Archives

Volume 23  Published by Foundation of IJCS

1.Security Enhancement for Data Sharing On Cloud Using Identity Based Encryption with Revocable Technique P.S.S. Naveen, P. Prasanna Kumari

2.Enhanced privacy searching for multiple data owners in cloud computing S. Mounika, Dr. A. Subramanyam

3.Energy Efficient Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks                    M V PULLA REDDY, A.K. PUNEETH KUMAR

4.Controlling Dropping Attacks Through Thruthful Detection As Packets In Wireless Adhoc Networks N. Siva, P. Phanindra Kumar Reddy, Dr. A. Subramanyam

5.Prevention Of Various Attacks through Denial of Service strategy in Cloud Computing P. Swarupa Rani, T.N. Ranganadham, Dr. A. Subramanyam

6.A New Approach For Mining User Aware-Rare Stps In Document Streams P. Chandra Kantha Reddy, B.Narayana Reddy

7.Secured Friend To Friend Relationship In Overlying Communities Based On Online Behaviour Muvva Devi Venkatsubramanyam, K.Venkata Rathnam

8.An Enhanced Opportunistic Routing Approach For Underwater Sensor Networks B. Pratap, D. Sai Prathap Reddy

9.A Novel Technique for Detecting Clone Nodes in Wireless Sensor Network Yadala Mounika , M.Malyadri

10.Secure Dynamic Source Routing for Controlling Black Hole Attack over Mobile Ad hoc Networks Rajesh S, K.Venkata Rathnam

11.ENHANCED SECURE DIGITAL PAYMENTS SOLUTIONS USING COIN MANAGEMENT B. susheel kumar, B.Narayana Reddy

12.Novel Scheduling Algorithm For Efficient Deployment Of Mapreduce Applications In Heterogeneous Computing Environment S. Vara Lakshmi, Shaik Jaffar Hussain

13.Dynamic Mapreduce For Job Workloads Through Slot Configuration Technique Jetty Sumanth, Shaik Jaffar Hussain

14.Information Dispersion Through Mobile Social Networks B.Saiprathap , M.Atheequlla Khan

15.Support Reputation-Based Trust Management for Cloud Services K. Munisekhar,A. K. Puneeth Kumar

16.IMPROVED PASSWORD AUTHENTICATION SYSTEM AGAINST PASSWORD ATTACKS FOR WEB APPLICATIONS Pothireddy Sasidhar , D. Sai Prathap Reddy

17.Fraud Resilient Mechanism for Digital Payments Using Coin Management Kata Chandrakanth P. Krishnaiah

18.Mapreduce workload for dynamic job ordering And slot configuration KESAVAVULU ARTHALA N. ANAND REDDY

19.Encrypted Data Storage with Deduplication Approach Using Attribute Based Encryption K. Ameena, T.Lakshmi Prasanna

20.Multi Keywords With Ranked Search Over Encrypted Data In Clouds M. Sirisha, S. Mabjan

 

Volume 22  Published by Foundation of IJCS

1.Multiparty Privacy Policy Controls For Resolving Conflicts In Online Social Networks V.Divyavani, N.M. Deepika, K. Rashmi

Volume 21  Published by Foundation of IJCS

1.Automatic Slot Configurations for Heterogeneous Hadoop Clusters Ch Srikanth , Koona Hemanath, Y.Subba Rayudu

2.A Novel Optimized Mapreduce across Datacenter’s Using Dache: a Data Aware Caching for BigData Applications M.Santhi, A.K. Punith Kumar

3.Decentralised Access Control With Anonymous Authentication On Data Stored In Clouds S. Khader Basha D. Suresh Reddy

4.A Location Based Routing for Mobile Ad Hoc and Wireless Sensor Network P. V. Pavan Kumar

5.An Enhanced Privacy Preserving Data Mining Association Rules in Outsourced Database Mangaira Anjaneyulu , P.Raghavendra , N. Venkata Siva Reddy

6.Cryptography Victimization Fitful Framework Integration B Neeraja , S J Sowjanya, Y.Subba Rayudu

