Apply Now

Research Publications

Research Publications - Journal


S.NoName(s) of the AuthorTitleNational / InternationalConf/Jur NameYear
1Dr.B.Vijay Babu, M.Sudheer RajaAn Asymmetric Approach For Coperative Caching in Multi Hop Wireless Adhoc NetworksINTIJCNWC0
2Dr. M.Sreedevi,P. Haritha,K. Ravali,M. Manoj PruthviReview Paper: Procuring Frequent and Sequential Items to Improve Product Sales in E-Commerce SitesINTInternational Journal on Future Revolution in Computer Science & Communication Engineering0
3V P Krishna Anne, 3Dr. K. Rajasekhara RaoADVANCED IMPLEMENTATION OF ENHANCED-AODV TO DETECT PASSIVE BASED INTRUSION DETECTION ATTACKS IN WIRELESS AD HOC NETWORKSINTINTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY0
4V P Krishna Anne, 3Dr. K. Rajasekhara RaoImproved RCPHC to Detect IDS in Dynamic Wireless Ad hoc NetworksINTInternational Journal of Emerging Research in Management &Technology0
5Dr.S.Satyanarayana, T.Gopi kiranMulti Deployment AND Multi Snapshoting on cloudsINTIJCOT0
6A.Dhana Lakshmi, Dr.V.Srikanth, T.Pavan KumarRouting Security Against Flooding Attack In Wireless Adhoc NetworksINTIJAIR0
7Dr.Chalasani Srinivas1,Ch. Ramesh Kumar2Lanka Sunitha3Solving the Vehicle Routing Problem Using Genetic AlgorithmINTJournal of Social, Technological and Environmental Science •0
8T.Subha Masthan Rao, Thinley Lendup, Thingly Wandi, 4.SujathaHybrid Model for Preprocessing & Clustering of Web Service LogsINTIJCAES0
9Dr.S.Satyanarayana, B.Raj Kumar, V.David, 4.Siva NagarajuWireless Sensor Networks in Cloud ComputingINTIJAIR0
10G.Shyam Chandra Prasad, Dr A.Govardhan, Dr. T V RaoA Low Indexed Content Based Neural Network Approach for Natural Objects RecognitionINTIJCSIT2009
11V V Sobha , K Rama Krishna, and RK KondraguntaEffect of Thermal Dispersion and Ciscous Dissipation on MHD Radiative Non-Darcy Mixed Convection in a Fluid Saturated Porous MediumINTInternational Journal of Mathematical Archive2009
12Srikanth.V, I Ramesh BabuDelay adjust MAC protocol for enrgy efficiency in wireless sensor networksINTOriental Journal of Computer Science & Technology 2009
13Srikanth.V and I Ramesh BabuRLL-MAC: Reliable and Low Latency MAC for Event Critical Applications in Wireless Sensor NetworksINTInternational Journal of Computer Science and Network Security2009
14V. Kiran Kumar, Dr K Raja Sekhara RaoTBL2RDF:HTMLTable to RDF TranslatorINTIJWA2009
15M Vishnu VardhanA Novel way of Providing dynamic adaprability in Java Socket programs and Web Serivces Using AOPINTIJST2010
16B Ramesh Babu, K.Rama Krishnaiah, K.Rajasekhara RaoFast Training Algorithms for SVM’s for Large Data SetsINTIJCSIT2010
17A.Ramaswamy Reddy, M S R Prasad and C.NagarajuA Novel Boundary based Image Segmentation for Image Classification and AnalysisINTIJCSE2010
18G Shyama Chandra Prasad, Dr A Govardan and Dr. T V Rao.A Novel Method of Image Recognition Through Principal Component AnaLlysisINTIJCEIT2010
19G Shyama Chandra Prasad, Dr A Govardan and Dr. T V Rao.Neural Network based context dependent recognition approach for low indexed imagesINTIJCIR2010
20ANONIDX Kumar Tiwari, Lokesh Kumar Sharma and Dr. G. Rama KrishnaEntropy weighting genetic K-Means algorithm for subspace clusteringINTIJCA2010
21K.Rama Krishnaiah and Dr. K Rajasekhara RaoA Graph Based Model of Wireless Mesh NetworksINTJournal of Computer and Mathematical Sciences2010
22CH.V.Phani Krishna, S.Satyanarayana, Dr. K Rajasekhara RaoNovelty of Extreme ProgrammingINTIJCMI2010
23Mr V Rama KrishanaAcceptance Decision Rule for type I Generalized Half Logistic DistributionINTIJCTT2011
24G SivaNageswara Rao , Dr. K KrishNa murthy and B V Subba Rao.Reap information through procedure framework in an electronic process steerINTIJCSET2011
25A Ramaswamy Reddy, B Srinivas Rao, G Siva Nageswara Rao and C Nagaraju.A Novel method for aqua marine learning environment for classification of fish databaseINTIJCSC2011
26Shahana Bano, Dr. M S Prasad Babu and E nagendra Prasad T.A new Approach for edge detection using first order techniquesINTIJCST2011
27Ajaya Kumar Akasapu, Lokesh Kumar Sharma and Dr. G. Rama Krishna.Efficient Trajectory Pattern Mining for both parse and Dense Data SetINTIJCA2011
28K Rosaiah and Dr V Rama KrishnaGeneralized Half Logistic Distribution Acceptance Decision RulesINTIndian Journal of Clinical medicines2011
29Dr K Subrahmanyam and MariyamNONIDXzviaEvaluation of Critical Success Factors for Telemedicine ImplementationINTIJCA2011
30Ms Shahana Bano, Surendra Prasad Babu and C.naga Raju.A New Proposed Method For Image Segmentation Based On Gray Scale Morphological TransformationsINTIJCST2011
31Dr K SubrahmanyamComparative Study of DECIM-128 and DECIMV2 in relation to compact hash based message authentication codeINTIJCSIT2011
32Dr K SubrahmanyamAnalysis and Groping of Movable Object Patterns Using Similarity Measure of Trajectories in Wireless Sensor NetworksINTIJCSET2011
33Dr V Rama KrishnaGeneralized Half Logistic Distribution Acceptance Decision RulesINTANU Journal of Physical Science2011
34Mr V Rama KrishanaSynchronous Distributed path Computation Algorithm For High Speed NetworksINTGJCAT2011
35Mr M R Narasinga RaoPredicting the wellbeing of diabetic patients using Feed Forward Neural Network Constructive AlgorithmINTIJSAT2011
36Mr M R Narasinga RaoA Novel Facial Recognition Model Using An Artificial Neural NetworkINTIJSAT2011
37Dr K SubrahmanyamSystems Thinking and Practice for Telecommuting IssuesINTIJCA2011
