Untitled Document
ISSN 2321-5461(Online)

INTERNATIONAL JOURNAL OF REVIEWS ON RECENT
ELECTRONICS AND COMPUTER SCIENCE

INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE(Volume-1,Issue-7)
Sl.NOPaper TitlePaper IDDownload
1.IMPLEMENTATION OF THE ROUTING TOPOLOGIES RELATED TO THE SYSTEM OF VIRTUALIZATION
B.V.Prasanthi, M.Sumalatha
IJRRECS/V-1/I-6/01
2.AN EFFECTIVE STRATEGY OF IMPLEMENTATION OF NYMBLE AGAINST MISBEHAVING USERS
Balakrishna Varikuntla, J.Ravi Kumar
IJRRECS/V-1/I-6/02
3.AN EFFECTIVE IMPLEMENTATION OF THE SYSTEM FOR THE DATA PROTECTION
Ch.Swapna, S.Aparna
IJRRECS/V-1/I-6/03
4.AN EFFICIENT HIERARCHY CONCEPT OF THE RESULTS ORIENTED QUERY OF NAVIGATION
P.Avanthika, Dr.V.Murali Mohan
IJRRECS/V-1/I-6/04
5.DEFENDING WEB APPLICATIONS BY MEANS OF SYNTAX-AWARE ASSESSMENT
K.Uday Kiran, Y.Sangeetha
IJRRECS/V-1/I-6/05
6.DESIGN OF DATA CLASSIFICATION BY ADVANCED CLUSTERING TECHNIQUES
G.Lavanya, M.Sowjanya
IJRRECS/V-1/I-6/06
7.A REVIEW ON EFFICIENT ROUTING TECHNIQUE FOR HIGH RELIABILITY SENSOR NETWORKS
A.Partha Sarathi, Dr.A.Nagesh
IJRRECS/V-1/I-6/07
8.EFFICIENT PREFERENCES OF THE QUALITY ANALYSIS USING SPATIAL RANKING
M.Swetha, M.Sridevi
IJRRECS/V-1/I-6/08
9.EFFICIENT ANALYSIS OF DATA SHARING BASED ACCOUNTABILITY OF DISTRIBUTION
R.Prathima, Pavan Kumar
IJRRECS/V-1/I-6/09
10.DESIGN OF MALWARE SPREAD ORIENTED DECENTRALIZATION BASED P2P DYNAMIC NETWORKS
G.Krishna Chaitanya, G.Anil Kumar
IJRRECS/V-1/I-6/10
11.AN ADVANCE TECHNOLOGY IN ENERGY DISTRIBUTION MANAGEMENT SYSTEM
Chinta Akshitavalli, M.Ravindra Babu, M.Gurunadha Babu
IJRRECS/V-1/I-6/11
12.AN EFFICIENT NAVIGATION TEST BASED REMOTE CONTROL STRATEGY
Rudra Anil Kumar, G.Murali Krishna, S.Chandra Sekhar
IJRRECS/V-1/I-6/12
13.A SECURE REPRESENTATION TOWARDS A DATA HIDING SYSTEM
Yunuspasha Mohmad, Abdul Majeed
IJRRECS/V-1/I-6/13
14.ADVANCEMENT TOWARDS IDENTIFICATION OF BLURRED FACES
K.Suvarna Kumari, T.Sudhir
IJRRECS/V-1/I-6/14
15.MINING OF CONTROLLED DATA FROM WEB PAGES
Y.China Subbarao,D.Srinivas
IJRRECS/V-1/I-6/15
16.DESIGN OF OPPORTUNISTIC ROUTING SCHEME IN ADAPTIVE AD HOC NETWORKS
Gayatri Ratna Atluri, Shaik Habeeb
IJRRECS/V-1/I-6/16
17.VLSI ARCHITECTURE DEVELOPMENT FOR ADVANCEDENCRYPTION STANDARD
V.Durgaprasada Reddy, S.Jyothirmayee
IJRRECS/V-1/I-6/17
