INTERNATIONAL JOURNAL FOR RESEARCH ON
ELECTRONICS AND COMPUTER SCIENCE
                    ISSN 2321-5485 (Online) ISSN 2321-5784 (Print)

INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME-2, ISSUE-4)

S.NO TITLE OF MANUSCRIPT ARTICLE ID DOWNLOAD
1. Classifications of Techniques in Credit Card Fraud Detection using Hidden Markov Model IJRECS/V-2/I-4/01
B. Rajeswari, K. Bheemalingappa
2. Social Network Anomaly Detection Strategy Based On Data Mining Methods IJRECS/V-2/I-4/02
N. Esther Rani, Mujaseema Khanum
3. Sharing Data in Cloud Storage Using Key Aggregation in Crypto Systems IJRECS/V-2/I-4/03
Praveen Yadav, Muja Seema Kahnum
4. Seclusion Protection and Security of Data Issues In Cloud Computing IJRECS/V-2/I-4/04
Manjunath. K. M, Sreelakshmi. P
5. Disaster Recovery Techniques and Data Backup for Cloud IJRECS/V-2/I-4/05
Bhavya. R. A, Parthasaradhi Mayasala, K. Jagadeeswara Sarma
6. An Enhanced for Query Marching in Platform based P2P Systems IJRECS/V-2/I-4/06
Rajkiran Dhage, Vijay Lakshetty
7. Privacy Preserving In MANET Using an Advanced Intrusion Detection System IJRECS/V-2/I-4/07
Malrouthu Praveen Kumar, Kishore Babu Dasari
8. Automatic Speech Recognition Based IVR Systems IJRECS/V-2/I-4/08
Rubiya Shaik, G. Hemachandra
9. Generating Automatic Test Packets for Network IJRECS/V-2/I-4/09
Ingala Aneeshwa Reddy, Dr. S. Anitha Reddy
10. Energy Efficient Approach in Data-Intensive Wireless Sensor Networks IJRECS/V-2/I-4/10
Revanasiddappa Biredar, Swati. C
11. Assorting Packets with Intelligent Carvings IJRECS/V-2/I-4/11
Cherukupalli Naga Lakshmi Sowjanya, A. Ramesh
12. Trusted Database: A Sea Alter for Personal Data Avails IJRECS/V-2/I-4/12
Shivakumar, Aruna Kawdi
13. Vedic Multipliers: Survey on Logical Reversibility of Computation IJRECS/V-2/I-4/13
Ashwani Yada, Sandeep Moparthi, M. Basha
14. Furthered Information Approach Scheme in Disruption Tolerant Network IJRECS/V-2/I-4/14
Sadhana Dasari, Bhimineni Venkaiah Chowdary
15. Truncated Multipliers: Design and Effectuation of Truncated Multiplier for DSP Applications IJRECS/V-2/I-4/15
Shaik Jareena, Ma. Wajeed, M. Basha
16. Enhanced for Security Issues with Possible Solutions in Cloud Computing IJRECS/V-2/I-4/16
Basavakumar, Vishwakiran. D
17. Optimum Convey Selection for Accommodating Particular Dissemination IJRECS/V-2/I-4/17
Pratti Venkat Premchand, P Surekha
18. AES Cryptography: An Effectuation of AES Algorithm on FPGA IJRECS/V-2/I-4/18
Palamarthi Laxmi, N. Ravikumar, M. Basha
19. Scalable Device Configuration for the Cyberspace IJRECS/V-2/I-4/19
Shaik Rihana, K. Ramesh
20. Secure Data Access Strategy in Disruption Tolerant Military Network IJRECS/V-2/I-4/20
Prashanth Jadhav, Veeresh Biradar
21. Survey of Content Addressable Memory Circuits and Error Detecting Codes for Multiple Bits IJRECS/V-2/I-4/21
Mahitha Nelapati, G. Sri Harmya, M. Basha
22. Privacy Preserving for Certificateless Signature Schemes IJRECS/V-2/I-4/22
Jyothi Janga, R. Chinna Appala Naidu
23. Monitoring and Testing Large Network Systems IJRECS/V-2/I-4/23
Pari Prasantha Babu, K. Sreenija
24. Distributed Cooperative Caching Under Heterogeneous Requests IJRECS/V-2/I-4/24
S. Babjan, D. Basavaraju
25. Modified Low-Power: Design of LA and LP Modified 32-BIT Square Root Carry Select Adder IJRECS/V-2/I-4/25
Prasanna Pusuluri, Ch. Udaya Bhaskar, M. Basha
26. A Novel Private Authentication Approach for Pervasive Computing Environments IJRECS/V-2/I-4/26
Marishetty Chandrashekhar, G. Kiran Kumar
27. Securing Friendly User Location Hub for Geosocial Applications IJRECS/V-2/I-4/27
Akshanthala Laxmanavasu, T. Chander Seker Reddy
28. A Scalable Service Oriented Consistency Model for Data in the Cloud IJRECS/V-2/I-4/28
Tanukula Sandeep, Kothapelli Karunakar
29. Secrecy Maintaining Comparability Based Profile Matching in Mobile Social Networks IJRECS/V-2/I-4/29
V. Subba Reddy, D. Krishna Kishore
30. Reversible Cellular Automata for Symmetric Cryptography IJRECS/V-2/I-4/30
Sk. Md. Gousil Ajam, M. Muzammil Parvez
31. Digital Library: The YUV Component Information Based on the Original Image IJRECS/V-2/I-4/31
Shaik Kalimuddin Azaz, M. Muzammil Parvez
32. To Avoide the Malcious Entities for Autonomous System by Using Embedded and Computing Sensor IJRECS/V-2/I-4/32
Hanuma Naik. B, D. Mastan Pasha, T. Lalith Kumar
33. Secure User Profile Storage in Social Networks IJRECS/V-2/I-4/33
Naresh Repakula, M. Ahalya Rani
34. Multi - Clouds to Ensure Security in Cloud Computing through RNS Algorithm IJRECS/V-2/I-4/34
Kalvakuntla Swetha, Murali Nath R. S
35. Secure and Verifiable Outsourced Decryption with Limited Devices IJRECS/V-2/I-4/35
Jyothi Chinturla, Murali Nath R. S
36. Disseminated Mining of Association Rules in Horizontally Disseminated Dataset IJRECS/V-2/I-4/36
Komatireddy Akhila, R. Suhasini
37. Detection and Tracking of Moving Objects Using Occlusion Abandoned Detection IJRECS/V-2/I-4/37
Rahmatunnisa, Md. Shamshad Begum
38. Discovery of Trusted and Authenticated Neighbor Positions in Mobile Adhoc Networks IJRECS/V-2/I-4/38
Bolleddu Devananda Rao
39. Conceptualization-Based Query Responding For Dynamic RDF Database IJRECS/V-2/I-4/39
Korimilli V R N Lakshmi, B.Lakshmana Rao
40. Water Quality Monitoring and Agriculture Maintenance System Using Solar Power IJRECS/V-2/I-4/40
Batta Manisha Karunya, V. A. Sankar Ponnapalli