38Dr. K Rajasekhara RaoPrivacy Preserving Distributed Data Mining: A new Approaches for detecting network traffic Using StegonographyINTIJST2011
39Dr. K Rajasekhara RaoPrivacy Preserving Clustering in data mining using vector QuantizationINTRJCSE2011
40G SivaNageswara Rao, Dr K KrishNa Murthy, B V Subba Rao and Dr KNageswara Rao.A mentoring program for information convey in a small software consultancyINTIJI-KRIT2011
41G SivaNageswara Rao, Dr K Krishna Murthy, B V Subba Rao and Dr KNageswara Rao.Tailoring and Prologue of the rational unified processINTIJI-KRIT2011
42Mrs D Radha RaniAnalysis of Dendogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional DataINTIJETT2012
43Mrs D Radha RaniDeep Web Mining Using The Concepts Of Bayesian Network And Active LearningINTGJCAT2012
44T Vijaya SaradhiDynamic Item Set Counting and Fuzzy association Rule Mining in Stock MarketINTGJCAT2012
45T Vijaya SaradhiAnalysis and Grouping of Movable Object Patterns Using Similarity Measure of Trajectories in Wireless Sensor NetworksINTIJCSET2012
46Mr T Vijaya SaradhiConstraintless Approach of Power and Cost Aware Routing in Mobile Adhoc Networks INTIJCA2012
47Mrs Ch Radhika RaniSCARP: Secure Congestion Aware Routing Protocol For Wireless Sensor NetworksINTIJCSE2012
48Ms Ch Jyostna DeviANN Approach for Weather Prediction Using Back propagationINTIJETT2012
49Ms Ch Jyostna DeviInteracting with Dynamic Web Portals in Local LanguageINTIJSER2012
50Ms Ch Jyostna DeviUDA: Update Driven Approach for Continously Moving ObjectsINTIJSER2012
51Mr P V Vara PrasadAnalysis of Intrusion Detection TechniquesINTGJCAT2012
52Mr P V Vara PrasadExploring data Aggregation techniques in wireless on basis of network topology and security issuesINTIJESAT2012
53Mr P V Vara PrasadCongestion Control Mechanism for Wireless Mesh NetworksINTGJCAT2012
54Mrs K Ruth RamyaImproved Decision tree algorithm for data streams with concepts drift adaptationINTIJSER2012
55Mrs K Ruth RamyaA Class Based Approach for Medical Classification of Chest PainINTIJETT2012
56Mrs K Ruth RamyaOntology based Data Mining Application for the Enhancement of PrivacyINTIJASCT2012
57Mrs K Ruth RamyaAn Effective Strategy for Identifying Phishing Websites using Class-Based ApproachINTIJSER2012
58Mr B Chaitanya KrishnaIEB: Integrated Testing Environment on Loop BoundariesINTIJESAT2012
59Mr B Chaitanya KrishnaAn Efficient Face Recognition System by Declining Rejection Rate Using PCAINTIJESAT2012
60Mr B Chaitanya KrishnaPerformance on ARCP for Various Region Mobile Emissary EnvironmentsINTGJCAT2012
61Mr G D K KishoreAutomated Anomaly and Root Cause Detection in Distributed SystemsINTIJETT2012
62Mr G D K KishoreDecision Making and Reduction Techniques for Tax Revenue using Data WarehouseINTIJETT2012
63Mr G D K KishoreA CSMA/HN Algorithm for Optimized throughput in Wireless NetworksINTGJCAT2012
64Mr J Venkata RaoAn Efficient Approach for Debugging the WPAN Using Packet AnalyzerINTIJCST2012
65Mr J Venkata RaoImplementation of SaaS in a cloud computing environmentINTIJCST2012
66Ms N Naga KumariRelevant data clustering in web search engineINTIJCSIT2012
67Ms A AnushaEnforcement of Security within Wireless Adhoc NetworksINTGJCAT2012
68Ms G AnupamaEnhancing of data minig query language for transactional databases as a hypothesis schemeINTGJCAT2012
69Ms P SrivalliAvoidance of collision and overhearing in WSNINTIJCSIT2012
70Ms M MadhaviAutomatic Privacy Query Updation for Moving ObjectsINTIJESAT2012
71Ms M MadhaviAn Approach for location Privacy Framework for Continuously moving ObjectsINTIJERA2012
72D Rajeswar RaoOptimized Algorithms for Evaluation of Neuro Fuzzy Hybrid NetworksINTGJCAT2012
73U NanajiINCOG Query Processing in NetworksINTIJCSIT2012
74U NanajiDynamic Approach to retrieve Web PagesINTIJCSIT2012
75U NanajiA New Recovery Scheme for Handling both Link and Node failure in the fast IP NetworksINTIJERA2012
76U NanajiDetecting Application Denial of Service Attacks: A Dynamic Group Testing Based ApproachINTIJCSIT2012
77U NanajiImplementation of P2P Reputation management Scheme based on distributed Identities and Decentralization Recommendation ChainsINTIJERA2012
78U NanajiImplementation of Object Oriented approach to automatic Histogram Threshold based on fuzzy measuresINTIJERA2012
79U NanajiObject Oriented Implementation of concept based user profiles from search engine logsINTIJERA2012
80U NanajiA QOS aware software selection method based on service Credibility EvaluationINTIJERA2012
81G Siva Nageswara RaoRemoving inconsistencies and errors from original data sets through data cleanisingINTIJETAE2012
82M S R PrasadUnsupervised Image Thresholding Using Fuzzy measuresINTIJCA2012
83M S R PrasadImproved Entropic Threshold based on GLSC Histogram with varying similarity measureINTIJCA2012
84Dr V SrikanthA Scientific Approach for Segmentation and Clustering Technique of Improved K Means and Neural NetworksINTIJARCSSE2012
85CH V Narayana, E Srinivas Reddy and M S R Prasad.Automatic Image Segmentation using UltrafuzzinessINTIJCA2012
86Dr. J K R Sastry, Prof Subba Rao and Ms J Sasi Bhanu.Counter Attacking Electromagnetic attacks for securing Embedded SystemsINTIJAST2012
87Dr. J K R Sastry, Prof Subba Rao and Ms J Sasi Bhanu.Counter Attacking method for Embedded Systems against Power AnalysisINTIJCIS2012
88J Sasi Bhanu, A Vinay Babu, Dr J K R Satry and Dr P Thrimurthy.Dynamic Evolution of Syntax for Communicating with Embedded SystemsINTITEECE2012
