INTERNATIONAL JOURNAL FOR DEVELOPMENT OF COMPUTER SCIENCE & TECHNOLOGY(Volumn-3,Issue-1,Nov-Dec-2014)

S. No Paper Title Paper ID Download
01. Adaptive Acknowledgment based Intrusion Detection System for MANETs Syed Shajahan,Shaik Gousejohn IJDCST/01/V-3/I-1/01
02. Video Sharing in Online Social Networks using P2P N. Veeranjaneyulu,E.Karunakar IJDCST/01/V-3/I-1/02
03. An Earthquake Reporting System using Twitter Tweets Peeta Pravanya,U.Sri Lakshmi IJDCST/01/V-3/I-1/03
04. Attribute-Based Encryption for Securely Sharing of Personal Health Records in Cloud ComputingShaik Shahina,Guntapalli Minni IJDCST/01/V-3/I-1/04
05. A Secure Intrusion Detection System for MANETs using Adaptive AcknowledgmentB.Syam Kumar,M.Deepthi IJDCST/01/V-3/I-1/08
06. A Novel Query- and User-Dependent Approach for Ranking Query Results in Web DatabasesN.Durga Prasad,K.Kalpana IJDCST/01/V-3/I-1/09
07. Back Pressure-Based Adaptive Routing Algorithm Technique in Communication NetworksD. Anosh Hussain,V.Padmaja IJDCST/01/V-3/I-1/10
08 Detecting Denial-of-Service Attack based on Multivariate Correlation AnalysisSyed. Khajabee,Shaik.Gouse John IJDCST/01/V-3/I-1/11
9. Securely Sharing of Personal Health Records using Attribute-Based Encryption in Cloud ComputingR. Bhima Kishore,M.Chandra Sekhar IJDCST/01/V-3/I-1/12
10. An Increased Efficiency Router making use of Congestion handle approaches within High Speed NetworksD.Anil Kumar,Md.Rafi IJDCST/01/V-3/I-1/13
11. A Novel Mobile Social TV System based on Cloud EnvironmentSyeeda Meherunisa,G.Preethi Jyosthna IJDCST/01/V-3/I-1/32
12. Analysing privacy issues in online social networksSk Rasheed,Guntapalli Minni IJDCST/01/V-3/I-1/33
13. A Mechanism to Control Multiparty Access for Online Social NetworksMohamad Farzana Begum,Khamar Zahan IJDCST/01/V-3/I-1/34
14. A Scheme for Securing Multi-Owner Data Sharing for Dynamic Groups in the CloudShaik Khasim Basha,G.Preeti Jyothsna IJDCST/01/V-3/I-1/35
15. Detecting and Reporting Earthquake Using Twitter TweetsShaik Rizwan,Shaik Haseena Parveen IJDCST/01/V-3/I-1/36
16. Presence Cloud A Scalable Server Architecture for Mobile Presence Services in OSNNafeesa Khatoon,V.Premalatha Williams IJDCST/01/V-3/I-1/37
17. Creating Spontaneous Wireless Ad Hoc Networks by using Secure ProtocolShaik Rafi,V.PremaLatha Williams IJDCST/01/V-3/I-1/38
18. ALERTBIRD A System for Detecting Suspicious URLs in Twitter StreamShaik Shaheda,V.Padmaja IJDCST/01/V-3/I-1/39
19. A Proficient Processing of Probabilistic Top- k Queries in Distributed Wireless Sensor NetworksShaik Salma Sultana,Shaik Khamar Zahan IJDCST/01/V-3/I-1/40
20. A Novel Scheme to Map Moderately Connected Internet RegionsAmerineni Tejaswini,Shaik.Gouse John IJDCST/01/V-3/I-1/41
21. A Novel System to Prevent Private Inference Attacks on Social NetworksShaik Shaheda,V.PremaLatha Williams IJDCST/01/V-3/I-1/42
22. Spoofing Attacks detection in Wireless NetworksThangamani.R,Padmaja.V IJDCST/01/V-3/I-1/43
23. Impact of Information Technology-A Study on Employee Responses in Public and Private Hospitals of HyderabadDr.Ch.Sri Rama Murthy IJDCST/01/V-3/I-1/44
24. Secure transactions on wireless sensor networks with accurate mobile hopesA.Rajesh,B.SWATHI,M.Tech IJDCST/01/V-3/I-1/45
25. Factors Affecting Socially responsible behavior of employees – an empirical study in IndiaDr. Ch. Sri Rama Murthy IJDCST/01/V-3/I-1/62
