Research Article: IJIRCCE |
OTP Encryption Techniques in Mobiles for
Authentication and Transaction Security |
Dr.AnanthiShesashaayee, D. Sumathy |
|
|
|
Research Article: IJIRCCE |
Hot Topics Perception in Social Network |
Kayalvizhi P, Anoor Selvi C |
|
|
|
Research Article: IJIRCCE |
Dijkstra?s Shortest Path Algorithm for Road
Network |
K.Rohila, P.Gouthami, Priya M |
|
|
|
Research Article: IJIRCCE |
Enhancing the Performance of Mining High
Utility Itemsets Based On Pattern Algorithm |
Ranjith Kumar. M, kalaivani. A, Dr. Sankar Ram. N |
|
|
|
Research Article: IJIRCCE |
Designing Of Fast Multipliers with Ancient
Vedic Techniques |
Jeevitha.R, Jayanthi.P, Gowthami A.K, Uvarajan K.P |
|
|
|
Research Article: IJIRCCE |
A Neoteric Approaches To Efficient Data
Transmission and Avoid Address Collision in
Wireless Network Interface |
Ramya Devi.S, Senthil Murugan. N |
|
|
|
Research Article: IJIRCCE |
To Enhance the Network Lifetime Based On
EDIT Algorithm in Wireless Sensor Networks |
Suriya Jochi .T, S.Senthil, |
|
|
|
Research Article: IJIRCCE |
Challenges to Privacy and Risk Oriented
RFID System Implementation in Libraries |
Nitumika Gogoi |
|
|
|
Research Article: IJIRCCE |
A Survey of Clustering In Mobile Ad-Hoc
Networks |
K.Madhu Pavan, Dr.syed umar, P.V.Avinash Reddy, Munnangi.Chandradeep |
|
|
|
Research Article: IJIRCCE |
A Survey of Associate Access Points to
Increase the Performance of IEEE 802.11
Wirelesses LAN |
Tipirneni Venkata Satyanarayana, Dr.syed umar, Devagiri Sayee Chaitanya Reddy, Harshad Mahatha.Shaik |
|
|
|
Research Article: IJIRCCE |
Efficient Content Based Image Retrieval
System in Visual Words, Color and Edge
Directive Descriptors and Fuzzy Color and
Texture Histogram |
K. Haridas, Dr. Antony SelvadossThanamani |
|
|
|
Research Article: IJIRCCE |
Comprehensive and Comparative Analysis of
Cryptographic Solutions in Cloud |
P.Madhubala , Dr.P.Thangaraj |
|
|
|
Research Article: IJIRCCE |
A Proportional Learning on Sink, Warm Hole
Attacks with Prevention Algorithms in Wireless
Sensor Networks PLSWHA-WSN |
Savitha Devi.M, Dr.P.ThangaRaj |
|
|
|
Research Article: IJIRCCE |
Advanced Data Access Scheme in Disruption
Tolerant Network |
S.Revathi , A.P.V.Raghavendra |
|
|
|
Research Article: IJIRCCE |
A Survey of Random Routing Protocol for
Load Reduction in MANET's |
Tipirneni Venkata Satyanarayana, Dr.syed umar, Vunnam Naresh, Pillarisetty vivek |
|
|
|
Research Article: IJIRCCE |
Advanced Data Access Scheme in Disruption
Tolerant Network |
S.Revathi , A.P.V.Raghavendra |
|
|
|
Research Article: IJIRCCE |
A Novel Cloud based Mobile Social TV |
Srilatha Pavuluri and S.Sravani and Kadiyala Ramana |
|
|
|
Research Article: IJIRCCE |
Neighbour Position Discovery and Verification
in MANETs |
S.Feroz Ahammad and M.Vikram and Kadiyala Ramana |
|
|
|
Research Article: IJIRCCE |
Mitigation of Vampire Attacks in Wireless
Sensor Networks |
M.Nageswara Prasadhu, D.V.Bharath and G.Lakshmikanth |
|
|
|
Research Article: IJIRCCE |
Mobile Social TV based on Cloud |
Rajesh Mallela, K.Rajsekhar Reddy and M.Subba Rao |
|
|
|
Research Article: IJIRCCE |
The Feasibility of SET-IBS and SET-IBOOS
Protocols in Cluster-Based Wireless Sensor
Network |
R.Anbarasi, S.Gunasekaran |
|
|
|
Research Article: IJIRCCE |
A Survey of Cloud Authentication Attacks and
Solution Approaches |
B.Sumitra, C.R. Pethuru, M.Misbahuddin |
|
|
|
Research Article: IJIRCCE |
An Efficient Attack Resistance Model Using
Application Based Polynomial Distribution |
Vince Paul, Dr. K. Prasadh, Jasmy Davies |
|
|
|
Research Article: IJIRCCE |
Social Networks Privacy-Preserving On
Collaborative Tagging and Spam Filter Using
Naive Bayes Algorithm |
L.Sundarrajan, S.Gunasekaran |
|
|
|
Research Article: IJIRCCE |
The Use and Industrial Importance of Virtual
Databases |
Dr V S Dhaka, Sonali Vyas |
|
|
|
Research Article: IJIRCCE |
