A Unit of I2OR
Changing the Indian Telecom Sector: Reliance Jio
C.V.Keerthipriya, Ms. Ramya Sri, D.Srija, Dr. R.Ch.A.Naidu
Prevention of Authentication Problems using Quantum Cryptography
Ch Lokesh Kumar, Dr Balarengadurai chinnaiah
Secured Transmission by Using Pre-Division Optimization View
Banavath Bhasker, D.Srija
Sparse Poisson Latent Block Model for Document Clustering
G.Snigdha
Analyze Stock Data Using Apache Hive
Raswitha Bandi, T.Shravani Reddy, K.Nikhila, Mohd Abdul Javeed
The Smart LPG
B.Durga sree, S.Nikitha, M.Manasa, K.Kalyan
Twitter data analysis using MapReduce
Sandeep Iddalgave, T.Deepika Reddy, S.Kunal Reddy, P.Jayanth
Prevention of Misbehaving Users in Unknown Networks
Anil Kumar Gurram, Dr Balarengadurai Chinnaiah
Usability and the Network Implications
M.Deepika, A.Swathi
Vehicle Seat Vacancy Identification using Image Processing Technique
V. Naresh, M. Ashok
A Two Step Copyright Protection Scheme for ColourImages
Dr .D. SrinivasaRao, Dr .Ch.Ramesh Babu, B.VenkateswaraRao
Designing of Dual-axis Solar Tracking System
B.Ramu, M.Pallavi, P.M.Shashank, B.Roja
E-BRIDGE
M.Anila Rao, G.Swaroop Reddy, R.Vamshi, R.Rohan Reddy
Empirical Analysis and Validation of Security Alerts Filtering Techniques
Sridhar Gummalla, Ganesh Mani, Vesala Mohan, K.G.U. Sidartha Reddy
Working with employee Datasets using Hive Complex Data types
Dr.Sheikh Ghouse, S.Sravya, G.Charitha, Harish sai
Enhancing the performance of search engines based Heap based data file and hash based indexing file
Dr. J K R Sastry, Thulasi Manohara Reddy Alla, Chandu Sai Chittibomma
FIRE EMERGENCY RESPONSE SYSTEM
B.Durga sri, D.Abhilash, Ravalika
Heterogeneous Data Storage Management Technique including De-duplication in Cloud
A.Saikumar, J. Srikanth, M. Ashok
Identity Based Data Sharing in Cloud Computing
M. Thirumalesh, M. Ashok
VIRTUAL LAB IMPLEMENTATION BY USING ANDROID
Chekurumalli.lavanya, G.Sowmya, Dr.R.CH.A.Naidu
IJRECE_F501
Download Paper
IJRECE_F502
Download Paper
IJRECE_F503
Download Paper
IJRECE_F504
Download Paper
IJRECE_F505
Download Paper
IJRECE_F506
Download Paper
IJRECE_F507
Download Paper
IJRECE_F508
Download Paper
IJRECE_F509
Download Paper
IJRECE_F510
Download Paper
IJRECE_F511
Download Paper
IJRECE_F512
Download Paper
IJRECE_F513
Download Paper
IJRECE_F514
Download Paper
IJRECE_F515
Download Paper
IJRECE_F516
Download Paper
IJRECE_F517
Download Paper
IJRECE_F518
Download Paper
IJRECE_F519
Download Paper
IJRECE_F520
Download Paper
IJRECE_F521
Download Paper
IJRECE_F522
Download Paper
IJRECE_F523
Download Paper
IJRECE_F524
Download Paper
IJRECE_F525
Download Paper
IJRECE_F526
Download Paper
IJRECE_F527
Download Paper
IJRECE_F528
Download Paper
IJRECE_F529
Download Paper
IJRECE_F530
Download Paper
IJRECE_F531
Download Paper
IJRECE_F532
Download Paper
IJRECE_F533
Download Paper
IJRECE_F534
Download Paper
IJRECE_F535
Download Paper
IJRECE_F536
Download Paper
IJRECE_F537
Download Paper
IJRECE_F538
Download Paper
IJRECE_F539
Download Paper
IJRECE_F540
Download Paper
IJRECE_F541
Download Paper
IJRECE_F542
Download Paper
IJRECE_F543
Download Paper
IJRECE_F544
Download Paper
IJRECE_F545
Download Paper
IJRECE_F546
Download Paper
IJRECE_F547
Download Paper
IJRECE_F548
Download Paper
IJRECE_F549
Download Paper
IJRECE_F550
Download Paper
IJRECE_F551
Download Paper
IJRECE_F552
Download Paper
IJRECE_F553
Download Paper
IJRECE_F554
Download Paper
IJRECE_F555
Download Paper
IJRECE_F556
Download Paper
IJRECE_F557
Download Paper
IJRECE_F558
Download Paper
IJRECE_F559
Download Paper
IJRECE_F560
Download Paper
HR Pool Management
Enaganti Ravalika, Srujan, Dr.R.Ch.A.Naidu, D.Srija
Led Info Vision
B.Durgasri, T.Saisruthi, N.Sairoopa, Pruthviraj sahoo
MACHINE TO MACHINE COMMUNICATION
K.Nirosha, G.Prathyusha, Y.Geethika, B.Sai Risheek
Prevention of Active Attacks in MANET Using Node Exclusion
Narla Chaitanya Krishna, Dr Balarengadurai chinnaiah
Massage Text Data and Word Occurrence Using Mapreduce
Aravind Kumar, CH.Niveditha, T.Sandilya Kumar, A.Rajesh
A Deep Learning Approach To Sentiment Analysis of Movie Reviews
Anusri Katuri, V.Varalakshmi, Supreethi.K.P.
