1 | An Analytical Framework for Enhancement of Distorted Video Traffic in Wireless Multihop Networks R.Lakshmi Durga, K.Gowtham | IJRCSE/V6/5-2301 | |
2 | Integrated Framework for Multi-User Encrypted Query Operations on Cloud Database Services Addanki Ramasatya Sureshbabu, G.Nageswara Rao | IJRCSE/V6/5-2302 | |
3 | Prediction Policy Based Technique for Multimedia Content Sharing in Social Networking Sitess M.Nageswara Rao, A.Sudhakar | IJRCSE/V6/5-2303 | |
4 | Secured Personalized Web Search Using Adopted Algorithms Cherku Poorna Venkata Srinivasa Rao, M.Sribala | IJRCSE/V6/5-2304 | |
5 | Development of Employee Attendance System Based on RFID and Face Recognition B.Ramya, S.Rajesh | IJRCSE/V6/5-2305 | |
6 | An Efficient Approach for Converting Relational Queries to Spread Sheets K.Sai Jyotshna, B.Veeramallu | IJRCSE/V6/5-2306 | |
7 | A New Encryption and Decryption for 3D MRT Images Akula Pedda Venkata Subba Rao, P.P.S.Naik | IJRCSE/V6/5-2307 | |
8 | Trust Assessment for Cloud Infrastructure with META Approach Sk.Sherina Parvin, I.Tabhita | IJRCSE/V6/5-2308 | |
9 | A NOVEL Approach for Mobile APP and Discovery of Ranking Fraud Detection Abhishikth Nanduri, Ch.Nagaraju | IJRCSE/V6/5-2309 | |
10 | Public Auditing for Regenerating-Code-Based Cloud Storage-on Efficient Privacy Preserving Sanitha.P, M.Samba Siva Rao,Sravan Kumar.P | IJRCSE/V6/5-2310 | |
11 | Efficient Key Management for Privacy in Cloud Environment Gera Avinash, M.Gargi | IJRCSE/V6/5-2311 | |
12 | An Integrated Router Security Framework Using Cipher-SMS Protocol Mounikakari, G.Sumalatha | IJRCSE/V6/5-2312 | |
13 | Multimodal Image Search Engine with Reranking Process Manchineni Nageswara Rao, N.Zareena | IJRCSE/V6/5-2313 | |
14 | Clamping the Dataset from Warehouse Using Big Data Adabala.Venkataramteja, R.Veerababu | IJRCSE/V6/5-2314 | |
15 | Precise Information Obtained by Using Exploratory OLAP Chintala Sridhar Babu, N.Zareena | IJRCSE/V6/5-2315 | |
16 | Online Phishing Attack Detecting Through Efficient Modeling Bandreddy Srinivas, R.Veerababu | IJRCSE/V6/5-2316 | |
17 | Infrequent Weighted Itemset Mining Using Frequent Pattern Growth and Fuzzy Set Kalapala Bhavani, Parasa Nagamani | IJRCSE/V6/5-2317 | |
18 | Intrusion Detection and Hop By Hop Message Authentication in Wireless Active and Passive Networks G.Lakshmi Sravya, K.Jairam | IJRCSE/V6/5-2318 | |
19 | Anonymous Attribute-Based Encryption Control Cloud Data Access Anitha Ramisetti, D.Hari Krishna, L.Venkateswara Rao | IJRCSE/V6/5-2319 | |
20 | EATRCM for hybrid Data Storage and Processing Bapatla Suneetha, T.P.V.V. Srinivasa Rao, J.Srinivasa Rao | IJRCSE/V6/5-2320 | |