89Dr. J K R Sastry, N Venkatram, Ms Sahithy Ramya , Dr L S S Reddy.On dynamic configurability and Adaptability of Intelligent Tags with Handheld Mobile DevicesINTIIJECS2012
90Dr. J K R Sastry, N Venkatram, Dr K Srinivas Ravi , Mr G Pradeep, Dr L S S Reddy.On Locating intelligent TagsINTIIJECS2012
91Dr. J K R Sastry, N Venkatram and V Santhi Chandra.On Integrating Hardware of Distinct Embedded System BoardsINTIJCEA2012
92M.Vishnuvardhan and T RameshComposite Design Pattern for Feature Oriented Service Injection and Composition of Web Services for Distributed Computing Systems with Service Oriented ArchitectureINTIJWesT2012
93Badukonda Madhusudhana Rao, Uppe Nanaji and Y Swapana.Multiviewpoint Based Similarity Measure and Optimality Criteria for Document ClusteringINTIJAIR2012
94B Krishna Kishore, Uppe Nanaji and Y Swapana.Improving Utilization of Infrastructure CloudsINTIJAIR2012
95K S B Deepthi, Uppe Nanaji and Y Swapana.Effective Key Establishement and Authentication Protocol for Wireless Sensor Networks Using Elliptical Curve CryptographyINTIJAIR2012
96U Nanaji and Prof Chandan mazumdar.Application and Protocol Architecture in Wireless Adhoc NetworksINTIJAIR2012
97Korada Vasudevarao, Uppe Nanaji and Y Swapana.Nymble: Blocking Misbehaving Users in Anonymizing NetworksINTIJAIR2012
98M.R.Narasinga raoA Study of Psychosocial and Built environment factors for diabetes using MLP Neural networksINTinternational journal of computer applications2012
99K.Nageshwara Rao, D.Rajya Lakshmi, Dr.T.V.RaoA Novel Class Imbalance Learning Method using Neural NetworksINTIJAIS2012
100Prof S VenkateswarluExchange of Peer to Peer Identity Reputatio Using Cryptology ConventionsINTIJCSIT2012
101Prof S VenkateswarluAn Efficient Mechanism for Intrusion Detection and Prevention SystemINTIJSTInternational Recognition Research Journals- Golden Research Thoughts2012
102Prof S VenkateswarluSimulation of Frequency Selective Raleigh Faded HF Channel for Data Transmission Using Decision Feedback EqualizerINTIJESAT2012
103Prof S VenkateswarluOnline Mobile Backup and Power Optimized Retrieval Through MessagingINTIJESAT2012
104Ch. V. Phani KrishnaSurvey on extreme programming in Software EngineeringINTIJCTT2012
105Ch. V. Phani KrishnaMetaphor: Elucidate the system Architecture in XPINTIJCTT2012
106Ms T RevathiWeb Based Share TrackerINTIJCST2012
107Dr. J K R Sastry, Prof K Subba Rao and Ms J Sasi Bhanu.Counter Attacking Fault Injections into Embedded SystemsINTIJRRAMCS2012
108M.Vishnuvardhan and T RameshLoad Distribution Design Pattern for Genetic Algorithm Based Autonomic SystemsINTElsevier: Procedia Engineering2012
109M.Vishnuvardhan and T RameshDesign Pattern for Feature Oriented Service Injection and Composition of Web Services for Distributed Computing Systems with SOAINTElsevier: Procedia Engineering2012
110M.Vishnuvardhan and T RameshLoad Distribution Composite Design Pattern for Genetic Algorithm Based Autonomic Computing SystemsINTIJSC2012
111A V Praveen Krishna, Bhavya Boggavarapu and Sindura Katragadda.Maintenance of Entropy through Token Parceling and Verification of Error Bumping OFF for Protection in Cloud ComputingINTIJARCCE2012
112Uppe NanajiSpatiotemporal Data Mining : Issues, Tasks and ApplicationsINTIJAIR2012
113R V L S N Sastry, B Srinivas, P.Satheesh and U NanajiSkin Recognition Methods using Explicit Image FilteringINTIJAIR2012
114K Raja Sekhar, Dr L S S Reddy and U J Kameswari.Secure System of Attack Patterns towards Application Security Metric DerivationINTIJCA2012
115Sasi Veena D , Yojana Y and K V D Kiran.Performance Analysis of Network Resources in Standard Access ProtocolsINTIJCSIT2012
116Dr. J K R Sastry, Prof Subba Rao and Ms J Sasi Bhanu.Counter attacking the timing attacks on Embedded SystemsINTIJAST2012
117S Suneetha, Siva Priya T, Dr C Naga Raju and M S R Prasad.A Novel Interclass Clustering Method for Image ReconstructionINTIJARCSEE2012
118P Ajithand, Dr. K RajasekharaRole of Data Mining : A Technical Education PerspectiveINTIJECST2012
119Jiwan Pokharal, N Sai Sumanth , Dr CH Rupa, T Vijaya Sharadi.A Keyless JS AlgorithmINTIJESAT2012
120B.VeeramalluEncryptedtextPolicy Attribute Based Encryption and Broadcasting using BODINTIJCMI2012
121Dr S SatyanarayanaDesign on Security of Hybrid Cloud Business Intelligence SystemINTIJCMI2012
122V.Rama krishna, MR.Narasinga Rao, T.M.PadmajaSoftware Reliability Prediction Using neural networksINTinternational journal of computer applications2012
123Dr.T.V.RAO, B.Siva Rama Krishna, AMK Kannababu4.Sai Satyanarayana reddyA Novel Approach to deals with multiplr QOS Constrained Scheduling Stratagy of Multi Workflows using decentralized algarithms and network overlaysINTGJCAT2012
124Dr.T.V.Rao, Chanakya GM, Sk.SalamIconic Web Retrival System Using OntologiesINTVSRD IJCSIT2012
125Prof S VenkateswarluMicrostrip patch antenna using holographic structure for WLAN and Ku Band` applicationINTIJERA2012
126Dr. T V RaoHiding the Text information Using StenographyINTIJERA2012
127Dr. T V RaoDynamic Allocation of Proxies for Improving the PerformanceINTIJCOT2012
128Dr. T V RaoSignificant Storage on Sensor Storage Space,Energy Consumption and Better Security Based on Routing in Hybrid Sensor NetworksINTIJASUC2012
129Dr. J K R SastrySoftware Framework for Implementing Add-on Applicatio0ns on Mobile Phones that runs on Android Operating System for Effecting Peer Communication with application Components Resident on Intelligent TagsINTRJCSE2012
