S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | P.Vidyulatha,D.Rajeswara Rao | Rough set Reasoning based classification model generating decision rule on early stage of chronic kidney disease | INT | IJARCSMS | 2016 |
2 | 1.Rohith N.Divakar,2.deepak v patil,Dr.V.Chandra prakash | A Soft Computing Approach to improve network performance | INT | Indian journal of science and technology | 2016 |
3 | 1.Rohith N.Divakar,2.deepak v patil,Dr.V.Chandra prakash | issues in routing mechanisms for packet forwarding:A Survey | INT | IJECE | 2016 |
4 | 1.Rohith N.Divakar,2.deepak v patil,Dr.V.Chandra prakash | Study of BGP Convergence time:A Survey | INT | IJECE | 2016 |
5 | G.Jagadeesh,Suraj Narayan,Dr.D.Rajeswara Rao,Prathyusha Devi | Development Of Efficient Model For The Assessment Of Hart Risk Stratification | INT | IJPBS | 2016 |
6 | Sk.yakoob,Dr.v.Krishna reddy,c.dastagiraiah | Analysis of keyword searchable methodologies in encrypted cloud data | INT | IJET | 2016 |
7 | B.V.S Srikanth,Dr.V.Krishna Reddy | effecient of stream processing engines for processing big data streams | INT | indjst | 2016 |
8 | M.Sheshikala,D.Rajeswara Rao,R.Vijaya Prakash | Parllel Approah For Finding Co Location Pattern –A Map Reduce Framework | INT | Iccc-2016 Science Direct Procedia Computer Science 92( 2016 ) | 2016 |
9 | D.Srinivasa Rao,Dr.V.Sucharitha | Maximum Utilty Item Sets For Transactional Database Using Guide | INT | Iccc-2016 Science Direct Procedia Computer Science 92( 2016 ) | 2016 |
10 | Ranjeeth Kumar M, N Srinivasu, Lokanatha C Reddy | Des Secured K-Nn Query Over Secure Data In Clouds | INT | Journal Of Theoretical And Applied Information Technology | 2016 |
11 | Venkata Naresh.M,N.Lakshmipathi Anantha,Vijay Krishna,Hye Jin Kim | Jackknife Estimation Of Incomplete Dta For Data Marts For Customer Relationship Management | INT | International Journal of U- and e-Service ,Science and technology | 2016 |
12 | K. Spurthy, Srinivasarao Tammireddy, Satyabrata Patro, T. N. Shankar, G. Swain And Ranjan K. Senapati | Intrusion Detection System In Manets With Elgamal Digital Signature | INT | Far East Journal Of Electronics And Communications | 2016 |
13 | S.Sabari Giri Murugan | Enhancement Of Intrusion-Detection System In Manets With The Digital Signature Via Elliptic Curve Cryptosystem | INT | International Journal Of Computer Science And Information Security (IJCSIS), | 2016 |
14 | Drrajeswari Pothuraju, S.Viswanadha Raju, Amira Ashour, Nilanjan Dey, Valentina Emilia Balas, | Active Site Cavities Identification Of Amyloid Beta Precursor Protein: Alzheimer Disease Study'' | INT | IEEE 20th Jubilee International Conference On Intelligent Engineering Systems 2016 (INES 2016) , 2016 | 2016 |
15 | B. N. Jagadesh, Nazma Sultana Shaik, Venkata Naresh Mandhala and Debnath Bhattacharyya | Illumination Invariant Face Recognition Model using Tetrolet Transform and Truncated Gaussian Mixture Model | INT | International Journal of Software Engineering and Its Applications | 2016 |
16 | Sachin Arun Thanekar, K. Subrahmanyam, and A. B. Bagwan | A Study on Digital Forensics in Hadoop | INT | I J C T A (International Journal of Control Theory and Application) | 2016 |
17 | L.Lavanya,P.S.V.S Sridhar,VRD Swathi | Residual Risk Assessment for software projects by Considering Sub Factors for the risk Factors | INT | International Journal of Pharmacy and Technology | 2016 |
