1 | Calibers Service Scheme Applications Integration in Cloud Computing Reproduction J.Lakshmi Devi, P.Yejdani Khan, Revathi Pokuri | IJRCSE/V5/6-1701 | |
2 | Stability and Facility Auditing Cloud Remote System Maguluri.Bramarambha, Revathi Pokuri, P.Yejdani Khan | IJRCSE/V5/6-1702 | |
3 | Transfer Superabundant Resource Assignment in Different Routing Nodes Perala.Padma, Tata.Venkateswarlu | IJRCSE/V5/6-1703 | |
4 | Rapid Accessible Contiguous Investigation with Different Queries Nalagatla Ravi Krishna Yadav, B.Salmon Raju | IJRCSE/V5/6-1704 | |
5 | Security Sharing Service Sincerity Declaration for Cloud Computing B.Aruna Kumari, Revathi Pokuri, P.Yejdani Khan | IJRCSE/V5/6-1705 | |
6 | Secure Data Collection in Wireless Sensor Networks Remove out of Attacker Effect D.Seethamma, K.V.V.N.Babu, Revathi Pokuri | IJRCSE/V5/6-1706 | |
7 | Established and Synchronous Sufficient Data Security Outsourcing in Cloud Computing M.S.V.Ravindra Babu, P.Saritha Hepsibha | IJRCSE/V5/6-1707 | |
8 | Provide Service Level Agreement in Cloud Computing and Security Strategy Gurram Rajesh Kumar, Mohammad Sirajuddin | IJRCSE/V5/6-1708 | |
9 | Security Inaugurate Data Destitutions and Useful Admin in Cloud Computing P.Vijaya Kumar Reddy, P.Yejdani Khan, Revathi Pokuri | IJRCSE/V5/6-1709 | |
10 | Authority Spasm Reign with Impersonal Security and Data Stored in Clouds A.Susmitha, P.Yejdani Khan, Revathi Pokuri | IJRCSE/V5/6-1710 | |
11 | Systematic Data Cluster for Small-Security Mobile Quality Requisition N.NaveenTeja, M.KiranKumar, Revathi Pokuri | IJRCSE/V5/6-1711 | |
12 | Per-to- Per Message Identifying and Applications Security in WSN Using MAC S.Swarna Sravanthi, M.KiranKumar, Revathi Pokuri | IJRCSE/V5/6-1712 | |
13 | Protection Launch Content Sharing and Functional Index in Cloud Computing Shaik Sikindar, Sk.Ahamad Sharif | IJRCSE/V5/6-1713 | |
14 | Efficient Security and Independent Keyword Queries with Higher Databases Syed Jhani Basha, Goda Srinivasa Rao | IJRCSE/V5/6-1714 | |
15 | Predominance Shrinkage Rule with Impartial Security and Data Denote in Cloud Storage Kosanam Janardhan Rao, Goda Srinivasa Rao | IJRCSE/V5/6-1715 | |
16 | Packet Cache and Position in Wireless Networks with Object and Medium Transmission Bhimavarapu Lokesh Reddy, B.Salmon Raju | IJRCSE/V5/6-1716 | |
17 | Principal Collection and Security Service is Modify Data Sharing in Cloud Techniques M.Chandra Rao, P.Yejdani Khan, Revathi Pokuri | IJRCSE/V5/6-1717 | |
18 | Collect Generation Location Commission Routing and Node Relay Algorithms NagaAnusha Konagalla, G.J.Sunny Deol | IJRCSE/V5/6-1718 | |
19 | Instinctive Quality Container in the Node Group in Wireless Networks Yedluri Deepika, M.Gargi | IJRCSE/V5/6-1719 | |
20 | Congregate Group Resources Assignment Node Transfer and Routing Techniques Velaga Lakshmi Sowjanya, K.Vivek | IJRCSE/V5/6-1720 | |
21 | Privacy Preserving Delegated Access Control in Public Clouds K.Nalini, Md.Amanatulla | IJRCSE/V5/6-1721 | |
