IJRECE_G710
Download Paper

IJRECE_G711
Download Paper

IJRECE_G712
Download Paper

IJRECE_G713
Download Paper

IJRECE_G714
Download Paper

IJRECE_G715
Download Paper

IJRECE_G716
Download Paper

IJRECE_G717
Download Paper

IJRECE_G718
Download Paper

IJRECE_G719
Download Paper

IJRECE_G720
Download Paper

IJRECE_G721
Download Paper

IJRECE_G722
Download Paper

IJRECE_G723
Download Paper

IJRECE_G724
Download Paper

IJRECE_G725
Download Paper

IJRECE_G726
Download Paper

IJRECE_G727
Download Paper

IJRECE_G728
Download Paper

IJRECE_G729
Download Paper

IJRECE_G730
Download Paper

IJRECE_G731
Download Paper

IJRECE_G732
Download Paper

IJRECE_G733
Download Paper

IJRECE_G734
Download Paper

IJRECE_G735
Download Paper

IJRECE_G736
Download Paper

IJRECE_G737
Download Paper

IJRECE_G738
Download Paper

IJRECE_G739
Download Paper

IJRECE_G251
Download Paper

IJRECE_G399
Download Paper

IJRECE_G459
Download Paper

IJRECE_G465
Download Paper

IJRECE_G571
Download Paper

IJRECE_G574
Download Paper

IJRECE_G584
Download Paper

IJRECE_G594
Download Paper

IJRECE_G595
Download Paper

IJRECE_G597
Download Paper

IJRECE_G600
Download Paper

IJRECE_G601
Download Paper

IJRECE_G646
Download Paper

IJRECE_G649
Download Paper

IJRECE_G651
Download Paper

IJRECE_G653
Download Paper


IJRECE_G524

​Download Paper


IJRECE_G590

Download Paper


IJRECE_G591

Download Paper


IJRECE_G702

Download Paper


IJRECE_G703

Download Paper


IJRECE_G704

Download Paper


IJRECE_G705

Download Paper


IJRECE_G706

Download Paper


IJRECE_G707

Download Paper


IJRECE_G708

Download Paper


IJRECE_G709

Download Paper


IJRECE_G567
Download Paper

IJRECE_G569
Download Paper

IJRECE_G598
Download Paper

IJRECE_G606
Download Paper

IJRECE_G648
Download Paper

IJRECE_G652
Download Paper


IJRECE_G369

Download Paper


IJRECE_G450

Download Paper


IJRECE_G432

Download Paper


IJRECE_G575
Download Paper

IJRECE_G576
Download Paper

IJRECE_G570
Download Paper

IJRECE_G605
Download Paper


IJRECE_G288

Download Paper


IJRECE_G741

Download Paper


IJRECE_G742

Download Paper


IJRECE_G743

Download Paper


IJRECE_G744

​Download Paper


​IJRECE_G381
Download Paper

IJRECE_G602
Download Paper

IJRECE_G637
Download Paper

IJRECE_G647
Download Paper


IJRECE_G568

​Download Paper


IJRECE_G746

Download Paper


​IJRECE_G566

Download Paper


IJRECE_G749

Download Paper


IJRECE_G750
Download Paper


IJRECE_G751
Download Paper


IJRECE_G752

Download Paper


IJRECE_G753

Download Paper


IJRECE_G756

Download Paper


IJRECE_G757

Download Paper


IJRECE_G119

Download Paper


IJRECE_G758

​Download Paper


IJRECE_G759

Download Paper


IJRECE_G760

Download Paper


IJRECE_G761

​Download Paper


IJRECE_G762

Download Paper


IJRECE_G763

Download Paper


IJRECE_G764

Download Paper


IJRECE_G765

Download Paper


IJRECE_G766

Download Paper


IJRECE_G767

Download Paper


IJRECE_G769

Download Paper


IJRECE_G770

Download Paper


IJRECE_G771

Download Paper


IJRECE_G772

Download Paper


IJRECE_G773

Download Paper


IJRECE_G774

Download Paper