Efficient and Secure Route Discover by Stability
Link Selection of Neighbours in MANET |
R.Santhosam, A.P.V.Raghavendra |
|
|
|
Research Article: IJIRCCE |
A Survey of Web Image Search and Re-
Ranking Technique |
B. Steffi Graph, M. Ramesh |
|
|
|
Research Article: IJIRCCE |
Responsive Communication Jamming
Detector with Noise Power Fluctuation using
Cognitive Radio |
Mohsen M. Tanatwy |
|
|
|
Research Article: IJIRCCE |
Impact of Using G.729 on the Voice over LTE
Performance |
Younes LABYAD, Mohammed MOUGHIT1, 2, Abderrahim Marzouk1, Abdelkrim HAQIQ1, 3 |
|
|
|
Research Article: IJIRCCE |
DC Chopping for High Power Application |
D.Pavithra , K.C.Anandhan |
|
|
|
Research Article: IJIRCCE |
Certain Investigations on Strategies for
Protecting Medical Data in Cloud |
V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa |
|
|
|
Research Article: IJIRCCE |
Investigations on Evolution of Strategies to
Preserve Privacy of Moving Data Objects |
P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa |
|
|
|
Research Article: IJIRCCE |
Certain Investigations on Securing Moving
Data Objects |
P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa |
|
|
|
Research Article: IJIRCCE |
A Novel Technique for Detection of CVSD
Encoded Bit Stream |
Parthraj Tripathi, Dr.K.Padma Raju, V.Ravi Chandra |
|
|
|
Research Article: IJIRCCE |
Investigations on Remote Virtual Machine to
Secure Lifetime PHR in Cloud |
V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa |
|
|
|
Research Article: IJIRCCE |
Protection of Smartphone, Personal
Computer and Other Similar Devices from
Virus Infections |
Sudhakar Singh, P.K. Khare, J.M. Keller, P. Mor, M.K. Pathak |
|
|
|
Research Article: IJIRCCE |
A Data Mining Model to Read and Classify
Your Employees? Attitude |
J John Victor Antony, G M Nasira |
|
|
|
Research Article: IJIRCCE |
Incremental Violation Detection of
Inconsistencies in Distributed Cloud Data |
S. Anantha Arulmary, N.S. Usha |
|
|
|
Research Article: IJIRCCE |
Link Quality Aware Wireless Sensor
Networks Using Adaptive Code Dissemination
Protocol |
C. Bhuvaneswari, Ellcy Priana |
|
|
|
Research Article: IJIRCCE |
Improving Ad Hoc Network Behaviour Using
Clustering T echnique with NS2 |
GhaidaaMuttasher Abdulsahib, Norrozila Sulaiman, Osamah Ibrahem Khalaf, |
|
|
|
Research Article: IJIRCCE |
Stress causing Arrhythmia Detection from
ECG Signal using HMM |
K.Vimala |
|
|
|
Research Article: IJIRCCE |
A Survey of Frequent and Infrequent
Weighted Itemset Mining Approaches |
J.Jaya, S.V.Hemalatha |
|
|
|
Research Article: IJIRCCE |
Spectral Response of FWM in EDFA for
Long-haul Optical Communication |
Lekshmi.S.R, Sindhu.N |
|
|
|
Research Article: IJIRCCE |
A Survey on Detection of Mining Service
Information Discovery Using SASF Crawler |
R.Eswaramoorthy, M.Jayanthi |
|
|
|
Research Article: IJIRCCE |
A Survey on Delegated Access Control in
Public Cloud |
V.Karthik, K.S.Arvind |
|
|
|
Research Article: IJIRCCE |
A Study on Unidentified Routing Protocols in
MANETs |
N.Saravana Selvam, R.T.Nivetha, S.S.Nevatha |
|
|
|
Research Article: IJIRCCE |
A Study of Information Extraction Tools for
Online English Newspapers (PDF):
Comparative Analysis |
M. Hanumanthappa, Deepa T. Nagalavi, Manish Kumar |
|
|
|
Research Article: IJIRCCE |
A Recent Improvements in Quantum Model
and Counter Measures in Quantum
Computing |
J.Senthil Murugan, V.Parthasarathy , S.Sathya, M.Anand |
|
|
|
Research Article: IJIRCCE |
Stateless Routing for Wireless Networks Using
Ravenous Perimeter |
Anwar Ahsan, U T Nagdeve |
|
|
|
Research Article: IJIRCCE |
Big Data Analytics Security Issues in Data
Driven Information System |
M. Chithik Raja, Munir Ahmed Rabbani |
|
|
|
Research Article: IJIRCCE |
Improvement of Energy Efficiency in Wireless
Sensor Network Using Intelligent Water Drop |
Harshwinder Singh, Navpreet Kaur Walia |
|
|
|