22 | Enhancing Video Dissemination Using Cellular and ADHOC Network S.Supriya Polisetti,S.N.V.Satyanarayana.B | IJRCSE/V5/6-1722 | |
23 | A Novel Approach for Business Process Mining K.Naga lalithadevi, M.Srinivasa Rao | IJRCSE/V5/6-1723 | |
24 | A Blended Mechanism for Traveler Package Recommendation System M.V.V.Pradeep, S.S.V.Appa Rao | IJRCSE/V5/6-1724 | |
25 | Systematic Security of Different Keyword Queries Higher Databases Ravanamma, B.V.PraveenKumar | IJRCSE/V5/6-1725 | |
26 | Connection Destruction Perception Location in Delay Tolerant Networks P.Radha Manohar, V.V.A.S.Lakshmi | IJRCSE/V5/6-1726 | |
27 | Regarding Individual Query Services and Specified Systematic in Clouds Computing A.Yugandhar Reddy | IJRCSE/V5/6-1727 | |
28 | Artificial Routing and Medium Access Control Fixed Methods in AD-HOC Wireless Networks Chappidi Surekha, V.Sri Harsh | IJRCSE/V5/6-1728 | |
29 | Secure Data Collection in Wireless Sensor Networks to Separate Out of Attacker Reaction Poorni Lakshmi Triveni, M.Gargi | IJRCSE/V5/6-1729 | |
30 | Fastest Nearest Location Keyword Search G.Sridevi, V.Swamy Naidu | IJRCSE/V5/6-1730 | |
31 | Data Mining with Large Amount of Data V.Rajitha, V.Swamy Naidu | IJRCSE/V5/6-1731 | |
32 | Certain Knowledge Routing in Straightforward Flexible Communication Networks P.Venkateswarlu, V.Sri Harsh | IJRCSE/V5/6-1732 | |
33 | Strength and Merger Scrutinize Cloud Impassive System Praveen Mathangi, V.Anjali | IJRCSE/V5/6-1733 | |
34 | A Novel Secured Retrieval Method for Ad Hoc Disruption- Tolerant Networks using CP-ABE
Technique Vijaya Raju Motru, Penmetsa V Krishna Raja,Kondapalli Beulah, Gudikandhula Narasimha
Rao | IJRCSE/V5/6-1734 | |
35 | A Novel Approach for Creation of Dynamic Form using Database Queries K.Chaitanya, G.Tatayya Naidu | IJRCSE/V5/6-1735 | |
36 | A Novel Approach for Online Nearer Path Computation Rongala Jnana Deepika, G.Sanjay Gandhi | IJRCSE/V5/6-1736 | |
37 | A Novel Approach for Improving Anomaly Intrusion Detection System J.S.Kumar, M.Gopinath Reddy | IJRCSE/V5/6-1737 | |
38 | A Novel Approach for Secure Data Accessing in Military Network K.Krishna, N.Nagendra Gopal | IJRCSE/V5/6-1738 | |
39 | Live Video Distribution Using Hybrid Cellular and AD HOC Networks Ch.Sri Lakshmi, G.Sanjay Gandhi | IJRCSE/V5/6-1739 | |
40 | Seclusion Security and Data Protecting Position Based Search Yellinedi Hari Krishna, M.Aparna | IJRCSE/V5/6-1740 | |
41 | Suitable Operation in ARQ Model Container Desert in Content Delivery Networks Addanki Pavan Kumar, A.Rajesh | IJRCSE/V5/6-1741 | |
42 | Efficient Service Transportation in Cloud Storage System for Multimedia Distribution T.Venkateswara Reddy, J.L.Alekhya, Revathi Pokuri | IJRCSE/V5/6-1742 | |
43 | A Novel Approach for Accurate Best Location Search Using Keywords N.Lavanya, S.S.V.Apparao | IJRCSE/V5/6-1743 | |
44 | Drugs Analyzed With the Help of Probabilistic Aspect Mining Model K.Jai Prakash, K.K.Krishnaiah | IJRCSE/V5/6-1744 | |
