/V4/5-962 | |
63 | A System for Filtering Unwanted Messages from Online Social Network (OSN) by Using Machine Learning Techniques P. Preethi, K Subash Chandra | IJRCSE/V4/5-963 | |
64 | Privacy-Preserving Firewall Optimization for Cross Domain Y. Prasanna, K Subash Chandra | IJRCSE/V4/5-964 | |
65 | Verification And Verification Of Neighbour Positions In Mobile Networks A. Radhika, B. Maheswari | IJRCSE/V4/5-965 | |
66 | Dynamic Resource Allocation Exploitation With Virtual Machines In Cloud Computing V. Swathi, K Chandra Bhushan | IJRCSE/V4/5-966 | |
67 | A New Key Management Paradigm For Fast Transmission G. L. Sowjanya, K Subhash Chandra | IJRCSE/V4/5-967 | |
68 | Data-Intensive with Mobile Relay Configuration by Using Wireless Sensor Networks SK. Sufiabhanu, K Chandra Bhushan | IJRCSE/V4/5-968 | |
69 | Privacy Protection In OSN By Using Three Approaches P. Sravani, K Chandra Bhushan | IJRCSE/V4/5-969 | |
70 | High-Speed Network Traffic Management Service By Using Fuzzy Logic Control K. Bagya Laxmi, B Maheswari | IJRCSE/V4/5-970 | |
71 | Providing Security Against Vampire Attackes In Ad Hoc Sensor Networks A.Yasoda, B. Maheswari | IJRCSE/V4/5-971 | |
72 | Retrieving Hidden Data from Digital Media with Spread Spectrum K. Hemabala, K Subhash Chandra | IJRCSE/V4/5-972 | |
73 | IPTV Services Through Cloud Resources With Optimisation And Virtualization V. Haritha, K Chandra Bhushan | IJRCSE/V4/5-973 | |
74 | Implementing Secure Agent Based Distributed Information Sharing Thumalapenta Eswaramma, G. Prasuna | IJRCSE/V4/5-974 | |
75 | Anonymous Id Delegation Supported Privacy Preserving Data Sharing Lakshmi Purnachandh B, S. Rama Krishna | IJRCSE/V4/5-975 | |
76 | Cloud Supported Content Distribution Networks Based On Attribute Access To Scalable Media Koganti Rajesh, S. Rama Krishna | IJRCSE/V4/5-976 | |
77 | The Endangered Entity Stalking In Mobile Sensor Networks Thadi Tej Charan, Prasuna Grandhi | IJRCSE/V4/5-977 | |
78 | Sophisticated Attribute-Based Encryption In Cloud Computing For Scalable And Secure Sharing Of Personal Health Records Venu Babu Gali, G. Prasuna | IJRCSE/V4/5-978 | |
79 | Random Object Detection By Using Background Subtraction M.Sujitha, Ravi Mathey | IJRCSE/V4/5-979 | |
80 | Providing password Security by using Shamir Secret Sharing Scheme E. Sushma, J. Swapna | IJRCSE/V4/5-980 | |
81 | A Link_Local Address In Manets By Network Management And Security Label Protocol Irugula Satyanarayanareddy, Jajam.Nagaraju, , Shaik.Abdul | IJRCSE/V4/5-981 | |
82 | Mutual Relationship Process Over Group Based On Link Specified Cluster T.Rupa Rani, K.Vinay Kumar Reddy | IJRCSE/V4/5-982 | |
83 | Secure- Delegating Logging As A Service Management To Cloud Arati.S.B, K.Roshan | IJRCSE/V4/5-983 | |
84 | An Light Weight Geo-Location Based technique for Hetro MANETs Syed Irfan, J. Damodhar | IJRCSE/V4/5-984 | |
85 | System To Compress Attacks in Wireless Sensor Networks Using Security algorithms P. Srinivasa Rao, Raja Rajeswari Jetti | IJRCSE/V4/5-985 | |
86 | Biased Query Evaluation in Dynamic Query Formation S.S.Dileep Roy, V.V.A.S.Lakshmi | IJRCSE/V4/5-986 | |
87 | Template Extraction from HeterogeneousText Clustering in Web Pages K.Srinija, Madduru Sambasivudu | IJRCSE/V4/5-987 | |
88 | A Novel Approach for Identifying the Face Analysis using Local Directive Patterns Kypa Ramanjaneya Reddy, B.V.Srinivasulu | IJRCSE/V4/5-988 | |
89 | Convergence Auto Configuration In Manets By Using Systematic And Security Label Protocol N. Kiran Kumar, Sriharsha.Vikruthi | IJRCSE/V4/5-989 | |
90 | Scalable and Strong Detection of the Breakages in Wireless Sensor Networks Suhalekhya.Immadisetty, J.V.Anil Kumar | IJRCSE/V4/5-990 | |
91 | QOS Aware Intelligent Hybrid MAC Protocol for Wireless Sensor Networks D.Nikhila, K. Ashok Babu | IJRCSE/V4/5-991 | |
92 | Ad hoc mobile wireless networks for Security Based on Intrusion-Detection System Y. Srinivasa Raju, J. Raja Rajeswari | IJRCSE/V4/5-992 | |
93 | Moving object detection based on background subtraction by comparing background and foreground image B. Pranay, Dr T.V. Rajinikanth | IJRCSE/V4/5-993 | |
