RK Project Zone

Call Me now +91-9871568303

section

Research paper


JV0 The Perils of Unauthenticated Encryption: Kerberos Version 4 Java Kerberos 2016
JV1 Reliable Re-Encryption in Unreliable Clouds Java Cloud Computing 2013
JV2 Costing of Cloud Computing Services: A Total Cost of Ownership Approach Java Cloud Computing 2013
JV3 Ensuring Distributed Accountability for Data Sharing in the Cloud Java Cloud Computing 2013
JV4 Cloud Data Production for Masses Java Cloud Computing 2013
JV6 A secure erasure code based cloud storage system with secure data forwarding Java Secure Computing 2013
JV8 Policy-by-Example for Online Social Networks Java Networking 2013
JV10 Packet-Hiding Methods for Preventing Selective Jamming Attacks Java Secure Computing 2013
JV11 FADE: Secure Overlay Cloud Storage with File Assured Deletion Java Secure Computing 2013
JV12 Risk-Aware Mitigation for MANET Routing Attacks Java Secure Computing 2013
JV13 Learn to Personalized Image Search from the Photo Sharing Websites Java Multimedia 2013
JV14 Organizing User Search Histories Java Knowledge and Data Engineering 2013
JV15 Slicing A New Approach to Privacy Preserving+C39Data Publishing Java Knowledge and Data Engineering 2013
JV16 Ranking Model Adaptation FOR DOMAIN-SPECIFIC SEARCH Java Knowledge and Data Engineering 2013
JV17 Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Java Parallel and Distributed Systems 2013
JV18 Trust modeling in social tagging of multimedia content Java Multimedia 2013
JV19 RIHT: A novel hybrid IP trace back scheme Java Multimedia 2013
JV20 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks Java Wireless Communications 2013
JV21 Cut Detection in Wireless Sensor Networks Java Wireless Communications 2013
JV22 Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences Java International Conference (science) 2013
JV23 Efficient Computation of Range Aggregates against Uncertain Location Based Queries Java International Conference 2013
JV24 Statistical Entity Extraction from Web Java International Conference 2013
JV25 Efficient Similarity Search over Encrypted Data Java International Conference (science) 2013
JV26 Scalable and cost-effective interconnection of data-center servers using dual server ports Java Networking 2013
JV27 Caching Strategies Based on Information Density Estimation in Wireless Adhoc Networks Java Networking 2013
JV28 Modeling and Detection of Camouflaging Worm Java Networking 2013
JV29 Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Java Networking 2013
JV30 Clustering with Multi-Viewpoint based Similarity Measure Java Networking 2013
JV31 Sketch4Match  Content-based Image Retrieval system using sketches Java Image Processing 2013
JV32 Embedded Extended Visual Cryptography Schemes Java Secure Computing 2013
JV33 Competitive Study of Cryptography techniques over block Cipher Java Secure Computing 2013
JV34 Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations Java Knowledge and Data Engineering 2013
JV35 Architecting a secure enterprise data sharing Environment to the edge Java Secure Computing 2013
JV36 Analysis on Credit Card Fraud Detection Methods Java Secure Computing 2013
JV37 Subspace-Based Striping Noise Reduction in Hyper spectral Images Java Image Processing 2013
JV38 Intrusion detection An Energy efficient approach in Heterogeneous WSN Java Secure Computing 2013
JV39 Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service Java Networking 2013
JV40 Geographical Routing With Location Service in Intermittently Connected MANETs Java Networking 2013
JV41 Resource Management Using Dynamical Load Prediction and Multiprocessor Cooperation Java Networking 2013
JV42 On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents Java Networking 2013
JV43 Mobile Sampling of Sensor Field Data Using Controlled Broadcast Java Networking 2013
JV44 Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization Java Networking 2013
JV45 Enabling Public Audit ability and Data Dynamics for Storage Security in Cloud Computing Java Cloud Computing 2013
DN1 Robust Face-Name Graph Matching for Movie Character Identification Dot Net Multimedia 2013
DN3 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Dot Net Cloud Computing 2013
DN5 Topology Control in Mobile Ad Hoc Networks with Cooperative Communications Dot Net Wireless Communications 2013
DN6 AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies Dot Net Wireless Communications 2013
DN7 Efficient Audit Service Outsourcing for Data Integrity in Clouds Dot Net Cloud Computing 2013
DN9 View-invariant action recognition based on Artificial Neural Networks Dot Net Neural Networks 2013
DN10 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Dot Net Image Processing 2013
DN11 Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing Dot Net Cloud Computing 2013
DN12 Scalable Scheduling of Updates in Streaming Data Warehouses Dot Net Knowledge and Data Engineering (DM) 2013
DN13 Efficient and Discovery of Patterns in Sequence Data Sets Dot Net Knowledge and Data Engineering (DM) 2013
DN16 Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms. Dot Net Networking 2013
DN18 Investigation and Analysis of New Approach of Intelligent Semantic Web Search engines. Dot Net Parallel and Distributed Systems 2013
DN19 Data Integrity Proofs In Cloud Storage Dot Net Cloud Computing 2013
DN20 A Personalized Ontology Model For Web Information Gathering Dot Net Data Mining 2013
DN21 A Query Formulation Language for the Data Web Dot Net Data Mining 2013
DN22 A Web Search Engine Based Approach to Measure Semantic Similarity Between Words Dot Net Data Mining 2013
DN23 Adaptive Provisioning Of Human Expertise In Service-Oriented Systems Dot Net Data Mining 2013
DN24 Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems Dot Net Data Mining 2013
DN25 Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud Dot Net Data Mining 2013
DN26 Exploring Application-Level Semantics For Data Compression Dot Net Data Mining 2013
DN27 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Dot Net Data Mining 2013
DN29 One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases Dot Net Data Mining 2013
DN30 Optimal Service Pricing For A Cloud Cache Dot Net Data Mining 2013
DN31 Publishing Search Logs A Comparative Study Of Privacy Guarantees Dot Net Data Mining 2013
DN32 Fuzzy-Zoning-Based Classification for Handwritten Characters Dot Net Fuzzy Systems 2013
DN33 Adaptive Spectral Transform for Wavelet-Based Color Image Compression Dot Net Image Processing 2013
DN34 Blind Image Watermarking Using a Sample Projection Approach Dot Net Information forensics And Security 2013
DN35 Histogram Specification: A Fast and Flexible Method to Process Digital Images Dot Net Instrumentation And Measurement 2013
DN36 Mining Web Graphs for Recommendations Dot Net Knowledge And Data Engineering 2013
DN37 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators Dot Net Knowledge And Data Engineering 2013
DN38 Scalable Learning of Collective Behavior Dot Net Knowledge And Data Engineering 2013
DN39 Bridging Socially-Enhanced Virtual Communities Dot Net Networking 2013
DN40 Unified Approach To Optimizing Performance in Networks Serving Heterogeneous Flows Dot Net Networking 2013
DN41 A More Secure Steganography Method in Spatial Domain Dot Net Secure Computing 2013
DN42 NABS Novel Approaches for Biometric Systems Dot Net Secure Computing 2013