1 | Improve Image Quality Using Dynamic Histogram and Information Hiding Technique U.Sivanagalakshmi, T.T.Rajeswara Rao | IJRCSE/V4/6-1101 | |
2 | Expression and Face Recognition with the Use of LDN Pattern N.Sravanthi , T.T.Rajeswara Rao | IJRCSE/V4/6-1102 | |
3 | Mobile Health Care Privacy by Using Cloud Computing Thota Devendara Venkata Satish | IJRCSE/V4/6-1103 | |
4 | A Systematic and Changed Multi Frequency plan to Remove Trespass nodes in Wireless Sensor
Networks Gubbala Mohan Sankar, Raja Rajeswari Jetti | IJRCSE/V4/6-1104 | |
5 | A Distributed Network Intrusion Detection and Prevention Framework for Zombie Detection in a
Cloud Computing Environment Shaik Khaja Hussain, S.Asif | IJRCSE/V4/6-1105 | |
6 | Assumption Safety in Communal Analyse for Cloud Area Algorithm in Manets K.K.Subramanyaeswararao | IJRCSE/V4/6-1106 | |
7 | An Intelligent System to Learn to Optimize Web Forums V.N.V.Haritha, K. Surya Ram Prasad, D. D. D. Suribabu | IJRCSE/V4/6-1107 | |
8 | Dynamic Content Delivery Scheme Using Data Staging Concept V.Guru Kumar, P.Nanna Babu, K.Pradeep Kumar | IJRCSE/V4/6-1108 | |
9 | Destination Nodes Tracking For Multicasting of Messages in Wireless Networks K.Venkateswararao, K.Surendra, T.Soma Sekhar | IJRCSE/V4/6-1109 | |
10 | Bootstrapping Ontologies Based on Web Services Nirmitee N. Kurhekar, L. J. Sankpal | IJRCSE/V4/6-1110 | |
11 | Secure Data Sharing With Privacy Protection by Assigning an ID Nathani Sravya, Ramdev Reddy | IJRCSE/V4/6-1111 | |
12 | Intrusion-Detection System by Using Ad hoc Mobile Networks Deepika.Mohanan, Sachin Godse | IJRCSE/V4/6-1112 | |
13 | Keyword Based Caption Generation by Using Image Annotation Ch. Sathwik, Dr T.V. Rajinikanth | IJRCSE/V4/6-1113 | |
14 | A Providing Security for Encrypted Data Using JPEG Stenography S.Nagarani, Mr.M.V.DurgaRao | IJRCSE/V4/6-1114 | |
15 | An Efficient Fuzzy Single and Multi Keyword Automatic Search Technique in RDBMS Puppala Devaki, Nuthakki.Anil Kumar | IJRCSE/V4/6-1115 | |
16 | Effectively Minimizing Improper Messages in Social Networks I.V. Siva Kumar, A S N V Bhogesh | IJRCSE/V4/6-1116 | |
17 | HEA: A Novel Approach for Well-Organized Access Control and Secure Storage in Cloud Rayavarapu Mahesh, G.Satyanarayana | IJRCSE/V4/6-1117 | |
18 | Reversible Watermarking using Dynamic Histogram Shifting S.Edukondalu, M.Srinivasa Rao | IJRCSE/V4/6-1118 | |
19 | Protecting Privacy of Location Proof Updating System Annam.Mounika, Md.Ameer Raza | IJRCSE/V4/6-1119 | |
20 | A Novel Intruder Detecting System to Enhance the Security Levels in MANETs A.V.P.Rajesh, S.V.C. Gupta | IJRCSE/V4/6-1120 | |
21 | An Effectively Managing Balancing Load in Cloud Chitri Rami Naidu, Md.Ahmed | IJRCSE/V4/6-1121 | |
22 | An Efficient Intruder Detection System using Data Mining Techniques Pamarthi Sunil Kumar, Katru Rama Rao | IJRCSE/V4/6-1122 | |
23 | Secure Information Assortment in Wireless Device Networks Victimisation Irregular Dispersive Routes R.V. Swathi, M.Rama Krishna | IJRCSE/V4/6-1123 | |
24 | Secure Certainty for Quantities in Cloud Systems SK.Shammi Munnisa, Ch.Ranjith Kumar | IJRCSE/V4/6-1124 | |
25 | Automatic Image Deed and Distinction Enhancement Exploitation Gaussian Mixture
