1 | A Framework and Graphical Development Environment for Business Events Udaya Kiran Kurapati, M.Prasanna | IJRCSE/V5/5-1601 | |
2 | An Efficient Mining Approach for Text Data with Side Information Rukmini.G, V.Rajashekar | IJRCSE/V5/5-1602 | |
3 | Clustering with Multiple Reference Points Based Similarity Measure K.V.Prasad, G.Sanjay Gandhi, S.Balaji | IJRCSE/V5/5-1603 | |
4 | A Novel Approach for Node Failures and Recover in Wireless Sensor Network Hari Inapakurthi, Madhava Rao Batteri | IJRCSE/V5/5-1604 | |
5 | Efficient Personalized Web Search using Hierarchical Clustering M.BharathKumar, V.Rajashekar | IJRCSE/V5/5-1605 | |
6 | Secure Multi keyword Top-K Retrieval over the Compressed Encrypted Cloud Data Kola Pavithra, V.A Radhika, Anusha.M | IJRCSE/V5/5-1606 | |
7 | Previous Data Collection Based Intrusion Detection for Advanced Critical Medical Cyber Physical
Systems M.Raghava Priyanka, J.Srinivasa Rao, Anusha.M | IJRCSE/V5/5-1607 | |
8 | Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks using
KNN Parasa Somanya, V.A Radhika, J.Srinivasa Rao | IJRCSE/V5/5-1608 | |
9 | Protection for Location in Geo social Applications Rajmaleswara Rao, Hari Krishna Deevi, K.Rama Krishnaiah | IJRCSE/V5/5-1609 | |
10 | Provided QoS and Share Routing Protocol in Hybrid Wireless Networks Dubala Srilatha, M.Pragathi | IJRCSE/V5/5-1610 | |
11 | Security Maintain different Cipher Model Search Data in Cloud Computing K.Prasanthi, T.venkatrao, V.lakshmi | IJRCSE/V5/5-1611 | |
12 | Inferring User Image Search Goals under the Implicit Guidance of Users V.Ashvini, K.Venkateswara Reddy | IJRCSE/V5/5-1612 | |
13 | An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring in Real World
Limited Bandwidth Networks V.Hima Bindu, K.Venkateswara Reddy | IJRCSE/V5/5-1613 | |
14 | Web Accelerator for Wireless Networks using BIT Reduction Algorithm K.Sudha Rani, M.Sailaja | IJRCSE/V5/5-1614 | |
15 | Secured Profile Matching in Social Networks Using Machine Learning B.Aruna, D.Sree Lakshmi | IJRCSE/V5/5-1615 | |
16 | A New Data Mining Approach for Software Bug Prediction Srilakshmi Balagam, G.PardhaSaradhiVarma | IJRCSE/V5/5-1616 | |
17 | Multi-Attribute Group Decision Making Models on XML Data by Using Fuzzy Sujatha.Polaki, A.Divya | IJRCSE/V5/5-1617 | |
18 | Pre-Eminence Service Strategy Application in Cloud Computing and Security Scheme J.Venkata Prasad, P.Pedda SadhuNaik | IJRCSE/V5/5-1618 | |
19 | Fetch Productive Resource Assignment in Different Routing Transfer Nodes Sayed Arief, S.Jalaiah | IJRCSE/V5/5-1619 | |
20 | A Relating Establish Friend Suggestion System for Social Networks SK.Beebavali, Anantha Rao Gottimukkala | IJRCSE/V5/5-1620 | |
21 | An Information Security Scheme Based on Steganography Using Muilt-Key Generation N.Swathi, Swapna.Donepudi | IJRCSE/V5/5-1621 | |
22 | Implementation of Genetic Algorithm to Optimize Query Processing Chindada.Gopi, Mr.V.V.Gopala Rao | IJRCSE/V5/5-1622 | |
23 | Portions and Preserve Data Guard Situation Based Services Soma Nageswara Rao, P.Pedda Sadhu Naik | IJRCSE/V5/5-1623 | |
24 | Authorized Designer Cloud Services between Remote Sensing the Entirety Users Syed Bismilla Jabeen, P.Pedda Sadhu Naik | IJRCSE/V5/5-1624 | |
25 | Pattern Discovery Taxonomy for Effective Text Mining Kalapala Raj Pradeep, V.Sowjanya | IJRCSE/V5/5-1625 | |
26 | Secured Medical Data Publication by Using Earth Mo ver Distance (EMD) Kalapala Raji Anusha, J.Ramadevi | IJRCSE/V5/5-1626 | |
27 | Regulation Path Direct Passing and Route Calculation Pedapudi Nagababu, Mohammad Sirajuddin | IJRCSE/V5/5-1627 | |
28 | An Efficient Approach on Privacy Preserving of the data using EMD N.Aswani, B.Bhanu Prakash | IJRCSE/V5/5-1628 | |
29 | Relating Damage Perception Finding in Delay Tolerant Networks Dampuru Ramesh, P.Pedda Sadhu Naik | IJRCSE/V5/5-1629 | |
30 | Security and Grouping of Data Sharing System Using Social Network Model
Scheme V.Mounika, G.Radhika Deepthi | IJRCSE/V5/5-1630 | |
31 | Reliability and Adornment Database with Security and Information Access Budhati Sandhya, M.Jahir Pasha | IJRCSE/V5/5-1631 | |
32 | Web Scheme Commendation Resource Position and QoS Rapid Growth K.V.L.Nagamani, Pasupuleti.Eswaraiah | IJRCSE/V5/5-1632 | |
33 | Security and Destitutions Locations Integrity Communication in Cloud Computing Using MVC Manikanta Rudravarapu, Shaik Mohammad Rafi | IJRCSE/V5/5-1633 | |
34 | Generating Positive and Negative Tweets Using Opinoin Mining in Social Networking Sites B.Navya Sree, V.Siva Parvathi | IJRCSE/V5/5-1634 | |
35 | A Species Cloud Nears and Traditional Agreement Data Compression Bussareddy.Haritha, N.Madhava Rao | IJRCSE/V5/5-1635 | |
36 | IOR Based Routing Model for Relay Nodes in Overlay Networks Alluri Annapurna, Kavuri Karunakar | IJRCSE/V5/5-1636 | |
37 | Resource Process in ARQ Model Packet Disappear in Content Delivery Networks N.V.Ramanareddy, Mohammad Sirajuddin | IJRCSE/V5/5-1637 | |
38 | Collateral and Systematic Portion Information Inspect in Public Cloud Auditing Nimmagadda Murali Krishna, Mohammad Sirajuddin | IJRCSE/V5/5-1638 | |
39 | Structure Security and Systematic Query Services in Data Deviation R.Padma Saranya, N.Venkateswara Reddy | IJRCSE/V5/5-1639 | |
40 | Divination for Web Image Semantic Characterized Exceptional Coding Sujith Sudha Nemalikanty, V.Anjali | IJRCSE/V5/5-1640 | |