IJRECE_G775

Download Paper


IJRECE_G776

Download Paper


IJRECE_G777
Download Paper


IJRECE_G778
Download Paper


IJRECE_G779
Download Paper


IJRECE_G780
Download Paper


IJRECE_G781

Download Paper


IJRECE_G782

Download Paper


IJRECE_G783

Download Paper


IJRECE_G784

Download Paper


IJRECE_G785

Download Paper


IJRECE_G786

Download Paper


IJRECE_G787

Download Paper


IJRECE_G788

Download Paper


IJRECE_G789

Download Paper


IJRECE_G790

Download Paper


IJRECE_G791

Download Paper

ISSN (Online): 2348-2281
ISSN (Print): 2393-9028

International Journal of Research in Electronics AND Computer Engineering (IJRECE)

A Unit of I2OR

A COST-EFFECTIVE PARADIGM FOR MULTIPLE INTERMEDIATE DATASETS USING UPPER-BOUND CONSTRAINT APPROACH | Rama Lakshmi Boyapati 

SYSTEMATIC SPATIAL KEYWORD PERCEPTION SUGGESTIVE TRAVEL ROUTE RECOMMENDATION ALGORITHM | Jyothi Yadla, Dr. Deepak Nedunuri

Restrict disseminate denial of service flooding problems with change Routing    Identifiers
G Leela Rani, B Madhava Rao

K-RLE COMPRESSION USING VHDL
Shaik Mallika Begum, K.N.Madhavi Latha

Sequestration Security based Cloud Access Control Using Symmetric Cryptography Algorithm
K. Neelima Devi, K. Varada Rajkumar

A Degree of Realism Commendation Reproduction Established Accompanied by Customer Conviction and Product Ranking | Rajini Katta, Gopala Krishna

Resolving Top-k High Utility Itemsets Mining Problem without Setting Minimum Utility Thresholds
M Madhava Rao, Vallabhaneni Mounika

Fuzzy Identity-Based Encryption Data Service with Security Auditing in Clouds
Vemuri Jayamanasa, Chalasani Srinivas, Gadi Nirmala

A NOVEL IMPLEMENTATION OF LEARNING BASED PRE-FETCHING IN PORTABLE ONLINE PUBLIC ASSOCIATION | B.Indhu Madhavi, Ch. Rama Devi

HARDWARE AND SOFTWARE EXECUTION FAULT DETECTION USING ROUND TRIP DELAYS (RTD’S) AND PATHS (RTP’)S IN WIRELESS SENSOR NETWORK | Sandhya Rayavarapu, G.Satyanarayana .

Big Data Analytics over Twitter Real Time Data using Kafka Streaming and KSQL with Confluent Bundled Platform | Mohana Durga Raja, Konda Sreenu

An Effective and Efficient Secured Ranked Multi Keyword Search over Distributed Clouds
PN Deepthi, Md Khaled ShujaArshi

A Model to Detect and Minimize of Mobile Radiation using IoT
Satyanarayana Kotha, Srija Arigela, Manikanta Koppula, K. J. P. Sai Bhaskar

A Review on Effects of Mobile SIM Radiation
Satyanarayana Kotha, Srija Arigela, Manikanta Koppula, K J P Sai Bhaskar

Providing an Adaptive Setup for Media-Content Sources
Chintala Bhanu Prakash, V Pranav

Application of Decision Tree and Random Forest in Caesarean and Diabetes Prediction
Dr. D. Veeraiah, M.V.Komalatha, T.Navya Sree, P. Dhanyaka

An Aid for Operative Criminal Detection
G Baby Sindhuja, K Thirumala Teja, N S V Ram Prathap, Ajay Kumar, G Nageswara Rao

Privacy Preserving for Health Records
K Tejaswini, G Sai Manasa, SK Dawood Afroz, B Varun Reddy, Mr. G.Vijay Suresh

Assisting Frequent Cause of Accidents on Roads using Data Mining Techniques
Srinivasa Rao D, Gowtham V, Tanuja T, Revanth CH, Venkateswara Rao B

