Statistics

    Map

Twitter

Special Issue-3(Trends in Engineering and Technology(NCTET-2K17))

Download Certificate

Sr No. Title
1

A Novel Approach for Cyberbullying on Social Media Using SEMAE

Author: A.Lahari, A.Ganesh

DOI: 10.22161/ijaers/nctet.2017.2


  • Downloads : 3
  • Page No: 001-009
2

Efficient Remote Data Integrity Checking and Uploading into Pubic Cloud using Proxy

Author: KONDE KUMAR, Mr. G.RAJESWARAPPA

DOI: 10.22161/ijaers/nctet.2017.4


  • Downloads : 1
  • Page No: 010-016
3

Medical Sensor Data Protection In Multiple Server

Author: Vanganuru Gayathri, Mrs.T.K.Lakshmi

DOI: 10.22161/ijaers/nctet.2017.5


  • Downloads : 2
  • Page No: 017-026
4

An Effective Learning Automata for Recommending Users and Locations Based On Cloud

Author: Kamatam LasyaPriya Reddy, Srinivasulu . Sirisala

DOI: 10.22161/ijaers/nctet.2017.8


  • Downloads : 1
  • Page No: 045-050
5

Improving Hadoop Performance by using H2Hadoop MapReduce workflow in Text Datasets

Author: C REKHA, A.REVATHI

DOI: 10.22161/ijaers/nctet.2017.9


  • Downloads : 1
  • Page No: 051-057
6

A Secure and scalable data access control using Hierarchical CPABE in the Cloud

Author: C Sailaja, B.Balakonda Reddy

DOI: 10.22161/ijaers/nctet.2017.10


  • Downloads : 1
  • Page No: 058-065
7

Service Rating Prediction by Exploring Social Mobile Client’s Geographical Places

Author: K SREE DIVYA, D PREM KUMAR, B BALAKONDAR REDDY

DOI: 10.22161/ijaers/nctet.2017.12


  • Downloads : 4
  • Page No: 066-069
8

A Novel Authentication System Passmatrix Based On Graphical Passwords

Author: M.Sravanasree, T.Satyendra Kumar

DOI: 10.22161/ijaers/nctet.2017.13


  • Downloads : 1
  • Page No: 070-075
9

A Systematic Approach for Multi-Keyword Ranked Search over Encrypted Data by Using User Interest Model

Author: V.Deepika, D.Shobha Rani

DOI: 10.22161/ijaers/nctet.2017.14


  • Downloads : 5
  • Page No: 076-081
10

Identification Primarily Based Proxy –Oriented Statistics Importing and Remote Records Integrity Checking In Public Cloud