18.ONE TIME PASSWORD APPLICATION BY USING ANDROID MOBILE
K.Sai Ashritha , P.Pavan Kumar
IJRRECS/V-1/I-6/18
19.EFFICIENT LOSSY IMAGE COMPRESSION TECHNIQUE BASED ON SEAM IDENTIFICATION AND SPIHT CODING
Md. Saira Banu , Ch. Prabhucharan, A.Jose
IJRRECS/V-1/I-6/19
20.IMPROVING THE TRANSMISSION OF IMAGE BY USINGHUFFMAN ENCODING OVER MIMO OFDM FADING CHANNEL
M.Sravanthi, Sk.Rasool, A.Jose
IJRRECS/V-1/I-6/20
21.IMAGE RE-RANKING BY USING K-MEANS CLUSTERING
A.Surya Prakash Rao, Mr.M.Srujan Kumar Reddy
IJRRECS/V-1/I-6/21
22.AN EFFECTIVE IMPLEMENTATION OF THE FPGA BY THE ALGORITHM OF ADVANCED ENCRYPTION
Nirsanametla Praveen, S.Srikanth Reddy, D.M.K. Chaitanya
IJRRECS/V-1/I-6/22
23.AN EFFICIENT DYNAMIC ARBITRATION IMPLEMENTATION OF BUS MATRIX OF AHB
Srinivas Sappa, A.Renuka Narasimha, Y.Chalapathi Rao, M.Varma
IJRRECS/V-1/I-6/23
24.A NOVEL DECISION TREE ALGORITHM FOR HANDLING UNCERTAIN DATA SETS
Budida Satish Kumar, P.R.Krishna Prasad
IJRRECS/V-1/I-6/24
25.DESIGN OF THE DOUBLE GUARD INTRUSION DETECTION OF APPLICATION RELATED TO THE WEB BASED MULTI TIER
Bandi Bhavani, T.Bhaskar
IJRRECS/V-1/I-6/25
26.CONFIDENTIALITY AND ANONYMITY STRENGTHENING IN COMPUTATIONAL SERVICES
Akheel Mohammed, Sajjad Ahmed Md, Ayesha
IJRRECS/V-1/I-6/26
27.DATA AUTHENTICATION AND SECURITY PROVIDER FOR THE ASSURED DELETION OF THE FILE IN CLOUD
K.Monika, G.Balakrishna
IJRRECS/V-1/I-6/27
28.DESIGN OF NETWORKS BASED ON THE URBAN VEHICLES AGAINST THE ATTACKS OF SYBIL ORIENTED FOOTPRINT
Ch.Santhosh laxmi, G.Balakrishna
IJRRECS/V-1/I-6/28
29.HIERARCHICAL ORGANIZATION RANKING BASED QUERY RESULTS
Mallikarjuna Sarma.Rayaprolu, K.Sandhya Rani
IJRRECS/V-1/I-6/29
30.DISCOVERING INTERRUPTIONS IN WIRELESS SENSOR NETWORKS
S.Krishna Reddy, Siva Sankar
IJRRECS/V-1/I-6/30
31.SECURE SOLUTION FOR FLEXIBLE SCALABLE ACCESS CONTROL IN CLOUD COMPUTING
Radhika Ravula, Naveen Immadi
IJRRECS/V-1/I-6/31
32.AUTOMATIC SENSING OF JAMMING ATTACKS IN DYNAMIC WIRELESS AD HOC NETWORKS
Mohammad Arif C, Naveen Immadi
IJRRECS/V-1/I-6/32
33.A RAPID APPROACH FOR SEARCHING PERSONALIZED IMAGES FROM PHOTO SHARING SITES
Thandoju Shashikanth, B.S Malleswari
IJRRECS/V-1/I-6/33
34.MEASURING THE SIMILARITY ON THE DATA IN MULTI VIEW POINT CLUSTERING OPTIMIZATION SCHEMA
Vazra Kyathi, B Rakesh
IJRRECS/V-1/I-6/34