26. Full Text Retrieval in P2P Networks Using Compressed Bloom FiltersTalatoti Ratna Kumar,T.Sudhir IJDCST/01/V-3/I-1/63
27. Obtaining Embedded Data in a Spectrum Domain of Digital MediaVeera V Chantibabu Yasam,Sk Haseena Parveen IJDCST/01/V-3/I-1/64
28. A Tactic for Elegance Prevention in Data ExplorationM.Priyatham Kumar,G.J.sunny deol IJDCST/01/V-3/I-1/65
29. Vigorous Module in Data ManagementP.Srinivasulu,P.Eswaraiah IJDCST/01/V-3/I-1/66
30. Security in Cloud for Mobile Health MonitoringP.Siva Nageswara Rao,A.Srinivasa Rao IJDCST/01/V-3/I-1/67
31. Message Encryption Using Enhanced Palindrome NumberSarmisthaSaha,A.V.D.N.Murthy,P.SureshBabu IJDCST/01/V-3/I-1/70
32. Dynamic Query Formation Based on User Feedbacks Using Clustering ProcessGuntagani Rishitha,MRS.Asha Varma,Mtech IJDCST/01/V-3/I-1/71
33. Optimized Resource Allocation in Cloud Computing Using SIP ServersK.Sindhura,R.Eswaraiah IJDCST/01/V-3/I-1/72
34. Dynamically Organizing User Search HistoriesK.Vijaya Lakshmi,D.HariKrishna,J.Srinivas Rao IJDCST/01/V-3/I-1/75
35. Metamorphic Relations for Program Testing, Debugging using an Enhancement Method M.Vijaya Kumar,D.HariKrishna,J.Srinivas Rao IJDCST/01/V-3/I-1/76
36. Reinforcement of Access Policies for Event Processing SystemsM.S.V.Praveen Kumar,Rehana Begum IJDCST/01/V-3/I-1/77
37. Querying from Web Databases using Annotation WrapperGera Bujji Babu,Konduru Siva Naga Narasimha Rao IJDCST/01/V-3/I-1/78
38. Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud ArchitectureShaik Fayaz,Dr.V.N.Srinivasu,Tata Venkateswarlu IJDCST/01/V-3/I-1/79
39. Grid Location Service for Optimal Performance in MANETsD Anand Avinash,Chandra Sekhar Muttangi IJDCST/01/V-3/I-1/81
40. Improving Power Exhaustion Attacks in Wireless Sensor NetworksJ.Ramesh,MD.Rafi IJDCST/01/V-3/I-1/82
41. Adaptive query planning procedures to support Continuous Aggregation QueriesPanidapu LakshmiSivaSaila,J.Ranga Rajesh,T.Hema Latha IJDCST/01/V-3/I-1/90
42. Users Behavior Prediction in Social Networks using Edge Centric ClusteringP.Dwaraka Prameela Rani,G.Kalyani IJDCST/01/V-3/I-1/91
43. Access control in Cloud Computing based on group key Management PoliciesV.Mohan Krishna,D.HariKrishna,Dr.K.Rama Krishnaiah IJDCST/01/V-3/I-1/92
44. Imitation and Induction of Effectual of Cloud ServicesM S Naveen Kumar,G.Vara Prasad Rao IJDCST/01/V-3/I-1/93
45. Privacy-Preserving Protocol for unwanted Message With Cooperative Firewall OptimizationBhanu Chandar.P,G.VaraPrasad Rao IJDCST/01/V-3/I-1/94
46. Secure and Flexible Data Sharing for Dynamic Groups in the CloudSrinivas Tutigunta,K.Ravi Chadara IJDCST/01/V-3/I-1/95
47. Gender Classification Using Hybrid Classifier TechniquesBokka Neelima,K.Vijay Kumar IJDCST/01/V-3/I-1/96
48. Intent Image Search Using User Link_Snap Based On Hierarchical Clustering TechniqueM.Venkatesh,A.D.Purushotham,M.Ravi Kishore IJDCST/01/V-3/I-1/97
49. Mobile Social Videos using CloudShaik T Fathe Ahamed,G.Vara Prasad Rao IJDCST/01/V-3/I-1/98
50. Cost Estimation Model in Horizontal Partitioned Data Using Secure Association Rule MiningYesupogu Sandhya Rani,Lakshmi Ramani Burra,Praveen Tumuluru IJDCST/01/V-3/I-1/99
51. Maximum Utility Sets Using Data StreamsSK Reshma,G.Lalitha Kumari IJDCST/01/V-3/I-1/100
52. Third Party Lock-Into the Meta CloudV S S Maruthi Ghandikota,K Ravichandra,M.Tech IJDCST/01/V-3/I-1/101