18 | Mohammad,Arshad Ahmad Khan, Mirza Ali, Dr.V.Srikanth | Energy aware routing for MANETs based on current processing state of nodes | INT | Journal of Theoretical and Applied Information Technology | 2016 |
19 | Venkata Naresh Mandhala , K. Bhagavan S. Suresh Babu and N. Lakshmipathi Anantha | Advanced Role of Internet of Things in the Smart Grid Technology | INT | IJCTA | 2016 |
20 | Divya V,K.Thirupathi rao | Securing provenance for efficient maintanence and lineage tracking of data in cloud environmement | INT | Asian journal of information technology | 2016 |
21 | Naresh.V,B.Thirumala Rao | Security Threats in cloud computing | INT | International journal of computational science,mathematics&engineering | 2016 |
22 | Naresh.V,B.Thirumala Rao,B.Thirupathi Reddy | A Secured cloud data storage with access previleges | INT | International journal of electrical and computer engineering | 2016 |
23 | Ranjeeth Kumar M, N Srinivasu, Lokanatha C Reddy | Des Secured K-Nn Query Over Secure Data InClouds | INT | Journal of Theoretical and Applied Information Technology | 2016 |
24 | K Ruth Ramya, D Naga Malleswari, Ch Radhika Rani,Debnath Bhattacharyya and Hye-jin Kim | KeyAggregate ased homomorphic Encryption for Efficient Authentication for Secure Cloud Storage | INT | International Journal of Database Theory And Application | 2016 |
25 | C.M.Velu,J. Yamini Devi,Vijay Krishna Dhulipalla and Debnath Bhattacharyya | Prediction Model of Survival Analysis for Customer Relationship Management | INT | International Journal of Software Engineering and Its Applications | 2016 |
26 | Vidyullatha,D.Rajeswara Rao | Rough Set Reasoning based classification model generating decision rule on early stage of chronic kidney disease | INT | IJARCSMS | 2016 |
27 | V.Sucharitha,P.Venkateswara Rao,Debnath,Tai-hoon Kim | Classification of penacid prawn spiecies using radial basis probabilistic neural networks and support vector machine | INT | IJBSBT | 2016 |
28 | Vidyullatha,D.Rajeswara Rao | Training and Development of artificial neural network models:single layer feedforward and multilayer feedforward neural network | INT | JATIT | 2016 |
29 | T.Sajana,C.M Sheela Rani,K.V Narayana | A Survey on clustering techniques for big data mining | INT | INDJST | 2016 |
30 | Haritha Akkineni, P.V.S. Lakshmi, B. Vijay Babu, G.Lakshmi | Modeling and Visualizing the Extraction of Opinions from Twitter | INT | IJIACS | 2016 |
31 | Syed Umar,Shaik Mahaboob jani | Proposed Potential Security Infrastructure in VANETS using tamper registered hardware | INT | IJECE | 2016 |
32 | Greeshma.L,Pradeepini.G | Input Split Frequent Pattern Tree Using Mapreduce Paradigm In Hadoop | INT | JATIT | 2016 |
33 | R.Durga Lakshmi,N.Srinivasu | A Dynamic Approach To Task Scheduling In Cloud Computing Using Genetic Algorithm | INT | JATIT | 2016 |
34 | Deepti Gurram,M.R Narasinga Rao | Modeling On Thyroid Diagnosis Using Machine Learning Approaches-A Review | INT | IJPBS | 2016 |
35 | Vidyullatha,D.Rajeswara Rao | Progressive Decision Making In The Department Of Cardiology By Optimized Rough Set Model. | INT | IJPBS | 2016 |
36 | M.Srinivasu,G.Rama Krishna,K.Rajasekhar Rao,E.Suresh babu | Analysis of Legacy System in Software Application Development: A Comparative Survey | INT | IJECE | 2016 |
37 | Sasi Bhanu Jammalamadaka, Vinaya Babu A, Trimurthy A | Implementing Dynamically Evolvable Communication with Embedded Systems through WEB Services | INT | IJECE | 2016 |
