S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | Dr.B.Vijay Babu, M.Sudheer Raja | An Asymmetric Approach For Coperative Caching in Multi Hop Wireless Adhoc Networks | INT | IJCNWC | 0 |
2 | Dr. M.Sreedevi,P. Haritha,K. Ravali,M. Manoj Pruthvi | Review Paper: Procuring Frequent and Sequential Items to Improve Product Sales in E-Commerce Sites | INT | International Journal on Future Revolution in Computer Science & Communication Engineering | 0 |
3 | V P Krishna Anne, 3Dr. K. Rajasekhara Rao | ADVANCED IMPLEMENTATION OF ENHANCED-AODV TO DETECT PASSIVE BASED INTRUSION DETECTION ATTACKS IN WIRELESS AD HOC NETWORKS | INT | INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY | 0 |
4 | V P Krishna Anne, 3Dr. K. Rajasekhara Rao | Improved RCPHC to Detect IDS in Dynamic Wireless Ad hoc Networks | INT | International Journal of Emerging Research in Management &Technology | 0 |
5 | Dr.S.Satyanarayana, T.Gopi kiran | Multi Deployment AND Multi Snapshoting on clouds | INT | IJCOT | 0 |
6 | A.Dhana Lakshmi, Dr.V.Srikanth, T.Pavan Kumar | Routing Security Against Flooding Attack In Wireless Adhoc Networks | INT | IJAIR | 0 |
7 | Dr.Chalasani Srinivas1,Ch. Ramesh Kumar2Lanka Sunitha3 | Solving the Vehicle Routing Problem Using Genetic Algorithm | INT | Journal of Social, Technological and Environmental Science • | 0 |
8 | T.Subha Masthan Rao, Thinley Lendup, Thingly Wandi, 4.Sujatha | Hybrid Model for Preprocessing & Clustering of Web Service Logs | INT | IJCAES | 0 |
9 | Dr.S.Satyanarayana, B.Raj Kumar, V.David, 4.Siva Nagaraju | Wireless Sensor Networks in Cloud Computing | INT | IJAIR | 0 |
10 | G.Shyam Chandra Prasad, Dr A.Govardhan, Dr. T V Rao | A Low Indexed Content Based Neural Network Approach for Natural Objects Recognition | INT | IJCSIT | 2009 |
11 | V V Sobha , K Rama Krishna, and RK Kondragunta | Effect of Thermal Dispersion and Ciscous Dissipation on MHD Radiative Non-Darcy Mixed Convection in a Fluid Saturated Porous Medium | INT | International Journal of Mathematical Archive | 2009 |
12 | Srikanth.V, I Ramesh Babu | Delay adjust MAC protocol for enrgy efficiency in wireless sensor networks | INT | Oriental Journal of
Computer Science &
Technology
| 2009 |
13 | Srikanth.V and I Ramesh Babu | RLL-MAC: Reliable and Low Latency MAC for Event Critical Applications in Wireless Sensor Networks | INT | International Journal of Computer Science and Network Security | 2009 |
14 | V. Kiran Kumar, Dr K Raja Sekhara Rao | TBL2RDF:HTMLTable to RDF Translator | INT | IJWA | 2009 |
15 | M Vishnu Vardhan | A Novel way of Providing dynamic adaprability in Java Socket programs and Web Serivces Using AOP | INT | IJST | 2010 |
16 | B Ramesh Babu, K.Rama Krishnaiah, K.Rajasekhara Rao | Fast Training Algorithms for SVM’s for Large Data Sets | INT | IJCSIT | 2010 |
17 | A.Ramaswamy Reddy, M S R Prasad and C.Nagaraju | A Novel Boundary based Image Segmentation for Image Classification and Analysis | INT | IJCSE | 2010 |
18 | G Shyama Chandra Prasad, Dr A Govardan and Dr. T V Rao. | A Novel Method of Image Recognition Through Principal Component AnaLlysis | INT | IJCEIT | 2010 |
19 | G Shyama Chandra Prasad, Dr A Govardan and Dr. T V Rao. | Neural Network based context dependent recognition approach for low indexed images | INT | IJCIR | 2010 |
20 | ANONIDX Kumar Tiwari, Lokesh Kumar Sharma and Dr. G. Rama Krishna | Entropy weighting genetic K-Means algorithm for subspace clustering | INT | IJCA | 2010 |
21 | K.Rama Krishnaiah and Dr. K Rajasekhara Rao | A Graph Based Model of Wireless Mesh Networks | INT | Journal of Computer and Mathematical Sciences | 2010 |
22 | CH.V.Phani Krishna, S.Satyanarayana, Dr. K Rajasekhara Rao | Novelty of Extreme Programming | INT | IJCMI | 2010 |
23 | Mr V Rama Krishana | Acceptance Decision Rule for type I Generalized Half Logistic Distribution | INT | IJCTT | 2011 |
24 | G SivaNageswara Rao , Dr. K KrishNa murthy and B V Subba Rao. | Reap information through procedure framework in an electronic process steer | INT | IJCSET | 2011 |
25 | A Ramaswamy Reddy, B Srinivas Rao, G Siva Nageswara Rao and C Nagaraju. | A Novel method for aqua marine learning environment for classification of fish database | INT | IJCSC | 2011 |
26 | Shahana Bano, Dr. M S Prasad Babu and E nagendra Prasad T. | A new Approach for edge detection using first order techniques | INT | IJCST | 2011 |
27 | Ajaya Kumar Akasapu, Lokesh Kumar Sharma and Dr. G. Rama Krishna. | Efficient Trajectory Pattern Mining for both parse and Dense Data Set | INT | IJCA | 2011 |
28 | K Rosaiah and Dr V Rama Krishna | Generalized Half Logistic Distribution Acceptance Decision Rules | INT | Indian Journal of Clinical medicines | 2011 |
29 | Dr K Subrahmanyam and MariyamNONIDXzvia | Evaluation of Critical Success Factors for Telemedicine Implementation | INT | IJCA | 2011 |
30 | Ms Shahana Bano, Surendra Prasad Babu and C.naga Raju. | A New Proposed Method For Image Segmentation Based On Gray Scale Morphological Transformations | INT | IJCST | 2011 |
31 | Dr K Subrahmanyam | Comparative Study of DECIM-128 and DECIMV2 in relation to compact hash based message authentication code | INT | IJCSIT | 2011 |
32 | Dr K Subrahmanyam | Analysis and Groping of Movable Object Patterns Using Similarity Measure of Trajectories in Wireless Sensor Networks | INT | IJCSET | 2011 |
33 | Dr V Rama Krishna | Generalized Half Logistic Distribution Acceptance Decision Rules | INT | ANU Journal of Physical Science | 2011 |
34 | Mr V Rama Krishana | Synchronous Distributed path Computation Algorithm For High Speed Networks | INT | GJCAT | 2011 |
35 | Mr M R Narasinga Rao | Predicting the wellbeing of diabetic patients using Feed Forward Neural Network Constructive Algorithm | INT | IJSAT | 2011 |
36 | Mr M R Narasinga Rao | A Novel Facial Recognition Model Using An Artificial Neural Network | INT | IJSAT | 2011 |
37 | Dr K Subrahmanyam | Systems Thinking and Practice for Telecommuting Issues | INT | IJCA | 2011 |
38 | Dr. K Rajasekhara Rao | Privacy Preserving Distributed Data Mining: A new Approaches for detecting network traffic Using Stegonography | INT | IJST | 2011 |
39 | Dr. K Rajasekhara Rao | Privacy Preserving Clustering in data mining using vector Quantization | INT | RJCSE | 2011 |
