Apply Now

Research Publications

Research Publications - Journal


S.NoName(s) of the AuthorTitleNational / InternationalConf/Jur NameYear
1P.Vidyulatha,D.Rajeswara RaoRough set Reasoning based classification model generating decision rule on early stage of chronic kidney diseaseINTIJARCSMS2016
21.Rohith N.Divakar,2.deepak v patil,Dr.V.Chandra prakashA Soft Computing Approach to improve network performanceINTIndian journal of science and technology2016
31.Rohith N.Divakar,2.deepak v patil,Dr.V.Chandra prakashissues in routing mechanisms for packet forwarding:A SurveyINTIJECE2016
41.Rohith N.Divakar,2.deepak v patil,Dr.V.Chandra prakashStudy of BGP Convergence time:A SurveyINTIJECE2016
5G.Jagadeesh,Suraj Narayan,Dr.D.Rajeswara Rao,Prathyusha DeviDevelopment Of Efficient Model For The Assessment Of Hart Risk StratificationINTIJPBS2016
6Sk.yakoob,Dr.v.Krishna reddy,c.dastagiraiahAnalysis of keyword searchable methodologies in encrypted cloud dataINTIJET2016
7B.V.S Srikanth,Dr.V.Krishna Reddyeffecient of stream processing engines for processing big data streamsINTindjst2016
8M.Sheshikala,D.Rajeswara Rao,R.Vijaya PrakashParllel Approah For Finding Co Location Pattern –A Map Reduce FrameworkINTIccc-2016 Science Direct Procedia Computer Science 92( 2016 )2016
9D.Srinivasa Rao,Dr.V.SucharithaMaximum Utilty Item Sets For Transactional Database Using GuideINTIccc-2016 Science Direct Procedia Computer Science 92( 2016 )2016
10Ranjeeth Kumar M, N Srinivasu, Lokanatha C ReddyDes Secured K-Nn Query Over Secure Data In CloudsINTJournal Of Theoretical And Applied Information Technology2016
11Venkata Naresh.M,N.Lakshmipathi Anantha,Vijay Krishna,Hye Jin KimJackknife Estimation Of Incomplete Dta For Data Marts For Customer Relationship ManagementINTInternational Journal of U- and e-Service ,Science and technology2016
12K. Spurthy, Srinivasarao Tammireddy, Satyabrata Patro, T. N. Shankar, G. Swain And Ranjan K. SenapatiIntrusion Detection System In Manets With Elgamal Digital SignatureINTFar East Journal Of Electronics And Communications2016
13S.Sabari Giri MuruganEnhancement Of Intrusion-Detection System In Manets With The Digital Signature Via Elliptic Curve CryptosystemINTInternational Journal Of Computer Science And Information Security (IJCSIS),2016
14Drrajeswari Pothuraju, S.Viswanadha Raju, Amira Ashour, Nilanjan Dey, Valentina Emilia Balas,Active Site Cavities Identification Of Amyloid Beta Precursor Protein: Alzheimer Disease Study''INTIEEE 20th Jubilee International Conference On Intelligent Engineering Systems 2016 (INES 2016) , 20162016
15B. N. Jagadesh, Nazma Sultana Shaik, Venkata Naresh Mandhala and Debnath BhattacharyyaIllumination Invariant Face Recognition Model using Tetrolet Transform and Truncated Gaussian Mixture ModelINTInternational Journal of Software Engineering and Its Applications2016
16Sachin Arun Thanekar, K. Subrahmanyam, and A. B. BagwanA Study on Digital Forensics in HadoopINTI J C T A (International Journal of Control Theory and Application)2016
17L.Lavanya,P.S.V.S Sridhar,VRD SwathiResidual Risk Assessment for software projects by Considering Sub Factors for the risk FactorsINTInternational Journal of Pharmacy and Technology2016
18 Mohammad,Arshad Ahmad Khan, Mirza Ali, Dr.V.SrikanthEnergy aware routing for MANETs based on current processing state of nodesINTJournal of Theoretical and Applied Information Technology2016
19Venkata Naresh Mandhala , K. Bhagavan S. Suresh Babu and N. Lakshmipathi AnanthaAdvanced Role of Internet of Things in the Smart Grid TechnologyINTIJCTA2016
20Divya V,K.Thirupathi raoSecuring provenance for efficient maintanence and lineage tracking of data in cloud environmementINTAsian journal of information technology2016
21Naresh.V,B.Thirumala RaoSecurity Threats in cloud computingINTInternational journal of computational science,mathematics&engineering2016
