IRJCS: Volume 4, Issue 5 of May 2017
SPECIAL ISSUE
S.No. | Title & Author Details | Paper ID |
01. |
Solar Powered Green House Monitoring and Controlling using AWS Cloud by Android Application Authors:Mamatha C.R, Abhishek Kumar Singh, Shazia Amreen |
MYCSSP10091 |
02. |
A Survey on Network Security Issues Authors:Ruma Panda, Lavanya S, Monika N |
MYCSSP10092 |
03. |
Secure Authentication Scheme for Distributed Cloud Computing Authors:Brundha Elci J, Manisha K R, D M Pooja, Divya H D |
MYCSSP10098 |
04. |
Home Monitoring System Using RP Device Authors:Mrs. Sudha D, Mr. Sharveshwaran R, Ms. Atiya Fathima, Ms. Anusha B S, Mr. Vijay Kumar U |
MYCSSP10100 |
05. |
Security for Mobile ADHOC Network using Intrusion Detection System Authors:Roopa Lakshmi S, Anusha V G, Anushree S A ,Gowthami B S , Chaithra T S |
MYCSSP10103 |
06. |
-Arpitha T G, Aishwarya Anil Shanbhag, Krishna Raj KK, Jayashree L K |
MYCSSP10105 |
07. |
Authors:MANJUSHREE C.V, S M Y ALTAMASH |
MYCSSP10107 |
08. |
Survey on MANET’s Mobility Models and Security Attacks for Routing Protocols Authors:Mamatha C.R, Ankit Chaurasia, A.Rishi Akil |
MYCSSP10117 |
09. |
A Survey on IoT Solutions Concerning Healthcare Authors: Ruma Panda, Nabeela Anjum, Aisha Siddiqa, Chirag Beta |
MYCSSP10116 |
10. |
Enhancing Throughput using Coverage Protocol and Secure Data Assemblage in Wireless Sensor Networks Authors:Kantharaju .H.C, Dr. K.N. Narasimha Murthy, Dr. M. Ramakrishna |
MYCSSP10130 |
11. |
Secure Energy Optimization with Data Integrity Assurance in Wireless Sensor Networks – A Survey Authors:Kantharaju .H.C, Dr. K.N. Narasimha Murthy |
MYCSSP10131 |
12. |
Scope and Challenges in Li-Fi Technology Authors:Rachitha M V, Harsha H L, Bandi Krishna Reddy |
MYCSSP10085 |
13. |
FOG COMPUTING: MITIGATING INSIDER DATA THEFT ATTACK IN PRIVATE CLOUD Authors:Manjushree C.V, Raghu R ,Priyadarshini S ,Roshini Maria A |
MYCSSP10086 |
14. |
Enhanced SEaaS to Provide Better Security for Data in Cloud Computing Environment Author:Rachitha M.V |
MYCSSP10087 |
15. |
Authors:Priyadarshini S, Shilpa G.V |
MYCSSP10088 |
16. |
Big Data and its implication on Social media and Electoral Process Authors:Rachitha M V, Manish Parasher, Mohan Krishna Ponduri |
MYCSSP10089 |
17. |
Artificial Intelligence: Its Applications and Various Issues Authors:Rachitha M V, Eshan Kumar, Chandra Mouli Gupta |
MYCSSP10090 |
18 |
Effective Anonymous Data Sharing with Forward Security in Cloud - A Survey Authors:Mary Vidya John, G. Keerthana, Giridharan R., J. Suchith Samuel, Mitali M. Javkar |
MYCSSP10094 |
19. |
Authors:Ms.Rekha M, Samana V,Rakshitha R, |
MYCSSP10095 |
20. |
MORDERNIZING LEARNING ENVIRONMENT USING CLOUD COMPUTING ENVIRONMENT Authors:Ms. Rekha. M, Ms. Payal Sharma , Ms. Yamini Singh ,Vandana V |
MYCSSP10096 |
21. |
Time Based Resource Scheduling At Phase Level of Map Reduce Framework Authors:Mary Vidya John, J Brundha Elci, Sudha D |
MYCSSP10099 |
22. |
Real Time Vehicle Tracking System Authors:Anirudh Karthik, Jayashree L K |
MYCSSP10101 |
23. |
Cloud based File and Letter Management System (FiLMS) Authors:Mrs. SHILPA G V, Megha S, Nithin Kashyap N, S M Y ALTAMASH |
MYCSSP10102 |
24. |
Survey on Dynamic Ownership Management for Secure Data De-duplication Authors:Ms Vijaya SC, P Vasavi, R Bhavitha Reddy, K Swetha Kumari, |
MYCSSP10104 |
25. |
Authors:Noor Basha, Kavya N, Manjushree K, Arogyasheela A, Bhavana T, |
MYCSSP10106 |
26. | Design and Implementation of Dual Network Security Based Using Signature on Packets Authors:Ashwini M,SukruthaS, Suma Reddy, Syed Zaid Ahmed,Vinay Christopher |