7. Cost-Trivialize Dynamic Exodus Of Content Distribution Systems Into Amalgam Woolpack Mothe Rakesh , koona Hemanath, Y.Subba Rayudu

8.An Enhanced Security Method through Continous and Transparent Identity Verification for Secure Internet Services B. Thanuja, Dr. A. Subramanyam

9.Enhanced privacy searching for multiple data owners in cloud computing S. Mounika, Dr. A. Subramanyam

10.Energy Efficient Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks                    M V PULLA REDDY, A.K. PUNEETH KUMAR

11.Controlling Dropping Attacks Through Thruthful Detection As Packets In Wireless Adhoc Networks N. Siva, P. Phanindra Kumar Reddy, Dr. A. Subramanyam

12.Prevention Of Various Attacks through Denial of Service strategy in Cloud Computing P. Swarupa Rani, T.N. Ranganadham, Dr. A. Subramanyam

13.Cloud Computing Environment for Secure Data Storage A. Aparna, G.Surya Narayana, Dr. A. Subramanyam

14.Enhanced Approaches To Improve Security On Data And Images On Content Sharing Jaya Krishna Gummadidala,S. Suraj Kamal, Dr. A. Subramanyam

15.Enahnced Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage Challa Kranthi Rekha, Naga Swaroopa

16.Enhanced Technique for Images to Control Visually Lossless JPEG2000 Ch srikanth , Mothe Rakesh, Y.Subba Rayudu

17.Enhanced Mechanism for Controlling Distorition in Routing for Video Traffic in Wireless Networks K.Jaya Deepthi , M.Purushottam

18.Attribute Based Encryption Technique for Privilege and Anonymity Access Controlling in Cloud Shaik Rukhsar Begum , S. Mabjan

19. Elimination Of Fraud By Optimization To Integrate Evidences In Mobile Play Store Applications S. Krishna Geetha , B.J. Karuna Sagar

20.Eye Gaze Detection Using Low Resulution for a Desktop with a Web Camera K. Reddy Thulasi , G. Swarna

21. Load Optimization Technique For Content Controlling In Hybrid Clouds To Minimize Cost       V. Girija Rani , C. Nancy 

22.Slot Configuration Technique for Handling Large Data sets in Hadoop Environment A. Reddy Rekha , Dr. A. David William

23.A Framework to Facilitate Selection of Enhanced Multi Cloud Service Providers G. Sameera khanam ,G. Suvarna

24.Dynamic Routing To Preserve Data Integrity In Wireless Networks S. Mohammad Rafi ,C. Praveen Kumar, R.M. Noorullah

25.Data Mining with Big Data Using Semantic Inference Gaddam Surendra, Shaik Jaffar Hussain

26.Implementing An Efficient Distributed Trust Model For Wireless Sensor Networks Palegani Praveen Kumar, Shaik Jaffar Hussain

27.ADAPTIVE PRIVACY POLICY PREDICTION FOR USER UPLOADED IMAGES ON CONTENT SHARING SITES J.Mamasa , A.K.Puneeth Kumar

28.Anonymous Authentication of Decentralized Access Control of Data Stored in Cloud V.Narasimha Swamy, Bandela Guruvaiah

29.METHOD AND APPARATUS FOR REDUCING NETWORK TRAFFIC OVER LOW BANDWIDTH LINKS V.Manohar, Bandela Rajesh

Volume 20  Published by Foundation of IJCS

1.A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security V. Narasimha Swamy, K. Raja Sekhar Reddy

2.A Novel Solution for Minimum Cost Blocking Problem in Multi-path Wireless Mesh Network M.Beema mehraj, Sabari vasan.J

3.A NOVEL STEGANOGRAPHY ALOGIRTHM USING UNIFORM EMBEDDING FOR EFFICIENT JPEG K. SRIRAM, N. PRIYA

4.Improving Reliability against Security Attacks by Identifying Reliance Node in MANET K.Pradeep Kumar,M.Sivalakshmi

5.Development of a Packet Simulator for Performance Test of Information Security System D. Mohan Reddy, M Atheequllah Khan

6.An Efficient Query Forecasting through Different Keywords Over Databases G. Jagadeesh, I.Kavitha Jackleen