40 | G SivaNageswara Rao, Dr K KrishNa Murthy, B V Subba Rao and Dr KNageswara Rao. | A mentoring program for information convey in a small software consultancy | INT | IJI-KRIT | 2011 |
41 | G SivaNageswara Rao, Dr K Krishna Murthy, B V Subba Rao and Dr KNageswara Rao. | Tailoring and Prologue of the rational unified process | INT | IJI-KRIT | 2011 |
42 | Mrs D Radha Rani | Analysis of Dendogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional Data | INT | IJETT | 2012 |
43 | Mrs D Radha Rani | Deep Web Mining Using The Concepts Of Bayesian Network And Active Learning | INT | GJCAT | 2012 |
44 | T Vijaya Saradhi | Dynamic Item Set Counting and Fuzzy association Rule Mining in Stock Market | INT | GJCAT | 2012 |
45 | T Vijaya Saradhi | Analysis and Grouping of Movable Object Patterns Using Similarity Measure of Trajectories in Wireless Sensor Networks | INT | IJCSET | 2012 |
46 | Mr T Vijaya Saradhi | Constraintless Approach of Power and Cost Aware Routing in Mobile
Adhoc Networks
| INT | IJCA | 2012 |
47 | Mrs Ch Radhika Rani | SCARP: Secure Congestion Aware Routing Protocol For Wireless Sensor Networks | INT | IJCSE | 2012 |
48 | Ms Ch Jyostna Devi | ANN Approach for Weather Prediction Using Back propagation | INT | IJETT | 2012 |
49 | Ms Ch Jyostna Devi | Interacting with Dynamic Web Portals in Local Language | INT | IJSER | 2012 |
50 | Ms Ch Jyostna Devi | UDA: Update Driven Approach for Continously Moving Objects | INT | IJSER | 2012 |
51 | Mr P V Vara Prasad | Analysis of Intrusion Detection Techniques | INT | GJCAT | 2012 |
52 | Mr P V Vara Prasad | Exploring data Aggregation techniques in wireless on basis of network topology and security issues | INT | IJESAT | 2012 |
53 | Mr P V Vara Prasad | Congestion Control Mechanism for Wireless Mesh Networks | INT | GJCAT | 2012 |
54 | Mrs K Ruth Ramya | Improved Decision tree algorithm for data streams with concepts drift adaptation | INT | IJSER | 2012 |
55 | Mrs K Ruth Ramya | A Class Based Approach for Medical Classification of Chest Pain | INT | IJETT | 2012 |
56 | Mrs K Ruth Ramya | Ontology based Data Mining Application for the Enhancement of Privacy | INT | IJASCT | 2012 |
57 | Mrs K Ruth Ramya | An Effective Strategy for Identifying Phishing Websites using Class-Based Approach | INT | IJSER | 2012 |
58 | Mr B Chaitanya Krishna | IEB: Integrated Testing Environment on Loop Boundaries | INT | IJESAT | 2012 |
59 | Mr B Chaitanya Krishna | An Efficient Face Recognition System by Declining Rejection Rate Using PCA | INT | IJESAT | 2012 |
60 | Mr B Chaitanya Krishna | Performance on ARCP for Various Region Mobile Emissary Environments | INT | GJCAT | 2012 |
61 | Mr G D K Kishore | Automated Anomaly and Root Cause Detection in Distributed Systems | INT | IJETT | 2012 |
62 | Mr G D K Kishore | Decision Making and Reduction Techniques for Tax Revenue using Data Warehouse | INT | IJETT | 2012 |
63 | Mr G D K Kishore | A CSMA/HN Algorithm for Optimized throughput in Wireless Networks | INT | GJCAT | 2012 |
64 | Mr J Venkata Rao | An Efficient Approach for Debugging the WPAN Using Packet Analyzer | INT | IJCST | 2012 |
65 | Mr J Venkata Rao | Implementation of SaaS in a cloud computing environment | INT | IJCST | 2012 |
66 | Ms N Naga Kumari | Relevant data clustering in web search engine | INT | IJCSIT | 2012 |
67 | Ms A Anusha | Enforcement of Security within Wireless Adhoc Networks | INT | GJCAT | 2012 |
68 | Ms G Anupama | Enhancing of data minig query language for transactional databases as a hypothesis scheme | INT | GJCAT | 2012 |
69 | Ms P Srivalli | Avoidance of collision and overhearing in WSN | INT | IJCSIT | 2012 |
70 | Ms M Madhavi | Automatic Privacy Query Updation for Moving Objects | INT | IJESAT | 2012 |
71 | Ms M Madhavi | An Approach for location Privacy Framework for Continuously moving Objects | INT | IJERA | 2012 |
72 | D Rajeswar Rao | Optimized Algorithms for Evaluation of Neuro Fuzzy Hybrid Networks | INT | GJCAT | 2012 |
73 | U Nanaji | INCOG Query Processing in Networks | INT | IJCSIT | 2012 |
74 | U Nanaji | Dynamic Approach to retrieve Web Pages | INT | IJCSIT | 2012 |
75 | U Nanaji | A New Recovery Scheme for Handling both Link and Node failure in the fast IP Networks | INT | IJERA | 2012 |
76 | U Nanaji | Detecting Application Denial of Service Attacks: A Dynamic Group Testing Based Approach | INT | IJCSIT | 2012 |
77 | U Nanaji | Implementation of P2P Reputation management Scheme based on distributed Identities and Decentralization Recommendation Chains | INT | IJERA | 2012 |
78 | U Nanaji | Implementation of Object Oriented approach to automatic Histogram Threshold based on fuzzy measures | INT | IJERA | 2012 |
79 | U Nanaji | Object Oriented Implementation of concept based user profiles from search engine logs | INT | IJERA | 2012 |
80 | U Nanaji | A QOS aware software selection method based on service Credibility Evaluation | INT | IJERA | 2012 |
81 | G Siva Nageswara Rao | Removing inconsistencies and errors from original data sets through data cleanising | INT | IJETAE | 2012 |
82 | M S R Prasad | Unsupervised Image Thresholding Using Fuzzy measures | INT | IJCA | 2012 |
83 | M S R Prasad | Improved Entropic Threshold based on GLSC Histogram with varying similarity measure | INT | IJCA | 2012 |
84 | Dr V Srikanth | A Scientific Approach for Segmentation and Clustering Technique of Improved K Means and Neural Networks | INT | IJARCSSE | 2012 |
85 | CH V Narayana, E Srinivas Reddy and M S R Prasad. | Automatic Image Segmentation using Ultrafuzziness | INT | IJCA | 2012 |
86 | Dr. J K R Sastry, Prof Subba Rao and Ms J Sasi Bhanu. | Counter Attacking Electromagnetic attacks for securing Embedded Systems | INT | IJAST | 2012 |
87 | Dr. J K R Sastry, Prof Subba Rao and Ms J Sasi Bhanu. | Counter Attacking method for Embedded Systems against Power Analysis | INT | IJCIS | 2012 |
88 | J Sasi Bhanu, A Vinay Babu, Dr J K R Satry and Dr P Thrimurthy. | Dynamic Evolution of Syntax for Communicating with Embedded Systems | INT | ITEECE | 2012 |
89 | Dr. J K R Sastry, N Venkatram, Ms Sahithy Ramya , Dr L S S Reddy. | On dynamic configurability and Adaptability of Intelligent Tags with Handheld Mobile Devices | INT | IIJECS | 2012 |