Bus Tracking System using IOT
Dr. O.Rama Devi, Ch. Jerusa Esther Rani, Y.Nikitha, S.Prasad Reddy, A.Chavan Kumar

Secure Deduplication of Encrypted Data in Cloud
Mr.K.Sundeep Saradhi, Nikhil Kolla, Sarada Mulukuri, N R S RamTeja, Venkatesh Lankalapalli

Engagement and Popularity Dynamics of Youtube Videos and Sensitivity to Meta-Data
Mr.T.N.V.S Praveen, Sushma Kolli, Yamuna Bezawada, Renuka Lingam, Ramsai Reddy Vintha

Application on Prediction of Recurrent cases of Breast Cancer
K Revathi, M Tanuj, P Naveen, D Rohit, Mr. A A.SriramaChandraMurthy

Classifying Bank Customers Data using Data Mining and Clustering Techniques
Dr.K.Venkateswara Rao, U.V.Sravya, P.Bharadwaz, N.Durga Prasad 

Providing Security to the Data using RSA Algorithm
Dr.K.S.M.V. Kumar, Y.Gowthami, P. Midhuna, M.Hari Kiran, G. Anil

Moving Target Defense using DES based Dynamic Encryption Scheme and Network Coding
Ch. Bhuvaneshwari, H.Vishnu Sankar, V.Sravanthi Reddy

Graphical Password Authentication using Cued Click Points
Sunil kumar Theegireddi, Nikhila Narla, Mukkapati Chaitanya, Kolla Surya Teja, Mr.A.SUDHAKAR

Analysis of Best Life Insurance Cover Selection using Data Mining Technique
Mr. T Udaya Kumar, Muneesha Vunnam, KeerthiSonga, MounikaVattigunta, Venkata Ravi TejaVemulakonda

Heart Disease Prediction using Naive Bayes Classification Technique
K.Naga Prasanthi, Vanama Vamsi Krishna, Chippada Sai Durga Prasad, Singu Tarun, Reddy Vamsi Krishna

Face Recognition using Neural Networks
P.M. Ashok Kumar, Somala Suchitha, Karedla Poojitha, Unguturu Bhaskar, Satish

Comparative Study on Five and Nine Level MLI for Percentage THD Reduction 
Shraddha S. Lohakare, Dr. Pravin M. Sonawane

An Hybrid Technique for Finding Age from Facial Image by Using Combined Approach of Age Difference and Feature Extraction Methods | Vishnu Prasad Verma, Dipti Verma

A SKYied Approach for Connecting and Accessing Different Geographical Locations
Mr. Vaibhav V. Jaysingpure, Mr. Sujwal P. Tikhe, Miss. Shraddha M. Bute, Miss. Pallavi S. Ajabale

User Verification by the Keystroke Dynamics System for Security in Online System 
Sameer Dass, Suresh Kumar

IMAGE STEGANOGRAPHY USING 2-LEVEL DWT AND ARTIFICIAL NEURAL NETWORK
Harpreet Kaur, Jyoti Saxena, Sukhjinder Singh

IOT Based Smart Parking System Using Raspberry Pi 
Makhan Singh

Modelling and Mitigation of various secure routing technique in Manets
Ritu, Sourabh Aggarwal

Dynamic Key Generation over Encrypted Cloud Data Using Genetic Functions
M.V. Kishore, Ch.D.Naidu, Prof. Ch.Suresh

Secured Lossless Data Transmission in Armed Force Networks using CPABME Methodology 
Pandit Samuel, N.Aditya Sundar, Prof . Ch.Suresh

PATIENT MONITORING SYSTEM
MS. Latha Bhuvaneswari, Sritama Banerjee, Saba Parwez, Ashutosh Soni

SURF serves better results for Brain Tumor Classification
Nitish Zulpe, Vaijinath V. Bhosle

Railway - Track crack detecting system using ARDUINO 
Mrs.V.N.Sireesha, K. Prince John Daniel, B. Jhansi Lakshmi, P. Gopinath, R. Siva Kalyan

Comparative Study of Obstacle Distance Measurement with Ultrasonic Sensor using Internet of Things Development Boards | Shatrughna Prasad Yadav, Ravindra Parab