7.Effective Data Reduction Technique for Softwares to Reduce Bug Triage Y.Deepthi, B.Kavya

8.INDEPENDENT ACCESS TO ENCRYPTED MULTI CLOUD DATABASES STORAGE M. Siva Kumar, O. Sri Hari Raju

9.Preserving User’s Privacy In Personalized Web Search B. Mahesh Reddy, T. Lakshmi Prasanna

10.Enhanced Privacy Access Inference for User Uploaded Images for Images Sharing Sites in web K.Mayuri , V.Divyavani , Y.Subba Rayudu

11.A Novel Passive IP Approach for Path file sharing through BackScatter in Disclosing the Locations K.Sudha Deepthi , A.Swapna , Y.Subba Rayudu

12.Providing Behavior Prediction with Guarantee Solution for Mobile App From Frauds Y Harika Devi , N. Shalini , Y.Subba Rayudu

13.Interactive Big Data Analytics For Real Time Applications G.Chinna Baludu, K. Rajasekhar Reddy

14.Cluster Based Adaptive Prediction Scheme For Energy Efficiency In Wireless Sensor Networks Y. Vinaya Kumar, K. Rajasekhar Reddy

15.Malware Prevention Using Two Layers Protection Seelam Visweswararao, K.V.Rathnam Dr.M.Sidhar

16.Enhanced Privacy in Online Social Networks K. Sravan Kumar Reddy, K. Rajasekhar Reddy

17.Integrity Attestation for Software-as-a Service Clouds S.Luqman, K. Rajasekhar Reddy

18.Elimination of Fraud by Optimization to Integrate Evidences in Mobile Play Store Applications Syed Hussain Basha, C. Praveen Kumar, R.M. Noorullah

 

Volume 19  Published by Foundation of IJCS

1.Survey of Visual Cryptography Schemes without Pixel Expansion P. Gnaneswari, K. Rajasekhar Reddy

2.Network Monitoring using Test Packet Generation K.G.S. Venkatesan, Dr. V. Khanna S.B. ,Amarnath Reddy

3.Mining Structure for Formation User Profiles Involuntarily D. Bala Raju,K Srinivasa Rao

4.A Novel Secure MultiKeyword Search Over Encrypted Clouds Mr.B.Sundarraj , Aravind G

5.An Enhanced Privacy Preservation Method For High Dimensional Data Through Slicing Technique K. Bashirun, K. Ramesh

6.Lossless Color Image Compression Based on Hierarchical Prediction & Context Adaptive Coding Technique Srikarapu. Tejaswini, A. Rajendra Babu

7.IDENTIFYING KEY CHALLENGES IN PERFORMANCE ISSUES IN CLOUD G Michael, J Arunkumar

8.Automatic Diagnosis Using Test Packet Generation Sri Gowthem.S, Manivannan.D

9.Three Layers of Security System for Electronic Mail T.M.Arun Prabu, C.Anuradha

10.A Novel Solution for Minimum Cost Blocking Problem in Multi-path Wireless Mesh Network M.Beema mehraj, Sabari vasan.J

11.A NOVEL STEGANOGRAPHY ALOGIRTHM USING UNIFORM EMBEDDING FOR EFFICIENT JPEG K. SRIRAM, N. PRIYA

12.Improving Reliability against Security Attacks by Identifying Reliance Node in MANET K.Pradeep Kumar,M.Sivalakshmi

13.A Novel Framework for High Dimensional Data using Fast Clustering Subset Selection B.Lakshmi Naveen Kumar, M.Venkatesh Nayak

14.A Novel Technique for Annotating a Document through Counsel Relevant Attributes Pakala.Niranjan, M.Venkatesh Nayak

Volume 18  Published by Foundation of IJCS

1. Reversible Data Hiding For High Quality Images, S. Rama Devi, G. Chinna Babu

2. Redundancy Management of Multipath Routing Intrusion Toleranceing Heterogeneous Wireless Sensor Networks, C. Himaja, D.Bullarao