Modelling SK.Gousia Begum, A.Veera RaghavaRao | IJRCSE/V4/6-1125 | |
26 | Memory Management by Using the Heap and the Stack in Java S.Poornima, Dr. C.V. Guru Rao, Nazia Thabassum, Dr. S.P. Anandaraj | IJRCSE/V4/6-1126 | |
27 | Efficient Approach to Balancing Performance Factors in Processing of Query in Public Data Srinivas Velichety, V.Yuvaraju Chinnam | IJRCSE/V4/6-1127 | |
28 | An Effectively Managing the Mobile Relaying in Data Incentives Wireless Sensor Network Ch. Rajesh, B.S.N.V.Satyanarayana | IJRCSE/V4/6-1128 | |
29 | An Advanced Learning to Crawling Web Forums K. Giridhar, B.S.N.V.Satyanarayana | IJRCSE/V4/6-1129 | |
30 | A Secure Acknowledgement Scheme to Provide Security from Intruders in Wireless MANETs K. Ramya krishna, G.Tatayya Naidu | IJRCSE/V4/6-1130 | |
31 | A Novel Approach for Balancing the Load in Cloud K. Santoshi lakshmi, V.Swami Naidu | IJRCSE/V4/6-1131 | |
32 | A Novel Approach for Extracting the Secreted Data from Digital Media M.Narasimha Raju, G.Tatayya Naidu | IJRCSE/V4/6-1132 | |
33 | Protecting Privacy in Mobile Health Data Monitoring in Cloud P. Satyamurthy, G.Tatayya Naidu | IJRCSE/V4/6-1133 | |
34 | A Novel Approach for Pruning Malicious Messages in Social Network S.Tanusha, M.Sailaja | IJRCSE/V4/6-1134 | |
35 | Dynamic Secure Multi Owner Group to Share the data in Cloud G.Venkata Vara Prasad, V.Swami Naidu | IJRCSE/V4/6-1135 | |
36 | An Efficiently Detecting and Solving the Vampire Attacks in Wireless Network A. Suribabu, B.S.N.V.Satyanarayana | IJRCSE/V4/6-1136 | |
37 | ALP - Automated Learning Process for Filtering Unwanted Messages in OSN M.T.V.K.S.Vijaya Raju, K. Surya Ram Prasad, D. D. D. Suribabu | IJRCSE/V4/6-1137 | |
38 | An Enhanced Intensified Data Hiding In Encrypted Images by Separable Reversible Encryption M.Yesu Raju, D.D.D. Suribabu | IJRCSE/V4/6-1138 | |
39 | A Novel Approach for Data Storage and Access Control Policies in Cloud System B.Rajasekhar, Mr.M.Gopinath Reddy | IJRCSE/V4/6-1139 | |
40 | An Efficient Intrusion Detection System to Provide Security in Wireless MANETs N.Ramakrishna, Mr. K. Tulasi Ram | IJRCSE/V4/6-1140 | |
41 | A Novel Approach to Optimize the Traffic Control in Network Nalla Yesubabu, M.Sailaja | IJRCSE/V4/6-1141 | |
42 | Optimization of Balancing Load in Cloud G.Prudhvi Raju, Mr. K.K.Krishnaiah | IJRCSE/V4/6-1142 | |
43 | Node Capture Attacks in Data Aggregation by using Wireless Sensor Networks Rohini Kumar.Talasila, P Srinivasu Varma | IJRCSE/V4/6-1143 | |
44 | Preventing Unauthorized Data and Inference Attacks on Social Networks Nancharaiah Chatti, S.Shravani | IJRCSE/V4/6-1144 | |
45 | Implementing Dynamic Query Forms using Queries besides the Click Feedback Jada Srinivas, G.Ravi | IJRCSE/V4/6-1145 | |
46 | Effective Mining Scheme for Large Streams Personalized data Using Sparse data D.Narsimha Reddy, B.Sivaiah | IJRCSE/V4/6-1146 | |
47 | Assure and Orderly Methodical System Extending Wireless Sensor Networks Puvvada Kusa Kumar, Pasupuleti Eswaraiah | IJRCSE/V4/6-1147 | |
48 | Trusted DB: Database Engine for a Trusted Hardware Mohammad Fayazullakhan, Jajam.Nagaraju | IJRCSE/V4/6-1148 | |