90 | Dr. J K R Sastry, N Venkatram, Dr K Srinivas Ravi , Mr G Pradeep, Dr L S S Reddy. | On Locating intelligent Tags | INT | IIJECS | 2012 |
91 | Dr. J K R Sastry, N Venkatram and V Santhi Chandra. | On Integrating Hardware of Distinct Embedded System Boards | INT | IJCEA | 2012 |
92 | M.Vishnuvardhan and T Ramesh | Composite Design Pattern for Feature Oriented Service Injection and Composition of Web Services for Distributed Computing Systems with Service Oriented Architecture | INT | IJWesT | 2012 |
93 | Badukonda Madhusudhana Rao, Uppe Nanaji and Y Swapana. | Multiviewpoint Based Similarity Measure and Optimality Criteria for Document Clustering | INT | IJAIR | 2012 |
94 | B Krishna Kishore, Uppe Nanaji and Y Swapana. | Improving Utilization of Infrastructure Clouds | INT | IJAIR | 2012 |
95 | K S B Deepthi, Uppe Nanaji and Y Swapana. | Effective Key Establishement and Authentication Protocol for Wireless Sensor Networks Using Elliptical Curve Cryptography | INT | IJAIR | 2012 |
96 | U Nanaji and Prof Chandan mazumdar. | Application and Protocol Architecture in Wireless Adhoc Networks | INT | IJAIR | 2012 |
97 | Korada Vasudevarao, Uppe Nanaji and Y Swapana. | Nymble: Blocking Misbehaving Users in Anonymizing Networks | INT | IJAIR | 2012 |
98 | M.R.Narasinga rao | A Study of Psychosocial and Built environment factors for diabetes using MLP Neural networks | INT | international journal of computer applications | 2012 |
99 | K.Nageshwara Rao, D.Rajya Lakshmi, Dr.T.V.Rao | A Novel Class Imbalance Learning Method using Neural Networks | INT | IJAIS | 2012 |
100 | Prof S Venkateswarlu | Exchange of Peer to Peer Identity Reputatio Using Cryptology Conventions | INT | IJCSIT | 2012 |
101 | Prof S Venkateswarlu | An Efficient Mechanism for Intrusion Detection and Prevention System | INT | IJSTInternational Recognition Research Journals- Golden Research Thoughts | 2012 |
102 | Prof S Venkateswarlu | Simulation of Frequency Selective Raleigh Faded HF Channel for Data Transmission Using Decision Feedback Equalizer | INT | IJESAT | 2012 |
103 | Prof S Venkateswarlu | Online Mobile Backup and Power Optimized Retrieval Through Messaging | INT | IJESAT | 2012 |
104 | Ch. V. Phani Krishna | Survey on extreme programming in Software Engineering | INT | IJCTT | 2012 |
105 | Ch. V. Phani Krishna | Metaphor: Elucidate the system Architecture in XP | INT | IJCTT | 2012 |
106 | Ms T Revathi | Web Based Share Tracker | INT | IJCST | 2012 |
107 | Dr. J K R Sastry, Prof K Subba Rao and Ms J Sasi Bhanu. | Counter Attacking Fault Injections into Embedded Systems | INT | IJRRAMCS | 2012 |
108 | M.Vishnuvardhan and T Ramesh | Load Distribution Design Pattern for Genetic Algorithm Based Autonomic Systems | INT | Elsevier: Procedia Engineering | 2012 |
109 | M.Vishnuvardhan and T Ramesh | Design Pattern for Feature Oriented Service Injection and Composition of Web Services for Distributed Computing Systems with SOA | INT | Elsevier: Procedia Engineering | 2012 |
110 | M.Vishnuvardhan and T Ramesh | Load Distribution Composite Design Pattern for Genetic Algorithm Based Autonomic Computing Systems | INT | IJSC | 2012 |
111 | A V Praveen Krishna, Bhavya Boggavarapu and Sindura Katragadda. | Maintenance of Entropy through Token Parceling and Verification of Error Bumping OFF for Protection in Cloud Computing | INT | IJARCCE | 2012 |
112 | Uppe Nanaji | Spatiotemporal Data Mining : Issues, Tasks and Applications | INT | IJAIR | 2012 |
113 | R V L S N Sastry, B Srinivas, P.Satheesh and U Nanaji | Skin Recognition Methods using Explicit Image Filtering | INT | IJAIR | 2012 |
114 | K Raja Sekhar, Dr L S S Reddy and U J Kameswari. | Secure System of Attack Patterns towards Application Security Metric Derivation | INT | IJCA | 2012 |
115 | Sasi Veena D , Yojana Y and K V D Kiran. | Performance Analysis of Network Resources in Standard Access Protocols | INT | IJCSIT | 2012 |
116 | Dr. J K R Sastry, Prof Subba Rao and Ms J Sasi Bhanu. | Counter attacking the timing attacks on Embedded Systems | INT | IJAST | 2012 |
117 | S Suneetha, Siva Priya T, Dr C Naga Raju and M S R Prasad. | A Novel Interclass Clustering Method for Image Reconstruction | INT | IJARCSEE | 2012 |
118 | P Ajithand, Dr. K Rajasekhara | Role of Data Mining : A Technical Education Perspective | INT | IJECST | 2012 |
119 | Jiwan Pokharal, N Sai Sumanth , Dr CH Rupa, T Vijaya Sharadi. | A Keyless JS Algorithm | INT | IJESAT | 2012 |
120 | B.Veeramallu | EncryptedtextPolicy Attribute Based Encryption and Broadcasting using BOD | INT | IJCMI | 2012 |
121 | Dr S Satyanarayana | Design on Security of Hybrid Cloud Business Intelligence System | INT | IJCMI | 2012 |
122 | V.Rama krishna, MR.Narasinga Rao, T.M.Padmaja | Software Reliability Prediction Using neural networks | INT | international journal of computer applications | 2012 |
123 | Dr.T.V.RAO, B.Siva Rama Krishna, AMK Kannababu4.Sai Satyanarayana reddy | A Novel Approach to deals with multiplr QOS Constrained Scheduling Stratagy of Multi Workflows using decentralized algarithms and network overlays | INT | GJCAT | 2012 |
124 | Dr.T.V.Rao, Chanakya GM, Sk.Salam | Iconic Web Retrival System Using Ontologies | INT | VSRD IJCSIT | 2012 |
125 | Prof S Venkateswarlu | Microstrip patch antenna using holographic structure for WLAN and Ku Band` application | INT | IJERA | 2012 |
126 | Dr. T V Rao | Hiding the Text information Using Stenography | INT | IJERA | 2012 |
127 | Dr. T V Rao | Dynamic Allocation of Proxies for Improving the Performance | INT | IJCOT | 2012 |
128 | Dr. T V Rao | Significant Storage on Sensor Storage Space,Energy Consumption and Better Security Based on Routing in Hybrid Sensor Networks | INT | IJASUC | 2012 |
129 | Dr. J K R Sastry | Software Framework for Implementing Add-on Applicatio0ns on Mobile Phones that runs on Android Operating System for Effecting Peer Communication with application Components Resident on Intelligent Tags | INT | RJCSE | 2012 |
130 | Dr. J K R Sastry | Software Architecture for Implementing Dynamic Configurability and Adaptability of Intelligent Tags with handheld Mobile Devices | INT | IJCEA | 2012 |