94 | Distributed Recovery Method For Multiple Node Failures In Wireless Sensor And Actor Networks Santhosh.Y, V. Harini | IJRCSE/V4/5-994 | |
95 | Resourceful Scope For Location Reliable Data In Mobile Setting M. Priyanka, Ch. Srinivas, S. Anitha Reddy | IJRCSE/V4/5-995 | |
96 | A New Framework for Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems K. Tejaswini, D. D. D. Suribabu | IJRCSE/V4/5-996 | |
97 | Automatic Annotation based Profile Matching for Mobile Social Networks (MSNs) Penmatsa V V Rama Krishnam Raju, P. Srinivas, D. D. D. Suribabu | IJRCSE/V4/5-997 | |
98 | Automatic Relay Configuration in Data-Intensive Wireless Sensor Networks V. Suneetha, M. Chandrasekhar Varma, D. D. D. Suribabu | IJRCSE/V4/5-998 | |
99 | A Novel Approach for Secure Intrusion Detection System in Wireless MANETs K.V.Nagalakshmi, S.Nagavali, P.M.Prasuna | IJRCSE/V4/5-999 | |
100 | A Novel Approach for Secure Access Control and Data Storage in Cloud System J.Priyanka, K.Kiran Kumar, P.M.Prasuna | IJRCSE/V4/5-1000 | |
101 | A Novel Approach for Minimizing Unnecessary Messages in Social Network Mekala.Sujatha, O.Shiva Bhagawan, P.M.Prasuna | IJRCSE/V4/5-1001 | |
102 | Protected and Well-Organized Method Under WSN M.Swathi, Sriharsha.Vikruthi | IJRCSE/V4/5-1002 | |
103 | Positive FTC Environment In User Search Data Shribas Chandra Sahoo, Ch.Raghu Kumar | IJRCSE/V4/5-1003 | |
104 | Assurance in the Modeling Analysis Using Expedite Message Authentication Protocol (EMAP) M.Jagadeesh Reddy, J.V.Anil Kumar | IJRCSE/V4/5-1004 | |
105 | Accessing Remote Information of Staff and Student using Android App Ashok Kumar M, Ramanjaneyulu T, Baji G | IJRCSE/V4/5-1005 | |
106 | College Cybernetic System App in Android Ashok Kumar M , Baji G , Ramanjaneyulu T | IJRCSE/V4/5-1006 | |
107 | Low Cost Smart Camera Systems for Monitoring Traffic Congestion S Sriharsha ,Shaik khajavali | IJRCSE/V4/5-1007 | |
108 | Dynamic Multi Attribute String Search Over Spatial Databases Lella Kranthi Kumar, CH. Chandra Mohan | IJRCSE/V4/5-1008 | |
109 | Time Sensitive Queries Based on Term Frequency and Inverse Document Frequency T.Durga, J.Rama Devi, M.Tech(Ph.D), B. Lakshmi Ramani,M.Tech(Ph.D) | IJRCSE/V4/5-1009 | |
110 | Implementing Efficient Search Results and Navigation in website Ganne Anusha, D .Lokesh Sai Kumar | IJRCSE/V4/5-1010 | |
111 | Load Balancing using DWLC J. Siva Gopi, Mrs.U. Tulasi | IJRCSE/V4/5-1011 | |
112 | Dynamic Query Fusion Generation Over Relational Data Bases K.Niveditha, U.Sailaja ,V. Siva Parvathi | IJRCSE/V4/5-1012 | |
113 | Dynamic Dedupulication Approach to Handle Dirty Data T.Syamasree, V. Siva Parvathi, U.Sailaja | IJRCSE/V4/5-1013 | |
114 | Smart Phone based Optical Mark Evaluation D.Vimala Kumari, K.Syama Sundara Rao | IJRCSE/V4/5-1014 | |
115 | Privacy Preserving over Nested Sub Queries Bonasi.Murali Krishna, M.V.S.N. Maheswar | IJRCSE/V4/5-1015 | |
116 | Classifier Enforcing Access and Direct Control on Messages in OSN P.Pallavi, Y.Surekha, G.Lalitha Kumari | IJRCSE/V4/5-1016 | |
117 | Multi Cloud Data Storage Using Byzantine Fault Tolerance Vangara NagaBrahmani, Mr.I.M.V.Krishna | IJRCSE/V4/5-1017 | |
118 | A Novel Optimal Firewall for Privacy Preserving in Cross Domain Dr S.V.N.Srinivasu | IJRCSE/V4/5-1018 | |
119 | Development of Virtual Machines in Cloud Computing using Dynamic Resource Parceling Dr S.V.N.Srinivasu | IJRCSE/V4/5-1019 | |
120 | Mobile Relay Constellation with Data Intensifier Using WSNs Dr S.V.N.Srinivasu | IJRCSE/V4/5-1020 | |
121 | Optimized Re Encryption Schema over Cloud Storage System Mary Kamala Kumari, Divya.Adusmilli, M.Tech , D.Swapna,M.tech | IJRCSE/V4/5-1021 | |
122 | Efficient Machine Learning Technique for Disease Treatment Classification Lakshmi Sowjanya Allamsetti, V.Rajesh, M.Tech | IJRCSE/V4/5-1022 | |
123 | E-mail Authentication mining of Association Rules from Outsourced Transaction Databases D Raj Kumar,K Naga Divya,D Sree Lakshmi | IJRCSE/V4/5-1023 | |