1 | Distributed Deduplication Systems with Security and Improved Reliability Dittakavi.Damodar Babu, Chandra Sekhar Muttangi | IJRCSE/V6/6-2401 | |
2 | A Confidential Privacy Policy for Protecting User Images Uploaded on Shared Web Sites P.Rajesh, Dr.M.S Babu | IJRCSE/V6/6-2402 | |
3 | Hybrid Feature Descriptor for Image Data Retrieval Using Hadoop Method V.Jagadish Kumar, Ms.Rajyalakshmi Matta | IJRCSE/V6/6-2403 | |
4 | An Enhanced Multi-Layered Cryptosystem Based Secure and Authorized Deduplication Model in Cloud Storage System Rajulapati Anusha, M.Siva Sankar Naik | IJRCSE/V6/6-2404 | |
5 | Analyzing Drifts Using Event Logs Melimi. Radha Meghana, Ch.Chandra Mohan | IJRCSE/V6/6-2405 | |
6 | Supervise Data Service in Multi-Cloud Storage Using Cryptographic Model Sambireddy Gottam, B.Bhanu Pratap Reddy | IJRCSE/V6/6-2406 | |
7 | Objectivity User Transfer Data on Content Sharing Sites Using Access Control Mechanism Rayipudi Raghu Varma, Dr.Uma Devi | IJRCSE/V6/6-2407 | |
8 | Climate Change and Weather Prediction Based on Decision Tree Using Data Mining Techniques Tanna Anusha, P.Lalitha Raja Rajeswari | IJRCSE/V6/6-2408 | |
9 | A Parity Relationship Agitate Objected Scheme in Smartphone Mobile Networks Sriharsha Vikruthi, JanardhanReddyDevarapalli | IJRCSE/V6/6-2409 | |
10 | Assurance and Stable Detection of Packet Pursue Attacks in Mobile Ad Hoc Networks Maddineni Kasi Viswanatham, Sridhar Kodali | IJRCSE/V6/6-2410 | |
11 | A Reliable Implements of Index Appliance Shaik Jilani Basha, Vellaturi Gopi Krishna | IJRCSE/V6/6-2411 | |
12 | Putrefaction Substructure for Image Denoising Using Clustering Methods V.V.Praveen Kumar, U.Jayaram | IJRCSE/V6/6-2412 | |
13 | Spirited Audit Method and File Data Administer in Cloud Storage Kancharla. Chaitanya, G.J. Sunny | IJRCSE/V6/6-2413 | |
14 | Keyword Search Result Based Facet Mining from Web Pages AmarthaluriKarunasri, B.V.V.S.Prasad | IJRCSE/V6/6-2414 | |
15 | Finest Keyword Nearest Neighbor Search J.S.S.Bharathi, Dr.N.K.Kameswara Rao | IJRCSE/V6/6-2415 | |
16 | Quantitative Analysis of Magnetic Resonance Images for Segmentation Applications B.Srinivasa Rao | IJRCSE/V6/6-2416 | |
17 | Dealing with Concept Drift in Process Mining Anuharika Channamsetti, N.N.Gopal | IJRCSE/V6/6-2417 | |
18 | A Novel Approach on Bug Triage in Huge Repository Files M.KasiAnnapoorna, S.V.V.Apparao | IJRCSE/V6/6-2418 | |
19 | Supervised Clustering Ch.Likitha, S.V.V.Apparao | IJRCSE/V6/6-2419 | |
20 | Online Live Traffic Shortest-Path Computation Suma Veni.Veerla, P.C.S.Nagendra Setty | IJRCSE/V6/6-2420 | |
21 | Confidential Privacy Policy to Protect Sharing Images Across Various Social Sites P.S.V.Surya Kumar, K.Rajani Kumari | IJRCSE/V6/6-2421 | |
22 | Sentiment Analysis on Social Data: A Survey G.V.Lakshmi, N.N.Gopal | IJRCSE/V6/6-2422 | |
23 | A Secure in-Network Data Aggregation in Wireless Sensor Networks M.Ganesh Gowd, P.V.Vijaya Durga | IJRCSE/V6/6-2423 | |
24 | A Novel Approach for Business Process Mining K.Ambica Kishan, P.V.Vijaya Durga | IJRCSE/V6/6-2424 | |
25 | A Novel Approach for Managing Secure Data in Decentralized Wireless Sensor Networks K.Suresh Kumar, P.V.Vijaya Durga | IJRCSE/V6/6-2425 | |
26 | Redundancy Elimination in Clustering Ananta Kumar, P.V.Vijaya Durga | IJRCSE/V6/6-2426 | |