35.WIRELESS VIDEO TRANSMISSION SYSTEM BASED ON COMPRESSED SENSING
Ashwini, G.Varalakshmi
IJRRECS/V-1/I-6/36
36.DESIGN OF AN EDGE BASED NETWORK BY THE CONTROL OF PACKET LOSS
S.Nagesh, B.Prasanthi
IJRRECS/V-1/I-6/37
37.DESIGN OF TRACE BOOK SCHEME ORIENTED NOVEL HYBRID INFORMATION PACKETS
M.Santhosh Kumar, R.Srinivas
IJRRECS/V-1/I-6/38
38.CONFIDENTIAL DATA RECOVERY FOR A SINGLE DATABASE THROUGH INVARIABLE COMMUNICATION RATE
Sitarami Reddy Polimera, D.Deepika
IJRRECS/V-1/I-6/39
39.AN OVERVIEW OF FACIAL MOVEMENT FEATURES ON THE WAY TO THE DISCOVERY OF FACIAL EXPRESSION
Thallapalli Moses, P.Poornima, B.Swetha
IJRRECS/V-1/I-6/40
40.PATIENT MONITORING SYSTEM USING ZIG-BEE AND ETHERNET
Mahesh Votarikari, Sudhakar Pillodi
IJRRECS/V-1/I-6/41
41.AN ADAPTIVE INDUSTRIAL AUTOMATION APPLICATION DESIGN USING ASIC
Yadav Vajrangshakti.Ramdayal, K.Srinivasa Rao
IJRRECS/V-1/I-6/42
42.AN ANALYSIS OF GROUND BOUNCE NOISE REDUCTION IN FLIP-FLOP NETWORKS
M.Raghu, V.Sabitha
IJRRECS/V-1/I-6/43
43.EVALUATING THE USABILITY AND SECURITY OF A SPELLING BASED CAPTCHA
M.Harish, D.Baswaraj
IJRRECS/V-1/I-6/44
44.A SECURE APPROACH FOR AUTHENTICATION: BY USING 3-LEVEL SECURITY SYSTEM
M.Kiran, E.Purushotham
IJRRECS/V-1/I-6/45
45.EFFICIENT ADAPTIVE BACKGROUND SUBTRACTION BASED ON MULTI RESOLUTION BACKGROUND MODELING AND UPDATING
Harika Lakkimsetti, G.Satya Suneetha
IJRRECS/V-1/I-6/46
46.AN EFFECTIVE DESIGN OF THE IMAGE FUSION ORIENTED PIXEL LEVEL CONFIGURATION
D.Ravinder, M.Govindu, A.Rajaiah
IJRRECS/V-1/I-6/48
47.DESIGN OF ALTERNATIVE ORDERED DATA WITH MINING BASED EFFICIENCY
M.Naveena, V.Purushothama Raju
IJRRECS/V-1/I-6/49
48.RECOMMENDATION ORIENTED DATA CLASSIFICATION BASED WEB MINING
C.Samaikya, C.Rajendra
IJRRECS/V-1/I-6/50
49.DETECTING FRAUD BY THE PROACTIVE SYSTEM
R.Sumalatha, Dr.Y.S.S.R.Murthy
IJRRECS/V-1/I-6/51
50.PERFORMANCE ANALYSIS OF WEIGHTED MEDIAN FILTERTECHNIQUE FOR HIGH DENSITY SALT AND PEPPER NOISEREMOVAL
K Nareshkumar, CH Rajarao
IJRRECS/V-1/I-6/52
51.TRACKING THE MOVING OBJECT AND MORPHOLOGICAL RECONSTRUCTION OF VIDEO SEQUENCES BY USING GRADIENT AND HSV PROCESS
G Ashok Kumar, K Nagaiah
IJRRECS/V-1/I-6/53
52.CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION
Akheel Mohammed, Dr.Vasumathi, Mir Ahmed Ali
IJRRECS/V-1/I-6/54
53.DESIGN OF THE ATTRIBUTE ORIENTED KEY POLICY FOR THE DECENTRALIZATION BASED PRESERVING PRIVACY