131 | Dr. J K R Sastry | Development of Software Architecture for Building Intelligence to Secure the Communication between the Tags and Mobile Devices | INT | IJVES | 2012 |
132 | Dr. J K R Sastry | Generating Code Related to embedded Software for Modeling Clear Box Structures | INT | IJCEA | 2012 |
133 | Dr. J K R Sastry | Software Architecture for implementing tamper detection system within an intelligent tag related embedded system | INT | IJCEA | 2012 |
134 | Dr. J K R Sastry | An Approach towards Development of Communication Standard around CAN Protocol Suite for Networking Embedded Systems | INT | IJAST | 2012 |
135 | Dr. J K R Sastry | Testing Embedded Systems through refined CRSE Methodology | INT | IJESR | 2012 |
136 | Dr. J K R Sastry | An Approach to Cognition Built-in Knowledge Discovery | INT | IIJDWM | 2012 |
137 | Dr. J K R Sastry | An Architecture for Mining WEB Content Hosted on clustered backend Servers | INT | IIJDWM | 2012 |
138 | Dr. J K R Sastry | An Open Specification for Firewire Standard to Extend its Suitability to Diversified applications | INT | ITEECE | 2012 |
139 | Dr. J K R Sastry | Automated Generation of Test cases for Testing critical regions of Embedded Systems through Adjacent Pair-wise Testing | INT | IJMCMST | 2012 |
140 | Dr. J K R Sastry | An Efficient Architecture for Enforcing Mobile Security through In-clouds | INT | IJRRAMCS | 2012 |
141 | Dr. J K R Sastry | Efficient Power Management Techniques for increasing the Longevity of Intelligent Tags | INT | ITEECE | 2012 |
142 | Dr. J K R Sastry | Building Intelligence into TAGs for Tamper Proofing | INT | IJAST | 2012 |
143 | Dr. J K R Sastry | On Identifying Intelligent TAGS with remote HOST | INT | ITEECE | 2012 |
144 | Dr. J K R Sastry | An Architecture Framework for Implementing add-on applications on Mobile phones that runs on Android os for effecting peer communication with application components resident on intelligent TAGS | INT | ITEECE | 2012 |
145 | Dr. J K R Sastry | Simulation Models for Adding Cognition into Traffic Management systems | INT | IIJC | 2012 |
146 | Dr. J K R Sastry | Software Architecture for Implementation of Location Management in intelligent TAGS | INT | ITEECE | 2012 |
147 | Dr. J K R Sastry | On Building Intelligence for Securing Communication between the Tags and the mobile Devices | INT | IJMAN | 2012 |
148 | Dr. J K R Sastry | Software Architecture for Implementation of Identification Systems within Intelligent TAGS | INT | IJAST | 2012 |
149 | Dr G Rama Krishna | A New Approach to Maintain Privacy and Accuracy in Classification Data Mining | INT | IJCSET | 2012 |
150 | Dr G Rama Krishna | Efficient Approaches for the Preventions of Unsolicited Access to Sensitive Data | INT | GJCAT | 2012 |
151 | Dr K Subrahmanyam | Web Hosting in the Cloud: Key Considerations for the Deployment of web Application to attain High availability, Scalability and Reliability in the Cloud | INT | IJASRT | 2012 |
152 | Dr K Subrahmanyam | Building Highly available, Scalable and Reliable Architectures for Web Applications in Cloud | INT | IJCA | 2012 |
153 | Dr K Subrahmanyam | Attacks on Anonymous Systems | INT | IJCST | 2012 |
154 | B.Ramesh Babu | An Algorithm Approach to Avoid Starvation in Wireless Mesh Networks | INT | IJCA | 2012 |
155 | M.V.B.T.Santhi | Enhancing K-Means Clustering Algorithm | INT | IJCST | 2012 |
156 | M.V.B.T.Santhi | Security Issues on Inter-Vehicle Communications | INT | IJCSIT | 2012 |
157 | K.Seetha Devi | Evaluated and Suggested Range Aggregate Query Approximation on Data Cubes in P2P Networks | INT | IJCSET | 2012 |
158 | Divya V | Inferring Private data by providing privacy preserving Techniques | INT | GJCAT | 2012 |
159 | Divya V | Probing Agent Based Anomaly Solving Strategies for Dynamic Distributed Scheduling in Railway Transportation | INT | IJCSET | 2012 |
160 | P.Venkateswara Rao | Comparitive Study of DECIM-128 and DECIM-V2 in Relation to Compact Hash Based Message Authentication code | INT | IJCSIT | 2012 |
161 | Ms T Revathi | An Effective Analysis of Weblog Files to Improve Website Performance | INT | IJCSCN | 2012 |
162 | V.Srujana | IDS Alert classifications using data mining techniques | INT | GJCAT | 2012 |
163 | V.Srujana | An inference Routing Tree Topology Algorithm for Reducing Overhead in Packet Probing | INT | IJCSIT | 2012 |
164 | N.Janardhan | Attempt to Provide Web Accessibility for Low Vision and Color Deficient People | INT | IJCA | 2012 |
165 | K.Sireesha | Voice Recognition browser for reduced vision and vision loss learners. | INT | IJSER | 2012 |
166 | Prof. V Chandra Prakash | The Relevance of Clean Room Software Engineering Methodology for the Development of Embedded Systems | INT | IJCIS | 2012 |
167 | Prof. V Chandra Prakash | Code Generation for Embedded Software for Modeling Clear Box Structure | INT | IJANA | 2012 |
168 | Ch.Satya Keerthi N.V.L | Intrusion Detection System Using Genetic Algorithm | INT | IJCTT | 2012 |
169 | T.Subha Mastan Rao | Framework for Testing Web Applications using Selenium Testing tool with respect to Integration Testing | INT | IJCST | 2012 |
170 | T.HemaLatha | Performance Evaluation Methodology for Biometric Authentication | INT | IJCST | 2012 |
171 | T.Subhamastan Rao | Simultaneous Data Compression and Encryption | INT | IJCSIT | 2012 |
172 | Dr.V.Srikanth | Automatic Histogram Threshold with fuzzy measures using C-Means | INT | IJCSI | 2012 |
173 | T.Hema latha | Intelligent Data Mining in Autonomous Heterogeneous Distributed Bio Databases | INT | IJCSIT | 2012 |
174 | K.Ravindranath | A Prototype Model to generate attack towards application security metric generation | INT | GJCAT | 2012 |
175 | K.Ravindranath | Opernic performance analysis of iBURST,HIPHERMAN and GSM | INT | IJCNS | 2012 |
176 | Ch.Satya keerthi N.V.L | Security issues on inter vehicle communications | INT | IJCSIT | 2012 |
177 | T.Subha Mastan Rao | Web Usage Mining on Cluster Architecture | INT | GJCAT | 2012 |
178 | G.Rajendhra Kumar | A Cryptographic Approach to Securely Share Genomic Sequences | INT | IJCSIT | 2012 |
179 | T. Pavan Kumar | Emotion Recognition from Speech | INT | IJCSIT | 2012 |
