S. No |
Paper Title |
Paper ID |
Download |
01. |
Indexing query Forms for Data base queries
Bogani Rama Devi,Sri U.Moulali
|
IJDCST/01/V-3/I-6/02 |
|
02. |
Advanced Keyword String Routing
K.Ravendra,Hari Krishna Deevi,Dr.J.Srinivasa Rao
|
IJDCST/01/V-3/I-6/03 |
|
03. |
Email based verification of dynamic data for cloud computing storage systems
B.Venkata Vara Prasad,P.Radha Krishna,Dr.J.Srinivasa Rao
|
IJDCST/01/V-3/I-6/04 |
|
04. |
Allowing data integrity along with security in clouds
B.Venkata Subba Reddy,T.P.V.V.Srinivasa Rao,Dr.J.Srinivasa Rao
|
IJDCST/01/V-3/I-6/05 |
|
05. |
Secure Data Retrieval Scheme Using CP-ABE Scheme for Decentralized Disruption-Tolerant Military Networks
Abdul Hoora Begum,J.V.NagaRaju
|
IJDCST/01/V-3/I-6/06 |
|
06. |
A Novel Approach of Scalable Data Sharing in Cloud Using Key-Aggregate Cryptosystem
P.Pavani Sri Katyayini,M.Anand Kumar
|
IJDCST/01/V-3/I-6/07 |
|
07. |
Keyword Query Routing using top-k Routing Plans
Naraharisetty Naga Anitha,U.Ganesh Naidu
|
IJDCST/01/V-3/I-6/08 |
|
08. |
BAEV Back-Bone Assisted Emergency alert in VANET’s City Environments
B.Sushma,B.V.Prasadbabu
|
IJDCST/01/V-3/I-6/09 |
|
09. |
Improved Secure Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Using Distributed Coordinating Solution
P.Swetha,K.Sri Lakshmi
|
IJDCST/01/V-3/I-6/10 |
|
10. |
Hybrid Cloud Environment for secure Backup and Data Storage
D.Mahesh,V S S Reddy,Dr.K.Rama Krishnaiah
|
IJDCST/01/V-3/I-6/11 |
|
11. |
Hybrid-Fast Multi-View Clustering Algorithm for Mining Web documents
Mahabbuni Shaik,Mr.T.Seshu Chakravarthy,T.Surekha
|
IJDCST/01/V-3/I-6/12 |
|
12. |
Personalized Web Search using advanced string search
Kotireddy Gurram,Mr.T.Seshu Chakravarthy,T.Surekha
|
IJDCST/01/V-3/I-6/13 |
|
13. |
A Novel optimal routing using Hop-by-Hop Adaptive linking
Dasari Pujitha,Sayeed Yasin
|
IJDCST/01/V-3/I-6/14 |
|
14. |
Improvement of Business analysis using frequent pattern tree
Kilari Teja Seethal Kumar,Mr.K.John Paul
|
IJDCST/01/V-3/I-6/17 |
|
15. |
A Novel Social Authenticating Approach for Security using Trustee-Based
Venkata Sai Kumar Bellapu,M Samba Siva Rao
|
IJDCST/01/V-3/I-6/20 |
|
16. |
Verification of Scalable Distributed Service Integrity for Software-as-a-Service Clouds
Ramalakshmi Golla,I.Tabitha,Sayeed Yasin
|
IJDCST/01/V-3/I-6/23 |
|
17. |
A New Approach in Big Data with Fast Clustering Algorithm
Devisetty Bhargava Sai Kumar,O.Srinivas
|
IJDCST/01/V-3/I-6/24 |
|
18. |
A Hybrid Approach for Travel Package Recommendation
Silpa Kondeti,Hema Latha.Goli
|
IJDCST/01/V-3/I-6/27 |
|
19. |
Advanced Peer: Data sharing in network based on Peer to Peer
Syed Ayesha Firdose,P.Venu Babu
|
IJDCST/01/V-3/I-6/28 |
|
20. |
Analysis of Big Data Algorithms
Vecha.Harshini,Nelluru.Anjaneyulu
|
IJDCST/01/V-3/I-6/29 |
|
21. |
A Study on Computer Vision systems in Cloud Computing Environment with GIS
Kondapalli Beulah,Penmetsa V Krishna Raja,Gudikandhula Narasimha Rao,Vijaya Raju Motru
|
IJDCST/01/V-3/I-6/31 |
|
22. |
Strong Association Rules by using Market Datasets
V.Sujatha
|
IJDCST/01/V-3/I-6/33 |
|