Author: HEMAVATHI, Mrs.JASMINE SABEENA

DOI: 10.22161/ijaers/nctet.2017.15


  • Downloads : 3
  • Page No: 082-088
11

Adaptive Replication control in HDFS supported supervised learning

Author: K Sree Divya , T Vijaya Rao, A Kumar

DOI: 10.22161/ijaers/nctet.2017.17


  • Downloads : 1
  • Page No: 089-091
12

LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED PROFITABLE SYSTEM

Author: S.Swarnalatha, M.Supraja, K.Bhanu Prakash

DOI: 10.22161/ijaers/nctet.2017.19


  • Downloads : 2
  • Page No: 092-94
13

SECURE DATA TRANSMISSION USING VIRTUAL PRIVATE NETWORKS

Author: B.Ramasubba Reddy, A.Saritha, B.BalaKonda Reddy

DOI: 10.22161/ijaers/nctet.2017.20


  • Downloads : 3
  • Page No: 095-097
14

Big data Curation: Enhanced Information Retrieval System

Author: K.Naresh, A.BasiReddy, S.Swarnalatha

DOI: 10.22161/ijaers/nctet.2017.21


  • Downloads : 1
  • Page No: 098-105
15

Map Reduce for Hadoop in Mobile Clouds

Author: G.Rajeswarappa, K.Naresh

DOI: 10.22161/ijaers/nctet.2017.22


  • Downloads : 1
  • Page No: 106-117
16

Choosing Historical Fixes using Association Rules for fixing the bugs

Author: T.MAMATHA, Dr.B. RAMA SUBBA REDDY, A BALARAM

DOI: 10.22161/ijaers/nctet.2017.24


  • Downloads : 1
  • Page No: 118-122
17

Information Retrieval systems and Web Search Engines: A Survey

Author: Arun Kumar, M. A. Jabbar, Y.V. Bhaskar Reddy

DOI: 10.22161/ijaers/nctet.2017.25


  • Downloads : 1
  • Page No: 123-125
18

Synthesis of Virtual Machines in Cloud Data center

Author: P.Poojitha, V.Krishna Kishore

DOI: 10.22161/ijaers/nctet.2017.26


  • Downloads : 1
  • Page No: 126-129
19

Multi Service Composition in Mobile Ad Hoc Networks

Author: Srinivasulu Sirisala, L. Lakshmaiah

DOI: 10.22161/ijaers/nctet.2017.30


  • Downloads : 1
  • Page No: 130-134
20

A Secure Mining in document streams By Using UARSTP

Author: G.Sireesha, K.sekhar

DOI: 10.22161/ijaers/nctet.2017.32


  • Downloads : 3
  • Page No: 135-142
21

Providing trust based communication in cloudlets using third party

Author: P.Liyaz, A.Kumar, N.Chaitanya

DOI: 10.22161/ijaers/nctet.2017.33


  • Downloads : 1
  • Page No: 143-146
22

A Valuable information distributing in cloud using Reversible Memory-Identity based Encryption

Author: J BALAMURALI, P M D ALIKHAN

DOI: 10.22161/ijaers/nctet.2017.3


  • Downloads : 1
  • Page No: 147-150
23

A Noval Programmable ALU Architecture for DLX Processor

Author: B.Geetha Rani, M.Chandra Sekhar Reddy

DOI: 10.22161/ijaers/nctet.2017.50


  • Downloads : 1
  • Page No: 151-157
24

Optimal Placement and Sizing of Distributed Generators in Balanced/Unbalanced Distribution Systems Using Backtracking Search Optimization (BSA)

Author: Dr. Shaik Rafi Kiran, G.Meena

DOI: 10.22161/ijaers/nctet.2017.51


  • Downloads : 1
  • Page No: 158-165
25

Implementation of 64-Bit ALU Using Modified Sqrt Carry Select Adder

Author: B. Ravikumar Reddy, A. Krishna Mohan

DOI: 10.22161/ijaers/nctet.2017.52


  • Downloads : 1
  • Page No: 166-169
26

Co-relation of Image and Text by Using Semantic Cross-Media Hashing

Author: Tella Prameela, Dr. B Ramasubba Reddy

DOI: 10.22161/ijaers/nctet.2017.53


  • Downloads : 3
  • Page No: 170-176
27

Space-Efficient Tiling Scheme for Tile-Level Encrypted Domain Scaling and Cropping

Author: DASARI MADHAVI, K.SANTHI

DOI: 10.22161/ijaers/nctet.2017.1


  • Downloads : 2
  • Page No: 177-182
28

Software Quality Modeling By Process

Author: Dr.N.Rajasekhar Reddy, Dr.R.J.Ramasree

DOI: 10.22161/ijaers/nctet.2017.28


  • Downloads : 1
  • Page No: 183-186
29

Internet of Things

Author: M.Prudhvi tej, M. Ajay, K.P.Pratyusha

DOI: 10.22161/ijaers/nctet.2017.31


  • Downloads : 1
  • Page No: 187-191
30

Empirical Study of coupling and cohesion in an Object-Oriented system Metrics

Author: P. Neelima, B.Sangamithra, Dr. M.Sunil Kumar

DOI: 10.22161/ijaers/nctet.2017.54


  • Downloads : 1
  • Page No: 192-198
31

An Efficient improved technique to retrieve the bug repository

Author: P. Hari Prasad, D. Ganesh, Dr. M.Sunil Kumar

DOI: 10.22161/ijaers/nctet.2017.55


  • Downloads : 1
  • Page No: 199-206
32

Security Guaranteed High Performance Data Search on Encrypted Cloud Storages

Author: B.Suresh Babu, S.Jeelan, V.Janardhan Babu


  • Downloads : 1
  • Page No: 207-211
33

AN ENHANCED ATTRIBUTE BASED ENCRYPTION IN DATA SHARING SCHEME FOR KEY ESCROW PROBLEM

Author: Kothapati Pavithra, Dr. N Sudhakar Reddy


  • Downloads : 12
  • Page No: 212-217
34

A Novel Approach to Reconstruct Routing Paths in Wireless Sensor Networks

Author: S.K Nishar, Ramakantha Reddy


  • Downloads : 3
  • Page No: 218-223