45 | An Incentive Structure for Mobile Traffic Offloading Sheik.Rasool, N.Nagendra Gopal | IJRCSE/V5/6-1745 | |
46 | Fastest Keyword Query Routing P.Raghu Pavan, K.K.Krishnaiah | IJRCSE/V5/6-1746 | |
47 | Friend proposed Recommendation System for Social Networks B.Raju, N.Nagendra Gopal | IJRCSE/V5/6-1747 | |
48 | Efficient Dynamic Cellular Traffic Offloading in Delay Tolerant Networks M.Vikram, G.T.Naidu | IJRCSE/V5/6-1748 | |
49 | Building Private and Systematic Query Services in the Cloud with RASP Data Perturbation P.N.V.Sai Chaitanya, S.S.V.Apparao | IJRCSE/V5/6-1749 | |
50 | GIS-GPS Based City Information System through Cloud Ch.Sravanthi Sowdanya, N.Supriya | IJRCSE/V5/6-1750 | |
51 | Superiority Destitute Model with Security and Data Indicate in Cloud Storage Mutyala Satish, G.J.Sunny Deol | IJRCSE/V5/6-1751 | |
52 | Efficient Approachable Contiguous Inspection with Request Queries Desu Siva Sankar, G.J.Sunny Deol | IJRCSE/V5/6-1752 | |
53 | Retreat Security and Data Protecting in Resources Based Protocol Essak Shaik, G.J.Sunny Deol | IJRCSE/V5/6-1753 | |
54 | Best Tour Travel Recommendation System M.Surya Prakash, G.Tatayya.Naidu | IJRCSE/V5/6-1754 | |
55 | Best Path Computation in Online D.Surendra Balu, Satyanarayana | IJRCSE/V5/6-1755 | |
56 | Protection and Systematic Serving in Public Data Investigate and Destitution in Cloud Computing Jasti Bindu, Thupakula Venkatrao | IJRCSE/V5/6-1756 | |
57 | Collect Propertied Resources Commission Routing and Node Relocate Technique Nersu.Neeraja, V.Padmaja, Sayeed Yasin | IJRCSE/V5/6-1757 | |
58 | Capability Shrinkage Privacy with Impersonal Security and Data Deposit in Clouds Savva Bhagya lakshmi, V.Srinivasa Rao | IJRCSE/V5/6-1758 | |
59 | Share Mobile Surface Enables in Wireless Sensor Networks Ramadugu PavanKumar, P.Yejdani Khan, Revathi Pokuri | IJRCSE/V5/6-1759 | |
60 | A Novel Approach for Offloading Mobile Traffic in Network ManiKumar Karri, J.Raja Rajeswari | IJRCSE/V5/6-1760 | |
61 | A Novel Approach for Nearest Path in Online K.Divya Rekha, J.Raja Rajeswari | IJRCSE/V5/6-1761 | |
62 | Regard Individualistic Query Services and Accept Systematic in Clouds Computing Sunil Kumar Bondu, G.J.Sunny Deol | IJRCSE/V5/6-1762 | |
63 | A Fastest and Secure Data Transmission in Wireless Network S.M.V.Gopikrishna, J.Raja Rajeswari | IJRCSE/V5/6-1763 | |
64 | Performance of Boundary Cutting for Decision-treebased Packet Classification S.Vijaya Nirmala, K.Santoshi Lakshmi | IJRCSE/V5/6-1764 | |
65 | Certainty and Compound Investigate Cloud Undemonstrative System S.Sriraghavendra, G.Guru Kesava Dasu | IJRCSE/V5/6-1765 | |
66 | Regard Unconventional Query Services and Recognize Standard in Clouds Computing Sucharitha Peddinti, V.Srinivasa Rao | IJRCSE/V5/6-1766 | |
67 | A Secure In-Network Data Aggregation in Wireless Sensor Networks G.Geetavani, N.N.Gopal | IJRCSE/V5/6-1767 | |
68 | Identity Producer in Cloud Services Remote Recognize the Aggregate Users Raghava Rani Suram, E.Sambasiva Rao | IJRCSE/V5/6-1768 | |
