INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME -
5, ISSUE - 2)
S.NO |
TITLE OF MANUSCRIPT |
ARTICLE ID |
DOWNLOAD |
1. |
Independent Access to Encrypted Cloud Database |
IJRECS/V-5/I-2/1 |
|
G. Satyanarayana, Kumpati Srinivas Raja |
2. |
Security for Collaboration in Multicloud Computing Environment |
IJRECS/V-5/I-2/2 |
|
M. Swarnalatha |
3. |
Time Serving Programming with Worst Case Delay Guarantees in Single and
Multi-Hop Net |
IJRECS/V-5/I-2/3 |
|
B. Srinath, D. Kishore Babu |
4. |
Anonymous Authentication on Decentralized Access Control in Clouds using KDC |
IJRECS/V-5/I-2/04 |
|
P. Tara Kumari, P. Pavan Kumar, Dr. S. Arvind |
5. |
Accessibility in Distributed Storage System and Coding for Big Data |
IJRECS/V-5/I-2/05 |
|
Snigdha Cheekoty |
6. |
Secure Data Sharing in Cloud Storage with KAC |
IJRECS/V-5/I-2/06 |
|
S. M. Krishna Reddy Padala, Dr. B. Sujatha |
7. |
A Secure and Trustworthy Service System for Service Oriented Mobile Social Networks |
IJRECS/V-5/I-2/07 |
|
Meduri Bhargavi, P. Sandhya |
8. |
Analyzing of Hybrid Cloud Approach for Secure Authorized Deduplication |
IJRECS/V-5/I-2/08 |
|
A. T. Jagadeesh, V. Gowtham Prakash |
9. |
Managing Idea Floats Utilizing Diverse Methods for Identifying Classes in Information Stockpiling |
IJRECS/V-5/I-2/09 |
|
Ch. Swapna, N. Subhasini |
10. |
Analyzing Complex Keyword Queries Search and Expectation Over Database |
IJRECS/V-5/I-2/10 |
|
Pranusha Mullangi, T. M. Jaya Krishna |
11. |
A Survey of Enhancing Web Service Recommendation Strategy with Positioning QOS Information |
IJRECS/V-5/I-2/11 |
|
Thommandru AnuSravani, M. Lakshumaiah |
12. |
Information Transmission Utilizing Secure Protocol for Unconstrained Wireless Ad Hoc Networks |
IJRECS/V-5/I-2/12 |
|
A. M. V. S. Sravani, Dr. B. Sujatha |
13. |
Securing User Location in GSN: Preserving Position and Absence Privacy in Geo-Social Networks |
IJRECS/V-5/I-2/13 |
|
ER. Aneetha, N. Sujatha |
14. |
Introducing a Security System for Public Auditing in Cloud Storage |
IJRECS/V-5/I-2/14 |
|
M. Harshini, Seshu Kumari |
15. |
An Advanced Query Processing For Networking Systems |
IJRECS/V-5/I-2/15 |
|
A. Srikanth Reddy, Thirupathi Reddy Thumma |
16. |
To Derive Test Suites For Integration Test From Architectural |
IJRECS/V-5/I-2/16 |
|
A. Edara Nageswara Rao, Santi Vishnu Prasad, Seepuram Srinivas Kumar |
17. |
Privacy Preserving In MANET Using an Advanced Intrusion Detection System |
IJRECS/V-5/I-2/17 |
|
Vadapalli Ajay Chanakya, Tejavath Balakrishna |
18. |
Direct Flux Vector and Torque Control of Induction Motor Drives Using Space Vector Modulation |
IJRECS/V-5/I-2/18 |
|
Vaishnavi S Masur, D. S. More |
19. |
An Operating Mechanism Driven by the Motor for HVCB |
IJRECS/V-5/I-2/19 |
|
G. Venkata Sudarsan, G. Venkata Lakshmi |
20. |
An Empirical Search in Databases by using Keyword Query Routing |
IJRECS/V-5/I-2/20 |
|
S. Sriman Narayana, M. Ravi, CH. Srinivasulu |
21. |
Security Upgrading Strategy for Consolidating Captcha Utilizing a Graphical Secret Word on Difficult Issue in AI |
IJRECS/V-5/I-2/21 |
|
M. Pranusha, M. A. Muneer, CH. Srinivasulu |
22. |
Implementing the Radix-10 Augmentation with Fast Utilizing Redundant BCD Codes |
IJRECS/V-5/I-2/22 |
|
Varre Satish Kumar, Srivalli Kiranmayi Sridhara |
23. |
MCM Technique Utilizing Wallace Multiplier and Convey Spare Adders Usage of FIR Channel |
IJRECS/V-5/I-2/23 |
|
Durga Prasad Siddani, K. Rajasekhar |
24. |
Identifying Adversary of Pattern Classification under Attacks |
IJRECS/V-5/I-2/24 |
|
Yatam Venkanna Babu, R. N. V. Jagan Mohan |
25. |
Multicast in Cognitive Radio Lattice Systems for Exploiting Multichannel Assorted Qualities |
IJRECS/V-5/I-2/25 |
|
K. Ramya, CH. Srinivasulu |