| Sr No. | Title |
| 1 |
A Novel Approach for Cyberbullying on Social Media Using SEMAE Author: A.Lahari, A.Ganesh DOI: 10.22161/ijaers/nctet.2017.2 |
| 2 |
Efficient Remote Data Integrity Checking and Uploading into Pubic Cloud using Proxy Author: KONDE KUMAR, Mr. G.RAJESWARAPPA DOI: 10.22161/ijaers/nctet.2017.4 |
| 3 |
Medical Sensor Data Protection In Multiple Server Author: Vanganuru Gayathri, Mrs.T.K.Lakshmi DOI: 10.22161/ijaers/nctet.2017.5 |
| 4 |
An Effective Learning Automata for Recommending Users and Locations Based On Cloud Author: Kamatam LasyaPriya Reddy, Srinivasulu . Sirisala DOI: 10.22161/ijaers/nctet.2017.8 |
| 5 |
Improving Hadoop Performance by using H2Hadoop MapReduce workflow in Text Datasets Author: C REKHA, A.REVATHI DOI: 10.22161/ijaers/nctet.2017.9 |
| 6 |
A Secure and scalable data access control using Hierarchical CPABE in the Cloud Author: C Sailaja, B.Balakonda Reddy DOI: 10.22161/ijaers/nctet.2017.10 |
| 7 |
Service Rating Prediction by Exploring Social Mobile Client’s Geographical Places Author: K SREE DIVYA, D PREM KUMAR, B BALAKONDAR REDDY DOI: 10.22161/ijaers/nctet.2017.12 |
| 8 |
A Novel Authentication System Passmatrix Based On Graphical Passwords Author: M.Sravanasree, T.Satyendra Kumar DOI: 10.22161/ijaers/nctet.2017.13 |
| 9 |
A Systematic Approach for Multi-Keyword Ranked Search over Encrypted Data by Using User Interest Model Author: V.Deepika, D.Shobha Rani DOI: 10.22161/ijaers/nctet.2017.14 |
| 10 |
Identification Primarily Based Proxy –Oriented Statistics Importing and Remote Records Integrity Checking In Public Cloud Author: HEMAVATHI, Mrs.JASMINE SABEENA DOI: 10.22161/ijaers/nctet.2017.15 |
| 11 |
Adaptive Replication control in HDFS supported supervised learning Author: K Sree Divya , T Vijaya Rao, A Kumar DOI: 10.22161/ijaers/nctet.2017.17 |
| 12 |
LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED PROFITABLE SYSTEM Author: S.Swarnalatha, M.Supraja, K.Bhanu Prakash DOI: 10.22161/ijaers/nctet.2017.19 |
| 13 |
SECURE DATA TRANSMISSION USING VIRTUAL PRIVATE NETWORKS Author: B.Ramasubba Reddy, A.Saritha, B.BalaKonda Reddy DOI: 10.22161/ijaers/nctet.2017.20 |
| 14 |
Big data Curation: Enhanced Information Retrieval System Author: K.Naresh, A.BasiReddy, S.Swarnalatha DOI: 10.22161/ijaers/nctet.2017.21 |
| 15 |
Map Reduce for Hadoop in Mobile Clouds Author: G.Rajeswarappa, K.Naresh DOI: 10.22161/ijaers/nctet.2017.22 |
| 16 |
Choosing Historical Fixes using Association Rules for fixing the bugs Author: T.MAMATHA, Dr.B. RAMA SUBBA REDDY, A BALARAM DOI: 10.22161/ijaers/nctet.2017.24 |
| 17 |
Information Retrieval systems and Web Search Engines: A Survey Author: Arun Kumar, M. A. Jabbar, Y.V. Bhaskar Reddy DOI: 10.22161/ijaers/nctet.2017.25 |
| 18 |
Synthesis of Virtual Machines in Cloud Data center Author: P.Poojitha, V.Krishna Kishore DOI: 10.22161/ijaers/nctet.2017.26 |
| 19 |
Multi Service Composition in Mobile Ad Hoc Networks Author: Srinivasulu Sirisala, L. Lakshmaiah DOI: 10.22161/ijaers/nctet.2017.30 |
| 20 |
A Secure Mining in document streams By Using UARSTP Author: G.Sireesha, K.sekhar DOI: 10.22161/ijaers/nctet.2017.32 |
| 21 |
Providing trust based communication in cloudlets using third party Author: P.Liyaz, A.Kumar, N.Chaitanya DOI: 10.22161/ijaers/nctet.2017.33 |
| 22 |
A Valuable information distributing in cloud using Reversible Memory-Identity based Encryption Author: J BALAMURALI, P M D ALIKHAN DOI: 10.22161/ijaers/nctet.2017.3 |
| 23 |
A Noval Programmable ALU Architecture for DLX Processor Author: B.Geetha Rani, M.Chandra Sekhar Reddy DOI: 10.22161/ijaers/nctet.2017.50 |
| 24 |
Optimal Placement and Sizing of Distributed Generators in Balanced/Unbalanced Distribution Systems Using Backtracking Search Optimization (BSA) Author: Dr. Shaik Rafi Kiran, G.Meena DOI: 10.22161/ijaers/nctet.2017.51 |
| 25 |
Implementation of 64-Bit ALU Using Modified Sqrt Carry Select Adder Author: B. Ravikumar Reddy, A. Krishna Mohan DOI: 10.22161/ijaers/nctet.2017.52 |
| 26 |
Co-relation of Image and Text by Using Semantic Cross-Media Hashing Author: Tella Prameela, Dr. B Ramasubba Reddy DOI: 10.22161/ijaers/nctet.2017.53 |
| 27 |
Space-Efficient Tiling Scheme for Tile-Level Encrypted Domain Scaling and Cropping Author: DASARI MADHAVI, K.SANTHI DOI: 10.22161/ijaers/nctet.2017.1 |
| 28 |
Software Quality Modeling By Process Author: Dr.N.Rajasekhar Reddy, Dr.R.J.Ramasree DOI: 10.22161/ijaers/nctet.2017.28 |
| 29 |
Internet of Things Author: M.Prudhvi tej, M. Ajay, K.P.Pratyusha DOI: 10.22161/ijaers/nctet.2017.31 |
| 30 |
Empirical Study of coupling and cohesion in an Object-Oriented system Metrics Author: P. Neelima, B.Sangamithra, Dr. M.Sunil Kumar DOI: 10.22161/ijaers/nctet.2017.54 |
| 31 |
An Efficient improved technique to retrieve the bug repository Author: P. Hari Prasad, D. Ganesh, Dr. M.Sunil Kumar DOI: 10.22161/ijaers/nctet.2017.55 |
| 32 |
Security Guaranteed High Performance Data Search on Encrypted Cloud Storages Author: B.Suresh Babu, S.Jeelan, V.Janardhan Babu |
| 33 |
AN ENHANCED ATTRIBUTE BASED ENCRYPTION IN DATA SHARING SCHEME FOR KEY ESCROW PROBLEM Author: Kothapati Pavithra, Dr. N Sudhakar Reddy |
| 34 |
A Novel Approach to Reconstruct Routing Paths in Wireless Sensor Networks Author: S.K Nishar, Ramakantha Reddy |



Advanced Engineering Research and Science