Sr No. | Title |
1 |
A Novel Approach for Cyberbullying on Social Media Using SEMAE Author: A.Lahari, A.Ganesh DOI: 10.22161/ijaers/nctet.2017.2 |
2 |
Efficient Remote Data Integrity Checking and Uploading into Pubic Cloud using Proxy Author: KONDE KUMAR, Mr. G.RAJESWARAPPA DOI: 10.22161/ijaers/nctet.2017.4 |
3 |
Medical Sensor Data Protection In Multiple Server Author: Vanganuru Gayathri, Mrs.T.K.Lakshmi DOI: 10.22161/ijaers/nctet.2017.5 |
4 |
An Effective Learning Automata for Recommending Users and Locations Based On Cloud Author: Kamatam LasyaPriya Reddy, Srinivasulu . Sirisala DOI: 10.22161/ijaers/nctet.2017.8 |
5 |
Improving Hadoop Performance by using H2Hadoop MapReduce workflow in Text Datasets Author: C REKHA, A.REVATHI DOI: 10.22161/ijaers/nctet.2017.9 |
6 |
A Secure and scalable data access control using Hierarchical CPABE in the Cloud Author: C Sailaja, B.Balakonda Reddy DOI: 10.22161/ijaers/nctet.2017.10 |
7 |
Service Rating Prediction by Exploring Social Mobile Client’s Geographical Places Author: K SREE DIVYA, D PREM KUMAR, B BALAKONDAR REDDY DOI: 10.22161/ijaers/nctet.2017.12 |
8 |
A Novel Authentication System Passmatrix Based On Graphical Passwords Author: M.Sravanasree, T.Satyendra Kumar DOI: 10.22161/ijaers/nctet.2017.13 |
9 |
A Systematic Approach for Multi-Keyword Ranked Search over Encrypted Data by Using User Interest Model Author: V.Deepika, D.Shobha Rani DOI: 10.22161/ijaers/nctet.2017.14 |
10 |
Identification Primarily Based Proxy –Oriented Statistics Importing and Remote Records Integrity Checking In Public Cloud Author: HEMAVATHI, Mrs.JASMINE SABEENA DOI: 10.22161/ijaers/nctet.2017.15 |
11 |
Adaptive Replication control in HDFS supported supervised learning Author: K Sree Divya , T Vijaya Rao, A Kumar DOI: 10.22161/ijaers/nctet.2017.17 |
12 |
LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED PROFITABLE SYSTEM Author: S.Swarnalatha, M.Supraja, K.Bhanu Prakash DOI: 10.22161/ijaers/nctet.2017.19 |
13 |
SECURE DATA TRANSMISSION USING VIRTUAL PRIVATE NETWORKS Author: B.Ramasubba Reddy, A.Saritha, B.BalaKonda Reddy DOI: 10.22161/ijaers/nctet.2017.20 |
14 |
Big data Curation: Enhanced Information Retrieval System Author: K.Naresh, A.BasiReddy, S.Swarnalatha DOI: 10.22161/ijaers/nctet.2017.21 |
15 |
Map Reduce for Hadoop in Mobile Clouds Author: G.Rajeswarappa, K.Naresh DOI: 10.22161/ijaers/nctet.2017.22 |
16 |
Choosing Historical Fixes using Association Rules for fixing the bugs Author: T.MAMATHA, Dr.B. RAMA SUBBA REDDY, A BALARAM DOI: 10.22161/ijaers/nctet.2017.24 |
17 |
Information Retrieval systems and Web Search Engines: A Survey Author: Arun Kumar, M. A. Jabbar, Y.V. Bhaskar Reddy DOI: 10.22161/ijaers/nctet.2017.25 |
18 |
Synthesis of Virtual Machines in Cloud Data center Author: P.Poojitha, V.Krishna Kishore DOI: 10.22161/ijaers/nctet.2017.26 |
19 |
Multi Service Composition in Mobile Ad Hoc Networks Author: Srinivasulu Sirisala, L. Lakshmaiah DOI: 10.22161/ijaers/nctet.2017.30 |
20 |
A Secure Mining in document streams By Using UARSTP Author: G.Sireesha, K.sekhar DOI: 10.22161/ijaers/nctet.2017.32 |
21 |
Providing trust based communication in cloudlets using third party Author: P.Liyaz, A.Kumar, N.Chaitanya DOI: 10.22161/ijaers/nctet.2017.33 |
22 |
A Valuable information distributing in cloud using Reversible Memory-Identity based Encryption Author: J BALAMURALI, P M D ALIKHAN DOI: 10.22161/ijaers/nctet.2017.3 |
23 |
A Noval Programmable ALU Architecture for DLX Processor Author: B.Geetha Rani, M.Chandra Sekhar Reddy DOI: 10.22161/ijaers/nctet.2017.50 |
24 |
Optimal Placement and Sizing of Distributed Generators in Balanced/Unbalanced Distribution Systems Using Backtracking Search Optimization (BSA) Author: Dr. Shaik Rafi Kiran, G.Meena DOI: 10.22161/ijaers/nctet.2017.51 |
25 |
Implementation of 64-Bit ALU Using Modified Sqrt Carry Select Adder Author: B. Ravikumar Reddy, A. Krishna Mohan DOI: 10.22161/ijaers/nctet.2017.52 |
26 |
Co-relation of Image and Text by Using Semantic Cross-Media Hashing Author: Tella Prameela, Dr. B Ramasubba Reddy DOI: 10.22161/ijaers/nctet.2017.53 |
27 |
Space-Efficient Tiling Scheme for Tile-Level Encrypted Domain Scaling and Cropping Author: DASARI MADHAVI, K.SANTHI DOI: 10.22161/ijaers/nctet.2017.1 |
28 |
Software Quality Modeling By Process Author: Dr.N.Rajasekhar Reddy, Dr.R.J.Ramasree DOI: 10.22161/ijaers/nctet.2017.28 |
29 |
Internet of Things Author: M.Prudhvi tej, M. Ajay, K.P.Pratyusha DOI: 10.22161/ijaers/nctet.2017.31 |
30 |
Empirical Study of coupling and cohesion in an Object-Oriented system Metrics Author: P. Neelima, B.Sangamithra, Dr. M.Sunil Kumar DOI: 10.22161/ijaers/nctet.2017.54 |
31 |
An Efficient improved technique to retrieve the bug repository Author: P. Hari Prasad, D. Ganesh, Dr. M.Sunil Kumar DOI: 10.22161/ijaers/nctet.2017.55 |
32 |
Security Guaranteed High Performance Data Search on Encrypted Cloud Storages Author: B.Suresh Babu, S.Jeelan, V.Janardhan Babu |
33 |
AN ENHANCED ATTRIBUTE BASED ENCRYPTION IN DATA SHARING SCHEME FOR KEY ESCROW PROBLEM Author: Kothapati Pavithra, Dr. N Sudhakar Reddy |
34 |
A Novel Approach to Reconstruct Routing Paths in Wireless Sensor Networks Author: S.K Nishar, Ramakantha Reddy |
Advanced Engineering Research and Science