2INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME-1,
ISSUE-5)
S.NO |
TITLE OF MANUSCRIPT |
ARTICLE ID |
DOWNLOAD |
1. |
Sharing Data in cloud storage using key-Aggregate cryptosystem |
IJRECS/V-1/I-5/01 |
|
C.Sowjanya, Dr.S.Anitha Reddy |
2. |
Providing Intelligent Traffic Management System by Using Fuzzy Logic in Networks |
IJRECS/V-1/I-5/02 |
|
S.R. Raj Kumar, Pakala Durga Prasad |
3. |
Attribute-Predicated Access to Scalable Media in Cloud-Availed Content Sharing
Networks |
IJRECS/V-1/I-5/03 |
|
A.Chandra Mouli, T.S. Suhasini |
4. |
Conceptualization Based Query for Dynamic Database |
IJRECS/V-1/I-5/04 |
|
V. Dilip Reddy, J. Sudhakar |
5. |
Mining Contracts for Occupation Cases and Secular Restraints in Service
Employments |
IJRECS/V-1/I-5/05 |
|
E. Shanmukha Priya |
6. |
Defending Against Flooding Attacks In Mobile Networks |
IJRECS/V-1/I-5/06 |
|
S.R.Rajkumar, Jaya Krishna Manila |
7. |
A Distributed Hash Table (DHT) Technique for Peer-To-Peer Networks |
IJRECS/V-1/I-5/07 |
|
B.Rajesh Kumar, Allu Phaneendra |
8. |
Conceptualization-Based Query Responding For Dynamic Database |
IJRECS/V-1/I-5/08 |
|
Mohammad Sirajuddin, T.Shilpa |
9. |
A Novel on Intrusion Detection Using Outlier Detection PCA and ICA Techniques |
IJRECS/V-1/I-5/09 |
|
Nari Ramesh, S. Shalini |
10. |
Utilization of Mining Queries for Efficient Online Image Retrieval |
IJRECS/V-1/I-5/10 |
|
Yeddula Ushajyothi, P. Gopala Krishna |
11. |
Furnishing Data Protection as a Avail in Cloud Computing |
IJRECS/V-1/I-5/11 |
|
N. Anusha, M. Sathya Narayana |
12. |
An Advanced Search Optimization Technique Using Genetic Algorithm |
IJRECS/V-1/I-5/12 |
|
Ch. Rajashekar, K. David Raju |
13. |
Rulebased segmentation technique for firewall optimization |
IJRECS/V-1/I-5/13 |
|
Pasula Swathi, K. Janardhan |
14. |
Lamia Assails Debilitating Life from Wireless Ad-Hoc Sensor Webs |
IJRECS/V-1/I-5/14 |
|
Indrapalli Swapna, M. Swapna |
15. |
Effective Comparision Based Profile Matching |
IJRECS/V-1/I-5/15 |
|
M. Swapna, K. Lalitha, Santi Vishnu Prasad |
16. |
Optimum Client-Server Appointment for Cyber world Disseminated Systems |
IJRECS/V-1/I-5/16 |
|
Srinivas Eega, Seshu Kumari |
17. |
Redundancy Management in HWSN to Maximize the Network Lifetime |
IJRECS/V-1/I-5/17 |
|
Sridhar Modam, S. Madhu, K. Neeraja |
18. |
Cohesion-Based Method for Analysis of Accurate and Constant Relationship on Wikipedia |
IJRECS/V-1/I-1/18
|
|
Bhukya Sunitha, M. N. L. Anuradhar |
19. |
Navigation Assistant for Blind People using GPS-GSM with smart SMS facility |
IJRECS/V-1/I-5/19 |
|
P.Sreevani, V.V.N.S.Sudha |
20. |
Dynamic Efficient Image Retrieval Coalescing an Identity |
IJRECS/V-1/I-5/20 |
|
V. Prakash, Sri. V. S. K. Prasada Rao |
21. |
Advanced Vehicle Security System with Theft Control and Accident Notification
|
