S. No |
Paper Title |
Paper ID |
Download |
01. |
Adaptive Acknowledgment based Intrusion Detection System for MANETs
Syed Shajahan,Shaik Gousejohn
|
IJDCST/01/V-3/I-1/01 |
|
02. |
Video Sharing in Online Social Networks using P2P
N. Veeranjaneyulu,E.Karunakar |
IJDCST/01/V-3/I-1/02 |
|
03. |
An Earthquake Reporting System using Twitter Tweets
Peeta Pravanya,U.Sri Lakshmi |
IJDCST/01/V-3/I-1/03 |
|
04. |
Attribute-Based Encryption for Securely Sharing of Personal Health Records in Cloud ComputingShaik Shahina,Guntapalli Minni |
IJDCST/01/V-3/I-1/04 |
|
05. |
A Secure Intrusion Detection System for MANETs using Adaptive AcknowledgmentB.Syam Kumar,M.Deepthi |
IJDCST/01/V-3/I-1/08 |
|
06. |
A Novel Query- and User-Dependent Approach for Ranking Query Results in Web DatabasesN.Durga Prasad,K.Kalpana |
IJDCST/01/V-3/I-1/09 |
|
07. |
Back Pressure-Based Adaptive Routing Algorithm Technique in Communication NetworksD. Anosh Hussain,V.Padmaja |
IJDCST/01/V-3/I-1/10 |
|
08 |
Detecting Denial-of-Service Attack based on Multivariate Correlation AnalysisSyed. Khajabee,Shaik.Gouse John |
IJDCST/01/V-3/I-1/11 |
|
9. |
Securely Sharing of Personal Health Records using Attribute-Based Encryption in Cloud ComputingR. Bhima Kishore,M.Chandra Sekhar |
IJDCST/01/V-3/I-1/12 |
|
10. |
An Increased Efficiency Router making use of Congestion handle approaches within High Speed NetworksD.Anil Kumar,Md.Rafi |
IJDCST/01/V-3/I-1/13 |
|
11. |
A Novel Mobile Social TV System based on Cloud EnvironmentSyeeda Meherunisa,G.Preethi Jyosthna |
IJDCST/01/V-3/I-1/32 |
|
12. |
Analysing privacy issues in online social networksSk Rasheed,Guntapalli Minni |
IJDCST/01/V-3/I-1/33 |
|
13. |
A Mechanism to Control Multiparty Access for Online Social NetworksMohamad Farzana Begum,Khamar Zahan |
IJDCST/01/V-3/I-1/34 |
|
14. |
A Scheme for Securing Multi-Owner Data Sharing for Dynamic Groups in the CloudShaik Khasim Basha,G.Preeti Jyothsna |
IJDCST/01/V-3/I-1/35 |
|
15. |
Detecting and Reporting Earthquake Using Twitter TweetsShaik Rizwan,Shaik Haseena Parveen |
IJDCST/01/V-3/I-1/36 |
|
16. |
Presence Cloud A Scalable Server Architecture for Mobile Presence Services in OSNNafeesa Khatoon,V.Premalatha Williams |
IJDCST/01/V-3/I-1/37 |
|
17. |
Creating Spontaneous Wireless Ad Hoc Networks by using Secure ProtocolShaik Rafi,V.PremaLatha Williams |
IJDCST/01/V-3/I-1/38 |
|
18. |
ALERTBIRD A System for Detecting Suspicious URLs in Twitter StreamShaik Shaheda,V.Padmaja |
IJDCST/01/V-3/I-1/39 |
|
19. |
A Proficient Processing of Probabilistic Top- k Queries in Distributed Wireless Sensor NetworksShaik Salma Sultana,Shaik Khamar Zahan |
IJDCST/01/V-3/I-1/40 |
|
20. |
A Novel Scheme to Map Moderately Connected Internet RegionsAmerineni Tejaswini,Shaik.Gouse John |
IJDCST/01/V-3/I-1/41 |
|
21. |
A Novel System to Prevent Private Inference Attacks on Social NetworksShaik Shaheda,V.PremaLatha Williams |
IJDCST/01/V-3/I-1/42 |
|
22. |
Spoofing Attacks detection in Wireless NetworksThangamani.R,Padmaja.V |
IJDCST/01/V-3/I-1/43 |
|
23. |
Impact of Information Technology-A Study on Employee Responses in Public and Private Hospitals of HyderabadDr.Ch.Sri Rama Murthy |
IJDCST/01/V-3/I-1/44 |
|
24. |
Secure transactions on wireless sensor networks with accurate mobile hopesA.Rajesh,B.SWATHI,M.Tech |
IJDCST/01/V-3/I-1/45 |
|
25. |
Factors Affecting Socially responsible behavior of employees – an empirical study in IndiaDr. Ch. Sri Rama Murthy |
IJDCST/01/V-3/I-1/62 |
|
26. |