180 | T.Subha Mastan Rao | An Enhanced Frametwork For Performing Pre-Processing On Web Server Logs | INT | IJETT | 2012 |
181 | K. Ravindranath | A Secure Architecture for Anonymizer Networks | INT | IJCSIT | 2012 |
182 | K. Ravindranath | Optimal State Allocation for Multicast Communications withExplicit Multicast Forwarding | INT | IJERA | 2012 |
183 | Ch.Satya Keerthi.N.V.L | Behaviour based Trust Management Using Geometric mean approach for Wireless Sensor Networks | INT | IJCTT | 2012 |
184 | K. Ravindranath | Design of a browser for people with low vision | INT | IJCSIT | 2012 |
185 | K. Ravindranath | An Enhanced secure method for mobile agents | INT | GJCAT | 2012 |
186 | Divya V | Rivet on Disseminated Problem Solving Techniques in Airtraffic Flow Management | INT | IJCSET | 2012 |
187 | Dr K Subrahmanyam | A Novel Approach for Classification of a Database Using Decision Tree Induction | INT | GJCAT | 2012 |
188 | Dr K Subrahmanyam | A Survey on Traffic Flow Correlation Attacks in Anonymity Networks | INT | IJESAT | 2012 |
189 | Dr K Subrahmanyam | ABIQUO: A Proficient Enterprise Cloud Management Platform Intended for Hyper Visor Independency, Integrity and Scalability | INT | IJESAT | 2012 |
190 | Dr K Subrahmanyam | A Generalized Framework for Building Scalable Load Balancing Architectures in the Cloud | INT | IJCSIT | 2012 |
191 | K Raja Sekhar | A Prototype Model to generate Attack Patterns towards Application Security Metric Generation | INT | GJCAT | 2012 |
192 | K Raja Sekhar | The Fault Management System Using Amazon EC2: Web Application Deployment on cloud | INT | IJCSIT | 2012 |
193 | K Raja Sekhar | An Overview of Intrusion detection System Strategies and Issues | INT | IJCST | 2012 |
194 | Mr K V D Kiran | Efficacious Distributed Arbitary Node Duplication Attacks in Wireless Networks | INT | IJCTT | 2012 |
195 | Mr K V D Kiran | Data Transferring Mechanisms for Multipath Routing Using Concentrated Dissimilate Algorithm in Wireless Networks | INT | IJCTT | 2012 |
196 | Mr K V D Kiran | Enhanced Dynamical Hierarchical Mobile Internet Protocol for Mobile IP Networks | INT | IJCSIT | 2012 |
197 | Mr K V D Kiran | Analysis and Individualization of Clients concern based on the Internet Browsing History | INT | IJCSIT | 2012 |
198 | Mr K V D Kiran | Analysis and Performance of ARCP for Multi Region Mobile Emissary Environments | INT | IJCSIT | 2012 |
199 | Mr K V D Kiran | Analysis of Finite state Machine and Classical Iterative Cluster Labeling for 3D Images on Mobile Computing Strategies | INT | IJCSET | 2012 |
200 | Mr K V D Kiran | Distributed Performance Evaluation Tool for Inferring Router Packet Forwarding Based on Priority | INT | IJEST | 2012 |
201 | Mr. S.Srinivasa Rao | Analysis of Software Reliability and cost Assessment Relationship for Architecture based Software | INT | GJCAT | 2012 |
202 | Mr Y A Siva Prasad | Searching Multidimensional Historical Data Using Quisea Algorithm in P2P Networks | INT | IJCSET | 2012 |
203 | Mr Y A Siva Prasad | Study of Anomaly Identification Techniques in Large scale Systems | INT | IJCTT | 2012 |
204 | Ms V Sneha Latha | Performance Evaluation of Different Line Codes | INT | IJCSE | 2012 |
205 | Ms V Sneha Latha | A Novel Approach for Live Streaming Using ZigZag & Splitstream | INT | GJCAT | 2012 |
206 | J Sasi Bhanu | Scenario Based Comprehensive Testing of Embedded Systems using Data Models | INT | IJAST | 2012 |
207 | J Sasi Bhanu | An Efficient Elliptic Curve Cryptography Application in Constrained Mobile Environment | INT | GJCAT | 2012 |
208 | J Sasi Bhanu | A Generalized Method for Data Extraction from Web Pages | INT | GJCAT | 2012 |
209 | Mrs D Radha Rani | Mining Items From Large Database Using Coherent Rules | INT | IJESAT | 2012 |
210 | Mrs D Radha Rani | Automated Personalization of web Directories for Usage data using web usage Mining | INT | IJESAT | 2012 |
211 | Divya V | Excogitating File Replication and Consistency maintenance strategies intended for Providing high Performance at low cost in peer to peer networks | INT | IJCSET | 2012 |
212 | Mrs K Ruth Ramya | Mobile PC Suite: Using Mobile Phone as Remote to control Pc Operations | INT | IJCSIT | 2012 |
213 | N Naga Kumari | A Survey on Best Scheduling policies for multihop wireless networks | INT | IJCST | 2012 |
214 | P.Srivalli | SMesh Frame Work for dynamic groups in peer to peer systems | INT | GJCAT | 2012 |
215 | A V Praveen Krishna | Privacy Defensive of Public Auditing data storage in Cloud Environment | INT | IJETED | 2012 |
216 | A V Praveen Krishna | Data Security in Cloud: A Proposal towards the Security Issues | INT | IJCSET | 2012 |
217 | A V Praveen Krishna | Implementation of MA-ABE for better Data Security in cloud | INT | IJCST | 2012 |
218 | A V Praveen Krishna | Extension of MA-ABE for better data Security in Cloud-Large Universe Construction | INT | IJASRT | 2012 |
219 | Ms T Revathi | Sentence Level Semantic Classification on Online Product Reviews of Mixed Opinions Using naivedayes Clasifier | INT | IJCSIT | 2012 |
220 | Ms T Revathi | An Enchanced Pre Processing Research Framework for Weblog Data | INT | IJARCSSE | 2012 |
221 | Shahana Bano | Keyword based word sense extraction in a index for text files:Design approach | INT | IJDMKE | 2012 |
222 | Shahana Bano | Randamization method and group based anonymization in privacy preserving data mining | INT | GJCAT | 2012 |
223 | Shahana Bano | A joint 2 level and multilevel approach for sentiment analysis at document level | INT | GJCAT | 2012 |
224 | Dr. K Rajasekhara Rao | A Hybrid Routing Protocol for Wireless Mesh Networks | INT | IJAEST | 2012 |
225 | Dr. K Rajasekhara Rao | A Cross Layered Architecture and its proposed security mechanism to lessen attacks vulnerability in mobile adhoc networks | INT | IJCSIT | 2012 |
226 | Dr. K Rajasekhara Rao | A New Stravation Mitigation Algorithm for wireless networks | INT | IJCST | 2012 |
227 | Dr. K Rajasekhara Rao | Distributed Data Mining: Server Selection and Query Processing based on communication costs | INT | RJCSE | 2012 |
228 | Dr. K Rajasekhara Rao | A survey on attacks and defense metrics of routing mechanism in mobile adhoc networks | INT | IJACSA | 2012 |