Analyzing Natural Calamities Using Apache Hive
Sandeep Iddalgave, M.Tejashree, G.Nikhil, Dattu goud
Small Line Recapped Propagation On Social Network Illustration Courses
N.Vijay Kumar, U.Veeresh
New Malware Propagation Technique for Networking
J. Srikanth, A. Saikumar, M. Ashok
Online Venue Booking System
Mr.J.Pradeep Kumar, G. Abhishek Goud, K.Priyanka, S.Santosh Yaswanth
A Query Routing Approach in Peer 2 Peer Networks
Sridhar Rachamalla, A.Santhoshi, Dr. R. Ch.A.Naidu
P2P File Sharing Technique to Improve Qos in Manets
S. Ch. Vijaya Bhaskar, Ch. Samson, D. Muninder
Personal Devices for Practical Authentication Scheme
Sridhar Gummalla., Ganesh Mani., Mohammed Abdul Raheem., Mohd Zeeshan Zaki,Mohd Zahed Ali
Privacy Measurements in Online Social Networks
P.NARAYANA, K.Srivani, P.Sravya, T.Spoorthi
Profession Identification in Social Media Data
P.Renuka
Quantifying Quality of WEB Sites Based On Content
K. Sasidhar, Dr, JKRSastry
Assessing Quality of WEB Sites Based on Multimedia Content
Dr. JKR Sastry,Prudhvi Kolla, Siva Krishna Onteru, Yeswanth Surya Pinninti
Evaluating the Quality of Navigation Designed for A WEB Site
Gorantla Sahana, ST. Mary Manasa, Dr. JKRSastry
Assessing the quality of WEB based on Structure
V.Sai Virajitha, Dr. JKR Sastry, P. Srija, M.Varun
Quantifying Quality of WEB Site Based On Usability
Dr. JKR Sastry, Nibhanupudi Sreenidhi, Sasidhar Kunchanapalli
A Novel Attribute based Encryption Scheme for Efficient File Hierarchy in Cloud
Mr.Dileep Kumar Murala, Pabba Sai Sharanya, Thatipally Ravali, Uppala Sahana
A Survey on Marine Radio Networking Technology
Banavath Bhasker, D.Srija
A Verifiable and Secure Access Control Scheme with Storing Big Data
Sridhar Gummalla, Ganesh Mani, Mir Habeebullah Shah Quadri, Mohd. Adnan Quraishi, Mohammed Amair Sohail
An Analytical Approach for Large Scale Business Oriented Software Architecture
Mr. E.Yaladri, Mr. M.Krishna
An Efficient Approach for Data Control Mechanism with Time Factors in Public Cloud
Mrs. A.V.L. Prasuna, Mr. Sandeep Kodavati
ARA Using Association feature in MANETs
Ravi Regulagadda, G Nagappa, B.Sunil, A.Santhoshi
Automatic Irrigation System
K.Nirosha, M.Raj Kumar, G.susmitha, G.Banu sri
A Novel Method for Brain Tumor Detection and Extraction
Dr. D. S. Rao, B.Keerthi, P.Kiranmayi, A.Thulasi
A Novel Approach for Recoding Canonical Signed Digit
Jugal Kishore Bhandari, B.Mamatha
A Survey on Cloud Computing Services and Storage
R.Ravali Raj, G.Swetha
Destructive Software Testing: A New Testing Paradigm
B. Avinash, R. Ravi, M. Nagendra Rao
Multi Owner Network sharing in clouds
Dr.P.Manikandan, A.Suma, A.Charitha, S.Mounika
Optimizing Performance of Search Engines Based on User Behavior
Dr. JKRSastry, R. Srinivas, G Yeshwanth, M. Vamsi
Prevention of Authentication Problems Using Quantum Cryptography
Ch Lokesh Kumar, Dr Balarengadurai chinnaiah
Time and Attribute Factor Combined Access Control for Time Sensitive Data in Public Cloud
E.Arshitha, G.Keerthi, Dr. R. Ch.A.Naidu
Implementation of Touch Detection With Virtual Keyboard Using Raspberry Pi
V. Venkat Lakshmi, B.Ramu, G.Keerthi
Vitality Effective Data Traffic Management In Cell Cloud Computing
A.Sravanthi Reddy, B.Praveen
Voice Alert Based Notification Android App
G.Anitha, T.Swathi, P.S.S.Aditya, V.Shainy
Voice to Text Converter
G.Anitha, Sainoji Shivani, Y.Laxmi Prasanna, P.Vineeth Kumar
Weather Prediction Based on Big Data Using Hadoop Map Reduce Technique
Raswitha.Bandi, M.Sai Sudeepthi, B.Sneha, N.Sai Krishna Goud