38 | Hema Gopinath Sukavasi, Lokesh Kanagala, Riaz Shaik | Sufficient Authentication for Energy Consumption in Wireless Sensor Networks | INT | IJECE | 2016 |
39 | Shaik mahaboob jani,syed umar,p.v.r.d prasada Rao,g.sridevi | Designing and simulation of surrounding supporting multicast routing protocol | INT | IJECE | 2016 |
40 | K.Sumanth,Dr.G.Sridevi,Dr.Syed Umar,Dr.K.Kiran Kumar,Dr.M D Ali Hussian | A Proposal forb mitigation ofgray hole attack in wireless mesh Ad-HocNetworks using S-DSDV | INT | JATIT | 2016 |
41 | Dilip Kumar Baraj,G Sridevi, syed Umar, Msr Prasad | Information Base Security Threats and challenges in Information Forensic:A Survey | INT | Indonesian journal of Electrical Engineering and Computer Science | 2016 |
42 | K.Prapulla Devi, Dr.K.Subba Rao | A secure and Privacy Aware and Establishing Distributed Services Across Inter Cloud Communication | INT | International Journal of Computational Mathematical Ideas(IJCMI) | 2016 |
43 | J. Dileep kumar, Dr. V Srikanth,L.Tejeswini | Email Phishing Attack Mitigation using server side Email Addon | INT | indjst | 2016 |
44 | Chitluru Veerabhadra Rao, T Pavan Kumar, Dr.V Srikanth | Powerful Network Monitoring System with Additional services increasing the network Performance | INT | JATIT | 2016 |
45 | Anusha M, Dr.V Srikanth | An Efficient MAC protocol for reducing Channel Interference andAccess Delay in Cognitive Radio Wireless Mesh Networks | INT | IRECAP | 2016 |
46 | D.Srinivasa Rao, Dr.V. Sucharita | Techniques for Mining High Utility Itemsets from Transactional Databases | INT | Ijarcsse | 2016 |
47 | M Sheshikala, Dr.D.Rajeswara Rao,R.Vijaya Prakash | A Novel Rank Based Co-Location Pattern MiningApproach Using MAP-Reduce | INT | JATIT | 2016 |
48 | M Sheshikala, Dr.D.Rajeswara Rao,R.Vijaya Prakash | Join-Less Approach for Finding Co-Location Patterns-Using Map-Reduce Framework | INT | JATIT | 2016 |
49 | v.krishna reddy,K.Deva surya,m.sai praveen,B.lokesh,a.vishal,k.akhil | performance analysis of load balancing algorithms in cloud computing environment | INT | indjst | 2016 |
50 | v.krishna reddy,y.sushmitha,k.thirupathi rao | distributed authentication for federated clouds in secure cloud data storage | INT | indjst | 2016 |
51 | t.sasidhar,vani havisha,sai koushik,mani deep,v.krishna reddy | load balancing techniques for effecient traffic management in cloud environment | INT | IJECE | 2016 |
52 | Reddi Prasadu,M.Jeevan Babu,sK.Mohammed Gouse | user recovation mechanism for service oriented wireless adhoc networks | INT | IJSIA | 2016 |
53 | Soujanya Lakshmi Ega , Ramya Krishna Kanamarlapudi , Manda R. Narasinga Rao and Sudhamani Muddada | Statistical optimization of cellulase production from a new strain of Bacillus subtilis VS15 by central composite design and artificial neural network | INT | Research Journal of Biotechnology | 2016 |
54 | jyothirmai M,K.Thirupathi rao | Reduced file hash foot prints for optimized deduplication in cloud platforms | INT | JATIT | 2016 |
55 | Srinivasa kumar,B.Thirumala Rao | An efficient cloud based key aggregate data sharing | INT | JATIT | 2016 |
56 | Gandharba Swain | Digital image steganography using variable length group of bits substitution | INT | International Conference on Computational Modeling and Security (CMS 2016) | 2016 |