Zareena Begum, D.Jamuna
IJRRECS/V-1/I-6/55
54.IRIS STATISTICS FOR EMBEDDED SYSTEMS
P.Parmeshwari, M.Gurunadha Babu
IJRRECS/V-1/I-6/56
55.DESIGN OF PUBLIC AUDITABILITY RELATED DYNAMICS OF THE DATA ORIENTED CLOUD COMPUTING
Akheel Mohammed, Ayesha, Muzamil Mohammed
IJRRECS/V-1/I-6/57
56.AN ADVANCE TECHNOLOGY IN DIGITAL PEN BY USING MEMS HAND GESTURE
J.Sneha Goud, G.Archana Devi , M.Gurunadha Babu
IJRRECS/V-1/I-6/58
57.ADVANCEMENT TOWARDS THE SYSTEM PROFICIENCY FOR WIRELESS MULTICAST AND BROADCAST SERVICE
Chanamala Suresh, G.Raju
IJRRECS/V-1/I-6/59
58.ASSURING OF DISTRIBUTED LIABILITY INTENDED FOR DATA CONTRIBUTION IN THE CLOUD
Rompa Kishore, Ch.Hemanand
IJRRECS/V-1/I-6/60
59.AN EXPOSURE TO THE INNOVATION SCHEMES FOR THE SIGHTING OF CREDIT CARD FRAUDS
Srinivas Reddy, M.M. Bala Krishna
IJRRECS/V-1/I-6/61
60.RECOVERING OF CONFIDENTIALITY POLICY ADMINISTRATION IN ONLINE SOCIAL NETWORKS
Prasad Mentada, A.Rama Murthy
IJRRECS/V-1/I-6/62
61.MAINTAINING OF SAFE DATA FORWARDING IN CLOUD STORAGE ENVIRONMENT
Ch.Shailender Kumar, G.Raju
IJRRECS/V-1/I-6/63
62.BUILDING OF A PROTECTED INFORMATION CONTRIBUTING ENVIRONMENT TO THE EDGE
Ratnala Shiva, Ch.Hemanand
IJRRECS/V-1/I-6/64
63.RECONFIGURING LARGE SCALE RELIABLE STORAGE SYSTEM BY USING DBQS AUTOMATICALLY
T.Santhosh Kumar, K.Chandra Sekhar
IJRRECS/V-1/I-6/65
64.DESIGN OF THE ATTRIBUTE BASED ENCRYPTION OF SHARING PERSONAL HEALTH RECORDS
Shanoob P.M, B.V Janaki Savithri
IJRRECS/V-1/I-6/66
65.DESIGN ORIENTED IMPLEMENTATION OF THE VHDL ARCHITECTURE BASED VENDING MACHINE
P.Rajani, G.Deepthi, B.Sunilkumar
IJRRECS/V-1/I-6/67
66.DESIGN OF FIR FILTER UNDER RECODING OF RADIX ORIENTED APPLICATION OF THE HIGH PERFORMANCE
Ramanjaneyulu Nalluri, G.Deepthi, B.Sunilkumar
IJRRECS/V-1/I-6/68
67.AN EFFECTIVE STRATEGY OF DESIGN ORIENTED LOW TRIGGERED POWER PULSE
Uttam Shahurao Munde, G.Deepthi, B.Sunilkumar
IJRRECS/V-1/I-6/69
68.AN EFFICIENT STRATEGY OF ENCRYPTION BASED IMPLEMENTATION OF FPGA
Virendra Vijaykumar Banale, G.Deepthi, B.Sunilkumar
IJRRECS/V-1/I-6/70
69.3D POINT CLOUD DATA OVER X3DOM
Gopi Krishna, B.V. Seshukumari
IJRRECS/V-1/I-6/71
70.AERIAL SURVEILLANCE FOR VEHICLE DETECTION USING DYNAMIC NETWORKS
Chintha Srinivasareddy, Keshapaga Vinay Kumar
IJRRECS/V-1/I-6/72
