INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME -
6, ISSUE - 2)
S.NO |
TITLE OF MANUSCRIPT |
ARTICLE ID |
DOWNLOAD |
1. |
Continuous Evolutionary Approach of Summarization and Timeline for Tweet Streams |
IJRECS/V-6/I-2/01 |
|
Sigirisetty Anusha |
2. |
Unsupervised Distance Based Outlier Detection Using Reverse Nearest Neighbors |
IJRECS/V-6/I-2/02 |
|
Dandeboyina Lakshmi Anusha, N. M. V. Nirmala, A. Surendra Babu |
3. |
An Effective Method for Reducing Bug Triage Using Data Reduction Techniques |
IJRECS/V-6/I-2/03 |
|
T. Hima Bindu, I. Phani Kumar, A. Surendra Babu |
4. |
A Dynamic Pervasive Computing Environment for Computational Trust Model |
IJRECS/V-6/I-2/04 |
|
Mulakalapalli Ramya Krishna, Kandimalla Gopi, SK Saida |
5. |
An Efficient Approach of Filtering of Unwanted Messages in Social Networks for Finding a Friend |
IJRECS/V-6/I-2/05 |
|
Bade Gopinadh, I. Phani Kumar, P. Firoze |
6. |
Effective and Efficient Progressive Techniques for Identifying Duplicates |
IJRECS/V-6/I-2/06 |
|
Hari Prasad Gaddipati, I. Phani Kumar, N. M. V. Nirmala |
7. |
Efficient Hybrid Approach of Dynamic Routing for Delay Based Services in WSN |
IJRECS/V-6/I-2/07 |
|
Devarakonda Hamalatha, P. Firoze, A. Surendra Babu |
8. |
An Improved Privacy Policy Inference over the Socially Shared Images with Automated Annotation Process |
IJRECS/V-6/I-2/08 |
|
Aduri Surekha, Kandimalla Gopi, SK. Saida |
9. |
An Effective Approach of Malicious Packet Dropping Attacks in Wireless Ad Hoc Networks Using Truthful Detection |
IJRECS/V-6/I-2/09 |
|
Bollineni Lavanya Chowdhary, P. Firoze, A. Surendra Babu |
10. |
Fully Anonymous Attribute-Based Encryption with User Revocation and Data Access in Cloud |
IJRECS/V-6/I-2/10 |
|
P. Priyadarsan, N. M. V. Nirmala, P. Firoze |
11. |
Finger Print Techniques for Multimedia Distribution Using Privacy Content Protection |
IJRECS/V-6/I-2/11 |
|
Donepudi Raveendra Babu, I. Phani Kumar, A. Surendra Babu |
12. |
A Dynamic Approach for Data Possession in Secure Cloud Storage System |
IJRECS/V-6/I-2/12 |
|
Sindhu Munagala, Anusha Merugu, P. Rathaiah3, B. Ramji |
13. |
Verification of User Identity for Secure and Transparent of Internet Services |
IJRECS/V-6/I-2/13 |
|
E. Sai Krishna, N. M. V. Nirmala, P. Firoze |
14. |
Efficient Approach of Best Keyword Search for Optimal Location |
IJRECS/V-6/I-2/14 |
|
Vuyyuru Sirisha, I. Phani Kumar, P. Firoze |
15. |
A Distributed and Systematic Method for Automatic Generation of Packets |
IJRECS/V-6/I-2/15 |
|
Anand Gopal. J, Adulapuram Pradeep |
16. |
An Efficient Approach of Progressive Techniques for Duplicate Detection |
IJRECS/V-6/I-2/16 |
|
A. Lakhan Singh, Adulapuram Pradeep |
17. |
An Efficient Process Mining Approach Using Concept Drifts |
IJRECS/V-6/I-2/17 |
|
Gopavaram Saraswathi Devi, P. Firoze, A. Surendra Babu |
18. |
An Efficient Group Data Sharing Approach in Cloud Using Key Aggregate Cryptosystem |
IJRECS/V-6/I-2/18 |
|
Rajendra Prasad Kuraganti, I. Phani Kumar, A. Surendra Babu |
19. |
Stochastic Based Computation for Live Traffic |
IJRECS/V-6/I-2/19 |
|
Velaga Anusha, I. Phani Kumar, P. Firoze |