Alternative Programming language for Indian Language Processing: A Choice among Java and C# 
Harjit Singh

Lightweight Stemming Approach for Punjabi Language Text: An NLIDB Subsystem Alternative 
Harjit Singh, Ashish Oberoi

ANALYSIS OF PRUNED PROTEIN PROTEIN INTERACTION NETWORK USING DIFFUSION METHOD
B Madhav Rao, V Srinivasa Rao, K Srinivasa Rao


NOVEL APPROACH SOFTWARE EFFORT ESTIMATION BY HYBIRDIZATION OF RANDOMFOREST AND BOOSTING APPROACHES | Er. Nisha Kumari, Er. Poonam chaudhary


Statistical Study of Microgrid Based on Object Oriented Usability Indices
Dhanshri A. Narayane, Prof. Kishor C. Muley

Demand Side Management for Power System Based on Particle Swarm Optimisation
Deepali Patil, Prof. Kishor C. Muley


Robotic Process Automation of Reports Segregation using Uipath
M. Sitharam, M.Akhilesh Patrudu

Fictitious Node Deployment to Prevent Routing Attacks on OLSR Protocol
M.Sitharam J, Mohan Sasidhar

Object recognition using Convolutional Neural Networks (CNN)
Annapurna Bala

A Survey on Methods of Phylogenetic Analysis for Constructing Phylogenetic Tree
B.MADHAV RAO

Collaborative Filtering Using Deep Learning Based Recommender Model
Korlapati Naga Siva Jyothi, Marlapalli Krishna

Advanced Online Transaction Based Fraud Detection using and Priority Voting
K BUDDA VARA PRASAD 

Supporting
Reputation Based Trust Management for Cloud Services
M.Sathi Ekambareesh

A Review on Flow Control using Computer Networks
T. Koti Mani Kumar, Lokesh Sai Kumar Dasari, Vahiduddin Shariff


GSM based Vehicle Theft Control System
V.N.SIREESHA, N.K.NEELIMA, M.VASUDEVA KIRAN, M.SAI VENKAT SRINIVAS, D.PRASANTH KUMAR

Analysis of Coupled Lift and Drag forces On Stationary Right Circular Cylinder 
Shaikh Jaweed, Patil Parag, Shaikh Feiroz

A Review on Sales Forecasting using Linear Regression and K Nearest Neighbor 
Neha Sehgal, Deepika Garg

Analysis the Performance of MANET Under Nodes Breakdown
Rajwinder Kaur, Dr. Raman Chadha

An Improved Traffic Congestion Control and Vehicle Monitoring System
M. Kavya Reddy, Dr. Regonda. Nagaraju, M. Harika, N. Shravani Reddy, P. Deepthi

Energy Efficiency through Unified Power Flow Controller
Ms. Bhakti Dafe, Dr. Mrs. Mangal Hemant Dhend


Region Growing based Tumor Detection and Classification using Convolutional Neural Networks(CNN)
Aarohi Trivedi, Himani Trivedi

Review on Assessment of HR Audit in Automobile Industry
Ravi Malik


Impact of Bandwidth on LANDSAT-7 ETM+ Image Quality using Gaussian Filter: Mysore, INDIA
Choodarathnakara A L, Bhagyamma S, Sandya M J, Sushmitha G R, Sowkya H K, Ramith H G Sinchana G S, Satisha M and Ranjith Kumar K


Hybrid Encryption with Verifiable Delegation using Cloud Computing
Dr. Regonda. Nagaraju, Reddygari Aishwarya Reddy, S. Yamini, P. Mythry

An Improved Traffic Congestion Control and Vehicle Monitoring System
Dr. Regonda. Nagaraju, M. Kavya Reddy, M. Harika, N. Shravani Reddy, P. Deepthi

Trackbot Assistance for Industries
Mrs.V.Sreelakshmi, V. Supriya, P.Sushmitha, T.Venkat Lakshmi, K.H. Sai Kumar