57 | Gandharba Swain | A steganographic method combining LSB substitution and PVD in a block | INT | International Conference on Computational Modeling and Security (CMS 2016) | 2016 |
58 | Aditya Kumar Sahu, Gandharba Swain | A Review on LSB Substitution and PVD Based Image Steganography Techniques | INT | Indonesian Journal of Electrical Engineering and Computer Science | 2016 |
59 | P.Ravi,D.Haritha,P.Niranjan | Computing iceberg queries having non anti monotone constrains with bit map number | INT | JATIT | 2016 |
60 | G.Mani Bharath,M.S.R Prasad | Test Case Prioritization On Real Time Applicationsfuzzy Oriented Risk Assessment In Enterprise Information Systems | INT | JATIT | 2016 |
61 | R AKHILESH REDDY, G SIVA NAGESWARA RAO | Real Time Scheduling For Dynamic Process Execution Using Round Robin Switching | INT | JATIT | 2016 |
62 | Hussain Syed, Dr.Y.Prashanth | A Panoramic Bayesian analogy based method for software project cost estimation | INT | Asian Journal of Information technology | 2016 |
63 | S. Suresh Babu,Vahiduddin Shariff , CH. M. H. Saibaba and Debnath Bhattacharyya | Data Mining Techniques Based on Effective Pattern Discovery | INT | International Journal of u- and e- Service, Science and Technology | 2016 |
64 | CH.M.H.Saibaba , V. Uday Kumar , K. Praveenkumar , Debnath Bhattacharyya | A New Privacy Approach using Graph-EMD | INT | International Journal of Software Engineering and Its Applications | 2016 |
65 | K.SAI KRISHNASREE, M.R.NARASINGA RAO | Diagnosis Of Heart Disease Using Neural Networks-Comparative Study Of Bayesian Regularization With Multiple Regression Model | INT | JATIT | 2016 |
66 | Shaik Razia and M. R. Narasinga Rao | Machine Learning Techniques for Thyroid Disease Diagnosis - A Review | INT | INDJST | 2016 |
67 | Vijaya Lakshmi Paruchuri | Distance based String Search using IR-Tree | INT | International Journal of Software Engineering and Its Applications | 2016 |
68 | Kanaka Durga, V Rama Krishna | Automatic Detection of illegitimate websites with Mutual Clustering [ADIWMC]. | INT | IJECE | 2016 |
69 | S.SAMPATH, B.TIRAPATHI REDDY | Dynamic Access Control Policies In Secure Our Sourced Data In Cloud Stotage | INT | International Journal of Software Engineering and Its Applications | 2016 |
70 | Y.Leela Sandhya rani,V.Sucharitha, Debnath Bhattacharyya, Hye-jin Kim | Performance Evaluation of feature selection methods on large dimensional databases | INT | International journal of database theory and applications | 2016 |
71 | V.Sucharitha,S.Jyothi,P.Venkateswara Rao | Comparision of machine learning algorithms for classification of penaeid prawn species | INT | Computing for substainable global development 2016 3rd international conference | 2016 |
72 | Dr. M. Nagabhushana Rao, S.Hrushi kesava Raju | Application of a data mining task called data preprocessing on the Input data and efficient external sorting using refinement of Existing algorithm | INT | IJPT- nternational Journalof pharmacy and Technology | 2016 |
73 | Dr. M. Nagabhushana Rao,S.Hrushi kesava Raju | Pattern matching using Data Preprocessing with the help of one time look indexing method | INT | IJPT- nternational Journalof pharmacy and Technology | 2016 |
74 | Dr. M. Nagabhushana Rao,S.Hrushi kesava Raju | Application of data reprocessing on the given data and efficient Construction of optimal binary search trees using post dynamic Programming | INT | IJPT- nternational Journalof pharmacy and Technology | 2016 |