IJRECS/V-1/I-5/21 |
|
K. Nikhila, S. Latha |
22. |
A Holistic Approach to Minimize the Data-Comprehensive WSN via Optimal Mobile Relay Configuration (OMRC)
|
IJRECS/V-1/I-5/22 |
|
G.Sikinder, Anuradha |
23. |
Gregarious Tube P2p-Availed Video Sharing in Online Convivial Networks
|
IJRECS/V-1/I-5/23 |
|
M. Sandeep Kumar, K. Madhavi |
24. |
SET Detecting Node clones in Sensor Meshwork’s |
IJRECS/V-1/I-5/24 |
|
Dasari Jayasree, P. Darshan, R. Srilatha |
25. |
Secure and Verifiable Outsourced Decryption with Resource Limited Devices |
IJRECS/V-1/I-5/25 |
|
Lalitha Rajarajeswari. P, G. Nagaraju |
26. |
Privacy Preserving Detecting an Attacker in wireless Sensor Networks |
IJRECS/V-1/I-5/26 |
|
Madhusudhan Raju Kurapati, Abdul Majeed |
27. |
Enhanced Resource User Navigation through Pattern Based Restructuring |
IJRECS/V-1/I-5/27 |
|
Ravula Sathish, T. Malathi |
28. |
Optimum Client-Server for Cyber world Disseminated Systems |
IJRECS/V-1/I-5/28 |
|
Pannem Mamatha, S. Uma Maheswara Rao |
29. |
Intrusion Detection in Realistic Networks |
IJRECS/V-1/I-5/29 |
|
P. Vijay Kumar, A. Anjaiah |
30. |
Secure and Efficient Profile Matching in Mobile Social Networks |
IJRECS/V-1/I-5/30 |
|
P. Shilpa, D. Sai Kumar |
31. |
Social Network Videos in Clouds |
IJRECS/V-1/I-5/31 |
|
I. Chittibabu, Sandeep Singh Rawat |
32. |
Website Structure Enhancement for Efficient Client Routing |
IJRECS/V-1/I-5/32 |
|
M. Rajitha |
33. |
A Remote Health Care Monitoring System for Drug Level Detection, Blood pressure,
and Measuring Heart Rate |
IJRECS/V-1/I-5/33 |
|
Ragi Ramachary, MA. Khaleed |
34. |
A Framework for Efficient Video Sharing and Streaming in Cloud Environment |
IJRECS/V-1/I-5/34 |
|
Kadarla Sowmya, K. Kishore Babu |
35. |
An Effectuation of a Digitally Dimming Controlled Lighting System Using for
Zigbee Methods |
IJRECS/V-1/I-5/35 |
|
Chintapally Sethu Krishna Yadav, K. Rajesh |
36. |
Safe Distribution of Health Record Information in Cloud Environment |
IJRECS/V-1/I-5/36 |
|
G. Shilpa |
37. |
Implementation of Modified SPIHT with Wavelet Packet Analysis |
IJRECS/V-1/I-5/37 |
|
Varanasi Srilakshmi, Moyya Priscilla Dinkar |
38. |
Simultaneous Plan Recognition and Monitoring (SPRAM) For RFID Tags |
IJRECS/V-1/I-5/38 |
|
Banoth Rambabu, A.M.V.N.Maruthi |
39. |
Invisible QR Code Watermarking Algorithm Using Lifting Based DWT |
IJRECS/V-1/I-5/39 |
|
Gudla Bhanu Gupta, S. Daya Sagar Chowdary |
40. |
CFO Estimation & PAPR Estimation for OFDM/OQAM Systems |
IJRECS/V-1/I-5/40 |
|
Mangipudi Chandra Sekhar, S. Daya Sagar Chowdary |
41. |
An Approach for Outlier Detection PCA and ICA techniques on Intrusion Detection |
IJRECS/V-1/I-5/41 |
|
Gazala Begum, Abdul Rasool. MD |
42. |
A Filtered Wall from Undesired Content Filtering From User Walls of OSN |
IJRECS/V-1/I-5/42 |
|
Konda Sharath Chandra, M. Deepika |