INTERNATIONAL JOURNAL FOR RESEARCH ON
ELECTRONICS AND COMPUTER SCIENCE
                    ISSN 2321-5485 (Online) ISSN 2321-5784 (Print)

INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME-2, ISSUE-3)

S.NO TITLE OF MANUSCRIPT ARTICLE ID DOWNLOAD
1. Detecting and Mitigating Collaborative Attacks using NICE in Virtual Network Systems IJRECS/V-2/I-3/01
Anuradha D N, K. Shiva Krishna Rao
2. EIRQ Privacy and EIRQ Efficient: Compressed Bloom Filters IJRECS/V-2/I-3/02
S. Asia Salma, Pasapula Suhasini
3. Child Activity Recognition Based on Triaxial Accelorometer and Barometric Pressure Sensor IJRECS/V-2/I-3/03
P.Deepthi, E.Mahendar Reddy
4. Personalized Recommendation on Dynamic Content Using Predictive Bilinear Models IJRECS/V-2/I-3/04
Oruganti Ramannadora, B. Lakshmana Rao
5. Determination of Moisture Content in Soil Using Digital Meter IJRECS/V-2/I-3/05
K. Priyanka, Abdul Rahim
6. Dynamic Efficient Image Retrieval Coalescing an Identity IJRECS/V-2/I-3/06
Y. Sanjay Sai Raj, R. Chandra
7. Introducing a Security System for Public Auditing in Cloud Storage IJRECS/V-2/I-3/07
Syeda Nazia Iram, B. Pradeep
8. Entity Mining Extraction using Sequential Rules IJRECS/V-2/I-3/08
Dharna Nandini, M. Ahalya Rani
9. Health Informatics Patient Monitoring: Data Mining Techniques for Medical Applications IJRECS/V-2/I-3/09
Subhashini Kilaparthi, K. Ravikumar
10. Privacy Preserving for Cloud Based Mobile Health Monitoring IJRECS/V-2/I-3/10
Kasaraneni Persis, Dr. B. Stephen Charles
11. Implementation of Intrusion Detection System to Secure AODV Protocol against Blackhole Attack in MANET’s IJRECS/V-2/I-3/11
S. V. Anusha, B. Prabhakar Reddy
12. Privacy Preserving in MANET Using an Advanced Intrusion Detection System IJRECS/V-2/I-3/12
B. Sasidhar, A. Vijetha
13. A Privacy Protection in Encrypted Images IJRECS/V-2/I-3/13
K. Bhargava Reddy, S. Md. Ibrahim, S. G. Nawaz
14. Enhanced Mining of High Dimensional Using Efficient Clustering Algorithm IJRECS/V-2/I-3/14
Shaik Hassanbi, T. Gayathri
15. Detecting and Resolving Vampire Attacks from Wireless ad-hoc Sensor Networks IJRECS/V-2/I-3/15
Munaswamy. D, J. Ravi Kumar
16. A Survey on Classification Techniques of Credit Card Fraud Detection IJRECS/V-2/I-3/16
B. Rajeswari, K. Bheemalingappa
17. Formulating and Feature Extractions of a Document Using Advanced Annotation Technique IJRECS/V-2/I-3/17
Sarangu Viswanadha Rao
18. Secured Sharing of Personal Health Records in Cloud IJRECS/V-2/I-3/18
K. G. Deepak Krishnan, Shyam Mohan J. S.
19. Selusion Maintaining Mine laying of Affiliation Patterns from Outsourced Trade Databases IJRECS/V-2/I-3/19
Nittala Swapna Suhasini
20. Image Fusion for Pan Achromatic and Multispectral Images (Mitigation of Atmospheric Turbulence) IJRECS/V-2/I-3/20
A. Aruna, A. Rajani