71.ANALOGOUS ENTITY MINING FROM COMPARATIVE QUERY
B.Suvarna Laxmi, U.Aswani Kumar
IJRRECS/V-1/I-6/73
72.INTERPRETATION OF CROWD SOURCING BEHAVIOURAL CONSEQUENCES
K.Shilpa, J.Jyotsna
IJRRECS/V-1/I-6/74
73.A NOVEL FEATURE SUBSET ALGORITHM FOR HIGH DIMENSIONAL DATA
S.Swetha, A.Harpika
IJRRECS/V-1/I-6/75
74.DISCOVERY OF URL PROTOTYPES INTENDED FOR WEB PAGE DE-DUPLICATION
K.Sandhya, M.Aruna
IJRRECS/V-1/I-6/76
75.A PROTECTED AND DISTRIBUTED STRUCTURE TO DISCOVER AND ALLOCATE REQUIRED INFORMATION
K.Ashok, V.Ravi Kumar
IJRRECS/V-1/I-6/77
76.AN APPROACH TOWARDS CACHE AS A SERVICE IN CLOUD COMPUTING
Ravulakollu Sreedevi, S.Rama Krishna
IJRRECS/V-1/I-6/78
77.ADVANCE TECHNOLOGY IN HEALTH CARE MONITORING SYSTEM USING WIRELESS COMMUNICATION
Aravind Ravula, Dr.Syed Musthak Ahmed
IJRRECS/V-1/I-6/80
78.DESIGN OF NOVEL AGITATION AODV ROUTING PROTOCOL FOR DEFENSE AGAINST BLACK HOLE ATTACK
T.Bhavana, M.Sowjanya
IJRRECS/V-1/I-6/81
79.DESIGN OF LOW POWER FULL ADDER USING POWER GATING SCHEME
V.Prasanth, S.Nagini
IJRRECS/V-1/I-6/82
80.IMPLEMENTATION OF SECURE CLOUD CACHE SYSTEM WITH OPTIMAL PRICING SCHEME
Santosh.C, Kolluri David Raju
IJRRECS/V-1/I-6/83
81.DESIGN OF SOLID HYBRID SECURITY PROTOCOL FOR MANET IN MILITARY APPLICATION
Bajjuri Naveen, Maheswara Reddy Sura
IJRRECS/V-1/I-6/84
82.MRI BRAIN IMAGE CLASSIFICATION USING MACHINE LEARNING APPROACH AND TUMOR DETECTION USING CLUSTERING TECHNIQUE
K.Madhukar, V.Rajesh
IJRRECS/V-1/I-6/85
83.ADAPTIVE HISTOGRAM AND INTER CHANNEL CORRELATION BASED VIDEO ENHANCEMENT
K.Devadasu, V.Lokesh Raju
IJRRECS/V-1/I-6/86
84.POWER DISSIPATION REDUCTION OF LOGIC CIRCUITS USING MTCMOS METHOD
Ch.Srikanth Reddy, A.Mohan
IJRRECS/V-1/I-6/87
85.ESTIMATION OF MOBILE TARGET IN WIRELESS SENSOR NETWORKS
K.Sravani kumara, E.Parusha Ramu, K.Asho Banu
IJRRECS/V-1/I-6/88
86.XBEE BASED SMART SENSOR NETWORK FOR MONITORING AN AGRICULTURAL ENVIRONMENT
Bollam Vinay Kumar,K. Raj kumar, Dr .Syed Musthak Ahmed
IJRRECS/V-1/I-6/89
87.INTERACTIVE IMAGE RETRIEVAL PROCESS THROUGH SEMI SUPERVISED BIASED MAXIMUM MARGIN ANALYSIS METHODOLOGY
S.Laxmi Narayana, B.Malathi
IJRRECS/V-1/I-6/90
88.EXPERTISE THE ENERGY FOR VLSI CIRCUIT DESIGN USING ADIABATIC PROCESS
R.Swapna, Mr.Shoban Mude
IJRRECS/V-1/I-6/91
89.DATA SHARING ON ENTRUSTED STORAGE WITH ATTRIBUTE BASED ENCRYPTION
