1 | Anomaly-Based Intrusion Detection and HOP by HOP Message Authentication in Wireless Sensor Networks K.Naga Bhushanam, Ch.Suresh Babu | IJRCSE/V6/1-1901 | |
2 | Compatibility Designer in Cloud Services Remote Reveal Aggregate Users Parella Venubabu, Munnangi.Suresh | IJRCSE/V6/1-1902 | |
3 | A Fuzzy Cluster Based for Travel Package Recommendation System Sanginadham Murali Mohan, P.Pedda Sadhu Naik | IJRCSE/V6/1-1903 | |
4 | Efficiency and Embellishment Database with Solitude Data Access B.D.L.Anusha, B.SubbaReddy | IJRCSE/V6/1-1904 | |
5 | Context-Based Diversification for Keyword Queries over XML Data Pavani Yerraguntla, Md.Amanatulla | IJRCSE/V6/1-1905 | |
6 | Authentication Based Personalized Web Search D.Mallikarjuna Rao, P.Radha Krishna, K.Rama Krishnaiah | IJRCSE/V6/1-1906 | |
7 | A Secure Aggregation of Data in Wireless Sensor Networks Suresh Kumar S, S.N.V.Satyanarayana.B | IJRCSE/V6/1-1907 | |
8 | Enhanced Approach for Data Offloading in Cellular Networks Vimala Mynevi, G.Minni | IJRCSE/V6/1-1908 | |
9 | An Effective Web Usage Mining Process for Recommender System Using Ontology P.Monika, K.Ganesh Reddy | IJRCSE/V6/1-1909 | |
10 | Dealing Procedure Oriented Data Loss Identification for Consistently Data Transportation Networks Bolla Praveenkumar Reddy, S. Jalaiah | IJRCSE/V6/1-1910 | |
11 | Seclusion and Improve Web Service Framework A.Mallikharjuna Reddy, Anantha Rao Gottimukkala | IJRCSE/V6/1-1911 | |
12 | Time Reliability Efficient Protocols in MANETs S.Joy Kumar,Dr.A.Yesu Babu | IJRCSE/V6/1-1912 | |
13 | Data Encryption Using Square Grid Transposition T.Koti Mani Kumar, S.Chitti Babulu | IJRCSE/V6/1-1913 | |