130Dr. J K R SastrySoftware Architecture for Implementing Dynamic Configurability and Adaptability of Intelligent Tags with handheld Mobile DevicesINTIJCEA2012
131Dr. J K R SastryDevelopment of Software Architecture for Building Intelligence to Secure the Communication between the Tags and Mobile DevicesINTIJVES2012
132Dr. J K R SastryGenerating Code Related to embedded Software for Modeling Clear Box StructuresINTIJCEA2012
133Dr. J K R SastrySoftware Architecture for implementing tamper detection system within an intelligent tag related embedded systemINTIJCEA2012
134Dr. J K R SastryAn Approach towards Development of Communication Standard around CAN Protocol Suite for Networking Embedded SystemsINTIJAST2012
135Dr. J K R SastryTesting Embedded Systems through refined CRSE MethodologyINTIJESR2012
136Dr. J K R SastryAn Approach to Cognition Built-in Knowledge DiscoveryINTIIJDWM2012
137Dr. J K R SastryAn Architecture for Mining WEB Content Hosted on clustered backend ServersINTIIJDWM2012
138Dr. J K R SastryAn Open Specification for Firewire Standard to Extend its Suitability to Diversified applicationsINTITEECE2012
139Dr. J K R SastryAutomated Generation of Test cases for Testing critical regions of Embedded Systems through Adjacent Pair-wise TestingINTIJMCMST2012
140Dr. J K R SastryAn Efficient Architecture for Enforcing Mobile Security through In-cloudsINTIJRRAMCS2012
141Dr. J K R SastryEfficient Power Management Techniques for increasing the Longevity of Intelligent TagsINTITEECE2012
142Dr. J K R SastryBuilding Intelligence into TAGs for Tamper ProofingINTIJAST2012
143Dr. J K R SastryOn Identifying Intelligent TAGS with remote HOSTINTITEECE2012
144Dr. J K R SastryAn Architecture Framework for Implementing add-on applications on Mobile phones that runs on Android os for effecting peer communication with application components resident on intelligent TAGSINTITEECE2012
145Dr. J K R SastrySimulation Models for Adding Cognition into Traffic Management systemsINTIIJC2012
146Dr. J K R SastrySoftware Architecture for Implementation of Location Management in intelligent TAGSINTITEECE2012
147Dr. J K R SastryOn Building Intelligence for Securing Communication between the Tags and the mobile DevicesINTIJMAN2012
148Dr. J K R SastrySoftware Architecture for Implementation of Identification Systems within Intelligent TAGSINTIJAST2012
149Dr G Rama KrishnaA New Approach to Maintain Privacy and Accuracy in Classification Data MiningINTIJCSET2012
150Dr G Rama KrishnaEfficient Approaches for the Preventions of Unsolicited Access to Sensitive DataINTGJCAT2012
151Dr K SubrahmanyamWeb Hosting in the Cloud: Key Considerations for the Deployment of web Application to attain High availability, Scalability and Reliability in the CloudINTIJASRT2012
152Dr K SubrahmanyamBuilding Highly available, Scalable and Reliable Architectures for Web Applications in CloudINTIJCA2012
153Dr K SubrahmanyamAttacks on Anonymous SystemsINTIJCST2012
154B.Ramesh BabuAn Algorithm Approach to Avoid Starvation in Wireless Mesh NetworksINTIJCA2012
155M.V.B.T.SanthiEnhancing K-Means Clustering AlgorithmINTIJCST2012
156M.V.B.T.SanthiSecurity Issues on Inter-Vehicle CommunicationsINTIJCSIT2012
157K.Seetha DeviEvaluated and Suggested Range Aggregate Query Approximation on Data Cubes in P2P NetworksINTIJCSET2012
158Divya VInferring Private data by providing privacy preserving TechniquesINTGJCAT2012
159Divya VProbing Agent Based Anomaly Solving Strategies for Dynamic Distributed Scheduling in Railway TransportationINTIJCSET2012
160P.Venkateswara RaoComparitive Study of DECIM-128 and DECIM-V2 in Relation to Compact Hash Based Message Authentication codeINTIJCSIT2012
161Ms T RevathiAn Effective Analysis of Weblog Files to Improve Website PerformanceINTIJCSCN2012
162V.SrujanaIDS Alert classifications using data mining techniquesINTGJCAT2012
163V.SrujanaAn inference Routing Tree Topology Algorithm for Reducing Overhead in Packet ProbingINTIJCSIT2012
164N.JanardhanAttempt to Provide Web Accessibility for Low Vision and Color Deficient PeopleINTIJCA2012
165K.SireeshaVoice Recognition browser for reduced vision and vision loss learners.INTIJSER2012
166Prof. V Chandra PrakashThe Relevance of Clean Room Software Engineering Methodology for the Development of Embedded SystemsINTIJCIS2012
167Prof. V Chandra PrakashCode Generation for Embedded Software for Modeling Clear Box StructureINTIJANA2012
168Ch.Satya Keerthi N.V.LIntrusion Detection System Using Genetic AlgorithmINTIJCTT2012
169T.Subha Mastan RaoFramework for Testing Web Applications using Selenium Testing tool with respect to Integration TestingINTIJCST2012
170T.HemaLathaPerformance Evaluation Methodology for Biometric AuthenticationINTIJCST2012
171T.Subhamastan RaoSimultaneous Data Compression and EncryptionINTIJCSIT2012
172Dr.V.SrikanthAutomatic Histogram Threshold with fuzzy measures using C-MeansINTIJCSI2012
173T.Hema lathaIntelligent Data Mining in Autonomous Heterogeneous Distributed Bio DatabasesINTIJCSIT2012
174K.RavindranathA Prototype Model to generate attack towards application security metric generationINTGJCAT2012
175K.RavindranathOpernic performance analysis of iBURST,HIPHERMAN and GSMINTIJCNS2012
176Ch.Satya keerthi N.V.LSecurity issues on inter vehicle communicationsINTIJCSIT2012
177T.Subha Mastan RaoWeb Usage Mining on Cluster ArchitectureINTGJCAT2012
178G.Rajendhra KumarA Cryptographic Approach to Securely Share Genomic SequencesINTIJCSIT2012