27 | Privacy and Preserving Cloud Data Distribution using Cloud Key Bank K.Vinaya Sree Bai, B.Usha Rani | IJRCSE/V6/6-2427 | |
28 | Enabling Cloud Storage Auditing with Key-Exposure Resistance Kodandaramu Karroti, Ch.Raja Jacob | IJRCSE/V6/6-2428 | |
29 | Efficient Clustering of Text Document Using Spherical K-Means Algorithm A.Harini, P.HemaVenkataRamana | IJRCSE/V6/6-2429 | |
30 | Improvement of Aomdv Routing Protocol in Manet and Performance Analysis of Security
Attacks Anusha Papasani, Nagaraju Devarakonda | IJRCSE/V6/6-2430 | |
31 | A Study on Similarity Measure for Text Classification and Clustering Using SMO, KMeans
and Bisecting K-Means Meduri.Haritha, Nagaraju.Devarakonda | IJRCSE/V6/6-2431 | |
32 | A New Grid Connected Power System Using Alternative Phase Shift Based PWM for DC-DC
Converter L.Sk.Laljani Basha, Sk.Shaheen, Dr.Abdul Ahad | IJRCSE/V6/6-2432 | |
33 | New Mechanisam for Secure the Detection of Packet Dropping Attacks in Wireless
Ad Hoc Networks Shiva Mondi, Kancharla Kalpana | IJRCSE/V6/6-2433 | |
34 | Recognition and Rectification of Unclear Fingerprints G.Satya Deepika, Dr.M.S.Babu | IJRCSE/V6/6-2434 | |
35 | A Novel Method for Detecting Duplicates N.Mounika, Dr.M.S.Babu | IJRCSE/V6/6-2435 | |
36 | A Novel Performance of Supervised Attributes Clustering of Dimensionality Reduction in
Irrelevent Data V.Sivaramakrishna, M.Revathi | IJRCSE/V6/6-2436 | |
37 | A Novel Approach for Integrity Auditing and Group User Revocation for Shared Dynamic Cloud
Data Access K.N.Suhasini,Ch.Lavanya Susanna,Sayeed Yasin | IJRCSE/V6/6-2437 | |
38 | Spirited Audit Method and File Allocate Data in Cloud Storage Boddu Teja Sree, N.Vijaya Gopal | IJRCSE/V6/6-2438 | |
39 | Inspect Cloud Storage Security Using Identity-Based Encryption Chintapanti.Anusha, A.Harsha Vardhan | IJRCSE/V6/6-2439 | |
40 | Productive Routing for Packet Examination and Recognize Resources in Wireless Sensor Networks K.Asha, Dr.K.S.M.V.Kumar | IJRCSE/V6/6-2440 | |
41 | Secure and Reliable Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks Pamula Harathi, Y.Rajesh Babu | IJRCSE/V6/6-2441 | |
42 | Communicatethe Locations of Secured IP Deception Using Trace Back Scheme Koteswari Yarru, N.Vijaya Gopal | IJRCSE/V6/6-2442 | |
43 | Insistent Audit Approach and File Security Data in Cloud Storage D.Niveditha Rani, Ch.Kiran Babu | IJRCSE/V6/6-2443 | |
44 | Segregation Approach End of User Conduct Data on Content Sharing Sites G.Lalitha Devi, S.V.Kishore Babu | IJRCSE/V6/6-2444 | |
45 | Secure Auditing for Assign Cloud Data with Message Authentication Code M.Sravana Sandhya, U.Usha Rani | IJRCSE/V6/6-2445 | |
46 | Ensemble Semantic Frequent Pattern Mining Discovery using Virtualization S.Jayaprada, P.Bala Krishna Prasad, R.Satya Prasad | IJRCSE/V6/6-2446 | |
47 | A New Approach for Integrating Social Data into Groups of Interest Dr.M.Kameswara Rao, Dr.Mohammad Rasool | IJRCSE/V6/6-2447 | |
48 | A Novel Approach for Bug Triage with Classification and Data Reduction Techniques Ramanjaneyulu.Pragada, Yuvraju.Chinnam | IJRCSE/V6/6-2448 | |
49 | Effective Reduction of Cluster Koyya Lavanya Kumari, Yuvraju.Chinnam | IJRCSE/V6/6-2449 | |
50 | A Shortest Path Live Traffic Index Rokkam Ashok, Yuvraju.Chinnam | IJRCSE/V6/6-2450 | |