1 | A Mixed Generative Discriminative Primarily Based Hashing Methodology Bommadevara Raghavendra Karthikeya, K.Chandra Mouli | IJRCSE/V8/3-3301 | |
2 | Finding Top-K Dominating Queries on Incomplete Data Challa Venkata Roja, B.Mouleswararao | IJRCSE/V8/3-3302 | |
3 | Cross Domain Sentiment Classifcation Using Response Sensitive Embeedings Chinni Sravani, K.Udayasri | IJRCSE/V8/3-3303 | |
4 | KNNVWC: An Proficient K Nearest Neighbors Approach Based On Various Widths Clustering Mathineti Bhargavi, Dr.V.Suryanarayana | IJRCSE/V8/3-3304 | |
5 | Authentication Two-Factor Access Control for Web-Based Cloud Computing Services Mitukulla Rajesh, Chinta.Venkata Murali Krishna | IJRCSE/V8/3-3305 | |
6 | A Naive Mathametisian Classification Approach Victimisation Class Specific Options For Text
Categorization Shaik Nagul Meera, G.Sireesha | IJRCSE/V8/3-3306 | |
7 | Domain-Sensitive Recommendation Algorithm Assisted With User Item Sub Group Analysis Shaik.Rizvana, K.Chandra Mouli | IJRCSE/V8/3-3307 | |
8 | Design Fine Tune Imprecise Conditions for Exploratory Search Sridarla Surya Prakasa Rao, K.Udaya Sri | IJRCSE/V8/3-3308 | |
9 | On the Protection of Permutation-Only Image Coding Schemes Vajrala Venkatesh, B.Mouleswararao | IJRCSE/V8/3-3309 | |
10 | Location Aware Keyword Problem Suggestion Based on Document Proximity Vankadhara Vijaya Bhanu, G.Sireesha | IJRCSE/V8/3-3310 | |
11 | Sufficient Algorithms for Mining Top-K High Utility Item Sets Swarna Kumari.Shodagiri, Dr.V.Suryanarayana | IJRCSE/V8/3-3311 | |