3. Detection and prevention of zombies in network based cloud environment, S. Anitha, M. Srikanth

4. Qos- Based Rate Allocation In Wireless Mesh Networks P. Leena Priya, D.Bulla Rao

5. A Model Approaching Security For Trusted Peer To Peer System R. Aswani, M. Naresh Babu

6. Recovery From A Node Failure In A Wireless Sensor Network Using Fault Node Recovery Algorithm V. Sirisha, G. Lalitha

7.Anticipatory Measure for Auction Fraud Detection In Online P. Anandha Reddy,G. Chinna Babu

8.Personalized Query Based Search Technqiues Using Association Rules Alluri.Venkata Ramana,K.Lakshman Kumar

9.An Enhance Encryption Scheme For Privacy-Preserving Mining Association Rules In Outsourced Database M. Sai Bhargavi,K. Raja Sekhar Reddy

10.A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks P.Pramidha, N.Ramanjaneya Reddy

11.ENHANCED PERSONALIZED MOBILE SEARCH ENGINE D Gangadhar,V. Siva Prasad

12.Model and Mechanisms in Relationship-based Access Control for Online Social Network S. Khadervalli,M.Atheequllah Khan

13.Inventory Management Software Yenamandra N.V.D. Abhinay Kumar, G. Chinna Babu

14.Filtering Unwanted Messages In Walls Of Social Network Users B.DWARAKANATH, C.K.HEMANTHA RAMA

15.Enhanced Opportunistic Routing for WSN’s C. Swetha , K. Rajasekhar Reddy

16.A User-Friendly Patent Search Paradigm MANNERU REDI SAGAR, M. REVATHI

17. EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar, S.G. Nawaz, M.Harathi

18.An Automated Approach to Comparative Question Identification and Comparator Extraction S MD SARTAJ BASHA, NARESH ACHARI

19.Flow-Based Methodology For Analysis Of Links On Wikipedia PALAGIRI MOHAMMAD NOUSHAD, P SHABANA

20.QOS RANKING CALCULATION FOR CLOUD APPLICATIONS B Hemasekhar Reddy, C.K.Hemantharama

21.SHIELDING IN CONTRAST TO FLOOD ATTACKS IN DISRUPTION TOLERANT NETWORKS GOUSE MODEEN SHAIK, GOUSIYA SULTHANA SHAIK, P. SUBHAN BASHA

22.Efficient Algorithms For Incessant Position Based Spatial Queries In Mobile Environments Esther Hebseba,S.G .Nawaz

23.An Enhanced Virtualized Cloud Based IPTV System Ramaji Siva, U. Shesadri

24. Mining User Queries with Markov Chain: Application to Content Based Image Retrieval System GANDALAM . SESHU PRATAP S.G. NAWAZ

 

Volume 17  Published by Foundation of IJCS

1. Search As You Type In Different Database Systems C. Venkat Narasaiah, K. Rajasekhar Reddy

2.Distributed, Concurrent and Independent Access to Encrypted Cloud Databases M. Rajasekhar, G. Prathap

3. Content Based Unwanted Message Filtering In OSN G. Lakshmi Radhika, B. Pedda Narayana

Volume 16  Published by Foundation of IJCS

1.Survey of Visual Cryptography Schemes without Pixel Expansion P. Gnaneswari, K. Rajasekhar Reddy

2.Mining Structure for Formation User Profiles Involuntarily D. Bala Raju,K Srinivasa Rao

3.Enhanced Adaptive Acknowledgement A Special Intrusion Detection System V. Tharuna Deepika, Rajiya Sulthana

4.An Enhanced Privacy Preservation Method For High Dimensional Data Through Slicing Technique K. Bashirun, K. Ramesh

5.Lossless Color Image Compression Based on Hierarchical Prediction & Context Adaptive Coding Technique Srikarapu. Tejaswini, A. Rajendra Babu

6.Redundancy Management of Multipath Routing Intrusion Toleranceing Heterogeneous Wireless Sensor Networks M. Rajini, K. Rajasekhar Reddy

7.Fabrication and Criticism on Compliant Caching In Wireless P2P M. Sai Eswar, K. Rajasekhar Reddy

Volume 15  Published by Foundation of IJCS

1.Encryption Of Secure Log Management Using Cryptographic Support V. Mahesh Babu, B. Peda Narayana

