| 1 | Design and Implementation of Trust and Energy Aware Routing Protocol in Wireless Sensor Network Sushma.P, Y.V Adi Satya Narayana | IJRCSE/V2/2-201 |  |
| 2 | Analysis of Authentication Schemes for Filtering Injected False Data in WSN N Kumar Babu.M, Y.V Adi Satya Narayana | IJRCSE/V2/2-202 |  |
| 3 | A Novel Approach for Detecting the Smile Yalamanda Rao.Vemula, Subba Reddy.Borra P.P.S Nayak | ijrcse/22/1/203 |  |
| 4 | Automatic Image Pixel Clustering using Genetic Algorithms Koreddi Venkatesh, G.Sudhakar, A.Prakashnipr | IJRCSE/V2/2-204 |  |
| 5 | Efficiently Prediction of Collective Behavior of a User in Social Network Bitra.Nagendra babu, S.Rajesh | IJRCSE/V2/2-205 |  |
| 6 | Developing a Generic Model and Ordering Test Cases for Embedded Software V.Srilakshmi, M.Satyanarayana, B.Srivara Prasad | IJRCSE/V2/2-206 |  |
| 7 | Modelling of Web Content using Social Tagging Systems Venkata Sri Harsha Karna, G.Satish | IJRCSE/V2/2-207 |  |
| 8 | Classification of ECG Heart Beats K.Jeevan Kumar, O.Sambasiva Rao, V.Ganesh Dutt | IJRCSE/V2/2-208 |  |
| 9 | Efficiently Maintaining the Data Reliability and Consistency in Cloud System Gopi Kishore Ala, Yenumula Sankararao | IJRCSE/V2/2-209 |  |
| 10 | Efficiently Maintaining & Searching User Histories Raja Ravi Chandra.K, Yenumula Sankara Rao | IJRCSE/V2/2-210 |  |
| 11 | Entropy Based Data Compression for Effective Results in Data Transmission Reshma Penmetsa, K.N.V.Devendra Kumar | IJRCSE/V2/2-211 |  |
| 12 | An Efficient Verification of the Data Integrity Proofs in Multi Cloud Storage System A.Lakshmi, Goda.Srinivasa Rao | IJRCSE/V2/2-212 |  |
| 13 | Object Tracking in Real Time Scene Using SPARCE Coding M.V.S.Naresh, Uma Maheswara Rao | IJRCSE/V2/2-213 |  |
| 14 | Improved Version of Web Crawler for Efficient Domain Specific Search Prasanti Supriya Bhavana, K.N.V.Devendra Kumar | IJRCSE/V2/2-214 |  |
| 15 | Fastest & Efficient Searching Technique by User Login Histories G.Vasundhara, B.Subba Reddy, P.Pedda Sadhu Naik | IJRCSE/V2/2-215 |  |
| 16 | Data Security in Cloud Computing Using Digital Signature with RSA Encryption K.Raja Reddy, Dr.G.Manjunath | IJRCSE/V2/2-216 |  |
| 17 | Effectively Monitoring the Traffic Control Problems in Network Ch. Lakshmi Deepika,P.P.S.Naik | IJRCSE/V2/2-217 |  |
| 18 | An Efficient & Interactive Query Formulation Language-MashQL Rama Rao Pooti, Chinna Babu Galinki | IJRCSE/V2/2-218 |  |
| 19 | Fastest & Professional Searching Method by User Login Histories P.Venkata Lakshmi, K.Govardhana Babu | IJRCSE/V2/2-219 |  |
| 20 | Fast and Professional Recovery from Link and Node Failures in Networks T.Swarna Latha, S.Jalaiah | IJRCSE/V2/2-220 |  |
| 21 | Proficiently Maintaining the Authentication, Access and User Control in Cloud G. Sarat Babu, S.Anil Kumar, Dr P. Harini | IJRCSE/V2/2-221 |  |
| 22 | An Efficiently Mining the User Related Data Using Inductive Rule Mining Ch.Sankar, S.Anil Kumar, Dr P. Harini | IJRCSE/V2/2-222 |  |
| 23 | Effeciently Controlling the Traffic Problems in Network Poornachand Kommu, Eswar Kodali, Dr P. Harini | IJRCSE/V2/2-223 |  |
| 23 | Effeciently Controlling the Traffic Problems in Network Poornachand Kommu, Eswar Kodali, Dr P. Harini | IJRCSE/V2/2-223 |  |