75 | Dr.R.Satya Prasad,2.v.suryanarayana,Dr.G.Krishna mohan | Gompertz Based spirit | INT | JATIT | 2016 |
76 | K V Pandu Ranga Rao, Dr. V Krishna Reddy , SK Yakoob | Analysis of Deduplication in Secure Cloud Storage | INT | International Journal of Engineering and Technology (IJET) | 2016 |
77 | B.Sekhar Babu,P.Lakshmi Prasanna, Dr.D.Rajeswara Rao,M.Anusha,A.Prathyusha,A.Ravi Chand | PROFILE BASED PERSONALIZED WEB SEARCH USING GREEDY ALGORITHMS | INT | Jeas | 2016 |
78 | T. Santhoshi Rupa, K. V. V. Satyanarayana | An Efficient Scheme to Establish Content and Audit liveness in the cloud | INT | indjst | 2016 |
79 | B. V. S. Srikanth,V. Krishna Reddy | Efficiency of Stream Processing Engines for Processing BIGDATA Streams | INT | Indian Journal of Science and Technology | 2016 |
80 | C. Dastagiraiah, Dr. V Krishna Reddy, K.V.Pandurangarao | Evaluation of Various VM Based Load Balancing Procedures in Cloud Environment | INT | International Journal of Engineering and Technology (IJET) | 2016 |
81 | D. Rohith Roshan, Dr.K.Subba Rao | Intranet Design Strategies | INT | IJECE | 2016 |
82 | D. Rohith Roshan, Dr.K.Subba Rao | Least-Mean Difference Round Robin (LMDRR) CPU Scheduling Algorithm | INT | JATIT | 2016 |
83 | Vidyullatha,Dr.D.Rajeswara Rao | Machine Learning Techniques on Multidimensional Curve Fitting Data Based on R-Square and chi-square methods | INT | IJECE | 2016 |
84 | Thota Siva Ratna Sai, Dr. V Srikanth | ERHR-Efficient and reliable Heterogeneous Routing Protocol for Sensor Networks | INT | JATIT | 2016 |
85 | J.Sasi Bhanu,2.A.Vinay Babu,3.P.Thrimurthy | Implementing dynamically evolvable communication with embeded system through web services | INT | IJECE | 2016 |
86 | Hussain Syed and Prasanth Yalla | Innovations on Bayesian Approaches of Software Cost Estimation Model | INT | INDJST | 2016 |
87 | Sumanth K,M.Jaya bhaskar | Secure Digital Signature scheme based on eliptic curve on internet of things | INT | IJECE | 2016 |
88 | S.Likitha,D.Rajeswara Rao | HBASE Bulk loading job scheduler for multiuser accessability | INT | JATIT | 2016 |
89 | K.Chaitanya,Dr.S.Venkateswarlu | Detection Of Blackhole & Greyhole Attacks In Manets Based On Cknowledgement Based Approach | INT | JATIT | 2016 |
90 | L . Greeshma and G. Pradeepini | Big Data Analytics with Apache Hadoop MapReduce Framework | INT | INDJST | 2016 |
91 | Sai Prasad Potharaju,M. Sreedevi | An Improved Prediction Of Kidney Disease Using Smote | INT | INDJST | 2016 |
92 | V.Naresh , Dr.B.Thiruma La Rao And B.Tirupati Reddy | A Secured Cloud Data Storage With Access Privileges | INT | International Journal Of Electrical And Computer Engineering (IJECE) | 2016 |
93 | V.Naresh,Dr.B.Thirumala Rao | A Study On Data Storage Security Issues In Cloud Computing | INT | Iccc-2016 Science Direct Procedia Computer Science 92( 2016 ) | 2016 |
94 | Arshad Ahmad Khan Mohammad, Ali Mirza ,Srikanth Vemuru | Analytical Model For Evaluating The Bottleneck Node In Manets | INT | INDJST | 2016 |
95 | T. V. Krishna Chowdary ,K. V. V. Satyanarayana | Data Gathering In Wireless Sensor And Actor Networks | INT | INDJST | 2016 |
96 | Vijaya Lakshmi Paruchuri , N Lakshmipathi Anantha, Vara Lakshmi Konagala,Debnath Bhattacharyya | Ciphertext-Policy Attribute-Based Encryption For Access Control Of Data In Cloud | INT | International Journal Of Software Engineering And Its Applications | 2016 |