Optimally Sparse LSB-based Steganography for Secure Transmission of E-learning related Documents
Soumendu Banerjee, Akash Nag, Kh Amirul Islam, Sunil Karforma


Fractal Antenna Design Process for Multiband Frequencies
N.Koteswaramma, Dr. P.A.Harsha Vardhini, M. Sai Laxmi


Face Tracking using MATLAB and Arduino
PoguVignan

An Efficient High Speed & Low Power Hybrid Full Adder
Sunil Kumar, Bharathi, Revanth, Keshav, Hruday

Driver Drowsiness Detection System using Raspberry Pi
CH. Tejesh Kumar, V.Moksha, M.Sarma, I. Mounica, K. Anand Murthy


ROLE OF INTERNET OF THINGS IN SMART CITIES: A CASE STUDY OF JAIPUR CITY, RAJASTHAN
Randeep Kaur


​Phase retreival imaging for nano-scale images using MATLAB
SUMITHA C, Dr. ANANDARAJU M B, NUTHAN A C

STUDY OF GENERATION OF ELECTRICAL ENERGY FROM OCEAN WAVES
Jitesh Thakare, Shruti Patil, C.J.Sharma

A Survey on Degree of Exploration and Exploitation for Effective Web Service Composition
N. Arunachalam, Dr. A. Amuthan

SURVEY ON CLUSTER HEAD SELECTION TECHNIQUES FOR WIRELESS SENSOR NETWORK 
N.Arunachalam, R. Arvind, S. George, S. Suresh, V. Suryanarayanan


Biometrics in Banking 
Manjot Kaur Bhatia, Gunjan Dawar, Sanchit Sachdeva, Yash Bhasin


A Novel Optimization approaches for fault tolerant routing in wireless sensor networks
G Anand, Dr. E. Nagabhooshanam


SPEED MANAGEMENT OF VEHICLES TO PREVENT VEHICLES ACCIDENTS USING IMAGE PROCESSING TECHNIQUES | Mr, M.Prem Chand, Ms,Y.N.S.Ramya , Mr, A.Sathi Babu, Mr, Sunil Kumar, Mr, A.Manikanteswara Rao


Review on Single-Phase Active Device for Power Quality Improvement of Electrified Transportation
Bhushan Bhoir, Prof. R.S Desai

Partial load shedding for distribution Utility
Hitesh H. Raut, Dr. R. M. Holmukhe

Survey, Analysis & Feasibility Of Solar Wind Hybrid Power Plant
Er. Pranav V. Paithankar, Dr. R.M. Holmukhe

REVIEW ON MULTILEVEL INVERTER WITH REDUCED NUMBER OF SWITCHES
Sachin Sawant, Dr. R. M. Holmukhe


Modified Ad-Hoc On-Demand Distance Vector Routing Algorithm: An era of transformation in conventional AODV | Amandeep Kalra, Dr. S. S. Khurmi


Design and Analysis of Phase Frequency Detector for Digital PLL
Dr. Priyesh P. Gandhi

Design Development of Low Offset High Speed CMOS Voltage Comparator 
Priyesh P. Gandhi


A NOVEL PAGE REPLACEMENT TECHNIQUE TO IMPROVE UTILIZATION OF CPU
Dr.G.Vijaya Lakshmi


Asynchronous Learning Practices & Tools

Punam


​Medical Image Segmentation using Deformable Models- State of the Art
Syed Asadullah Hussaini, Dr. S. K. Yadav


Modified Fault Tolerant Optimization Routing Protocol in Wireless Sensor Network
K.S.S Soujanya Kumari, M Purnachandra Rao, P S V Subba Rao


​Advanced ICH-LEACH protocol for Wireless Sensor Network using Optimization Approach
V. Rajanesh


​A Cooperative Black hole Avoidance Scheme of Intrusion Detection System in Mobile Ad Hoc Networks
V. Rajanesh


Recent Challenges and Security Issues on Cloud Computing Environment
Parminder Kaur

Study of Big Data for Data Analytics: Challenges and Progress
Parminder Kaur


​A Novel Approach for Brain MRI Segmentation using Pearson Type-IVa Mixture Model
B. N. Jagadesh