2.Optimized videotape steganography using genetic Algorithm (ga) G. Chakrapani, V. Lokeswara Reddy

3.A Serenity Based Steganography With Indian Root T. Shiva Lakshmi, V. Lokeshwara Reddy

4. An Enhanced Encryption Schema For Privacy Preserving Of Association Rules In Outsourced Database G.Pavani, C.Rama Mohan

5. Operative Definite Pocket Money Consume Deliberate With Machines for Cloud Computing Environment K. Divya Tejaswi, K. Raja Sekhar Reddy

6. An Energy Efficient And Secure Intrusion Detection System For HWSNS M. Purushothama Reddy, G. Nagendra Babu

7. Machine Learning Text Categorization in OSN to Filter Unwanted Messages C. Athika Anjum, G. Prathap, B. Laxmi Narayana Reddy

8. Extracting User Interests By Using Log B Swetha, K Srinivasa Rao

9. Touch of Proceeding Gifted And Word Of Honour Sudden Routing For WSNS C.H. Ganesh, G. Nagendra Babu

10. Adaptive Petition Processing in Cloud Database Systems G. Vara Prasad, K. Rajasekhar Reddy

11. A Frame Work of Adaptive Mobile Video Streaming And Efficient Social Video Sharing In The Clouds Vidhya Priyadharsini. Y, S. Rajiya Sulthana

12.Identifying Query Groups and Maintaining User Search Histories E. Ramachandra Reddy, K Srinivasa Rao

13.Hierarchical Super-Resolution Based In Painting S. Bhavani, A. Rajendra Babu

Volume 14  Published by Foundation of IJCS

1.Adaptive Query Processing for Distributed Database Systems Mounika, Kavitha

2.Novel Secure Multiparty Protocol In Distributed Databases P.LALITHA, P.RAMESWARA ANAND, P.NAGESWARA RAO

4.Extracting User Interests From Web Log Data G. PAVANI, C. RAMA MOHAN

5.A Structured Architecture P2P Systems Using Load Balancing With Imperfect Information N. HARISH, C. RAMA MOHAN, U. SHESADRI

6.A Secure And Efficient Message Analysis On Probabilistic Key Distributed Networks G. Swetha, S. Rajiya Sulthana

Volume 13  Published by Foundation of IJCS

1. FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE C. Nancy , Sha Sha Ali

2. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment S. Prathima, Shaik Shasha Ali

3. Enhanced Security for Association Rule Mining to secure Transactional Databases P.Mounika, B.Lakshmi Narayana

4. CLOUD BASED LOADBALANCING MODEL USING QUEUE SCHEDULING ALGORITHM K.Roopa, G.Prathap

5. CONSPECTUS ON BENEFIT DISCOUNT STRATEGIES IN CLOUD COMPUTING Yarramreddy M Reddy, K. Lakshman Kumar

6. Survey of Network Based Defense Mechanisms Countering The DoS And DDoS K J Bharath kumar yadhav, Sathiyaraj G, Murali P

Volume 12  Published by Foundation of IJCS

1. Fused Data Structure for Tolerating Faults in Distributed System S. Prabhallika, M.M.Venkata Chalapathi

2. ENSURING STORAGE SECURITY IN CLOUD COMPUTING A. Selva Kumar, Y. Santhi Swaroop

3. Extracting Users Interest From Web Log Files J. Lavanya, P.A. Ashoka Vardhini

4. DYNAMIC ROUTER CONTROL OF OPTIMAL PACKET ARRIVALS IN DTN’s N.Jyosthna, D.BullaRao

5. ENHANCING QUALITY OF MONITORING IN MULTICHANNEL NETWORK USING EFFICIENT CHANNEL ALLOCATION ALGORITHM L.P.Sai dhatri, P.NageswaraRao

