Review Report
Prevention of production network system from Attackers using Honeypot based Systems
G. Aruna Kranthi
Int. J. Res. Appl.(Volume – 6, Issue – 22, Page No’s:1201-1204)
DOI: http://dx.doi.org/10.17812/IJRA.6.22(1)2019
Received: 02nd Apr, 2019; Accepted: 10th May, 2019; Published: 09th Jun, 2019
Abstract |  Full Paper
Review Report
A Label-free imaging installation that divides cancer cells in drug-treated cancer cells
Sirikonda Anoosha, Rajitha Battu and Jilla Vinitha
Int. J. Res. Appl.(Volume – 6, Issue – 22, Page No’s:1205-1208)
DOI: http://dx.doi.org/10.17812/IJRA.6.22(2)2019
Received: 22nd Apr, 2019; Accepted: 10th May, 2019; Published: 11th Jun, 2019
Abstract |  Full Paper
Review Report
Privacy-preserving of social network data and application scenario with data mining
Shoban babu Sriramoju
Int. J. Res. Appl.(Volume – 6, Issue – 22, Page No’s: 1209-1214)
DOI: http://dx.doi.org/10.17812/IJRA.6.22(3)2019
Received: 26th Apr, 2019; Accepted: 15th May, 2019; Published: 15th Jun, 2019
Abstract |  Full Paper