​A REVIEW PAPER ON NETWORK SECURITY WITH DIVERSE ATTACK IN NETWORKS 
Rajesh Kumar, Dr. Chanderkant Sharma


Analysis of Rainfall pattern in different regions of India through a Statistical Forecasting Model projecting Climate Change | Seth, Aashraya


​Underwater Video Dehazing using Hybrid Pyramid Decomposition with Multi Frame Fusion
B. Prabhakar


Emerging Techniques in MIMO-OFDM Systems for LTE-A Environment
Arempula Sreenivasa Rao, Brij Bihari Tiwari, Dasari. Subba Rao


Big Data Challenges and Prospective Solution
Mujtaba Ashraf Qureshi, Dr. Azad Kumar Shrivastava


Research aspects and Need of Data Compression in Wireless Sensor Network
Narinder Singh

Comparative study of Proactive, Reactive and Hybrid Routing Protocols
Rekha Rani


​Prediction Exploration for Coronary Heart Disease aid of Machine Learning
Dr.T.Murali Mohan, Dr.P.Vamsi Krishna Raja


​PHYLOGENETIC TREE CONSTRUCTION FOR HIGHLY CONSERVED MITOGEN ACTIVATED PROTEIN KINASES 
Dr. Deepak Nedunuri, Dr. G. Nirmala, Dr. K. Satyanarayana, Ch. Madhava Rao


IMAGE SEGMENTATION METHOD BASED ON LOGISTIC DISTRIBUTION WITH HIERARCHICALCLUSTERING ALGORITHM | K V Satyanarayana, K.Ashish Vardhan


Face Recognition using algorithm and Fusion of PCA and ANN 
Dr. Somavarapu Vamsi Krishna, B Prem Kumar, K Sreenu, Mohammad Jaffar

Design and optimization of Variable Frequency transformer model analysis by MATLAB
Dr. N. Srinivasa Rao, S Rajesh, P Praveen, M Sravanthi

Improved K-Means clustering algorithm using Image Segmentation

N Malathi, M Prabhakar, D Shivani, N Anudeep

Closed Loop control of magnetic materials converter fed motor
Dr. Swathi Gupta. A, A Ramreddy, G Satish Goud, P Shiva Nagendra


​In Silico Prediction of an Unknown Function of a Protein Using Bioinformatics Tools
Dr.T. V. Sai Krishna, Dr. A. Yesubabu, Dr. Deepak Nedunuri, Ch. Madhava Rao


​Face Image Classification Based on Deep Convolutional Neural Network Feature Extraction Method
Koteswara Rao M, K Veera Swamy, K Anitha Sheela


​Uniform and Intensive Steel Quenching processes in modern physics 
Munigala Vinod Kumar, Daragoni Chandra Mohan


Determination of Pantoprazole Sodium by Complexation method: Hyphenated techniques 
Ganta Deepthi, Nemani Archana, G. Bhagat


​Early Brain Tumour Detection Using Residual Network and Random Forest
Dr. S. Satheesh, Dr. P. Ashok Babu


Deep Convolutional Neural Network using Local and Global Clustering Feature Extraction for Content Based Image Retrieval System | K Ramanjaneyulu, K Veera Swamy, CH. Srinivasa Rao


​Blood flow analysis in a constricted tube with permeable walls
M. Shiva Krishna, C. Uma Devi, B. Haritha


COMPENSATION MANAGEMENT AND EFFECTIVE COMPENSATION PLANNING TO IMPROVE EMPLOYEE PERFORMANCE AND JOB SATISFACTION: A THEORETICAL PREVIEW | G Swathi, Dr. V. Sreehari


​IOT Enabled E-ATM Surveillance and Security System Using BLYNK Server
Vijayakumar M, Ramamoorthi R, Nirmalkumar S


​CYBER TERRORISM AND LAW IN INDIA: A CRITICAL ANALYSIS
Mr. Ranjit Singh, Dr. Shamsher Singh


Detecting Fake News through Deep Learning and Natural Language Programming
B. SANTOSH KUMAR