229 | Ch. V. Phani Krishna | Software Quality Assurance in CMM and XP-A Comparative Study | INT | IJCSIT | 2012 |
230 | Ch. V. Phani Krishna | Combining Agile Software Development and Software Product Line Engineering | INT | IJEECT | 2012 |
231 | Ch. V. Phani Krishna | Accomplishing Constraints Using Artifact-Centric Operational Modeling in Multiple Artifacts | INT | IJRST | 2012 |
232 | Dr.V.Srikanth | Achieving Green Computing through Algorithmic Efficiency | INT | IJIT | 2012 |
233 | D Rajeswar Rao | Data Integrity in a Fuzzy Cloud Computing Considering Data Mining | INT | GJCAT | 2012 |
234 | K. Phaneendra, Venu Madhav Sunkara | Parameter dependent performance optimization in live migration of Virtual Machine | INT | IJMER | 2012 |
235 | Dr.K.V. V Satyanaraya, G.Radhika, A.Tejeswi | Efficient Framework for Deploying Information in Virtual Datacenter with cloud security Application | INT | IJETAE | 2013 |
236 | Prof.S.Venkateswarlu, G.M Deepa, G.Sriteja | Attacking Cloud Through Cache based Side Channel in Virtualized Environment | INT | ijarcsee | 2013 |
237 | Dr.A.Srinivasa rao, P.Santhosh Kumar | Distributed Agent Based Expert System in Health Care | INT | ijarcsse | 2013 |
238 | Dr.K.Subramanyam, S.Jaya Prakash, U.D.S.V.Prasad | Multi Clouds Model For Service Avalability And Security | INT | IJCSET | 2013 |
239 | Dr.M.R Narasinga Rao, K.Lokesh Kumar | Damage Detection in Cantilever Beams using Artificial Neural Networks | INT | IJMPERD | 2013 |
240 | Dr.D.Rajeswara Rao, K.Rajesh, K.Venkat Reddy | A Comprehensive Study on Making food using Rice cooker with Fuzzy logic technique | INT | IJCSIT | 2013 |
241 | Dr.K.Subramanyam, S.Jaya Prakash, U.D.S.V.Prasad | Improvised K-means Clustering Algorithm in Data Mining | INT | GJCER | 2013 |
242 | V.Srinivas, Sahithi, P.Yuvaraj, 4.Ravi Kanth | Tosca Enabling Cloud Portability | INT | IJARCET | 2013 |
243 | Dr.Ch.V.Phani Krishna, D.Sowmya, A.Suresh, 4.V.Samson Deva Kumar | Image Retrieval effective methods in image processing | INT | IJCSMR | 2013 |
244 | K.Venkataraju, P.Dinesh, Suhasini | Effective Utilization of cache in cloud | INT | IJARCSSE | 2013 |
245 | Dr.S.Satyanarayana, M.Srujana, Y.Divya, 4.Girvani | Reliable Proxy Re encryption in unreliable clouds | INT | IJARCSSE | 2013 |
246 | Dr.K.V.V Satyanarayana, Hashmi, A.Shiva Rama Rao | Standadization of systems and processes for CDR Based Billing System | INT | IJCER | 2013 |
247 | Dr.K.V.V Satyanarayana, D.Harika, Y.S Lakshmi | Collectional Activities Forecast via insution using social network sites | INT | IJSR | 2013 |
248 | Dr.K.V.V Satyanarayana, D.Harika, Y.S Lakshmi | Study and Scalable eruditries by using Communel activities | INT | IJETAE | 2013 |
249 | V. Akhila, Nikita Mahajan, B.V.SriRam, 4.Dr.N.Srinivas | Security Through Multiple Unrelated Clods in Cloud Computing | INT | IJCTT | 2013 |
250 | P.V.R.D.Prasada Rao, Govardhan | Insilico Identification of Novel Inhibitors Against HIV-1 Reverse transcripitate | INT | IJCTT | 2013 |
251 | N.Janardhan, Y.Raja Sree | Cloud data Protection For the Masses | INT | IJCTT | 2013 |
252 | N.Janardhan, Y.Raja Sree, Himaja | Data Invulnerability and data integrity Verification of multi cloud storage | INT | IJCTT | 2013 |
253 | Dr.D.Rajeswara Rao, K.Rajesh, K.Venkat Reddy | Hand Writen Character Detection By using Fuzzy Logic Techniques | INT | IJETAE | 2013 |
254 | Dr.D.Rajeswara Rao, K.Rajesh, K.Venkat Reddy, 4.U.Ankaiah | Hand Writen Character And digit recognition using Artificial Neural Networks | INT | IJARCSSE | 2013 |
255 | Dr.D.Rajeswara Rao, K.Rajesh | A Novel Study on Complex Fuzzy Logic | INT | IJSR | 2013 |
256 | V.Srinivas, K.Bhavya, K.Yamini | Cloud Services Portability for Secure Migration | INT | IJCTT | 2013 |
257 | V.Srinivas, Pratheek Singel, KVD Kiran | Optimizing Aggregation Query Processing | INT | IJAIR | 2013 |
258 | V.Srinivas, Bhavana, V.Alekya, 4.K.Deepa | Password Authentication System for Cloud Environment | INT | IJACSIT | 2013 |
259 | K.Venkataraju, Raja Mohan, Chaitanya | Enable Open Verifiability and Data Dynamics for Storage Protection in Cloud Computing | INT | IJCTT | 2013 |
260 | K.Venkataraju, Raja Mohan, Suhasini | Approaching Protected and Reliable Storage Space Services in cloud computing | INT | IJEA | 2013 |
261 | K.Venkataraju, Raja Mohan | Privacy Preserving Public auditing System for data storage security in cloud computing | INT | IJCTT | 2013 |
262 | P.V.R.D Prasada Rao, K.R.R Mohan, Dr.A.Govardhan | Identification of Novel Inhibitors against HIV-RT Through Virtual Screening | INT | IJCTT | 2013 |
263 | Dr.S.Satyanarayana, sruthi, sri rashmi, | Providing Cloud Services over mobile cloud data | INT | IJCTT | 2013 |
264 | Dr.S.Satyanarayana, M.Ramya, M.maha lakshmi, 4.Venkata Naresh | Ranked Keyword Search in cloud computing | INT | IJCTT | 2013 |
265 | K.V.D.Kiran, N.Kusuma, Sai Tejaswi4.T.Anitha | Network Security Using Quantum Cryptography | INT | IJCTT | 2013 |
266 | Dr.K.V.V Satyanarayana, D.Veena Sanjitha, T.V.N Sai Sindhura | Dependable and Secure Storage services in cloud computing | INT | IJCTT | 2013 |
267 | Dr.K.V.V Satyanarayana, T.Bala Keishna, Y.Venkateswara Rao | Secure and Dependable Storage in cloud computing | INT | IJCTT | 2013 |
268 | Dr.K.V.V Satyanarayana, G.Radhika, A.Tejaswi | Efficient Framework for Deploying Information in cloud Virtual Datacenter with cryptography algorithms | INT | IJCTT | 2013 |
269 | Dr.Rajeswara Rao, Sonawane | Xml Document Mining | INT | IJRCEE | 2013 |
270 | Dr. J K R Sastry, K.Ruth Ramya, M.Devi Kavya Priya | Random Indexing Based Web User Clustering for faster Navigation | INT | IJCSIT | 2013 |
271 | Dr.B.Vijay Babu, G.Kiran Kumar | Reduction of Greedy Forwarding Using Overlay Multicasting in Mobile Ad Hoc Networks | INT | IJCTT | 2013 |
272 | Dr.V.Ramakrishna, M.R Narasinga Rao, Sk.sunaina Sulthana, 4.T.Geethika | Transaction Based Prioritizatioh Stratagies for E-mail Applications | INT | IJARET | 2013 |
273 | Dr.K.Subrhamanyam, Jaya Prakash, U.D.S.V Prasad | Tmaper Proof JAR Client For Distributed Accounrability for Data Sharing in the Cloud | INT | IJDCST | 2013 |