G.Nani Babu, Balaji Loyisetti
IJRRECS/V-1/I-6/92
90.COMPETENT PATTERN RECOGNITION INTENDED FOR TEXTMINING
A.Manasa, D.Madhavi Devi, P.Prakash, Ch.Srinivasulu
IJRRECS/V-1/I-6/93
91.AN APPROACH TOWARDS THE LOAD BALANCING STRATEGY FOR WEB SERVER CLUSTERS
B.Divya Bharathi, N.A. Muneer, P.Prakash, Ch.Srinivasulu
IJRRECS/V-1/I-6/94
92.LIABILITY FOR DATA DISTRIBUTION IN CLOUD COMPUTING
B.Navaneetha, D.Madhavi Devi, P.Prakash, Ch.Srinivasulu
IJRRECS/V-1/I-6/95
93.AN APPROACH TOWARDS HIGH PERFORMANCE DATACOMPRESSION SYSTEM
E.Mothilal, P.Prakash, Ch.Srinivasulu
IJRRECS/V-1/I-6/96
94.INTERACTIVE IMAGE RETRIEVAL USING BMM AND SEMI BMM ANALYSIS
K.Hari Krishna, P.Prakash, Ch.Srinivasulu
IJRRECS/V-1/I-6/97
95.FACILITATING OF PROFICIENT KEYWORD SEARCH IN CLOUD COMPUTING
K.Shashidhar, D.Madhavi Devi, P.Prakash, Ch.Srinivasulu
IJRRECS/V-1/I-6/98
96.PROFICIENT JAMMING AND PROSPECT OF WIRELESS SENSORS NETWORKS
Swati Bommakanti, P.Prakash, Ch.Srinivasulu
IJRRECS/V-1/I-6/99
97.AN EFFECTIVE STRATEGY OF NETWORK RELATED OT AD HOC PHENOMENA IN ALLOCATION OF REPLICA
Afshan Fatima, B.Sudhakar
IJRRECS/V-1/I-6/100
98.DESIGN OF THE APPLICATION ORIENTED WEB RELATED MULTI TIER STRATEGY OF INTRUSION DETECTION
Ameena Ali Babsail, B.Narasimhulu, B.Sudhakar
IJRRECS/V-1/I-6/101
99.EFFECTIVE AND EFFICIENT DESIGN OF MALICIOUS EMAIL BASED TARGET DETECTION
Amtul Sana Amreen, Satya, B.Sudhakar
IJRRECS/V-1/I-6/102
100.AN EFFICIENT ROUTING STRATEGY SCHEME ORIENTED ADAPTIVE OPPORTUNISTIC PHENOMENA
Hina Afzal, B.Narasimhulu, B.Sudhakar
IJRRECS/V-1/I-6/103
101.PROFICIENT CACHING INTENDED FOR VIRTUAL MACHINES IN CLOUD COMPUTING
Imreena Ali, Vishnuvardhan, B.Sudhakar
IJRRECS/V-1/I-6/104
102.LOAD REBALANCING IN LARGE-SCALE DISTRIBUTED FILE SYSTEM
S.Indira, P.Jyothi
IJRRECS/V-1/I-6/105
103.ACHIEVING RECOMMENDATION DIVERSITY THROUGH RANKING-BASED TECHNIQUES
Samala Rajashekar, R.Venkata Ramana Chary
IJRRECS/V-1/I-6/106
104.DIGITAL CONTROL FOR HOME LIGHTNING WITH ZIGBEE COMMUNICATIONS
B.Ashwini, K.Srinivasa Reddy
IJRRECS/V-1/I-6/107
105.MEMORY EFFICIENT VLSI MODULAR USING 2-D DWT BASED ON LIFTING METHOD
S.M. Sardar Bhasha, Dr.Shaik Saheb Basha
IJRRECS/V-1/I-6/108
106.AN INTRUSION DETECTION SYSTEM FOR REAL NETWORK TRAFFIC CLASSIFICATION
P.Bharani Padma, P.Kiran Sree