69 | Served Quality Proceed for Subatomic Object Management Shaik Jakeer Hussain, Shaik Mohammad Rafi | IJRCSE/V5/6-1769 | |
70 | A Secure Self determining, and Simultaneously Accessing the Encrypted Cloud Database B.V.V.Siva Prasad, J.Raja Rajeswari | IJRCSE/V5/6-1770 | |
71 | Failure Nodes Detection and Solving in Wireless Sensor Network G.Vinay Kumar, K.Mohan Rao | IJRCSE/V5/6-1771 | |
72 | To Estimate Accuracy by Leveraging the Statistics from Multiple Verification Runs K.Shireesha, A.Soumya | IJRCSE/V5/6-1772 | |
73 | Efficient Keyword Query Routing System Using Query Expansion V.SivaNagendra Babu, B.S.N.V.Satyanarayana | IJRCSE/V5/6-1773 | |
74 | Assurance Ranking and Design Semantic Extending Topple S.Anil Kumar, K.Rama Rao | IJRCSE/V5/6-1774 | |
75 | Identification of Business Process Changes Using Mining Techniques Mangena Durga Chandra Rao, S.S.V.Apparao | IJRCSE/V5/6-1775 | |
76 | Detection and Resolving Denial of Service Attacks in Network Tammisetti Srividya, Mallela Ramesh Babu | IJRCSE/V5/6-1776 | |
77 | Locate Extend Discussion in Social Streams using Link Analysis Kuchipudi Suneetha, Mohammad Sirajuddin | IJRCSE/V5/6-1777 | |
78 | EMAP: A Novel Approach for Providing the Security in the Vehicular Ad Hoc Network(VANET) Paramata Vivek, K.Ramya Devi | IJRCSE/V5/6-1778 | |
79 | A Novel Network Method to Recover the Failure Nodes in Sensor Network Y.V.R.Naidu, J.Raja Rajeswari | IJRCSE/V5/6-1779 | |
80 | An Efficient Technique for Best Friends Recommendation in Social Network P.Naga Sravanthi, Md.Ahmed | IJRCSE/V5/6-1780 | |
81 | Recommend the Friends in Social Network L.Vinod, K.Santosh Lakshmi | IJRCSE/V5/6-1781 | |
82 | Data Store and Schedule in Wireless Networks Based Object and Medium Transmission Chinababu Kanaparthi, Tata.Venkateswarlu | IJRCSE/V5/6-1782 | |
83 | Predominance Shrinkage Model and Security Data Retainer in Cloud Computing Yeluri Veera Venkata Saikuma, M.VamsiKrishna | IJRCSE/V5/6-1783 | |
84 | Data Collection and Validity Service is Improve Data Sharing In Cloud Computing Kataru Srinu, Goda Srinivasa Rao | IJRCSE/V5/6-1784 | |
85 | Dominance Contraction Rule with Impersonal Security and Data Stored in Clouds Sai Meghana Maddela, Anantha Rao Gottimukkala | IJRCSE/V5/6-1785 | |
86 | An Efficient Technique to Identifying Fluctuations in Business Process Mining P.A.Bhargav, G.T.Naidu | IJRCSE/V5/6-1786 | |
87 | Partition Fragment for Packet Classification Nutakki Naresh, B.Radha Krishna Murthy | IJRCSE/V5/6-1787 | |
88 | Reliable Data Collection in Wireless Sensor Networks and Separate out of Attacker Reaction Razina Shaik, Madhubala Myneni, V.Sridhar Reddy | IJRCSE/V5/6-1788 | |
89 | Carp a Novel Strategy to Deal with the Well-Known Image Hotspot Problem in Preferred Graphical Password
Methods Chekuri Rama Krishna Raju, D.Srikar | IJRCSE/V5/6-1789 | |
90 | Efficient Image Encryption-Then-Compression System by Using Bilateral Filter Jonnalagadda Syam Babu | IJRCSE/V5/6-1790 | |
