1 | A New Video Watermarking Algorithm Using Decimated Wavelet and Singular Value Decomposition in Low Level Features M.Anusha, P.P.S.Naik | IJRCSE/V6/4-2201 | |
2 | Composition of Process Genetic to Cloud Service Reporter S.UpendraKiranBabu, D.Kumar | IJRCSE/V6/4-2202 | |
3 | A Survey on Applicability of Decision Trees on Class Imbalance Learning D.Durga Prasad, K.Nageswara Rao | IJRCSE/V6/4-2203 | |
4 | An Efficient Reverse Keyword Search using Cube Index Algorithm (CIA) Nakka Appala Swamy, S.V.S.V.P Ramaraju | IJRCSE/V6/4-2204 | |
5 | A Novel Technique for Learning Fine-Grained Image Similarity with Deep Ranking Alugolu Bhanuprakash, K.Nuka Raju | IJRCSE/V6/4-2205 | |
6 | A Secured and Revocable Multiauthority Cipher Text-Policy Attribute-Based Encryption Scheme for Cloud Storage Santosh Babu Ambati, Sk.Akbar | IJRCSE/V6/4-2206 | |
7 | Data Encryption and Decryption Using Square Grid and Columnar Transposition B.Hari Krishna, Ch.Raja Jacob | IJRCSE/V6/4-2207 | |
8 | Compatibility Encryption Scheme with Function Key Revocation Technique in Cloud Computing Medakayala Radhika, B.Salman Raju | IJRCSE/V6/4-2208 | |
9 | Designated Repudiation of Service Program in Cloud Computing K.Swetha, P.P.S.Naik | IJRCSE/V6/4-2209 | |
10 | Profitable Routing for Packet Investigation and Recognize Method in Wireless Sensor Networks Naga Umamaheswar.P, M.Siva Nagaraju | IJRCSE/V6/4-2210 | |
11 | Dependable Argument Auditing for Allot Cloud Data with Message Authentication Code Parchuru Shahansha, Gopala Krishna Nagasarapu | IJRCSE/V6/4-2211 | |
12 | A Novel Technique for Content Protection on Location Based Queries Using FHE A.Ravikiran, Ch.V.Narayana | IJRCSE/V6/4-2212 | |
13 | Privacy and Preserving Cloud Data Distribution Using Cloud Key Bank Yaramala Syam Sudarsana Reddy, T.V.Nagaraju | IJRCSE/V6/4-2213 | |
14 | A Study on Text Mining Techniques and Applications Eruguralla Sathish Babu, Rathode Maheshwar, Bukya Mohanbabu | IJRCSE/V6/4-2214 | |