274 | Dr.T.V Rao | Password Based Scheme and Testing for Defending DDOS Attacks | INT | IJNSA | 2013 |
275 | G.Sivanageswara rao, Navya Sree, J.Venkat Rao | A Graspable Learning system for the classification of XML documents | INT | IJCSIT | 2013 |
276 | J.Venkat Rao, G.Sivanageswara rao, K.Anusha | Data leakage Detection using encrypted fake objects | INT | IJP2PNTT | 2013 |
277 | G.Sivanageswara rao, Navya Sree | An Efficient classification Approach for the XML Documents | INT | IJCTT | 2013 |
278 | G.Sivanageswara rao, J.Venkat Rao, K.Anusha | Unobtrusive Technique for the detection of data seepage | INT | IJCSIT | 2013 |
279 | G.Sivanageswara rao, CH.V Phani Krishna, Dr.K.Rajasekhar Rao | Extreme programing Verification using unified process | INT | IJCSIT | 2013 |
280 | K.V.D.Kiran, Sitaram chowdary, P.Vittal Kumar | Game theory :A new Approach for video streaming in mobile networks | INT | IJCSMR | 2013 |
281 | Dr. J K R Sastry, M.V.B.T Santhi, S.pavani | A New Clustering Technique Based on user search Histories | INT | IJDCST | 2013 |
282 | K.V.D.Kiran, Gidla John | Apple Talk | INT | IJCSMR | 2013 |
283 | Mr.M S R Prasad, P.Radha Krishna | A Novel q-parameter Automation in Tsallis Entropy for Image Segmentation | INT | IJCA | 2013 |
284 | K.Venkataraju Santhi Swaroop | Survey on Advanced Data Mining Applications | INT | IJEA | 2013 |
285 | K.V.V Satyanarayana | A Novel Framework for Virtual Desktop Environment with vApp | INT | IJCA | 2013 |
286 | Dr.M.R Narasinga Rao, U.Ankaiah, V.Rama Krishna | Detection of error prone software modules using neural network | INT | IJCST | 2013 |
287 | 1.P.V.R.D Prasada Rao,2.K.Lakshmi Sunitha,3.K.Ram Mohan Rao,4.A.Govardhan | An insilco Approach to Restrain Hiv Replication Through Clustering and Virtual Screening | INT | IJCST | 2013 |
288 | Dr.S.Satyanarayana | Effective Bandwidth Allocation Approach on Users Billing in Cloud Environment | INT | IJCSMC | 2014 |
289 | V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao | Analysis on Virtualization Technologies in Cloud | INT | IJARCET | 2014 |
290 | koushik reddy,Dr.Syed Umar,Seelam eswar Reddy | The Survey of Congestion control protocols for smart transport system | INT | ijircce | 2014 |
291 | Dr.S.Satyanarayana | Cloud Based Platfrom as a Services of Panoramic Approach of Graphical 3D Wireframe | INT | GESJ | 2014 |
292 | Dr.S.Satyanarayana | Cloud Based Platfrom as a Services of Panoramic Approach of Graphical Boundary Value Differential Equation Solutions | INT | GESJ | 2014 |
293 | K.V.D.Kiran, Ramesh.Rayala, Sameer.Bodepudi and Uday.Dommaraju | Literature Review on Risk and their components | INT | IJREST | 2014 |
294 | Suresh B.Rathod, V.Krishna Reddy | Secure Live VM Migration in Cloud Computing: A Survey | INT | International Journal of Computer Applications(IJCA) | 2014 |
295 | T.Hema Latha,J.R.Rajesh | Adaptive Query Planning to support continuous Aggregate Queries | INT | IJDCST | 2014 |
296 | M.R Narasinga Rao | Inferences From the ADME Analysis of predicted inhibitors to DPPIV | INT | IJB | 2014 |
297 | Dr.D.Rajeswara Rao,2.S.Sahithya | M Score and K-Anonymity:A M odel For Detection and Protection of Data | INT | IJETAE | 2014 |
298 | Dr.D.Rajeswara Rao,2.A.Raghuveer | Privacy and Groups Maintaing in Social Networks | INT | IJETAE | 2014 |
299 | Dr.D.Rajeswara Rao,2.Lavanya Susanna | Effeciently Retrieving Top K Search Results over XML Data | INT | IJRCEE | 2014 |
300 | 1.M.Sheshikala,2.Dr.D.Rajeswara Rao | Bayesian Approach for E-mail Spam Filtering Based on the E-Mail Count | INT | IJCA | 2014 |
301 | 1.Vidyullatha,2.Dr.D.Rajeswara Rao | Hadoop Mapreduce Framework in Big Data Analytics | INT | IJCTT | 2014 |
302 | 1.K.V.D.Kiran,2.M.V.R Sri Vastava,3.K.Gayatri Devi | Risk management in mobile banking | INT | International Journal of Engineering Research & Technology (IJERT) | 2014 |
303 | 1.K.V.D.Kiran,2.P.Sruthi,3.P.S Naseema,4.G.V.S Manju Vani,5.Rishikesh Sahu | Risk management in online banking | INT | International Journal of Computer Trends & Technology (IJCTT) | 2014 |
304 | 1.Dr.N.Srinivasu,2.S.M.Gouse Samdani,3.L.Sai Kiran | Asynchronous Data Access and Transaction Decomposition in Distributed Databases | INT | IJARCS | 2014 |
305 | 1.K.V.D.Kiran,2.Sk.Sharmila,3.T.Abhishek | Risk Assessment in E-Banking | INT | International Journal of Latest Trends in Engineering and Technology (IJLTET) | 2014 |
306 | 1.Dr.V.Chandra Prakash,2.A.Naga Vamsi Krishna,3.B.Venkat Raman,4.Pardha saradhi | Ameliorative Effectives of Alchohol on Human Diabetic Volunteers -A Prospective Study | INT | British Journal of Pharmaceutical Research | 2014 |
307 | K.Sireesha,M.Sri vatsav | Diminution of Co channel interference in Femtocell networks | INT | JOMCCMN(STM JOURNALS) | 2014 |
308 | 1.M.Sridevi,2.L.S.S Reddy | Mining Closed Regular Patterns in Incremental Transactional Databases Using Vertical Data Format | INT | IJCA | 2014 |
309 | 1.Dr.JKR Sastry,2.Dr.A.Vinaya Babu | Directional Location Finding of Intelligent Tags | INT | IJRDET | 2014 |
310 | 1.Dr.JKR Sastry,2.Dr.A.Vinaya Babu | Implementating in cloud security for Effecting secured communication between intelligent tags and mobile devices | INT | IJIRCCE | 2014 |
311 | 1.Dr.JKR Sastry,2.Dr.A.Vinaya Babu | Strategizing Power Utilization within intelligent tags | INT | IJPTT | 2014 |
312 | T.Pavan Kumar | survey:Attack on cognitive radio networks | INT | IJARCE | 2014 |
313 | 1.K.V.Raju,2.K Aparna | A Novel Approach for People Interaction in Meeting | INT | IJCST | 2014 |
314 | 1.K.Ravindranath,2.Dr.K.Rajesekhara Rao | Energy Optimized Link Selection Algorithm for Mobile Cloud Computing | INT | IJANA | 2015 |
315 | Dr.R.Stya Prasad,Srisaila,Dr.G.Krishna Mohan | Software Reliability using SPRT:Power law process model | INT | IJECSE | 2015 |
316 | S.Venkateswarlu,Ch.Radhika Rani,SNM Sistra | Design and Development of Data Recovery System for Faded Wireless Communication Channel | INT | IJATES | 2015 |
317 | 1.P. N. V. Satyakonda, 2.T. Pavankumar,3. E. Suresh Babu | Routing on Cognitive Radio Wireless Mesh Networks Survey | INT | IJACSE | 2015 |
318 | G.Nageswara Rao, T.V.N.Giridhar And K.V.D.Kiran | Effects of Cyber Crime and their Access Controls | INT | IJREST | 2015 |