179T. Pavan KumarEmotion Recognition from SpeechINTIJCSIT2012
180T.Subha Mastan RaoAn Enhanced Frametwork For Performing Pre-Processing On Web Server LogsINTIJETT2012
181K. RavindranathA Secure Architecture for Anonymizer NetworksINTIJCSIT2012
182K. RavindranathOptimal State Allocation for Multicast Communications withExplicit Multicast ForwardingINTIJERA2012
183Ch.Satya Keerthi.N.V.LBehaviour based Trust Management Using Geometric mean approach for Wireless Sensor NetworksINTIJCTT2012
184K. RavindranathDesign of a browser for people with low visionINTIJCSIT2012
185K. RavindranathAn Enhanced secure method for mobile agentsINTGJCAT2012
186Divya VRivet on Disseminated Problem Solving Techniques in Airtraffic Flow ManagementINTIJCSET2012
187Dr K SubrahmanyamA Novel Approach for Classification of a Database Using Decision Tree InductionINTGJCAT2012
188Dr K SubrahmanyamA Survey on Traffic Flow Correlation Attacks in Anonymity NetworksINTIJESAT2012
189Dr K SubrahmanyamABIQUO: A Proficient Enterprise Cloud Management Platform Intended for Hyper Visor Independency, Integrity and ScalabilityINTIJESAT2012
190Dr K SubrahmanyamA Generalized Framework for Building Scalable Load Balancing Architectures in the CloudINTIJCSIT2012
191K Raja SekharA Prototype Model to generate Attack Patterns towards Application Security Metric GenerationINTGJCAT2012
192K Raja SekharThe Fault Management System Using Amazon EC2: Web Application Deployment on cloudINTIJCSIT2012
193K Raja SekharAn Overview of Intrusion detection System Strategies and IssuesINTIJCST2012
194Mr K V D KiranEfficacious Distributed Arbitary Node Duplication Attacks in Wireless NetworksINTIJCTT2012
195Mr K V D KiranData Transferring Mechanisms for Multipath Routing Using Concentrated Dissimilate Algorithm in Wireless NetworksINTIJCTT2012
196Mr K V D KiranEnhanced Dynamical Hierarchical Mobile Internet Protocol for Mobile IP NetworksINTIJCSIT2012
197Mr K V D KiranAnalysis and Individualization of Clients concern based on the Internet Browsing HistoryINTIJCSIT2012
198Mr K V D KiranAnalysis and Performance of ARCP for Multi Region Mobile Emissary EnvironmentsINTIJCSIT2012
199Mr K V D KiranAnalysis of Finite state Machine and Classical Iterative Cluster Labeling for 3D Images on Mobile Computing StrategiesINTIJCSET2012
200Mr K V D KiranDistributed Performance Evaluation Tool for Inferring Router Packet Forwarding Based on PriorityINTIJEST2012
201Mr. S.Srinivasa RaoAnalysis of Software Reliability and cost Assessment Relationship for Architecture based SoftwareINTGJCAT2012
202Mr Y A Siva PrasadSearching Multidimensional Historical Data Using Quisea Algorithm in P2P NetworksINTIJCSET2012
203Mr Y A Siva PrasadStudy of Anomaly Identification Techniques in Large scale SystemsINTIJCTT2012
204Ms V Sneha LathaPerformance Evaluation of Different Line CodesINTIJCSE2012
205Ms V Sneha LathaA Novel Approach for Live Streaming Using ZigZag & SplitstreamINTGJCAT2012
206J Sasi BhanuScenario Based Comprehensive Testing of Embedded Systems using Data ModelsINTIJAST2012
207J Sasi BhanuAn Efficient Elliptic Curve Cryptography Application in Constrained Mobile EnvironmentINTGJCAT2012
208J Sasi BhanuA Generalized Method for Data Extraction from Web PagesINTGJCAT2012
209Mrs D Radha RaniMining Items From Large Database Using Coherent RulesINTIJESAT2012
210Mrs D Radha RaniAutomated Personalization of web Directories for Usage data using web usage MiningINTIJESAT2012
211Divya VExcogitating File Replication and Consistency maintenance strategies intended for Providing high Performance at low cost in peer to peer networksINTIJCSET2012
212Mrs K Ruth RamyaMobile PC Suite: Using Mobile Phone as Remote to control Pc OperationsINTIJCSIT2012
213N Naga KumariA Survey on Best Scheduling policies for multihop wireless networksINTIJCST2012
214P.SrivalliSMesh Frame Work for dynamic groups in peer to peer systemsINTGJCAT2012
215A V Praveen KrishnaPrivacy Defensive of Public Auditing data storage in Cloud EnvironmentINTIJETED2012
216A V Praveen KrishnaData Security in Cloud: A Proposal towards the Security IssuesINTIJCSET2012
217A V Praveen KrishnaImplementation of MA-ABE for better Data Security in cloudINTIJCST2012
218A V Praveen KrishnaExtension of MA-ABE for better data Security in Cloud-Large Universe ConstructionINTIJASRT2012
219Ms T RevathiSentence Level Semantic Classification on Online Product Reviews of Mixed Opinions Using naivedayes ClasifierINTIJCSIT2012
220Ms T RevathiAn Enchanced Pre Processing Research Framework for Weblog DataINTIJARCSSE2012
221Shahana BanoKeyword based word sense extraction in a index for text files:Design approachINTIJDMKE2012
222Shahana BanoRandamization method and group based anonymization in privacy preserving data miningINTGJCAT2012
223Shahana BanoA joint 2 level and multilevel approach for sentiment analysis at document levelINTGJCAT2012
224Dr. K Rajasekhara RaoA Hybrid Routing Protocol for Wireless Mesh NetworksINTIJAEST2012
225Dr. K Rajasekhara RaoA Cross Layered Architecture and its proposed security mechanism to lessen attacks vulnerability in mobile adhoc networksINTIJCSIT2012
226Dr. K Rajasekhara RaoA New Stravation Mitigation Algorithm for wireless networksINTIJCST2012
227Dr. K Rajasekhara RaoDistributed Data Mining: Server Selection and Query Processing based on communication costsINTRJCSE2012
228Dr. K Rajasekhara RaoA survey on attacks and defense metrics of routing mechanism in mobile adhoc networksINTIJACSA2012
