INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME -
10, ISSUE - 7)
S.NO |
TITLE OF MANUSCRIPT |
ARTICLE ID |
DOWNLOAD |
1. |
Efficient Approach of Distance Based Outlier Detection Using Reverse Nearest Neighbors of Data |
IJRECS/V-10/I-7/01 |
|
Kanuri T. V. Subbarao, Patsa Pawani |
2. |
A Novel Approach for Peer-to-Peer Multimedia Content Distribution Using Recombined Fingerprints |
IJRECS/V-10/I-7/02 |
|
M. M. Balakrishna, Shaik Raziya Begum |
3. |
Social Sentimental Analysis for Rating Recommended System from Textual Reviews |
IJRECS/V-10/I-7/03 |
|
Mure Muralidhar Reddy, Varaprasad Gajjala, Karamala Suresh |
4. |
A Survey on Semantic-Enhanced Marginalized of Learning Model for De-noising Auto Encoder |
IJRECS/V-10/I-7/04 |
|
Hangalam Krishnamurthi Suhasini, Varaprasad Gajjala, Karamala Suresh |
5. |
A Novel Approach for Deduplicating and Auditing Data over Secure Cloud
|
IJRECS/V-10/I-7/05 |
|
Jenne Sunil, B. Vijaya Bhaskar Reddy |
6. |
Remote Data Integrity Checking and Data Uploading Using Identity-Based on Proxy |
IJRECS/V-10/I-7/06 |
|
Sindhu Kollu |
7. |
A Hybrid Approach for Malicious Data Control Using Data Transfer |
IJRECS/V-10/I-7/07 |
|
Shaik Shahintaz, Mareddy Swathi, Karamala Suresh |
8. |
Effective Approach for Searching the Keyword in Cloud by Public Key Encryption |
IJRECS/V-10/I-7/08 |
|
Maremreddy Saiteja, Mareddy Swathi, Karamala Suresh |
9. |
Identification of Malicious Applications in Online Social Networks |
IJRECS/V-10/I-7/09 |
|
Sandeep Merugu, M. Madhavi, Dr. G. Vishnu Murthy |
10. |
A Survey on Generating Automatic Test Packets for Network |
IJRECS/V-10/I-7/10 |
|
Shaik Mahamood, M. Madhavi, Dr. G. Vishnu Murthy |
11. |
An Effective Supported Path Planning on Roads by Efficient Cache |
IJRECS/V-10/I-7/11 |
|
Siddavatam Aparna, Varaprasad Gajjala, Karamala Suresh |
12. |
An Efficient Relay Selection for Large-Scale Power Grid IoT Networks |
IJRECS/V-10/I-7/12 |
|
K. Balaji, Karamala Suresh |
13. |
A Novel Approach of Twitter Social Network Analysis for Real Time Detection of Traffic |
IJRECS/V-10/I-7/13 |
|
Putyluru Sivajyothi, K. Bala Krishna |
14. |
A Survey on Attribute Based Encryption using Security Algorithms in Cloud Computing |
IJRECS/V-10/I-7/14 |
|
Umme Ruma, Zahoora Abid |
15. |
A Novel Approach on Anomaly Detection System Using Key Recovery Attacks on KIDS |
IJRECS/V-10/I-7/15 |
|
B. Renuka, Dr. D. Baswaraj |
16. |
A Light Weight Secure Scheme Method in Wireless Sensor Networks for Provenance Forgery and Packet Drop Attacks |
IJRECS/V-10/I-7/16 |
|
U. Divya, Kishore Kumar |
17. |
A Novel Approach for Mining High Utility Itemsets Using Top-k Approach |
IJRECS/V-10/I-7/17 |
|
K. Ravinder Goud, M. Jayapal |
18. |
An Efficient Inference Policy on Content Sharing Sites Using User Uploaded Images |
IJRECS/V-10/I-7/18 |
|
Kasam Raju, G. Anitha, M. Vazralu |
19. |
MCA Based Dos Attack Detection System Powered by Triangle Area Based Technique |
IJRECS/V-10/I-7/19 |
|
G. Prathyusha, M.Vazralu |
20. |
A Study on User Identity Verification for Secure Internet Services |
IJRECS/V-10/I-7/20 |
|
Potharaju Ramesh, A.Yogananda |
21. |
Secure Data Integrity in Wireless Sensor Networks for Delay Differentiated Services |
IJRECS/V-10/I-7/21 |
|
N. Tejapriya, M. Sambasivudu |
22. |
A Scalable Approach for Multi Keyword Based Ranked Search over Multiple Data Owners in the Cloud |
IJRECS/V-10/I-7/22 |
|
Paidi Rajitha, K. Srilakshmi |
23. |
A Secure Encryption Method for Providing Security to the Data in the Cloud |
IJRECS/V-10/I-7/23 |
|
Shivanya Chekka, Dr. G. Sharada |
24. |
Efficient Method for Privacy Preserving Malicious Packet Dropping in Wireless Adhoc Networks |
IJRECS/V-10/I-7/24 |
|
Sneha Perla, V. Suneetha |
25. |
A Hybrid Approach for Harvesting Deep-Web Interfaces by Using Two-Stage Crawler Method |
IJRECS/V-10/I-7/25 |
|
Yasa Sindura, E. Chitti Babu |
26. |
Enhancing the Security of Data in the Cloud Using Key Exposure Resistance |
IJRECS/V-10/I-7/26 |
|
Priyanka, Shyam Prasad |
27. |
Efficient Method of Wireless Ad Hoc Networks Using Cooperative Aware Mac Protocol |
IJRECS/V-10/I-7/27 |
|
Alaparthi Tanuja, P. Honey Diana |
28. |
Enabling Data Storage in Cloud with Secure Outsourcing Verifiable Key Updates |
IJRECS/V-10/I-7/28 |
|
Sahithya Gajula, P. Dileep |
29. |
An Efficient Scheme in Cloud Computing for providing Maximum Profit with Guaranteed Quality |
IJRECS/V-10/I-7/29 |
|
M. Manasa, S. Vishwanath Reddy |
30. |
A Survey on Wireless Adhoc Networks for Routing With Congestion Diversity |
IJRECS/V-10/I-7/30 |
|
K. Gayathri, G. Ravi |