49 | An Application for Providing Primary Maternity Healthcare Services in Developing Countries R Shalini, B.Satish Kumar | IJRCSE/V4/6-1149 | |
50 | Analysis Engine for machine-driven Health Checks, Early Drawback Detection and Advanced Drawback
Determination M N Ramya, V Suresh | IJRCSE/V4/6-1150 | |
51 | Cloud Ticket Validation by Using Android P.S.Gajapathi Raju, H.Appala Naidu | IJRCSE/V4/6-1151 | |
52 | Learning Gamified Platform for a City P Sitaram Das, M Kamalakar | IJRCSE/V4/6-1152 | |
53 | Data Mining Techniques for Physicians to Diagnose Diseases B Bhavani, T P R Vital | IJRCSE/V4/6-1153 | |
54 | Mobile and Web-Based Application for Blood Requisition within Blood Supply Chain M Rupali, A Sai Krishna | IJRCSE/V4/6-1154 | |
55 | Monitoring System by Using Fuzzy Synthetic Evaluation, Fuzzy Ordering, Preferences and
Consesus K.Venkata Ramana Rao, K Venkata Subrahmanyam | IJRCSE/V4/6-1155 | |
56 | The Potential of ICTs for Empowering Rural Women S Girisha, S Appala Raju | IJRCSE/V4/6-1156 | |
57 | Secure Authentication for Supporting Healthcare with Wireless Sensor Networks Ch Sravani, A Durga Praveen Kumar | IJRCSE/V4/6-1157 | |
58 | Automatic Profiles Creation with Evolving User Behavior Chiriki V N Kumar Giri, Mr.Chinna Babu Galinki | IJRCSE/V4/6-1158 | |
59 | Dynamic Data Module Management Using Logic-Based Approach Kalisetty.Narendra, V.V.A.S.Lakshmi | IJRCSE/V4/6-1159 | |
60 | Online Auction Fraud DetectionSystem with Modeling of Proactive Moderation S Roohul Ameen, S.Asif, J.Nagaraju | IJRCSE/V4/6-1160 | |
61 | Dynamic Load Balancing to Drift Application to the Cloud T. Ravi Chandra, T. Soma Sekhar | IJRCSE/V4/6-1161 | |
62 | Detection of Malware Accuracy after Conversion into Attribute Relation File Format Y.Vijitha, K.Sirisha | IJRCSE/V4/6-1162 | |
63 | Predicting School Failure with Clasification A Bichamma, J. Sudhakar | IJRCSE/V4/6-1163 | |
64 | Fully Load Rebalancing for Distributed Encrypted File Systems in Clouds P. Neena Rao, P.S Murthy | IJRCSE/V4/6-1164 | |
65 | Effective and Intelligent Traffic Service Management for High Speed Networks Using Fuzzy R.Venkanna Babu, Mr. Sayeed Yasin | IJRCSE/V4/6-1165 | |
66 | Ascribe-Based Effective for Access Entrance Command Obtaing Data in Cloud Computing Madasu Daniel , M.Gnana Vardhan | IJRCSE/V4/6-1166 | |
67 | Mobile Broad Cast Structure in Data Accelerated Wireless Sensor Networks Pasala Siva Krishna, Mr.Sayeed Yasin | IJRCSE/V4/6-1167 | |
68 | Protection and Prevention from DDoS Attacks using Advanced Cracking Algorithm Jeldi Vijay Praksh, Katta Ramesh | IJRCSE/V4/6-1168 | |
69 | Effective Implementation of Privacy Preserved Profile Matching in Mobile Social Networks Jonnala Kumar Reddy, K.Venkata Ratnam | IJRCSE/V4/6-1169 | |
70 | Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption Syed Qurban Ali Quadri, A.Hanuman Prasad | IJRCSE/V4/6-1170 | |
71 | Secure Data Sharing In Cloud Computing for Personal Health Care Information Lakkampelli Rakesh, P.Ramesh | IJRCSE/V4/6-1171 | |
72 | Reversible Watermarking Based on Data Encryption and Decryption R.Naveen Kumar, B.Seva Naik | IJRCSE/V4/6-1172 | |