22Naresh.V,B.Thirumala Rao,B.Thirupathi ReddyA Secured cloud data storage with access previlegesINTInternational journal of electrical and computer engineering2016
23Ranjeeth Kumar M, N Srinivasu, Lokanatha C ReddyDes Secured K-Nn Query Over Secure Data InClouds INTJournal of Theoretical and Applied Information Technology2016
24K Ruth Ramya, D Naga Malleswari, Ch Radhika Rani,Debnath Bhattacharyya and Hye-jin KimKeyAggregate ased homomorphic Encryption for Efficient Authentication for Secure Cloud Storage INTInternational Journal of Database Theory And Application2016
25C.M.Velu,J. Yamini Devi,Vijay Krishna Dhulipalla and Debnath BhattacharyyaPrediction Model of Survival Analysis for Customer Relationship ManagementINTInternational Journal of Software Engineering and Its Applications2016
26Vidyullatha,D.Rajeswara RaoRough Set Reasoning based classification model generating decision rule on early stage of chronic kidney diseaseINTIJARCSMS2016
27V.Sucharitha,P.Venkateswara Rao,Debnath,Tai-hoon KimClassification of penacid prawn spiecies using radial basis probabilistic neural networks and support vector machineINTIJBSBT2016
28Vidyullatha,D.Rajeswara RaoTraining and Development of artificial neural network models:single layer feedforward and multilayer feedforward neural networkINTJATIT2016
29T.Sajana,C.M Sheela Rani,K.V NarayanaA Survey on clustering techniques for big data miningINTINDJST2016
30Haritha Akkineni, P.V.S. Lakshmi, B. Vijay Babu, G.LakshmiModeling and Visualizing the Extraction of Opinions from TwitterINTIJIACS2016
31Syed Umar,Shaik Mahaboob janiProposed Potential Security Infrastructure in VANETS using tamper registered hardwareINTIJECE2016
32Greeshma.L,Pradeepini.GInput Split Frequent Pattern Tree Using Mapreduce Paradigm In HadoopINTJATIT2016
33R.Durga Lakshmi,N.SrinivasuA Dynamic Approach To Task Scheduling In Cloud Computing Using Genetic AlgorithmINTJATIT2016
34Deepti Gurram,M.R Narasinga RaoModeling On Thyroid Diagnosis Using Machine Learning Approaches-A ReviewINTIJPBS2016
35Vidyullatha,D.Rajeswara RaoProgressive Decision Making In The Department Of Cardiology By Optimized Rough Set Model.INTIJPBS2016
36M.Srinivasu,G.Rama Krishna,K.Rajasekhar Rao,E.Suresh babuAnalysis of Legacy System in Software Application Development: A Comparative SurveyINTIJECE2016
37Sasi Bhanu Jammalamadaka, Vinaya Babu A, Trimurthy AImplementing Dynamically Evolvable Communication with Embedded Systems through WEB ServicesINTIJECE2016
38Hema Gopinath Sukavasi, Lokesh Kanagala, Riaz ShaikSufficient Authentication for Energy Consumption in Wireless Sensor NetworksINTIJECE2016
39Shaik mahaboob jani,syed umar,p.v.r.d prasada Rao,g.srideviDesigning and simulation of surrounding supporting multicast routing protocolINTIJECE2016
40K.Sumanth,Dr.G.Sridevi,Dr.Syed Umar,Dr.K.Kiran Kumar,Dr.M D Ali HussianA Proposal forb mitigation ofgray hole attack in wireless mesh Ad-HocNetworks using S-DSDV INTJATIT2016
41Dilip Kumar Baraj,G Sridevi, syed Umar, Msr PrasadInformation Base Security Threats and challenges in Information Forensic:A SurveyINTIndonesian journal of Electrical Engineering and Computer Science2016
42K.Prapulla Devi, Dr.K.Subba RaoA secure and Privacy Aware and Establishing Distributed Services Across Inter Cloud CommunicationINTInternational Journal of Computational Mathematical Ideas(IJCMI)2016
43J. Dileep kumar, Dr. V Srikanth,L.TejeswiniEmail Phishing Attack Mitigation using server side Email AddonINTindjst2016
44Chitluru Veerabhadra Rao, T Pavan Kumar, Dr.V SrikanthPowerful Network Monitoring System with Additional services increasing the network PerformanceINTJATIT2016
45Anusha M, Dr.V SrikanthAn Efficient MAC protocol for reducing Channel Interference andAccess Delay in Cognitive Radio Wireless Mesh NetworksINTIRECAP2016
46D.Srinivasa Rao, Dr.V. SucharitaTechniques for Mining High Utility Itemsets from Transactional DatabasesINTIjarcsse2016