6. EFFICIENT SEARCH RESULT ALIGNMENT WITH ANNOTATION OF CONTENT AND QUERYING VALUE V.Subhasini, P.NageswaraRao

7. CLONE DETECTION N.Supriya, D.BullaRao

Volume 11  Published by Foundation of IJCS

1. Least Cost Problem In Various Paths Of Wireless Sensor Networks BALLI OBAIAH, S.SURESH KUMAR

2. Reducing Electronic Provisioning Cost In Social Wireless Network CIGARAPALLI KARTHIK , J.VELUMURUGAN

3. Content Based Message Filtering System by Using Text Categorization S.LOKESH , K.THYAGARAJAN

4. Location Detection and Verification of Mobile Node Positions in Mobile Networks PENUMURU NIHAR , R.KUMARAN

5. Design A Novel Mobile Social Tv Using Paas And Iaas Service Clouds R.KHADAR VALI , G.SATEESH

6. Provable Outsourced Public Data In Cloud By Using Cryptographic Techniques RUDRASHI SATHISH , Dr J.JANET

7. Evolution of Data Propagation Rate In Wireless Mobile Networks V.BALAJI, K.THYAGARAJAN

8. Secure Pre Key Sharing System For Wireless Sensor Network Y.PRASAD BABU, P.JYOTHEESWARI

9. Fast Transparent Migration For Virtual Machines YELLU SREENIVASULU, S.VASU

10. Imposing confidential information brokering in distributed mechanism E.Jahnavi, V.Harsha Vardhan

11. Cross-Sphere Confidentiality-Preserving Supportive Fire Partition Optimization G.SANGEETHA, S.SURESH KUMAR

12. Efficient Estimate String Search In Spatial Database G. Nagaveni, J. Velumurugan

13. Obtain Multi Party Computation For Participating Parties K. PRATHYUSHA , SAKSHI SIVA RAMAKRISHNA

14. Rational Secure Computation And Ideal Mechanism Design P. Veera Raghavendra Reddy, P. Jyotheeswari

15. Quick Communication To Distant Supportive Groups: A Novel Key Managing Model Vadlachandra Roja,S.Vasu

16. Fraternization In Multi Cloud Computing Ambiances:Forestalling Security Issues Velavali Asha Esther, S. Rajiya Sulthana

17. ALGORITHM RESEARCH ON USER INTERESTS EXTRACTING VIA WEB LOG DATA T. Sumitra , Shaik Shasha Ali

Volume 10  Published by Foundation of IJCS

1. Detection and prevention of Energy draining attacks in Wireless Ad Hoc Sensor Networks B. Mounika , T. Lakshmi Prasanna

2. A Novel Framework for Mitigating Routing Attacks in Manet Chinna Reddy Varalakshmi, R.Kumaran

3. Novel Framework to Cloud data security Kamasani Lokesh,P .Hemanth Kumar

4. An Efficient Mobile Configuration for Data intensive in WSN’s Bejawada Naga Lakshmi,P. Jyothiswari

5. Secure attributes based mechanism through Access cipher policies in outsourced cloud data B. Mamatha, A. Haritha

6. Detecting, Determining and Localizing Multiple Spoofing Attackers in Wireless Networks D. Srikala , Siva Reddy

7. Efficient Search Result Alignment With Annotation of Content and Querying Value M. PADMAVATHI, A. HARITHA

8.Providing Security for Social Networks from Inference Attacks  K. NAVEEN , A. NARAYANA RAO

 

Volume 9  Published by Foundation of IJCS

1. Exploiting User Preference for Online Learning in Web Content Optimization Systems , Syed. Habeeba Banu, P.A. Ashoka Vardhini

2. An Enhance Encryption Scheme For Privacy-Preserving Mining Association Rules In Outsourced Database, P. Sowjanya, B. Venkatesh

3.Classification Consumer Preferences of Spike Good-luck piece System with Genetic Optimization G. Reddy Lakshmi, Sha Sha Ali

4. A Survey on Community Routing and Data Dissemination in Opportunistic MSN’S
P. Hemalatha, C.C Kalyan Srinivas

5.A Novel Framework for multicast communication using Property Schemes for Distribution M. MEENA MANJEERA, S. JAFFAR HUSSAIN

6.Efficient and Secure Data Preserving in Cloud Using Fog Security M. Shalima Sulthana , V. Sandeep Kumar Reddy