Full Text Retrieval in P2P Networks Using Compressed Bloom FiltersTalatoti Ratna Kumar,T.Sudhir |
IJDCST/01/V-3/I-1/63 |
|
27. |
Obtaining Embedded Data in a Spectrum Domain of Digital MediaVeera V Chantibabu Yasam,Sk Haseena Parveen |
IJDCST/01/V-3/I-1/64 |
|
28. |
A Tactic for Elegance Prevention in Data ExplorationM.Priyatham Kumar,G.J.sunny deol |
IJDCST/01/V-3/I-1/65 |
|
29. |
Vigorous Module in Data ManagementP.Srinivasulu,P.Eswaraiah |
IJDCST/01/V-3/I-1/66 |
|
30. |
Security in Cloud for Mobile Health MonitoringP.Siva Nageswara Rao,A.Srinivasa Rao |
IJDCST/01/V-3/I-1/67 |
|
31. |
Message Encryption Using Enhanced Palindrome NumberSarmisthaSaha,A.V.D.N.Murthy,P.SureshBabu |
IJDCST/01/V-3/I-1/70 |
|
32. |
Dynamic Query Formation Based on User Feedbacks Using Clustering ProcessGuntagani Rishitha,MRS.Asha Varma,Mtech |
IJDCST/01/V-3/I-1/71 |
|
33. |
Optimized Resource Allocation in Cloud Computing Using SIP ServersK.Sindhura,R.Eswaraiah |
IJDCST/01/V-3/I-1/72 |
|
34. |
Dynamically Organizing User Search HistoriesK.Vijaya Lakshmi,D.HariKrishna,J.Srinivas Rao |
IJDCST/01/V-3/I-1/75 |
|
35. |
Metamorphic Relations for Program Testing, Debugging using an Enhancement Method M.Vijaya Kumar,D.HariKrishna,J.Srinivas Rao |
IJDCST/01/V-3/I-1/76 |
|
36. |
Reinforcement of Access Policies for Event Processing SystemsM.S.V.Praveen Kumar,Rehana Begum |
IJDCST/01/V-3/I-1/77 |
|
37. |
Querying from Web Databases using Annotation WrapperGera Bujji Babu,Konduru Siva Naga Narasimha Rao |
IJDCST/01/V-3/I-1/78 |
|
38. |
Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud ArchitectureShaik Fayaz,Dr.V.N.Srinivasu,Tata Venkateswarlu |
IJDCST/01/V-3/I-1/79 |
|
39. |
Grid Location Service for Optimal Performance in MANETsD Anand Avinash,Chandra Sekhar Muttangi |
IJDCST/01/V-3/I-1/81 |
|
40. |
Improving Power Exhaustion Attacks in Wireless Sensor NetworksJ.Ramesh,MD.Rafi |
IJDCST/01/V-3/I-1/82 |
|
41. |
Adaptive query planning procedures to support Continuous Aggregation QueriesPanidapu LakshmiSivaSaila,J.Ranga Rajesh,T.Hema Latha |
IJDCST/01/V-3/I-1/90 |
|
42. |
Users Behavior Prediction in Social Networks using Edge Centric ClusteringP.Dwaraka Prameela Rani,G.Kalyani |
IJDCST/01/V-3/I-1/91 |
|
43. |
Access control in Cloud Computing based on group key Management PoliciesV.Mohan Krishna,D.HariKrishna,Dr.K.Rama Krishnaiah |
IJDCST/01/V-3/I-1/92 |
|
44. |
Imitation and Induction of Effectual of Cloud ServicesM S Naveen Kumar,G.Vara Prasad Rao |
IJDCST/01/V-3/I-1/93 |
|
45. |
Privacy-Preserving Protocol for unwanted Message With Cooperative Firewall OptimizationBhanu Chandar.P,G.VaraPrasad Rao |
IJDCST/01/V-3/I-1/94 |
|
46. |
Secure and Flexible Data Sharing for Dynamic Groups in the CloudSrinivas Tutigunta,K.Ravi Chadara |
IJDCST/01/V-3/I-1/95 |
|
47. |
Gender Classification Using Hybrid Classifier TechniquesBokka Neelima,K.Vijay Kumar |
IJDCST/01/V-3/I-1/96 |
|
48. |
Intent Image Search Using User Link_Snap Based On Hierarchical Clustering TechniqueM.Venkatesh,A.D.Purushotham,M.Ravi Kishore |
IJDCST/01/V-3/I-1/97 |
|
49. |
Mobile Social Videos using CloudShaik T Fathe Ahamed,G.Vara Prasad Rao |
IJDCST/01/V-3/I-1/98 |
|
50. |
Cost Estimation Model in Horizontal Partitioned Data Using Secure Association Rule MiningYesupogu Sandhya Rani,Lakshmi Ramani Burra,Praveen Tumuluru |
IJDCST/01/V-3/I-1/99 |
|
51. |
Maximum Utility Sets Using Data StreamsSK Reshma,G.Lalitha Kumari |
IJDCST/01/V-3/I-1/100 |
|
52. |
Third Party Lock-Into the Meta CloudV S S Maruthi Ghandikota,K Ravichandra,M.Tech |
IJDCST/01/V-3/I-1/101 |
|