47M Sheshikala, Dr.D.Rajeswara Rao,R.Vijaya PrakashA Novel Rank Based Co-Location Pattern MiningApproach Using MAP-ReduceINTJATIT2016
48M Sheshikala, Dr.D.Rajeswara Rao,R.Vijaya PrakashJoin-Less Approach for Finding Co-Location Patterns-Using Map-Reduce FrameworkINTJATIT2016
49v.krishna reddy,K.Deva surya,m.sai praveen,B.lokesh,a.vishal,k.akhilperformance analysis of load balancing algorithms in cloud computing environmentINTindjst2016
50v.krishna reddy,y.sushmitha,k.thirupathi raodistributed authentication for federated clouds in secure cloud data storageINTindjst2016
51t.sasidhar,vani havisha,sai koushik,mani deep,v.krishna reddyload balancing techniques for effecient traffic management in cloud environmentINTIJECE2016
52Reddi Prasadu,M.Jeevan Babu,sK.Mohammed Gouse user recovation mechanism for service oriented wireless adhoc networksINTIJSIA2016
53Soujanya Lakshmi Ega , Ramya Krishna Kanamarlapudi , Manda R. Narasinga Rao and Sudhamani MuddadaStatistical optimization of cellulase production from a new strain of Bacillus subtilis VS15 by central composite design and artificial neural networkINTResearch Journal of Biotechnology 2016
54jyothirmai M,K.Thirupathi raoReduced file hash foot prints for optimized deduplication in cloud platformsINTJATIT2016
55Srinivasa kumar,B.Thirumala RaoAn efficient cloud based key aggregate data sharingINTJATIT2016
56Gandharba SwainDigital image steganography using variable length group of bits substitutionINTInternational Conference on Computational Modeling and Security (CMS 2016)2016
57Gandharba SwainA steganographic method combining LSB substitution and PVD in a blockINTInternational Conference on Computational Modeling and Security (CMS 2016)2016
58Aditya Kumar Sahu, Gandharba SwainA Review on LSB Substitution and PVD Based Image Steganography TechniquesINTIndonesian Journal of Electrical Engineering and Computer Science2016
59P.Ravi,D.Haritha,P.NiranjanComputing iceberg queries having non anti monotone constrains with bit map numberINTJATIT2016
60G.Mani Bharath,M.S.R PrasadTest Case Prioritization On Real Time Applicationsfuzzy Oriented Risk Assessment In Enterprise Information SystemsINTJATIT2016
61R AKHILESH REDDY, G SIVA NAGESWARA RAOReal Time Scheduling For Dynamic Process Execution Using Round Robin SwitchingINTJATIT2016
62Hussain Syed, Dr.Y.PrashanthA Panoramic Bayesian analogy based method for software project cost estimationINTAsian Journal of Information technology2016
63S. Suresh Babu,Vahiduddin Shariff , CH. M. H. Saibaba and Debnath BhattacharyyaData Mining Techniques Based on Effective Pattern DiscoveryINTInternational Journal of u- and e- Service, Science and Technology2016
64CH.M.H.Saibaba , V. Uday Kumar , K. Praveenkumar , Debnath BhattacharyyaA New Privacy Approach using Graph-EMDINTInternational Journal of Software Engineering and Its Applications2016
65K.SAI KRISHNASREE, M.R.NARASINGA RAODiagnosis Of Heart Disease Using Neural Networks-Comparative Study Of Bayesian Regularization With Multiple Regression ModelINTJATIT2016
66Shaik Razia and M. R. Narasinga RaoMachine Learning Techniques for Thyroid Disease Diagnosis - A ReviewINTINDJST2016
67Vijaya Lakshmi ParuchuriDistance based String Search using IR-TreeINTInternational Journal of Software Engineering and Its Applications2016
68Kanaka Durga, V Rama KrishnaAutomatic Detection of illegitimate websites with Mutual Clustering [ADIWMC].INTIJECE2016
69S.SAMPATH, B.TIRAPATHI REDDYDynamic Access Control Policies In Secure Our Sourced Data In Cloud StotageINTInternational Journal of Software Engineering and Its Applications2016
70Y.Leela Sandhya rani,V.Sucharitha, Debnath Bhattacharyya, Hye-jin KimPerformance Evaluation of feature selection methods on large dimensional databasesINTInternational journal of database theory and applications2016