73 | Distributed Self Organization Using Load Balancing Technique Ramasani Govardhan Reddy, M Sreenivas Reddy | IJRCSE/V4/6-1173 | |
74 | Centroid Formation for Computer Inspection Using Dynamic Clustering Rajesh.G | IJRCSE/V4/6-1174 | |
75 | Attribute-Based Data Sharing by Improving Security and Efficiency Praveen.V, Ravi Babu Arangi | IJRCSE/V4/6-1175 | |
76 | Profile Matching in Mobile Social Networks with Privacy Enhancement Ansar Ali, Ravi Babu Arangi | IJRCSE/V4/6-1176 | |
77 | Privacy Preserving Delegated Access Control in Public Clouds Mohd Haseebuddin, Ravi Babu Arangi | IJRCSE/V4/6-1177 | |
78 | Disease Prediction Using Data Mining Gandam Kommalu, M Swapna | IJRCSE/V4/6-1178 | |
79 | Image Re-Ranking Using Data Mining Techniques Indira Jerripothu, M.S.RadhaManga Mani | IJRCSE/V4/6-1179 | |
80 | Tracking Moving Objects for Multicasting Messages in Wireless Networks A.Charles, P.Nanna Babu | IJRCSE/V4/6-1180 | |
81 | A Novel Approach for Automatic Search in RDBMS Dodda Rajagopal, B.S.N.V.Satyanarayana | IJRCSE/V4/6-1181 | |
82 | Peer to Peer Architecture for Cloud Downloading Service S.Sriraghavendra, G. Guru Kesava Dasu | IJRCSE/V4/6-1182 | |
83 | Moving Object Tracking Using Background Subtraction B.Mahalakshmidevi, K.HimaBindu | IJRCSE/V4/6-1183 | |
84 | Secure Log Data Storage in Cloud by Using AES Algorithm Ch.Sandeep, D.Swapna, A.Divya | IJRCSE/V4/6-1184 | |
85 | MOBI-SYNC Efficient Time Synchronization for Mobile Underwater Sensor Networks P.Raghu Vamshi, B.Manasa | IJRCSE/V4/6-1185 | |
86 | Aggressive and Supervision Coding for Accurate Packet Arrivals in DTNS Rajesh Peddakotla, Md.Amanutulla | IJRCSE/V4/6-1186 | |
87 | Enhancing Scalable Database-Driven Reverse Dictionary Ch.V.N.S. Swathi, R.V.Satyanarayana | IJRCSE/V4/6-1187 | |
88 | Implementing Energy Efficient load Balancing in Cloud Computing M.Sravan Kumar Babu, PDL Narasimha Rao | IJRCSE/V4/6-1188 | |
89 | Genetic Algorithmic Approach to Improve Performance of Query Processing K.Rajesh, G. Kumari, D.Sirisha | IJRCSE/V4/6-1189 | |
90 | Automatic Tolerance of Memory Leaks in C and C++ Applications by Using Plug Chinnala Mounika, Dr. S.P. Anandaraj, Dr. C.V. Guru Rao, S.Poornima | IJRCSE/V4/6-1190 | |
91 | Image Retrieval System with Hash Codes based on Adaptive Query Y.Manasa, M.BabuRao, CH.Kavitha | IJRCSE/V4/6-1191 | |
92 | A Novel Frame Work for Intrusion Detection System M.Mohanrao, S.Karthik | IJRCSE/V4/6-1192 | |
93 | A Novel Approach for Detecting Intruders using Data mining Techniques D.Janaki Ramaiah, G.Tatayya Naidu | IJRCSE/V4/6-1193 | |
94 | A System for Preventing Unauthorized Information Inference Attacks on Social Networks Vudumula.Divya, P.Pedda Sadhu Naik | IJRCSE/V4/6-1194 | |
95 | Building an Efficient Database Driven Reverse Mapping Dictionary N.Sujatha | IJRCSE/V4/6-1195 | |
96 | A Survey on Security Issues with Possible Solutions in Cloud Computing Konduri Bhagavan | IJRCSE/V4/6-1196 | |
97 | Strong Association rules by using Market datasets Srinivasa Rao Kongarana, V.Kamakshi Prasad | IJRCSE/V4/6-1197 | |
98 | Recognizing Gesture considering digital image Correlation , Mahalanobis Distance M Ashok Kumar, Dr.R.R.Tewari, | IJRCSE/V4/6-1198 | |