IJRRECS/V-1/I-6/109
107.RECOGNITION USING SECRET KEY IN IRIS FEATURES EXTRACTION AND PALM PRINT FEATURES
K.Bharath Kumar, B.Aruna
IJRRECS/V-1/I-6/110
108.AN EFFICIENT REMOVAL OF NOISE USING MDBUT FILTER
G.Dinesh Kumar, P.Vijay Gopal
IJRRECS/V-1/I-6/111
109.ACHIEVING DATA SECURITY IN WIRELESS NETWORK BY DATA AGGREGATION
Vikram Reddy Burri, Dr.S.Kalaimagal
IJRRECS/V-1/I-6/112
110.DYNAMIC OPTIMIZATION THRESHOLD MODEL APPROACH THROUGH DIGITAL MORPHOLOGY
S.V Ravi Kishore, N.Ravali
IJRRECS/V-1/I-6/113
111.DESIGN AND SIMULATION OF MTCMOS CIRCUITS
B.Priyank, Ad.Nataraj
IJRRECS/V-1/I-6/114
112.ADVANCE TECHNOLOGY FOR DETECTING THE HARMFUL GAS LEAKAGE IN VEHICLES
U.Naresh, B.Aruna
IJRRECS/V-1/I-6/115
113.AN RFID-BASED REMINDER SYSTEM AND SECURITY SYSTEM FOR SMART HOME
M.Uma Rani, A.Pradeep Kumar
IJRRECS/V-1/I-6/116
114.LIFTING BASED DISCRETE WAVELET TRANSFORM TECHNIQUE FOR IMAGE FUSION
Peddi Durga Srinivasu, Ch.Venkateswarlu
IJRRECS/V-1/I-6/117
115.FPGA IMPLEMENTATION OF LIFTING DWT BASED LSB STEGANOGRAPHY USING MICRO BLAZE PROCESSOR
B.Vidheya Raju, B.Vasantha Lakshmi
IJRRECS/V-1/I-6/118
116.DETECTION OF HUMAN MOTION BASED ON BACKGROUND SUBTRACTION METHOD USING MORPHOLOGICAL FILTERING ON FPGA
Ch.Venkateswarlu, G.Lokesh Kumar
IJRRECS/V-1/I-6/119
117.PROFICIENT TOPOLOGY FOR REDUCING DATA LOSS IN WIRELESS NETWORKS
Haritha Chekuru, K.Roshan, Ch.Srinivasulu
IJRRECS/V-1/I-6/120
118.DESIGN, IMPLEMENTATION AND EVALUATION OF KNOW LEDGE BASED AUTHENTICATION MECHANISM USING PERSUASIVE CUED CLICK POINTS
M.Adinarayana, V.Krishna Reddy, Ch.Srinivasulu
IJRRECS/V-1/I-6/121
119.DESIGN AND IMPLEMENTATION OF ROBOT THROUGH BI-DIRECTIONAL
Mohammed Azeem, Ch.Sridevi Reddy
IJRRECS/V-1/I-6/122
120.A SECURE AUTHENTICATION SYSTEM BY USING THREE LEVEL SECURITIES
K.Anjanelu, D.Baswaraj
IJRRECS/V-1/I-6/123
121.IDENTIFYING AND HANDLING OF FALSE ALARM IN SELFISH REPLICA ALLOCATION
C.R.Priyadarshini, Sudeshana
IJRRECS/V-1/I-6/124
122.WEB BASED RE-RANKING BY USING K-MEANS
M.L.Kiranmaye, Aaluri Seenu, P. R. Sudharani
IJRRECS/V-1/I-6/125
123.COOPERATIVE COMMUNICATION FOR TOPOLOGICAL CONTROL IN MANETS
Narsa Reddy, Keshapaga Vinay Kumar
IJRRECS/V-1/I-6/126
124.MULTIMODAL INTERACTION FOR SERVICE ROBOT CONTROL
Vadije Uday, K.Vijaychand
IJRRECS/V-1/I-6/127


Untitled Document