1 | A Mixed Generative Discriminative Primarily Based Hashing Methodology Bommadevara Raghavendra Karthikeya, K.Chandra Mouli | IJRCSE/V8/3-3301 |  |
2 | Finding Top-K Dominating Queries on Incomplete Data Challa Venkata Roja, B.Mouleswararao | IJRCSE/V8/3-3302 |  |
3 | Cross Domain Sentiment Classifcation Using Response Sensitive Embeedings Chinni Sravani, K.Udayasri | IJRCSE/V8/3-3303 |  |
4 | KNNVWC: An Proficient K Nearest Neighbors Approach Based On Various Widths Clustering Mathineti Bhargavi, Dr.V.Suryanarayana | IJRCSE/V8/3-3304 |  |
5 | Authentication Two-Factor Access Control for Web-Based Cloud Computing Services Mitukulla Rajesh, Chinta.Venkata Murali Krishna | IJRCSE/V8/3-3305 |  |
6 | A Naive Mathametisian Classification Approach Victimisation Class Specific Options For Text
Categorization Shaik Nagul Meera, G.Sireesha | IJRCSE/V8/3-3306 |  |
7 | Domain-Sensitive Recommendation Algorithm Assisted With User Item Sub Group Analysis Shaik.Rizvana, K.Chandra Mouli | IJRCSE/V8/3-3307 |  |
8 | Design Fine Tune Imprecise Conditions for Exploratory Search Sridarla Surya Prakasa Rao, K.Udaya Sri | IJRCSE/V8/3-3308 |  |
9 | On the Protection of Permutation-Only Image Coding Schemes Vajrala Venkatesh, B.Mouleswararao | IJRCSE/V8/3-3309 |  |
10 | Location Aware Keyword Problem Suggestion Based on Document Proximity Vankadhara Vijaya Bhanu, G.Sireesha | IJRCSE/V8/3-3310 |  |
11 | Sufficient Algorithms for Mining Top-K High Utility Item Sets Swarna Kumari.Shodagiri, Dr.V.Suryanarayana | IJRCSE/V8/3-3311 |  |