7.Amplifying Security for Cipher Text Policy Attribute Based Data Sharing K.Bindu Madhavi, C.Sudarsan Reddy

8.Query Interface Search on Spatial Databases Chandra Asha . N, C. Sudarsana Reddy

Volume 8  Published by Foundation of IJCS

1. Survey on Traffic Redundancy and Elimination Approach for Reducing Cloud Bandwidth and Costs, V. Uday Kumar , V. Savithri  

2.Presence Server For Mobile Ubiquity Services In Presence Cloud, P. Prathusha , A. Chandini Begum

3. A New Algorithm in Cloud Environment for Dynamic Resources Allocation through Virtualization, P. Prathusha , R. Anitha

4. A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks, P. Prathusha , T. Anil Yadav

5. Efficient Search Result Alignment with Annotation of Content And Querying Value, M. N. Praneswara Rao , Sandhya

6. Reduction of energy consumption and Data loses in wsn’s, K. E. Naresh Kumar , S. Sreenadh

7.Retrieval Of Encrypted Cloud Data Using Multi Keyword, V. Uday Kumar , D.Saira Bhanu

8.Detection of draining attacks in Wireless Ad Hoc Sensor Networks, M. N. Praneswara Rao , S.Reshma

9. Amplifying Security for Cipher Text Policy Attribute Based Data Sharing, S. Jaheen, S. Rajiya Sulthana

10.Encryption of Secure Log Management Using Cryptographic Support,S. Nazimoon, J. Balanjaneyulu

11.Energy Efficient Routing and Fault Node Recovery Algorithm for Wireless Sensor Network, S. Salma, S. Rajiya Sulthana

12.Combining Elliptic Curve Cryptography to Prevent Attacks for Secure Network Route Discovery, A. Madhuri ,S. Rajiya Sulthana

13.Adaptive Query Processing in Cloud Database Systems C. Lavanya, S. Rajiya Sulthana

14.Protecting Sensitive Label in social Network Dta Anonymization K. Lavanya, Shaik Shasha Ali

15.A DATA TRANSFORMATION APPROACHFOR DIRECT AND INDIRECT DISCRIMINATION IN DATA MINING , M. Mafitha John , M. Varghese

Volume Published by Foundation of IJCS

1. Intrusion Detection Energy Approach S. Bharathi

2. Symbian Mobile Os Syed Karimunnisa

3. Survey on Resource Allocation Strategies in Cloud Computing, V.Naga lakshmi, S. Naga Devi

4. A SECURE MEDICAL HEALTH CARE SYSTEM USING ANDROID, T.V. Vamsi Krishna, T.SENTHIL KUMAR

5.  Implementation of Energy Efficient and Trust aware Routing for WSN’S,Gandharva Reddy Puli, S. Selva Kumar

Volume 6  Published by Foundation of IJCS

1. Implementation of Policies In Online Shopping By P. ABDUL LATEEF, P. SARANYA

2. Fog Security For Cloud Information Accountability By A. Ramprakash Reddy, P. Akilandeswari

3. Design of Effective Attribute Based Encryption Security System For Personal Health Record In Cloud Computing By K. Sahana Priya, P. Saranya

4. Generalized Approach For Data Anonymization Using Map Reduce On Cloud By K.R. Vignesh, P. Saranya.

5.Soap Processing Performance and Enhancement with Traffic Control By Neelima, J.V. Vidhya

6.Resisting Web Proxy-Based HTTP Attacks Through Cross-Site Scripting By Priyanka, S. Ganesh Kumar

7. Performance Evaluation Of DsdvAd-Hoc Networks N. PRASAD 

8.An Autonomous Robotic Fish for Mobile Sensing ABHISHEK

9.Email Security from Attacks through Features Extraction By R. Vamsi Reddy , A. Jaculinmahariba

10.Automatic retrieval and clustering of similar words, S. Priya, A. Jegadeesh

11.A Novel Image Based on Harris Point Detect us Features, M. Shanmugasundari, M.Varghese 

Volume 5  Published by Foundation of IJCS

1.PhoNET-A Voice Based Web Technology -Emerging trend in Mobile Computing K.Samhitha Computer science and Engineering, II Year M.Tech

