1 | A Noval Approch for Load Balancing Model Based on Cloud Segregate for the Public Cloud Gudidevuni Bhagyasree goud, M Santhi Sudha | IJRCSE/V5/1-1201 | |
2 | Security and Authentication on Data Transfer Under the Cloud Computing Ashraf Sabri Waheed Alameri | IJRCSE/V5/1-1202 | |
3 | Materialistic Load Neutralize With Service Lag Attestation for Data Center Energy Cost
Enhancement Shravankumar Daddolu, P. Tejaswi , D.Krishna | IJRCSE/V5/1-1203 | |
4 | Security by using Key Pre-Distribution Scheme for Wireless Sensor Networks Keerthi Guttikonda, G.Vijayadeep | IJRCSE/V5/1-1204 | |
5 | A System for Profile Matching in Social Media with Mobile D.Praveen kumar, M.N Satish Kumar | IJRCSE/V5/1-1205 | |
6 | A Secure Approach for Data Retrieval in Decentralized Disruption-Tolerant Military
Networks Divyasri.Yallanki, Srikanth.V, Madhira Srinivas | IJRCSE/V5/1-1206 | |
7 | A Secure Fast Transmission Based On Key Management in Clustered Networks Md.Reshma, Adi Lakshmi.Yannam | IJRCSE/V5/1-1207 | |
8 | Novel Search Algorithm by Incorporating User Search Goal Using Feedback Sessions Y.KarunaManjusha, D.Nalini Kumari | IJRCSE/V5/1-1208 | |
9 | Effective Communication to Remote Collective Association by using secure key Pattern M.David Valas, M.V.Sumanth | IJRCSE/V5/1-1209 | |
10 | Privacy Preserving for Collaborative data Distribution by using m-privacy Surya Prakash.B, P.Pavan Kumar | IJRCSE/V5/1-1210 | |
11 | Multi-path Wireless Routing Protocol for Detecting Malicious Node Based on Minimum Cost A.H.Anusha, Mrs. Adilakshmi.Yannam | IJRCSE/V5/1-1211 | |
12 | Data Packets Arriaval Approach in Delay Tolerant Networks Abdul Samadh, K.Srinivas | IJRCSE/V5/1-1212 | |
13 | A System for Enabling Indirect Mutual Trust with Dynamic Data in Cloud Storage Area N.Santosh Kumar, K.Kiran | IJRCSE/V5/1-1213 | |
14 | Information Aggregation by Using WSN Arshad Shareef | IJRCSE/V5/1-1214 | |
15 | An Efficient Authentication for Cloud Storage with Public Auditing B.Rajesh Kumar, K.Kiran | IJRCSE/V5/1-1215 | |
16 | A New Algorithm for Inferring User Search Goals with Feed Back Session G.Mahender, J. Swapna | IJRCSE/V5/1-1216 | |
17 | Security Enhanced Location Identity Updating Approach Kommuri Naga Namratha, G.Vijayadeep | IJRCSE/V5/1-1217 | |
18 | Expression and Face Recognition by Using LDN Pattern N.Rangasree, Dr.M.BabuRao | IJRCSE/V5/1-1218 | |
19 | Access Control for Multi-Authority Cloud Storage with Efficient Expressive and Revocable Data M.Gopi Krishna, T.Ravi Kumar | IJRCSE/V5/1-1219 | |
20 | Dynamic Histogram Shifting and Invariant Image Classification by Using Reversible Watermarking T.V.Anusha, S.SeshaSai Priya | IJRCSE/V5/1-1220 | |
21 | Texture based Inpainting by using Super-Resolution K.Bindumadhavi, Y.V.N.Tulasi | IJRCSE/V5/1-1221 | |