71V.Sucharitha,S.Jyothi,P.Venkateswara RaoComparision of machine learning algorithms for classification of penaeid prawn speciesINTComputing for substainable global development 2016 3rd international conference2016
72Dr. M. Nagabhushana Rao, S.Hrushi kesava RajuApplication of a data mining task called data preprocessing on the Input data and efficient external sorting using refinement of Existing algorithmINTIJPT- nternational Journalof pharmacy and Technology2016
73Dr. M. Nagabhushana Rao,S.Hrushi kesava RajuPattern matching using Data Preprocessing with the help of one time look indexing methodINTIJPT- nternational Journalof pharmacy and Technology 2016
74Dr. M. Nagabhushana Rao,S.Hrushi kesava RajuApplication of data reprocessing on the given data and efficient Construction of optimal binary search trees using post dynamic ProgrammingINTIJPT- nternational Journalof pharmacy and Technology 2016
75Dr.R.Satya Prasad,2.v.suryanarayana,Dr.G.Krishna mohanGompertz Based spiritINTJATIT2016
76K V Pandu Ranga Rao, Dr. V Krishna Reddy , SK YakoobAnalysis of Deduplication in Secure Cloud StorageINTInternational Journal of Engineering and Technology (IJET)2016
77B.Sekhar Babu,P.Lakshmi Prasanna, Dr.D.Rajeswara Rao,M.Anusha,A.Prathyusha,A.Ravi ChandPROFILE BASED PERSONALIZED WEB SEARCH USING GREEDY ALGORITHMSINTJeas2016
78T. Santhoshi Rupa, K. V. V. SatyanarayanaAn Efficient Scheme to Establish Content and Audit liveness in the cloudINTindjst2016
79B. V. S. Srikanth,V. Krishna ReddyEfficiency of Stream Processing Engines for Processing BIGDATA StreamsINTIndian Journal of Science and Technology2016
80C. Dastagiraiah, Dr. V Krishna Reddy, K.V.PandurangaraoEvaluation of Various VM Based Load Balancing Procedures in Cloud EnvironmentINTInternational Journal of Engineering and Technology (IJET)2016
81D. Rohith Roshan, Dr.K.Subba RaoIntranet Design StrategiesINTIJECE2016
82D. Rohith Roshan, Dr.K.Subba RaoLeast-Mean Difference Round Robin (LMDRR) CPU Scheduling AlgorithmINTJATIT2016
83Vidyullatha,Dr.D.Rajeswara RaoMachine Learning Techniques on Multidimensional Curve Fitting Data Based on R-Square and chi-square methodsINTIJECE2016
84Thota Siva Ratna Sai, Dr. V SrikanthERHR-Efficient and reliable Heterogeneous Routing Protocol for Sensor NetworksINTJATIT2016
85J.Sasi Bhanu,2.A.Vinay Babu,3.P.ThrimurthyImplementing dynamically evolvable communication with embeded system through web servicesINTIJECE2016
86Hussain Syed and Prasanth YallaInnovations on Bayesian Approaches of Software Cost Estimation ModelINTINDJST2016
87Sumanth K,M.Jaya bhaskarSecure Digital Signature scheme based on eliptic curve on internet of thingsINTIJECE2016
88S.Likitha,D.Rajeswara RaoHBASE Bulk loading job scheduler for multiuser accessabilityINTJATIT2016
89K.Chaitanya,Dr.S.VenkateswarluDetection Of Blackhole & Greyhole Attacks In Manets Based On Cknowledgement Based ApproachINTJATIT2016
90L . Greeshma and G. PradeepiniBig Data Analytics with Apache Hadoop MapReduce FrameworkINTINDJST2016
91Sai Prasad Potharaju,M. SreedeviAn Improved Prediction Of Kidney Disease Using SmoteINTINDJST2016
92V.Naresh , Dr.B.Thiruma La Rao And B.Tirupati ReddyA Secured Cloud Data Storage With Access PrivilegesINTInternational Journal Of Electrical And Computer Engineering (IJECE)2016
93V.Naresh,Dr.B.Thirumala RaoA Study On Data Storage Security Issues In Cloud ComputingINTIccc-2016 Science Direct Procedia Computer Science 92( 2016 )2016
94Arshad Ahmad Khan Mohammad, Ali Mirza ,Srikanth VemuruAnalytical Model For Evaluating The Bottleneck Node In ManetsINTINDJST2016
95 T. V. Krishna Chowdary ,K. V. V. SatyanarayanaData Gathering In Wireless Sensor And Actor NetworksINTINDJST2016
96Vijaya Lakshmi Paruchuri , N Lakshmipathi Anantha, Vara Lakshmi Konagala,Debnath BhattacharyyaCiphertext-Policy Attribute-Based Encryption For Access Control Of Data In CloudINTInternational Journal Of Software Engineering And Its Applications2016
+