Welcome to Research Scholars for Submission of Latest Volume-8, Issue-3 for November-December 2023

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER SCIENCE & ENGINEERING May-Jun 2015 Volume-5, Issue-3

S.NOTITLE OF MANUSCRIPTARTICLE IDDOWNLOAD
1Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks
Reena Chaudhary, Sachin Chaudhary, Ankur Bhardwaj
IJRCSE/V5/3-1401Download
2Energy Efficient Survivable Path Routing in Wireless Sensor Network
Tanu Mohan, Sachin Chaudhary, Kumar Shanu
IJRCSE/V5/3-1402Download
3Secure Data Collection using Symmetric Key Cryptography
Sakshi Verma, Ankur Bhardwaj, Sachin Chaudhary
IJRCSE/V5/3-1403Download
4Exact Image Restoration from Double Random Projection
K.Anusha,R.Chinna Appala Naidu
IJRCSE/V5/3-1404Download
5Vector Valued-Feature Oriented Enhancement by Parallel Level Sets
B.Preethi,U.Shivaji
IJRCSE/V5/3-1405Download
6Safe Removal of Connection Policy in Level Circulated Database
Saride Sruthi,Ralla Suresh,I.Narsimha Rao
IJRCSE/V5/3-1406Download
7An input-comprehensive Cryptosystem used for Scalable records sharing within Cloud storage space
A.Anusha Rmana,D.Aswini,I.Narsimha Rao
IJRCSE/V5/3-1407Download
8Stability at the Same Time as Examination
K.Krishna Priyanka,I.Narsimha Rao
IJRCSE/V5/3-1408Download
9Enhancing Reliability and Effectiveness in Impute Based Data Division
Saride Swathi,K.Ram Mohan,I.Narsimha Rao
IJRCSE/V5/3-1409Download
10TrustedDB:A Trusted Hardware Based Catalog Through Isolation and Statistics Discretion
Sd.Nazia Parveen,Ralla Suresh,I.Narsimha Rao
IJRCSE/V5/3-1410Download
11Evaluating the Effectiveness of Relational Keyword Search with Experimental Results
S.Sai Lakshmi,Ralla Suresh,I.Narsimha Rao
IJRCSE/V5/3-1411Download
12An isolation-Preserving Multi-Keyword Rank Seek out in Excess of Encrypted Cloud Data
Pittala.Chandana,B.Bhavani,I.Narsimha Rao
IJRCSE/V5/3-1412Download
13Web Based Privacy-Aware DaaS Services Composition
Talari Christu Kumari,L.Abdul Saleem
IJRCSE/V5/3-1413Download
14Aspect Resource Distribution in Cloud Methods for Artistic Conveyance
Samineni.Mounika,I.Narsimha Rao
IJRCSE/V5/3-1414Download
15Signals Oriented Data Loss for Reliability Content Transportation Networks
Aakula Krishna Soujanya,N.Sujata Gupta
IJRCSE/V5/3-1415Download
16Assistance Seclusion and Security in Personalized Data Navigating
Kota Harini,L.Abdul Saleem
IJRCSE/V5/3-1416Download
17K-Designing and Architecture for Monitoring Patients at Home
Medak Yochitha, R.China Appala Naidu
IJRCSE/V5/3-1417Download
18Balancing the Load in Cloud for Distributed Systems
Rahul, C H Sravan Kumar
IJRCSE/V5/3-1418Download
19Efficient Mapping and Modeling of Human Networks Information Sharing System
Shashikala Nara, N.Sujata Gupta
IJRCSE/V5/3-1419Download
20Unprincipled Historical Repression Inpainting image Color Relocate
Veena.Pentyala, M.Sridevi
IJRCSE/V5/3-1420Download
21An Efficient Algorithm for Privacy Preserving in Geo-social Applications
Bommideni Revathi, Ravi Kumar Vemula, K. Praveen Kumar
IJRCSE/V5/3-1421Download
22Real Time Event Management System
Swati Kaushik, Pushpneel Verma, Sachin Chaudhary
IJRCSE/V5/3-1422Download
23Improved Dynamic Site Distribution in Privacy Preserved Networks
A.Sindhu Priyadarshini, Ch. Vijaya Bhaskar
IJRCSE/V5/3-1423Download
24Enhancing Security of Online Payment System
Kalal Sairam Goud,Vadrevu SSS Balaram
IJRCSE/V5/3-1424Download
25Implementation of Key Management Strategies for Attribute-Based Encryption
Vetcha Pujitha, N.Chaithanya Kumar
IJRCSE/V5/3-1425Download
26Human Activity Recognition Based on Image Segmentation
Suryadevara Sravanthi, D.Ratna Kishore
IJRCSE/V5/3-1426Download
27Reliable Obtaining Horizontally Distributed Databases Using Cryptography and Schema Models
Thaisin.Syed, Ch.Naga Santhosh Kumar, Madhira Srinivas
IJRCSE/V5/3-1427Download
28Reliability and Impedimenta Based Database with Security and Information Access
Sharada.Vutukuri, Ch.Naga Santhosh Kumar, Madhira Srinivas
IJRCSE/V5/3-1428Download
29EASY SMS: A Protocol for End-To-End Secure
K.Dhanalakshmi, B.Sunil
IJRCSE/V5/3-1429Download
30Dynamic Approach for Increasing Efficiency and Confidentiality in Cloud Query Services
Bolishetty Raja Vinesh, Menta Mosheck
IJRCSE/V5/3-1430Download
31Effective implementation of Web based re-ranking using CBIR (Content based Image Retrieval)
Nomula Sahithi, Ramana Nagavelli
IJRCSE/V5/3-1431Download
32Security and Privacy-Enhancing Multicloud Architectur
Kotupalli Koteswaramma, Thota Ramnadh babu
IJRCSE/V5/3-1432Download
33Secure and Efficient Bounded Ciphertext Policy for Disruption Tolerant Networks
Banoth Dinesh Nayak, Dara Raju, Nara Nalini
IJRCSE/V5/3-1433Download
34Improving Auditing Cloud Consistency Using CaaS Model
P.RAJITHA, B.SAILAJA
IJRCSE/V5/3-1434Download