2. Performance Evaluation Of Dsdv And Aodv In Mobile Ad-Hoc Networks N. PRASAD 

3.Automatic Construction of Moving Object Segmentation from Video Image using 3D-ACTIT M.KARTHIK P.GIRINATH

4.ADROIT LIMBS “A Tribute to the society” P.PAVAN

5.GENERATING WEALTH FROM GARBAGE S.SHAMA G.BHIMA SANKAR KUMAR

Volume 4  Published by Foundation of IJCS

1.Automatic Construction of Moving Object Segmentation from Video Image using 3D-ACTIT M.KARTHIK P.GIRINATH

2.HYPER THREADING TECHNOLOGY Syed Karimunnisa  

4.Intrusion Detection Energy Approach S. Bharathi

5.INFRARED IMAGING AS A DIAGNOSTIC TOOL J.Venkateswarlu

6. HURD Shaik. Shabreen 

7.Linux Virtual Server Shaik Thousif Ali

8.WIRELESS USB Patan Safia

9.ROBOT FOR DETECTING LIFE IN A SEISMIC DISASTER G.VAMSI KRISHANA

10.An Autonomous Robotic Fish for Mobile Sensing KANTA ABHISHEK

Volume 3  Published by Foundation of IJCS

1.Intrusion Detection Energy Approach S. Bharathi

2.Symbian Mobile Os Syed Karimunnisa

3.PhoNET-A Voice Based Web Technology -Emerging trend in Mobile Computing K.Samhitha Computer science and Engineering, II Year M.Tech

4.Locating Moving Objects Over Mobile Sensor Networks , M.SANDEEP SINGH (CSE) CH.VENKATA SUBBAIAH (CSE)

5.A Testing Frame Work For Mobile computing Software K.S.SARATH,K.POORNA CHANDRA

6.Fuzzy Coordination of FACTS Controllers for Power systems K.Sravani Srinija

7.EMBEDDED SYSTEM FOR DISASTER MANAGEMENT VIGNESH.S

8.Automatic Wireless Mobile Phone Charging Vignesh , Vinoth

9.Automatic Construction of Moving Object Segmentation from Video Image using 3D-ACTIT M.KARTHIK P.GIRINATH

10.VIDEO SECURITY FOR AMBIENT INTELLIGENCE T.MOUNIKA T.ANUSHA

Volume 2  Published by Foundation of IJCS

1.Network Security in 802.11 Wireless Lans M.Reddi Mohana

2.Human Computer Interface M.Supraja

3.E-Learning: Learning Through Internet S.Noor, Rgc, Nandayal

4.PhoNET-A Voice Based Web Technology -Emerging trend in Mobile Computing K.Samhitha Computer science and Engineering, II Year M.Tech

5.Web Mining, M.CHARISHMA

6.PILL CAMERAS S.Harshini , G.Jyothi

7.  NETWORK SECURITY THROUGH BIOMETRICS J.Rakesh B.Ramakrishna

8.Locating Moving Objects Over Mobile Sensor Networks , M.SANDEEP SINGH (CSE) CH.VENKATA SUBBAIAH (CSE)

9.CRYPTOGRAPHY IN SMART CARDS FOR NETWORK SECURITY ASRITHA.N ALEKHYA.T

10.CRYPTOGRAPHY & STEGANOGRAPHY P. Anusha

Volume 1  Published by Foundation of IJCS

2. Performance Evaluation Of Dsdv And Aodv In Mobile Ad-Hoc Networks N. PRASAD 

3. HURD Shaik. Shabreen 

4.HYPER THREADING TECHNOLOGY Syed Karimunnisa  

5.Pairing Based Onion Routing G. Kiran Kumar Reddy

6.Intrusion Detection Energy Approach S. Bharathi

7.Symbian Mobile Os Syed Karimunnisa

8.Trip Wire Shaik Abida

9.Wireless Internet Access S. Mohammed Azeez

10.Network security through biometrics B.ramakrishna.

Powered by WordPress | Download Free WordPress Themes | Thanks to Themes Gallery, Premium Free WordPress Themes and Free Premium WordPress Themes