MYCSSP10108 |
27. |
Cloud Data Auditing With a Focus on Privacy and Security Authors:Anirudh Karthik, Aruna Reddy H |
MYCSSP10110 |
28. |
AUTOMATIC ACTIVATION OF DEVICES USING ROLE BASED IOT Authors:Jagadamba.A, Vijayavani.K, Samyama.G.J, Ranjitha.P, Niveditha.K |
MYCSSP10112 |
29. |
SMART SHOPPING USING AUGMENTED ENVIRONMENT Authors:Ms. Rekha. M, Ms. Arshiya Tabreen, Ms. Banita Sei |
MYCSSP10113 |
30. |
A Survey on SET-IBS and SET-IBOOS Protocols for Cluster-Based WSN Authors:Namana B.L, Megha Nayak, Vidya S, Nivedha N, Kantharaju H.C |
MYCSSP10114 |
31. |
Authors:Rajanna M, Rabiya fathima , Priyanka Yadav R |
MYCSSP10115 |
32. |
ANALYSIS OF SECURITY SOLUTIONS FOR INDUSTRIAL CONTROL SYSTEMS Authors:Dayanand Kumar , Goutham J , Chaitra B R |
MYCSSP10118 |
33. |
Big Data Mining For Uncertain Data Authors:J Brundha Elci ,Madhavi J R ,Abinaya S ,Manjesh M ,Kushal G S |
MYCSSP10119 |
34. |
SURVEY ON FAST SEARCH IN SPATIAL DATABASE USING KEYWORD Authors:Smt. Veena .G, Anil kumar B M, Bharath Babu N, Manjunath K |
MYCSSP10120 |
35. |
ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS Authors:R.Niveditha, Vinuta Tigadi Basavaraj |
MYCSSP10121 |
36. |
Intelligent Energy Routing Protocol in Wireless Sensor Networks Authors:Dr S Ambareesh, Prathibha J, Samina Sultana Begum |
MYCSSP10122 |
37. |
A Smart Garbage Dumping Vehicle Authors:Dr S Ambareesh, Shivarani S, Supriya K |
MYCSSP10123 |
38. |
Authors:Vijaya S C, Shreya N, Shiksha, Aneesh Krishna R |
MYCSSP10124 |
39. |
INTRODUCTION TO VEHICULAR ADHOC NETWORKS (VANET): REVIEW Authors:Nidhi, D.K.Lobiyal |
MYCSSP10125 |
40. |
Cloud Computing and Its Issues Authors:Rachita M V, Keerthana K N, M Sai Chakradhar Reddy,Nishanth Reddy Dasari |
MYCSSP10126 |
41. |
Energy efficient routing in MANET Authors:Dr. M Ramakrishna, Akshay Kumar B Kulkarni, Ashwary Gupta, K Vidhyashree, Nikitha S |
MYCSSP10127 |
42. |
Authors:Monica.C, Nithya.R, Prarthana.M, Sonika.S.V, Dr.M.Ramakrishna |
MYCSSP10128 |
43. |
Security Model for Social Media to Block Unauthorized User Authors:Anil Kumar, Bharath Kumar,Joel, Anees Anthapur,Karthik M |
MYCSSP10129 |
44. |
Android Application for Safe and Efficient Search over cloud Authors:Anil Kumar, Roopalakshmi S and S V Krishna Reddy |
MYCSSP10080 |
45. |
SURVEY ON TECHNOLOGIES USED IN DISASTER RESCUE Authors:Ms. Rekha. M, Ms. Maknojia Insiya , Ms. Anjali Pal |
MYCSSP10082 |
46. |
Student Management System – A Survey Authors:Krithi P, Dr M Ramakrishna |
MYCSSP10083 |
47. |
A Survey on Security Mechanisms and its Consequences in Cloud Computing Authors:Manjushree.C.V, Dr. A. N. Nandakumar |
MYCSSP10084 |
48. |
Text to Speech for the Visually Impaired Authors:Mrs.Shilpa Reddy K, Mounika S.K,Pooja K , Sahana N |
MYCSSP10093 |
49. |
Student Information System Management and Monitoring Authors:Mrs. Manjushree C.V , Asst. Professor, Debashreesen, H.S Vindhya, Jasti Priyanka, Mula Raveena Reddy, |
MYCSSP10097 |
50. |
Secured Location Sharing Services for Social Networks Authors:Jayaprabha M S,Krupa R,Lavanya K M, Mamatha K,Jagadamba A |
MYCSSP10109 |
51. |
An Ameliorated Methodology to Compute Maximum Flow in a Flow Network Authors:Dr. Shivanand M. Handigund,Ms. Arunaumari B. N. ,Dr. Ajeet Chikkamannur, |
MYCSSP10111 |
52 |
Smart City & Internet of Things Authors: Alshafie Gafaar Mhmoud Mohmmed ,Saife Eldin Fatoh Osman | MYCS10082 |
53 |
Authors: Fajar Masya Hendra Prastiawan Destriyani Putri | MYCS10083 |