229Ch. V. Phani KrishnaSoftware Quality Assurance in CMM and XP-A Comparative StudyINTIJCSIT2012
230Ch. V. Phani KrishnaCombining Agile Software Development and Software Product Line EngineeringINTIJEECT2012
231Ch. V. Phani KrishnaAccomplishing Constraints Using Artifact-Centric Operational Modeling in Multiple ArtifactsINTIJRST2012
232Dr.V.SrikanthAchieving Green Computing through Algorithmic EfficiencyINTIJIT2012
233D Rajeswar RaoData Integrity in a Fuzzy Cloud Computing Considering Data MiningINTGJCAT2012
234K. Phaneendra, Venu Madhav SunkaraParameter dependent performance optimization in live migration of Virtual MachineINTIJMER2012
235Dr.K.V. V Satyanaraya, G.Radhika, A.TejeswiEfficient Framework for Deploying Information in Virtual Datacenter with cloud security ApplicationINTIJETAE2013
236Prof.S.Venkateswarlu, G.M Deepa, G.SritejaAttacking Cloud Through Cache based Side Channel in Virtualized EnvironmentINTijarcsee2013
237Dr.A.Srinivasa rao, P.Santhosh KumarDistributed Agent Based Expert System in Health CareINTijarcsse2013
238Dr.K.Subramanyam, S.Jaya Prakash, U.D.S.V.PrasadMulti Clouds Model For Service Avalability And SecurityINTIJCSET2013
239Dr.M.R Narasinga Rao, K.Lokesh KumarDamage Detection in Cantilever Beams using Artificial Neural NetworksINTIJMPERD2013
240Dr.D.Rajeswara Rao, K.Rajesh, K.Venkat ReddyA Comprehensive Study on Making food using Rice cooker with Fuzzy logic techniqueINTIJCSIT2013
241Dr.K.Subramanyam, S.Jaya Prakash, U.D.S.V.PrasadImprovised K-means Clustering Algorithm in Data MiningINTGJCER2013
242V.Srinivas, Sahithi, P.Yuvaraj, 4.Ravi KanthTosca Enabling Cloud PortabilityINTIJARCET2013
243Dr.Ch.V.Phani Krishna, D.Sowmya, A.Suresh, 4.V.Samson Deva KumarImage Retrieval effective methods in image processingINTIJCSMR2013
244K.Venkataraju, P.Dinesh, SuhasiniEffective Utilization of cache in cloudINTIJARCSSE2013
245Dr.S.Satyanarayana, M.Srujana, Y.Divya, 4.GirvaniReliable Proxy Re encryption in unreliable cloudsINTIJARCSSE2013
246Dr.K.V.V Satyanarayana, Hashmi, A.Shiva Rama RaoStandadization of systems and processes for CDR Based Billing SystemINTIJCER2013
247Dr.K.V.V Satyanarayana, D.Harika, Y.S LakshmiCollectional Activities Forecast via insution using social network sitesINTIJSR2013
248Dr.K.V.V Satyanarayana, D.Harika, Y.S LakshmiStudy and Scalable eruditries by using Communel activitiesINTIJETAE2013
249V. Akhila, Nikita Mahajan, B.V.SriRam, 4.Dr.N.SrinivasSecurity Through Multiple Unrelated Clods in Cloud ComputingINTIJCTT2013
250P.V.R.D.Prasada Rao, GovardhanInsilico Identification of Novel Inhibitors Against HIV-1 Reverse transcripitateINTIJCTT2013
251N.Janardhan, Y.Raja SreeCloud data Protection For the MassesINTIJCTT2013
252N.Janardhan, Y.Raja Sree, HimajaData Invulnerability and data integrity Verification of multi cloud storageINTIJCTT2013
253Dr.D.Rajeswara Rao, K.Rajesh, K.Venkat ReddyHand Writen Character Detection By using Fuzzy Logic TechniquesINTIJETAE2013
254Dr.D.Rajeswara Rao, K.Rajesh, K.Venkat Reddy, 4.U.AnkaiahHand Writen Character And digit recognition using Artificial Neural NetworksINTIJARCSSE2013
255Dr.D.Rajeswara Rao, K.RajeshA Novel Study on Complex Fuzzy LogicINTIJSR2013
256V.Srinivas, K.Bhavya, K.YaminiCloud Services Portability for Secure MigrationINTIJCTT2013
257V.Srinivas, Pratheek Singel, KVD KiranOptimizing Aggregation Query ProcessingINTIJAIR2013
258V.Srinivas, Bhavana, V.Alekya, 4.K.DeepaPassword Authentication System for Cloud EnvironmentINTIJACSIT2013
259K.Venkataraju, Raja Mohan, ChaitanyaEnable Open Verifiability and Data Dynamics for Storage Protection in Cloud ComputingINTIJCTT2013
260K.Venkataraju, Raja Mohan, SuhasiniApproaching Protected and Reliable Storage Space Services in cloud computingINTIJEA2013
261K.Venkataraju, Raja MohanPrivacy Preserving Public auditing System for data storage security in cloud computingINTIJCTT2013
262P.V.R.D Prasada Rao, K.R.R Mohan, Dr.A.GovardhanIdentification of Novel Inhibitors against HIV-RT Through Virtual ScreeningINTIJCTT2013
263Dr.S.Satyanarayana, sruthi, sri rashmi, Providing Cloud Services over mobile cloud dataINTIJCTT2013
264Dr.S.Satyanarayana, M.Ramya, M.maha lakshmi, 4.Venkata NareshRanked Keyword Search in cloud computingINTIJCTT2013
265K.V.D.Kiran, N.Kusuma, Sai Tejaswi4.T.AnithaNetwork Security Using Quantum CryptographyINTIJCTT2013
266Dr.K.V.V Satyanarayana, D.Veena Sanjitha, T.V.N Sai SindhuraDependable and Secure Storage services in cloud computingINTIJCTT2013
267Dr.K.V.V Satyanarayana, T.Bala Keishna, Y.Venkateswara RaoSecure and Dependable Storage in cloud computingINTIJCTT2013
268Dr.K.V.V Satyanarayana, G.Radhika, A.TejaswiEfficient Framework for Deploying Information in cloud Virtual Datacenter with cryptography algorithmsINTIJCTT2013
269Dr.Rajeswara Rao, SonawaneXml Document MiningINTIJRCEE2013
270Dr. J K R Sastry, K.Ruth Ramya, M.Devi Kavya PriyaRandom Indexing Based Web User Clustering for faster NavigationINTIJCSIT2013
271Dr.B.Vijay Babu, G.Kiran KumarReduction of Greedy Forwarding Using Overlay Multicasting in Mobile Ad Hoc NetworksINTIJCTT2013
272Dr.V.Ramakrishna, M.R Narasinga Rao, Sk.sunaina Sulthana, 4.T.GeethikaTransaction Based Prioritizatioh Stratagies for E-mail ApplicationsINTIJARET2013
273Dr.K.Subrhamanyam, Jaya Prakash, U.D.S.V PrasadTmaper Proof JAR Client For Distributed Accounrability for Data Sharing in the CloudINTIJDCST2013
274Dr.T.V RaoPassword Based Scheme and Testing for Defending DDOS AttacksINTIJNSA2013