319 | 1.Manne Lakshmi Mounika,2.Dr.Syed Umar,3.p.silpa | Architectural Design of D2H Medicare | INT | IJRITCC | 2015 |
320 | 1.K.Tejaswi, 2.Dr.Syed Umar | Sensor Scheduling Of Nodes Using Clustered Head Mechanisms | INT | IJES&M | 2015 |
321 | 1.G.Vijay Kumar,2.M.Sreedevi | A Review on Security and Privacy Issues in Bigdata | INT | IJ-ETA-ETS | 2015 |
322 | S.Venkateswarlu,Ch.Radhika Rani,SNM Sistra | Design and Development of Data Recovery System for Faded Wireless Communication Channel | INT | IJATES | 2015 |
323 | 1.P. N. V. Satyakonda, 2.T. Pavankumar,3. E. Suresh Babu | Routing on Cognitive Radio Wireless Mesh Networks Survey | INT | IJACSE | 2015 |
324 | P.Vidyullatha,Dr.D.Rajeswara Rao,g.deepthi,M.R.Narasinga Rao | Performance analysis and optimization of supervised learning technique for medical Diagonis using open source tools | INT | IJCSIT | 2015 |
325 | 1.K.Ravindranath,2.Dr.K.Rajesekhara Rao | Energy Optimized Link Selection Algorithm for Mobile Cloud Computing | INT | IJANA | 2015 |
326 | Ravindra ch,Dr.D.Rajeswara Rao,G.Annapurna | A Generalized Association Rule Mining Framework for Pattern Discovery | INT | IJCSIT | 2015 |
327 | Manisha,Dr.V.Srikanth | A Survey on cross layer solutions for routing in wireless sensor network | INT | IJERT | 2015 |
328 | G.Nageswara Rao, T.V.N.Giridhar And K.V.D.Kiran | Effects of Cyber Crime and their Access Controls | INT | IJREST | 2015 |
329 | 1.K.V.V Satyanarayana,2.T.V.Krishna Chowdary | Survey on Wireless sensor Network | INT | IJAES | 2015 |
330 | 1.Manne Lakshmi Mounika,2.Dr.Syed Umar,3.p.silpa | Architectural Design of D2H Medicare | INT | IJRITCC | 2015 |
331 | 1.K.Tejaswi, 2.Dr.Syed Umar | Sensor Scheduling Of Nodes Using Clustered Head Mechanisms | INT | IJES&M | 2015 |
332 | 1.G.Vijay Kumar,2.M.Sreedevi | A Review on Security and Privacy Issues in Bigdata | INT | IJ-ETA-ETS | 2015 |
333 | 1.Ch.Ravindra, 2.D.Rajeswara Rao, 3.T.JanardhanaRao, 4.P.KiranKumar, 5.Kareemunnisa | Knowledge Discover Process: The Next Step for Knowledge Search | INT | IJIRCCE | 2015 |
334 | T.Veeraiah,S.K.M Rao | Concept semantic mechanism for images using hybrid norms:An Overview | INT | IJESR | 2015 |
335 | B.Ramadevi,Dr.R.Satya Prasad,Dr.G.Sridevi | Considering Residual Faults of Burr Type XII Software Reliability | INT | IJECSE | 2015 |
336 | Dr.R.Satya Prasad,2.B.Rama Devi,3.Dr.G.Sridevi | Detection of Burr Type XII Reliable software using SPRT on Interval Domain Data | INT | IJCSIT | 2015 |
337 | N.Venkateswara rao,Dr.N.Srinivasu | A Review on cloud data integrity auditing methods and protocols | INT | IJETSR | 2015 |
338 | P.Vidyulatha,D.Rajeswara Rao | Designing and simulation of soft computing method obtained on fuzzy logic systems | INT | IJCR | 2015 |
339 | 1.N.Srinivasu,2.G.Krishna Chaitanya | Advanced Task Scheduling in Heterogeneous multiprocessor systems using evolutionary algorithms | INT | IJIRCCE | 2015 |
340 | Naresh Vurukonda ,Dr.B.Thirumala Rao | A Multilevel Authentication
Based On The Rfid Technique
For A Multiple Mobile Cloud
User In Cloud Storage:
A Survey
| INT | International Journal of Research and Applications | 2015 |
341 | 1.Y.Sushmitha,2.V.Krishna Reddy,3.D.Pavan Teja Reddy | A Survey on Cloud computing security issues | INT | International Journal of computer science and innovation | 2015 |
342 | M.Anusha,Dr.V.Srikanth | Cognitive Radio Networks:A Survey | INT | IJETTCS | 2015 |
343 | Dr.R.Stya Prasad,Srisaila,Dr.G.Krishna Mohan | Software Reliability using SPRT:Power law process model | INT | IJECSE | 2015 |
344 | P.Vidyulatha,D.Rajeswara Rao | Rough set Reasoning based classification model generating decision rule on early stage of chronic kidney disease | INT | IJARCSMS | 2016 |
345 | Naresh.V,B.Thirumala Rao | Security Threats in cloud computing | INT | International journal of computational science,mathematics&engineering | 2016 |
346 | Vidyullatha,D.Rajeswara Rao | Rough Set Reasoning based classification model generating decision rule on early stage of chronic kidney disease | INT | IJARCSMS | 2016 |
347 | Haritha Akkineni, P.V.S. Lakshmi, B. Vijay Babu, G.Lakshmi | Modeling and Visualizing the Extraction of Opinions from Twitter | INT | IJIACS | 2016 |
348 | K.Prapulla Devi, Dr.K.Subba Rao | A secure and Privacy Aware and Establishing Distributed Services Across Inter Cloud Communication | INT | International Journal of Computational Mathematical Ideas(IJCMI) | 2016 |
349 | D.Srinivasa Rao, Dr.V. Sucharita | Techniques for Mining High Utility Itemsets from Transactional Databases | INT | Ijarcsse | 2016 |
350 | Thirupathi Rao Komati1, Sai Balakrishna Allamsetty2, Chaitanya Varma Pinnamaraju3 | IMPLEMENTATION OF SENTIMENT ANALYSIS ON TWITTER DATA | INT | International Journal of Pure and Applied Mathematics(IJPAM) | 2017 |
351 | S. G. Rohini, Ch. Jyothsna, Ch. Ramaiah, Sk. Madeena Sunny | ASCII BASED SYMMETRIC KEY ALGORITHM FOR DATA SECURITY | INT | International Journal of Pure and Applied Mathematics(IJPAM) | 2017 |
352 | K.Lahari 1, D.Pavan Kumar2, L.K.S. Chandra Sekhar3, N.Srinivasu4 | CDA GENERATION AND INTEGRATION BASED ON CLOUD COMPUTING | INT | International Journal of Pure and Applied Mathematics(IJPAM) | 2017 |
353 | 1*T.Veeraiah, 2Aarathi Mahamkali, 3B.N.Pavan Kishore, 4A.Nikhil Rao,5 S.K.M.Rao, 6J. Amudhavel | IMAGE DENOISING BY PROFUNDITYMAP METHODUSING DIAGRAM BASE CHANGE AND GROUP SCANTY | INT | International Journal of Pure and Applied Mathematics(IJPAM) | 2017 |
354 | Dr. M. Nagabhushana Rao,M.Sangameswara Rao | A Frame work for Natural Disaster Management Using TWITTER Data | INT | International Journal Of Engineering And Computer Science | 2017 |
355 | P.S.Jagadeesh Kumar, Wenli Hu, Xianpei Li, Kundan LalP | Mobile Banking Adeptness on Man-In- The-Middle and Man-In-The-Browser Attacks | INT | IOSR Journal of Mobile Computing & Application (IOSR-JMCA) | 2017 |
356 | A. Kousar Nikhath ,K,Subramanyam | Concept based Document Clustering by corpus utility scale | INT | INDJST | 2017 |
357 | V P Krishna Annel, Dr. K Rajasekhara Rao, V.Venkatakoundinya, T Gnana Krishna Deep | A Study And Analysis On Intrusion Detection Based (Idb) Techniques | INT | IJPT | 2017 |