S. No Paper Title Paper ID Download
01. A Proactive Approach to Check the Health of Network Zarina Begum,Sayeed Yasin IJDCST/01/V-3/I-7/01
02. Integrating Social Network with Cloud for Allocating and Sharing Infrastructure Resources Shaik Faheemunnisa Begum,Sayeed Yasin IJDCST/01/V-3/I-7/02
03. Authenticating Anonymously of Data Stored in Clouds with Dispersed Security Mechanism Shaik Shabeena,I.Tabitha IJDCST/01/V-3/I-7/03
04. A Secured CP-ABE Based Retrieval Method for Ad Hoc Disruption- Tolerant Military Networks Mohammad Shabnam,V.Padmaja,Mr.Sayeed Yasin IJDCST/01/V-3/I-7/04
05. Anonymous Search using Multi-Keyword Ranked on Encrypted Cloud Data Shaik Jasmine,Lavanya,Sayeed Yasin IJDCST/01/V-3/I-7/05
06. Dipping Cost of Cloud Bandwidth using Prediction-Based System Shaik Sharmila,V.Padmaja,Sayeed Yasin IJDCST/01/V-3/I-7/06
07. Enhanced Algorithms in Association rule mining Sampath Kumar Kommineni,Dr S.N.Tirumala Rao IJDCST/01/V-3/I-7/10
08. Dupian:Duplicate Code Analyzer using Ontology Editor Rayavarapu Veeranjaneyulu,Singaraju Srinivasulu IJDCST/01/V-3/I-7/12
09. Summarization and Classification for document using Concept and Context Similarity Analysis Sandhya. Ekkurthi,Chilakalapudi Meher Babu IJDCST/01/V-3/I-7/14
10. Improved One-to-Many Data Linkages Using Clustering Tree Ch.Sabitha,Dr.S.Sai Satyanarayana Reddy IJDCST/01/V-3/I-7/16
11. Performing Preserving Privacy Multi Keyword Ranked Search on Encrypted Cloud Data Dileep Nidamanuri,MD Amanatulla IJDCST/01/V-3/I-7/18