91 | Consider Implementation, Validity, and Quality for Secure Cloud Data Compact Sandeepkumar Panthagani, M.Sivanaga Raju | IJRCSE/V5/6-1791 | |
92 | Statistical Aspect Mining Model for Drug Reviews M.Kishore, N.S.V.Satyaaraya B | IJRCSE/V5/6-1792 | |
93 | A Clustering Based Query with Security Data Processing Schedule K.Gowtham, P.Ashok Kumar | IJRCSE/V5/6-1793 | |
94 | Authorized Trustworthy Service Consideration in Security-Oriented Mobile Social Networks Shaik Moulali, G.J.Sunny Deol | IJRCSE/V5/6-1794 | |
95 | Consequence Position Extracting and Its Implementation V.Siva Kumar, N.Anil Kumar | IJRCSE/V5/6-1795 | |
96 | Efficient Search Location Using Keywords R.Venkatalaluswamy, V.K.Pratap | IJRCSE/V5/6-1796 | |
97 | Improved Query Based Web Image Retrieval with K-Means Clustering and SVM G.K.Soujanya, Y.Ramu | IJRCSE/V5/6-1797 | |
98 | An Improved Method for Document Retrieval by using Correlation Preserving Indexing with TF/IDF R.G.Vyshnavi, Y.Ramu | IJRCSE/V5/6-1798 | |
99 | Promptly Approachable Nearly Investigation Individual Queries P.Satyanarayana, S.Jalaiah | IJRCSE/V5/6-1799 | |
100 | Transactions with Formulation Gather in Process Mining Radha Lakshmi K, P.Pedda Sadhu Naik | IJRCSE/V5/6-1800 | |
101 | Stratagem Path Linear Passing and Route Estimation Arunajyothi Narra, M.Aparna | IJRCSE/V5/6-1801 | |
102 | Security and Efficient Portion Data Monitor in Public Cloud Auditing Muvva Raja Sekhar, Akbarkhan, Md.Amanatulla | IJRCSE/V5/6-1802 | |
103 | A Species Cloud Nears and Established Specified Data Reduction Manasa N, B.Showri Rayalu | IJRCSE/V5/6-1803 | |
104 | Delineation of MRI Brain Tumor using Unified Fuzzy K-means Clustering Algorithm Daram Amitha, P.Pedda Sadhu Naik | IJRCSE/V5/6-1804 | |
105 | Distributed Data Analytics Framework for Heterogeneous Cloud Computing Environments Srinivas Guttina,Nagatirumala Rao S N | IJRCSE/V5/6-1805 | |
106 | An Advanced common Pattern Recognition Algorithm in Bio-Informatics Ch.Anuradha, K.Sandhya Rani, T.Balamuralikrishna | IJRCSE/V5/6-1806 | |
107 | Data Security and Collection in Wireless Sensor Networks Remove out of Attacker Impacts Chundru Srinivas, Talatam Veerraju | IJRCSE/V5/6-1807 | |
108 | Web Resource Administration Expedient System and QoS with Ranking Information T.L.Tejaswini, M.Gnana Vardhan | IJRCSE/V5/6-1808 | |
109 | Authentic and Systematic Data Communication for Cluster-Based Wireless Sensor Networks S.Venkata Subba Rao, N.Gopala Krishna | IJRCSE/V5/6-1809 | |
110 | Compact Data Received for Single Executive Disruption-Tolerant Networks L.R.D.Prasad Maddireddi, V.Anantha Lakshmia | IJRCSE/V5/6-1810 | |
111 | Hierarchical Strip Cuts: A Translation, Rotation, Scale and Reflector Invariant Descriptor for Brisk Shape Retrievals R.Siva Ram Prasad, S.Suresh | IJRCSE/V5/6-1811 | |
112 | Hands and Face Tracking Techniques in Natural Expressions Based on Computer Vision Techniques M.Ashok Kumar, B.Srinivas, R.R.Tewari, | IJRCSE/V5/6-1812 | |