Statistics

    Map

Twitter

Special Issue-1(NCCSIGMA-16)

Download Certificate

Sr No. Title
1

Managing Deduplicate Data at Client Side in Public Cloud Storage Environment

Author: Kranthi Kiran G, V Naresh Kumar

DOI: 10.22161/ijaers/si.1


  • Downloads : 2
  • Page No: 001-004
2

Simple API for Grid Applications and IDEAS Design for Several Cloud Applications

Author: Md.Rafeeq,Dr.C. Sunil Kumar,Dr.N. Subhash Chandra

DOI: 10.22161/ijaers/si.2


  • Downloads : 2
  • Page No: 005-009
3

Role of Hash Function in Cryptography

Author: Edem Swathi, G. Vivek, G. Sandhya Rani

DOI: 10.22161/ijaers/si.3


  • Downloads : 2
  • Page No: 010-013
4

A Cloud Based Service for Internet Users to Track Privacy-Related Data in Web

Author: Nitin Singh Chauhan, Ashutosh Saxena, JVR Murthy

DOI: 10.22161/ijaers/si.4


  • Downloads : 2
  • Page No: 014-017
5

An Efficient Face Recognition System Using SIFT Feature Transform

Author: K.Shailaja, Dr.B.Anuradha

DOI: 10.22161/ijaers/si.5


  • Downloads : 6
  • Page No: 018-021
6

Digital Video Quality Enhancement Based On Weighted Guided Filtering Scheme

Author: L.Madhavi, N.Bhaskar

DOI: 10.22161/ijaers/si.6


  • Downloads : 2
  • Page No: 022-028
7

GIS Based Land Information System for CMR Group of Institutions

Author: Mr.Tara.Saikumar, Dr. K.Srujan Raju, Dr. Avala Raji Reddy

DOI: 10.22161/ijaers/si.7


  • Downloads : 2
  • Page No: 029-036
8

Comparison of Scheduling Algorithms in Cloud Computing

Author: Mrs. Rashi Saxena, Ms. Najeema Afrin

DOI: 10.22161/ijaers/si.8


  • Downloads : 1
  • Page No: 037-040
9

A Comprehensive Approach for Data Protection

Author: Jaya Saxena, V Subramanian

DOI: 10.22161/ijaers/si.9


  • Downloads : 2
  • Page No: 041-045
10

Migration Of Software Services Into Cloud For Reducing Cost And To Improve Efficiency

Author: R Pavitra, Kranthi Kiran G

DOI: 10.22161/ijaers/si.10


  • Downloads : 5
  • Page No: 046-051
11

Information Leak Identification and Secure Search Over Encrypted Data In Cloud Storage Utilities

Author: A Anusha, J.Dayanika, Kranthi Kiran G

DOI: 10.22161/ijaers/si.11


  • Downloads : 1
  • Page No: 052-055
12

Confidentiality Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Author: V Naresh Kumar, Kranthi Kiran G

DOI: 10.22161/ijaers/si.12


  • Downloads : 3
  • Page No: 056-058
13

Recommendation System for Smart Mobile Phone selection through e-commerce website using TOPSIS algorithm

Author: Mrs.M.Sridevi,Dr.R.Rajeshwara Rao, Dr.M.Varaprasad Rao

Keywords: 10.22161/ijaers/si.13

DOI:


  • Downloads : 1
  • Page No: 059-063
14

Cipher Text Design with Asymmetric RSA Algorithm

Author: S.Divya, B.Deepthi Reddy, D.Sravanthi

DOI: 10.22161/ijaers/si.14


  • Downloads : 1
  • Page No: 064-067
15

A Review on Importance of Improving Spectral Efficiency in Massive MIMO Communications

Author: Patteti Krishna, Tipparti Anil Kumar, Kalitkar Kishan Rao

DOI: 10.22161/ijaers/si.15


  • Downloads : 2
  • Page No: 068-075
16

Simple Secure Electronic Transaction (SSET) Protocol

Author: Neha Kaliya, Dr. Muzzammil Hussain

DOI: 10.22161/ijaers/si.16


  • Downloads : 1
  • Page No: 076-080
17

An Efficient System for Material Based Image Retrievals with Re-ranking Using Graph Based Ranking Algorithm

Author: Regonda.Nagaraju ,Chalamala . Naga Raju

DOI: 10.22161/ijaers/si.17


  • Downloads : 1
  • Page No: 081-084
18

Multiple Approach to Detect Duplicates in CD-Dataset

Author: Bondugulapati Keerthana, Dr. K. Ramakrishna

DOI: 10.22161/ijaers/si.18


  • Downloads : 2
  • Page No: 085-089
19

Tester and Timing Enabled Proxy ReEncryption Function on E-Health Clouds by Conjunctive Keyword Search

Author: P.Nagalakshmi, N.Bhaskar

DOI: 10.22161/ijaers/si.19


  • Downloads : 1
  • Page No: 090-092
20

Elevating Data Integrity Techniques in Matching Data Sets for Web Databases

Author: Ravikanth.M, D.Vasumathi

DOI: 10.22161/ijaers/si.20


  • Downloads : 2
  • Page No: 093-096
21

Performance Analysis of Different Scheduling Algorithms in WiMAX Network Quality of Services

Author: Dr. B. Rama Devi

DOI: 10.22161/ijaers/si.21


  • Downloads : 2
  • Page No: 097-100
22

Study of Wireless Sensor Networks its Security Issue, Challenges and Security Management

Author: Suwarna Gothane , Dr. M. V. Sarode, Dr. K. Srujan Raju

DOI: 10.22161/ijaers/si.22


  • Downloads : 1
  • Page No: 101-104
23

Analysis and Classification for Big Data Computing Techniques: A Retrospective Study

Author: Shriya kumari,Dr.K Srujan Raju , P.Satyavathi

DOI: 10.22161/ijaers/si.23


  • Downloads : 5
  • Page No: 105-110
24

Implementation of Air Quality Analyzer Using Internet of things through Android

Author: Sunil Bhati, Shubham Rajkamal , Avinash Kumar Singh

DOI: 10.22161/ijaers/si.24


  • Downloads : 4
  • Page No: 111-113
25

Crucial Use of DBMS in E-Management

Author: Md. Shabbeer, R. Kiranmai, G. Kranthi Kiran

DOI: 10.22161/ijaers/si.25


  • Downloads : 2
  • Page No: 114-117
26

An efficient approach of Bomb Detection Using Internet of Things

Author: V Mallaiah,B P Deepak Kumar

DOI: 10.22161/ijaers/si.26


  • Downloads : 1
  • Page No: 118-120
27

Implementation of Smart Irrigation System Using Internet of Things Through Android

Author: K Shainey , Shaik Md Afreen ,Durga Bhavani Rama

DOI: 10.22161/ijaers/si.27


  • Downloads : 2
  • Page No: 121-124
28

An Application of Internet of Things for Smart Home

Author: B. Ravinder , Dr. K Srujan Raju

DOI: 10.22161/ijaers/si.28


  • Downloads : 2
  • Page No: 125-128