275G.Sivanageswara rao, Navya Sree, J.Venkat RaoA Graspable Learning system for the classification of XML documentsINTIJCSIT2013
276J.Venkat Rao, G.Sivanageswara rao, K.AnushaData leakage Detection using encrypted fake objectsINTIJP2PNTT2013
277G.Sivanageswara rao, Navya SreeAn Efficient classification Approach for the XML DocumentsINTIJCTT2013
278G.Sivanageswara rao, J.Venkat Rao, K.AnushaUnobtrusive Technique for the detection of data seepageINTIJCSIT2013
279G.Sivanageswara rao, CH.V Phani Krishna, Dr.K.Rajasekhar RaoExtreme programing Verification using unified processINTIJCSIT2013
280K.V.D.Kiran, Sitaram chowdary, P.Vittal KumarGame theory :A new Approach for video streaming in mobile networksINTIJCSMR2013
281Dr. J K R Sastry, M.V.B.T Santhi, S.pavaniA New Clustering Technique Based on user search HistoriesINTIJDCST2013
282K.V.D.Kiran, Gidla JohnApple TalkINTIJCSMR2013
283Mr.M S R Prasad, P.Radha KrishnaA Novel q-parameter Automation in Tsallis Entropy for Image SegmentationINTIJCA2013
284K.Venkataraju Santhi SwaroopSurvey on Advanced Data Mining ApplicationsINTIJEA2013
285K.V.V SatyanarayanaA Novel Framework for Virtual Desktop Environment with vAppINTIJCA2013
286Dr.M.R Narasinga Rao, U.Ankaiah, V.Rama KrishnaDetection of error prone software modules using neural networkINTIJCST2013
2871.P.V.R.D Prasada Rao,2.K.Lakshmi Sunitha,3.K.Ram Mohan Rao,4.A.GovardhanAn insilco Approach to Restrain Hiv Replication Through Clustering and Virtual ScreeningINTIJCST2013
288Dr.S.SatyanarayanaEffective Bandwidth Allocation Approach on Users Billing in Cloud EnvironmentINTIJCSMC2014
289V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi RaoAnalysis on Virtualization Technologies in CloudINTIJARCET2014
290koushik reddy,Dr.Syed Umar,Seelam eswar ReddyThe Survey of Congestion control protocols for smart transport systemINTijircce2014
291Dr.S.SatyanarayanaCloud Based Platfrom as a Services of Panoramic Approach of Graphical 3D WireframeINTGESJ2014
292Dr.S.SatyanarayanaCloud Based Platfrom as a Services of Panoramic Approach of Graphical Boundary Value Differential Equation SolutionsINTGESJ2014
293 K.V.D.Kiran, Ramesh.Rayala, Sameer.Bodepudi and Uday.DommarajuLiterature Review on Risk and their componentsINTIJREST2014
294Suresh B.Rathod, V.Krishna ReddySecure Live VM Migration in Cloud Computing: A SurveyINTInternational Journal of Computer Applications(IJCA)2014
295T.Hema Latha,J.R.RajeshAdaptive Query Planning to support continuous Aggregate QueriesINTIJDCST2014
296M.R Narasinga RaoInferences From the ADME Analysis of predicted inhibitors to DPPIVINTIJB2014
297Dr.D.Rajeswara Rao,2.S.SahithyaM Score and K-Anonymity:A M odel For Detection and Protection of DataINTIJETAE2014
298Dr.D.Rajeswara Rao,2.A.RaghuveerPrivacy and Groups Maintaing in Social NetworksINTIJETAE2014
299Dr.D.Rajeswara Rao,2.Lavanya SusannaEffeciently Retrieving Top K Search Results over XML DataINTIJRCEE2014
3001.M.Sheshikala,2.Dr.D.Rajeswara RaoBayesian Approach for E-mail Spam Filtering Based on the E-Mail CountINTIJCA2014
3011.Vidyullatha,2.Dr.D.Rajeswara RaoHadoop Mapreduce Framework in Big Data AnalyticsINTIJCTT2014
3021.K.V.D.Kiran,2.M.V.R Sri Vastava,3.K.Gayatri DeviRisk management in mobile bankingINTInternational Journal of Engineering Research & Technology (IJERT)2014
3031.K.V.D.Kiran,2.P.Sruthi,3.P.S Naseema,4.G.V.S Manju Vani,5.Rishikesh SahuRisk management in online bankingINTInternational Journal of Computer Trends & Technology (IJCTT)2014
3041.Dr.N.Srinivasu,2.S.M.Gouse Samdani,3.L.Sai KiranAsynchronous Data Access and Transaction Decomposition in Distributed DatabasesINTIJARCS2014
3051.K.V.D.Kiran,2.Sk.Sharmila,3.T.AbhishekRisk Assessment in E-Banking INTInternational Journal of Latest Trends in Engineering and Technology (IJLTET)2014
3061.Dr.V.Chandra Prakash,2.A.Naga Vamsi Krishna,3.B.Venkat Raman,4.Pardha saradhiAmeliorative Effectives of Alchohol on Human Diabetic Volunteers -A Prospective StudyINTBritish Journal of Pharmaceutical Research 2014
307K.Sireesha,M.Sri vatsavDiminution of Co channel interference in Femtocell networksINTJOMCCMN(STM JOURNALS)2014
3081.M.Sridevi,2.L.S.S ReddyMining Closed Regular Patterns in Incremental Transactional Databases Using Vertical Data FormatINTIJCA2014
3091.Dr.JKR Sastry,2.Dr.A.Vinaya BabuDirectional Location Finding of Intelligent TagsINTIJRDET2014
3101.Dr.JKR Sastry,2.Dr.A.Vinaya BabuImplementating in cloud security for Effecting secured communication between intelligent tags and mobile devicesINTIJIRCCE2014
3111.Dr.JKR Sastry,2.Dr.A.Vinaya BabuStrategizing Power Utilization within intelligent tagsINTIJPTT2014
312T.Pavan Kumarsurvey:Attack on cognitive radio networks INTIJARCE2014
3131.K.V.Raju,2.K AparnaA Novel Approach for People Interaction in MeetingINTIJCST2014
3141.K.Ravindranath,2.Dr.K.Rajesekhara RaoEnergy Optimized Link Selection Algorithm for Mobile Cloud ComputingINTIJANA2015
315Dr.R.Stya Prasad,Srisaila,Dr.G.Krishna MohanSoftware Reliability using SPRT:Power law process modelINTIJECSE2015
316S.Venkateswarlu,Ch.Radhika Rani,SNM SistraDesign and Development of Data Recovery System for Faded Wireless Communication ChannelINTIJATES2015
3171.P. N. V. Satyakonda, 2.T. Pavankumar,3. E. Suresh BabuRouting on Cognitive Radio Wireless Mesh Networks SurveyINTIJACSE2015
318G.Nageswara Rao, T.V.N.Giridhar And K.V.D.Kiran Effects of Cyber Crime and their Access ControlsINT IJREST2015
3191.Manne Lakshmi Mounika,2.Dr.Syed Umar,3.p.silpaArchitectural Design of D2H MedicareINTIJRITCC2015
