INTERNATIONAL JOURNAL FOR RESEARCH ON
ELECTRONICS AND COMPUTER SCIENCE
                    ISSN 2321-5485 (Online) ISSN 2321-5784 (Print)

2INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME-1, ISSUE-5)

S.NO TITLE OF MANUSCRIPT ARTICLE ID DOWNLOAD
1. Sharing Data in cloud storage using key-Aggregate cryptosystem IJRECS/V-1/I-5/01
C.Sowjanya, Dr.S.Anitha Reddy
2. Providing Intelligent Traffic Management System by Using Fuzzy Logic in Networks IJRECS/V-1/I-5/02
 S.R. Raj Kumar, Pakala Durga Prasad
3. Attribute-Predicated Access to Scalable Media in Cloud-Availed Content Sharing Networks IJRECS/V-1/I-5/03
A.Chandra Mouli, T.S. Suhasini
4. Conceptualization Based Query for Dynamic Database IJRECS/V-1/I-5/04
V. Dilip Reddy, J. Sudhakar
5. Mining Contracts for Occupation Cases and Secular Restraints in Service Employments IJRECS/V-1/I-5/05
E. Shanmukha Priya
6. Defending Against Flooding Attacks In Mobile Networks IJRECS/V-1/I-5/06
S.R.Rajkumar, Jaya Krishna Manila
7. A Distributed Hash Table (DHT) Technique for Peer-To-Peer Networks IJRECS/V-1/I-5/07
B.Rajesh Kumar, Allu Phaneendra
8. Conceptualization-Based Query Responding For Dynamic Database IJRECS/V-1/I-5/08
Mohammad Sirajuddin, T.Shilpa
9. A Novel on Intrusion Detection Using Outlier Detection PCA and ICA Techniques IJRECS/V-1/I-5/09
Nari Ramesh, S. Shalini
10. Utilization of Mining Queries for Efficient Online Image Retrieval IJRECS/V-1/I-5/10
Yeddula Ushajyothi, P. Gopala Krishna
11. Furnishing Data Protection as a Avail in Cloud Computing IJRECS/V-1/I-5/11
N. Anusha, M. Sathya Narayana
12. An Advanced Search Optimization Technique Using Genetic Algorithm IJRECS/V-1/I-5/12
Ch. Rajashekar, K. David Raju
13. Rulebased segmentation technique for firewall optimization IJRECS/V-1/I-5/13
Pasula Swathi, K. Janardhan
14. Lamia Assails Debilitating Life from Wireless Ad-Hoc Sensor Webs IJRECS/V-1/I-5/14
Indrapalli Swapna, M. Swapna
15. Effective Comparision Based Profile Matching IJRECS/V-1/I-5/15
M. Swapna, K. Lalitha, Santi Vishnu Prasad
16. Optimum Client-Server Appointment for Cyber world Disseminated Systems IJRECS/V-1/I-5/16
Srinivas Eega, Seshu Kumari
17. Redundancy Management in HWSN to Maximize the Network Lifetime IJRECS/V-1/I-5/17
Sridhar Modam, S. Madhu, K. Neeraja
18. Cohesion-Based Method for Analysis of Accurate and Constant Relationship on Wikipedia IJRECS/V-1/I-1/18
Bhukya Sunitha, M. N. L. Anuradhar
19. Navigation Assistant for Blind People using GPS-GSM with smart SMS facility IJRECS/V-1/I-5/19
P.Sreevani, V.V.N.S.Sudha
20. Dynamic Efficient Image Retrieval Coalescing an Identity IJRECS/V-1/I-5/20
V. Prakash, Sri. V. S. K. Prasada Rao
21.

Advanced Vehicle Security System with Theft Control and Accident Notification

IJRECS/V-1/I-5/21
K. Nikhila, S. Latha
22.

A Holistic Approach to Minimize the Data-Comprehensive WSN via Optimal Mobile Relay Configuration (OMRC)

IJRECS/V-1/I-5/22
G.Sikinder, Anuradha
23.

Gregarious Tube P2p-Availed Video Sharing in Online Convivial Networks

IJRECS/V-1/I-5/23
M. Sandeep Kumar, K. Madhavi
24. SET Detecting Node clones in Sensor Meshwork’s IJRECS/V-1/I-5/24
Dasari Jayasree, P. Darshan, R. Srilatha
25. Secure and Verifiable Outsourced Decryption with Resource Limited Devices IJRECS/V-1/I-5/25
Lalitha Rajarajeswari. P, G. Nagaraju
26. Privacy Preserving Detecting an Attacker in wireless Sensor Networks IJRECS/V-1/I-5/26
Madhusudhan Raju Kurapati, Abdul Majeed
27. Enhanced Resource User Navigation through Pattern Based Restructuring IJRECS/V-1/I-5/27
Ravula Sathish, T. Malathi
28. Optimum Client-Server for Cyber world Disseminated Systems IJRECS/V-1/I-5/28
Pannem Mamatha, S. Uma Maheswara Rao
29. Intrusion Detection in Realistic Networks IJRECS/V-1/I-5/29
P. Vijay Kumar, A. Anjaiah
30. Secure and Efficient Profile Matching in Mobile Social Networks IJRECS/V-1/I-5/30
P. Shilpa, D. Sai Kumar
31. Social Network Videos in Clouds IJRECS/V-1/I-5/31
I. Chittibabu, Sandeep Singh Rawat
32. Website Structure Enhancement for Efficient Client Routing IJRECS/V-1/I-5/32
M. Rajitha
33. A Remote Health Care Monitoring System for Drug Level Detection, Blood pressure, and Measuring Heart Rate IJRECS/V-1/I-5/33
Ragi Ramachary, MA. Khaleed
34. A Framework for Efficient Video Sharing and Streaming in Cloud Environment IJRECS/V-1/I-5/34
Kadarla Sowmya, K. Kishore Babu
35. An Effectuation of a Digitally Dimming Controlled Lighting   System Using for Zigbee Methods IJRECS/V-1/I-5/35
Chintapally Sethu Krishna Yadav, K. Rajesh
36. Safe Distribution of Health Record Information in Cloud Environment IJRECS/V-1/I-5/36
G. Shilpa
37. Implementation of Modified SPIHT with Wavelet Packet Analysis IJRECS/V-1/I-5/37
Varanasi Srilakshmi, Moyya Priscilla Dinkar
38. Simultaneous Plan Recognition and Monitoring (SPRAM) For RFID Tags IJRECS/V-1/I-5/38
Banoth Rambabu, A.M.V.N.Maruthi
39. Invisible QR Code Watermarking Algorithm Using Lifting Based DWT IJRECS/V-1/I-5/39
Gudla Bhanu Gupta, S. Daya Sagar Chowdary
40. CFO Estimation & PAPR Estimation for OFDM/OQAM Systems IJRECS/V-1/I-5/40
Mangipudi Chandra Sekhar, S. Daya Sagar Chowdary
41. An Approach for Outlier Detection PCA and ICA techniques on Intrusion Detection IJRECS/V-1/I-5/41
Gazala Begum, Abdul Rasool. MD
42. A Filtered Wall from Undesired Content Filtering From User Walls of OSN IJRECS/V-1/I-5/42
Konda Sharath Chandra, M. Deepika