| 1 | Data Extraction User Used Information In Online Shaik Sher Ali , Shahida Shaik | IJRCSE/V4/4-801 |  |
| 2 | Balanced Usage of Provable Data Possession (PDP) in Cloud for Effective Functioning I.Naresh, G.Mallikharjuna Rao | IJRCSE/V4/4-802 |  |
| 3 | Minersoft and its Features for Efficient Working of Cloud Narne Srikanth, E.Sambasiva Rao | IJRCSE/V4/4-803 |  |
| 4 | Effective Controlling of Video Traffic by using Scalable Video Code D.Prasannanjaneyulu, K.Swarooparani | IJRCSE/V4/4-804 |  |
| 5 | Dynamic Mobile Streaming in Cloud Mov for Encoding Services D.Venkatesh Babu, E.Sambasiva Rao | IJRCSE/V4/4-805 |  |
| 6 | Dynamic Authentication for Virtual Machine in Cloud Computing using SIP Servers M. Radhika, SK.Shahida | IJRCSE/V4/4-806 |  |
| 7 | Attribute-Based Encryption for Access Control of Outsourced Data in Cloud Computing A. Adi Lakshmi, K. Sudhakara Babu | IJRCSE/V4/4-807 |  |
| 8 | Functional Usage Observation Node Position In Wireless Sensor Networks B.Prathusha , E.Sambasiva Rao | IJRCSE/V4/4-808 |  |
| 9 | Dynamic Crowd Sourcing using Active Learning Approach I.Sruthi, N. Hari Krishna | IJRCSE/V4/4-809 |  |
| 10 | Dynamic GPS Settings in User Search Histories P.Lakshminarayana, G.Mallikharjuna Rao | IJRCSE/V4/4-810 |  |
| 11 | Extracting Feedback Process Generation In Customized System Operations In Online Social
Networks M.Radhika, N.Hari Krishna | IJRCSE/V4/4-811 |  |
| 12 | Preventing Unauthorized Information Inference Attacks on Social Networks K.Praveena, K.Swaroopa Rani | IJRCSE/V4/4-812 |  |
| 13 | Dynamic Message Authentication in OSN Networks D.Nalini, K.SudhakaraBabu | IJRCSE/V4/4-813 |  |
| 14 | Information Security Using Cryptography Techniques In Steganography Applications K.Pavani Srivalli, E.Sambasiva Rao | IJRCSE/V4/4-814 |  |
| 15 | A Synchronized Processing on Vampire Attacks Using MAC Protocols S. Bala Gopala Raju, N. Veeranjaneyulu | IJRCSE/V4/4-815 |  |
| 16 | Maintains Construction Development Through Predictability Study N.Avinash, N.Veeranjaneyulu | IJRCSE/V4/4-816 |  |
| 17 | Cross Domain Privacy Preserving Firewall Optimization Using Secure Multi-Party Computation In Networks Raghavendrao. Birapuneni, N. Hari Krishna | IJRCSE/V4/4-817 |  |
| 18 | Safety Locate Formations Identification System For Improvised Mobile Wireless Networks Kethineni Satyanarayana, N. Hari Krishna | IJRCSE/V4/4-818 |  |
| 19 | A Secure Multi-Hop Routing In Wireless Sensor Networks K.Saidi Reedy, N.Satish | IJRCSE/V4/4-819 |  |
| 20 | Improved AFAST Clustering based FeatureSelection using Genetic Algorithm Y. Siva Kumar, G. John Samuel Babu | IJRCSE/V4/4-820 |  |
| 21 | Implementing characteristic Selection Algorithm for High Dimensional Data Using Self-Supervised
Learning and Fuzzy Logic Kulkarni Tejaswini, Lalitha Manglaram | IJRCSE/V4/4-821 |  |
| 22 | Multidimensional Reduction Principal Component Analysis for Anomaly Detection V.Neelima,G.L.Sravanthi, V.Tejaswi | IJRCSE/V4/4-822 |  |
| 23 | An Effective Classification System to Detect Packed and Encrypted Malware C.Deepika, A.Swarna, Ravi Mathey | IJRCSE/V4/4-823 |  |
| 24 | Information Security Using Human Visual System Model in Steganography Applications P.kiranmaie, R.Phani Kishore | IJRCSE/V4/4-824 |  |
| 25 | A Review of Implementing Web Mining and Knowledge Discovery of Usage Patterns for Personalization and Usage Mining Gujarathi Alaikya, Anitha sri ramoju | IJRCSE/V4/4-825 |  |
| 26 | Micro data Protection Using Tuple Grouping Components Mundru.Govindarajulu, Jetty Kiran Kumar, M. Swati | IJRCSE/V4/4-826 |  |
| 27 | Solving Optimality and Storage Constraint Problem in Data Staging using Dynamic Programming B.Naga Anusha, M. Narasimha Raju | IJRCSE/V4/4-827 |  |
| 28 | Secured Query Processing By Optimizing Performance Factors P. S. S. N. Madhuri, P. J. R. Shalem Raju | IJRCSE/V4/4-828 |  |
| 29 | Dynamic Site Distribution and Factor Balancing for Privacy Preserving Information Brokering Siva Sankar Siripurapu, T.Nirosh kumar | IJRCSE/V4/4-829 |  |
| 30 | Providing Security in Public Auditing for Cloud Storage P.Neelima, B.Rajini Kanth | IJRCSE/V4/4-830 |  |
| 31 | An Efficient Security Scheme against Vampire Flacks in Ad Hoc Sensor Networks Dr S.V.N.Srinivasu | IJRCSE/V4/4-831 |  |
| 32 | Trickling of Undesirable Messages in Online Social Networks Using Content based Message Filtering
and Short Text Classifier Dr S.V.N.Srinivasu | IJRCSE/V4/4-832 |  |
| 33 | Association rule mining based on Product Sales Algorithm Sampath Kumar Kommineni, S.N.Tirumala Rao | IJRCSE/V4/4-833 |  |