INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME-2,
ISSUE-3)
S.NO |
TITLE OF MANUSCRIPT |
ARTICLE ID |
DOWNLOAD |
1. |
Detecting and Mitigating Collaborative Attacks using NICE in Virtual Network
Systems |
IJRECS/V-2/I-3/01 |
|
Anuradha D N, K. Shiva Krishna Rao |
2. |
EIRQ Privacy and EIRQ Efficient: Compressed Bloom Filters |
IJRECS/V-2/I-3/02 |
|
S. Asia Salma, Pasapula Suhasini |
3. |
Child Activity Recognition Based on Triaxial Accelorometer and Barometric
Pressure Sensor |
IJRECS/V-2/I-3/03 |
|
P.Deepthi, E.Mahendar Reddy |
4. |
Personalized Recommendation on Dynamic Content Using Predictive Bilinear Models |
IJRECS/V-2/I-3/04 |
|
Oruganti Ramannadora, B. Lakshmana Rao |
5. |
Determination of Moisture Content in Soil Using Digital Meter |
IJRECS/V-2/I-3/05 |
|
K. Priyanka, Abdul Rahim |
6. |
Dynamic Efficient Image Retrieval Coalescing an Identity
|
IJRECS/V-2/I-3/06 |
|
Y. Sanjay Sai Raj, R. Chandra
|
7. |
Introducing a Security System for Public Auditing in Cloud Storage |
IJRECS/V-2/I-3/07 |
|
Syeda Nazia Iram, B. Pradeep |
8. |
Entity Mining Extraction using Sequential Rules |
IJRECS/V-2/I-3/08 |
|
Dharna Nandini, M. Ahalya Rani |
9. |
Health Informatics Patient Monitoring: Data Mining Techniques for Medical Applications |
IJRECS/V-2/I-3/09 |
|
Subhashini Kilaparthi, K. Ravikumar |
10. |
Privacy Preserving for Cloud Based Mobile Health Monitoring |
IJRECS/V-2/I-3/10 |
|
Kasaraneni Persis, Dr. B. Stephen Charles |
11. |
Implementation of Intrusion Detection System to Secure AODV Protocol against Blackhole Attack in MANET’s |
IJRECS/V-2/I-3/11 |
|
S. V. Anusha, B. Prabhakar Reddy |
12. |
Privacy Preserving in MANET Using an Advanced Intrusion Detection System |
IJRECS/V-2/I-3/12 |
|
B. Sasidhar, A. Vijetha |
13. |
A Privacy Protection in Encrypted Images |
IJRECS/V-2/I-3/13 |
|
K. Bhargava Reddy, S. Md. Ibrahim, S. G. Nawaz |
14. |
Enhanced Mining of High Dimensional Using Efficient Clustering Algorithm |
IJRECS/V-2/I-3/14 |
|
Shaik Hassanbi, T. Gayathri |
15. |
Detecting and Resolving Vampire Attacks from Wireless ad-hoc Sensor Networks |
IJRECS/V-2/I-3/15 |
|
Munaswamy. D, J. Ravi Kumar |
16. |
A Survey on Classification Techniques of Credit Card Fraud Detection |
IJRECS/V-2/I-3/16 |
|
B. Rajeswari, K. Bheemalingappa |
17. |
Formulating and Feature Extractions of a Document Using Advanced Annotation Technique |
IJRECS/V-2/I-3/17 |
|
Sarangu Viswanadha Rao |
18. |
Secured Sharing of Personal Health Records in Cloud |
IJRECS/V-2/I-3/18 |
|
K. G. Deepak Krishnan, Shyam Mohan J. S. |
19. |
Selusion Maintaining Mine laying of Affiliation Patterns from Outsourced Trade Databases |
IJRECS/V-2/I-3/19 |
|
Nittala Swapna Suhasini |
20. |
Image Fusion for Pan Achromatic and Multispectral Images (Mitigation of Atmospheric Turbulence) |
IJRECS/V-2/I-3/20 |
|
A. Aruna, A. Rajani |