3201.K.Tejaswi, 2.Dr.Syed UmarSensor Scheduling Of Nodes Using Clustered Head MechanismsINTIJES&M2015
3211.G.Vijay Kumar,2.M.SreedeviA Review on Security and Privacy Issues in BigdataINTIJ-ETA-ETS2015
322S.Venkateswarlu,Ch.Radhika Rani,SNM SistraDesign and Development of Data Recovery System for Faded Wireless Communication ChannelINTIJATES2015
3231.P. N. V. Satyakonda, 2.T. Pavankumar,3. E. Suresh BabuRouting on Cognitive Radio Wireless Mesh Networks SurveyINTIJACSE2015
324P.Vidyullatha,Dr.D.Rajeswara Rao,g.deepthi,M.R.Narasinga RaoPerformance analysis and optimization of supervised learning technique for medical Diagonis using open source toolsINTIJCSIT2015
3251.K.Ravindranath,2.Dr.K.Rajesekhara RaoEnergy Optimized Link Selection Algorithm for Mobile Cloud ComputingINTIJANA2015
326Ravindra ch,Dr.D.Rajeswara Rao,G.AnnapurnaA Generalized Association Rule Mining Framework for Pattern DiscoveryINTIJCSIT2015
327Manisha,Dr.V.SrikanthA Survey on cross layer solutions for routing in wireless sensor networkINTIJERT2015
328G.Nageswara Rao, T.V.N.Giridhar And K.V.D.KiranEffects of Cyber Crime and their Access ControlsINTIJREST2015
3291.K.V.V Satyanarayana,2.T.V.Krishna ChowdarySurvey on Wireless sensor NetworkINTIJAES2015
3301.Manne Lakshmi Mounika,2.Dr.Syed Umar,3.p.silpaArchitectural Design of D2H MedicareINTIJRITCC2015
3311.K.Tejaswi, 2.Dr.Syed UmarSensor Scheduling Of Nodes Using Clustered Head MechanismsINTIJES&M2015
3321.G.Vijay Kumar,2.M.SreedeviA Review on Security and Privacy Issues in BigdataINTIJ-ETA-ETS2015
3331.Ch.Ravindra, 2.D.Rajeswara Rao, 3.T.JanardhanaRao, 4.P.KiranKumar, 5.KareemunnisaKnowledge Discover Process: The Next Step for Knowledge SearchINTIJIRCCE2015
334T.Veeraiah,S.K.M RaoConcept semantic mechanism for images using hybrid norms:An OverviewINTIJESR2015
335B.Ramadevi,Dr.R.Satya Prasad,Dr.G.SrideviConsidering Residual Faults of Burr Type XII Software ReliabilityINTIJECSE2015
336Dr.R.Satya Prasad,2.B.Rama Devi,3.Dr.G.SrideviDetection of Burr Type XII Reliable software using SPRT on Interval Domain DataINTIJCSIT2015
337N.Venkateswara rao,Dr.N.SrinivasuA Review on cloud data integrity auditing methods and protocolsINTIJETSR2015
338P.Vidyulatha,D.Rajeswara RaoDesigning and simulation of soft computing method obtained on fuzzy logic systemsINTIJCR2015
3391.N.Srinivasu,2.G.Krishna ChaitanyaAdvanced Task Scheduling in Heterogeneous multiprocessor systems using evolutionary algorithmsINTIJIRCCE2015
340 Naresh Vurukonda ,Dr.B.Thirumala Rao A Multilevel Authentication Based On The Rfid Technique For A Multiple Mobile Cloud User In Cloud Storage: A Survey INT International Journal of Research and Applications2015
3411.Y.Sushmitha,2.V.Krishna Reddy,3.D.Pavan Teja ReddyA Survey on Cloud computing security issuesINTInternational Journal of computer science and innovation2015
342M.Anusha,Dr.V.SrikanthCognitive Radio Networks:A SurveyINTIJETTCS2015
343Dr.R.Stya Prasad,Srisaila,Dr.G.Krishna MohanSoftware Reliability using SPRT:Power law process modelINTIJECSE2015
344P.Vidyulatha,D.Rajeswara RaoRough set Reasoning based classification model generating decision rule on early stage of chronic kidney diseaseINTIJARCSMS2016
345Naresh.V,B.Thirumala RaoSecurity Threats in cloud computingINTInternational journal of computational science,mathematics&engineering2016
346Vidyullatha,D.Rajeswara RaoRough Set Reasoning based classification model generating decision rule on early stage of chronic kidney diseaseINTIJARCSMS2016
347Haritha Akkineni, P.V.S. Lakshmi, B. Vijay Babu, G.LakshmiModeling and Visualizing the Extraction of Opinions from TwitterINTIJIACS2016
348K.Prapulla Devi, Dr.K.Subba RaoA secure and Privacy Aware and Establishing Distributed Services Across Inter Cloud CommunicationINTInternational Journal of Computational Mathematical Ideas(IJCMI)2016
349D.Srinivasa Rao, Dr.V. SucharitaTechniques for Mining High Utility Itemsets from Transactional DatabasesINTIjarcsse2016
350Thirupathi Rao Komati1, Sai Balakrishna Allamsetty2, Chaitanya Varma Pinnamaraju3IMPLEMENTATION OF SENTIMENT ANALYSIS ON TWITTER DATAINTInternational Journal of Pure and Applied Mathematics(IJPAM)2017
351S. G. Rohini, Ch. Jyothsna, Ch. Ramaiah, Sk. Madeena SunnyASCII BASED SYMMETRIC KEY ALGORITHM FOR DATA SECURITYINTInternational Journal of Pure and Applied Mathematics(IJPAM)2017
352K.Lahari 1, D.Pavan Kumar2, L.K.S. Chandra Sekhar3, N.Srinivasu4CDA GENERATION AND INTEGRATION BASED ON CLOUD COMPUTINGINTInternational Journal of Pure and Applied Mathematics(IJPAM)2017
3531*T.Veeraiah, 2Aarathi Mahamkali, 3B.N.Pavan Kishore, 4A.Nikhil Rao,5 S.K.M.Rao, 6J. AmudhavelIMAGE DENOISING BY PROFUNDITYMAP METHODUSING DIAGRAM BASE CHANGE AND GROUP SCANTYINTInternational Journal of Pure and Applied Mathematics(IJPAM)2017
354Dr. M. Nagabhushana Rao,M.Sangameswara RaoA Frame work for Natural Disaster Management Using TWITTER DataINTInternational Journal Of Engineering And Computer Science 2017
355P.S.Jagadeesh Kumar, Wenli Hu, Xianpei Li, Kundan LalPMobile Banking Adeptness on Man-In- The-Middle and Man-In-The-Browser Attacks INTIOSR Journal of Mobile Computing & Application (IOSR-JMCA)2017
356A. Kousar Nikhath ,K,SubramanyamConcept based Document Clustering by corpus utility scaleINTINDJST2017
357V P Krishna Annel, Dr. K Rajasekhara Rao, V.Venkatakoundinya, T Gnana Krishna DeepA Study And Analysis On Intrusion Detection Based (Idb) TechniquesINTIJPT2017
+