S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | M.Venkateswara Rao | Time –Frequency Representation of Vocal Source Signal for Speaker Verification | INT | International Journal of Computer Applications | 2011 |
2 | P.Vikram | Rain fall Forecasting Using Non linear SVM based on PSO | INT | IJCSIT | 2011 |
3 | P.Vikram | Scheduling in Wi-Max Networks | INT | IJCSIT | 2011 |
4 | M.Venkateswara Rao | Self-Test Techniques in SoC for Low Power Consumption | INT | IJCTA | 2011 |
5 | S.Balaji | Design And Development of A Rfid Based Mobile Robot. | INT | IJESAT | 2011 |
6 | M.Venkateswara Rao | Ad-Hoc Low Powered 802.15.1 Protocol Based Automation System for Residence using Mobile Devices | INT | IJCST | 2011 |
7 | S.Balaji | A Novel iris Recognition System Using Statical Feature Analysis By Haar Wavelet | INT | IJCSIT | 2011 |
8 | K.Sreenivasa Ravi | Cross Platform Comptibility on Mobile Operating System | INT | IJCST | 2011 |
9 | K.Ravi Kumar | Enhancement in Encryption through Localization | INT | International Journal of Engineering Research and Applications | 2011 |
10 | M.Suman
| Direct Marketing with the
Application of Data Mining | INT | IISTE | 2011 |
11 | N.V.K.Ramesh | Comparative Analysis of Different Shorting PIFA Models for Size Reduction | INT | GJCAT | 2011 |
12 | N.V.K.Ramesh | Multiband Planar Inverted-F Antenna For PCS And UMTS Applications | INT | International journal of computer and electronics engineering | 2011 |
13 | D. Aruna Kumari | Privacy Preserving distributed
data mining: A new approaches for Detecting network traffic using Steganography | INT | International Journal of systems & technology | 2011 |
14 | S.Balaji | Automatic Signature Verification Using Web Cams | INT | GJCAT | 2011 |
15 | N.Rajesh Babu | Design of ARM Based EMBEDDED Ethernet Interface For Sensors | INT | GJCAT | 2011 |
16 | S.Nagendram | Efficient Resource Scheduling in data centers using MRIS | INT | IJCSE | 2011 |
17 | T.Anuradha | Recent Trends in Parallell Clasification and Clustering Data Mining | INT | GJCAT | 2011 |
18 | V.Harini | Security Level For Data
Transmission in Blue
tooth Communication | INT | GJCAT | 2011 |
19 | A.Rama Krishna | Combination of UWB and Indoor-Outdoor Vehicle Localization | INT | GJCAT | 2011 |
20 | K.Naga Prakesh | An energy efficient routing protocol based on Periodic Discovery for Mobile Adhoc Networks | INT | IJNGN | 2011 |
21 | Y. Madhavi latha | Symbolic execution for software testing based on DART and CUTE | INT | GJCAT | 2011 |
22 | D.Aruna Kumari | Privacy Preserving Clustering in data mining using vector Quantization | INT | RJCSE | 2011 |
23 | D.Aruna Kumari | Privacy Preserving Distributed Data Mining: A new Approaches for detecting network traffic Using Stegonography | INT | IJST | 2011 |
24 | U.Jyothi Kameswari | Novel Techniques for Test Suite Reduction | INT | International Journal of Science and Advanced Technology | 2011 |
25 | T.Anuradha | Recent Trends in Parallell and Distributed APRIORI Algorithm | INT | International Journal of Engineering Research and Applications | 2011 |
26 | G.Rajesh Chandra | A New Algorithm for pervasive Computing in MANET | INT | IJESAT | 2011 |
27 | V.Harini | Block Thresholding Algorithm for Enhancement of an Audio signal Corrupted by Noise | INT | ijrras | 2011 |
28 | S. Balaji
| Design and Development of a RFID based Mobile Robot | INT | IJESAT | 2011 |
29 | G.S.Sarma
| A Case Study on Pervasive Computing in MANET | INT | IJSER | 2011 |
30 | N.V.K.Ramesh | Planar inverted-F Antenna on liquid crystal polymer substrate for pcs,umts,wibro applications | INT | APRN Journal of engineering and applied sciences | 2011 |
31 | N.V.K.Ramesh | Ultra wideband log-periodic trapezoidal antenna on k15 LC-substrate material | INT | International Journal of engineering science and technology | 2011 |
32 | D.Aruna Kumari | Privacy preserving clustering in data mining using vector quantization | INT | Research Journal of Computer Systems Engineering-RJCSE | 2011 |
33 | D.Aruna Kumari | Distributed data mining: A new Approach using Steganography techniques | INT | CIT International journal of Research and educations | 2011 |
34 | S.Nagendram | A Force Skilled for Wireless Networks | INT | IFRSA | 2011 |
35 | P.Vikram | Rain fall Forecasting Using Non linear SVM based on PSO | INT | IJCSIT | 2011 |
36 | M.Suman | Application level load balancing in a web switch or ssecurity oriented filtering based on the content signatures for deep packet inspection and delayed input DFA | INT | IJSER | 2011 |
37 | N.Rajesh Babu | Design of ARM Based EMBEDDED Ethernet Interface For Sensors | INT | GJCAT | 2011 |
38 | T.Anuradha | Recent Trends in Parallell and Distributed APRIORI Algorithm | INT | IJER | 2011 |
39 | T.Anuradha | Frequent Pattern Mining for Efficient library management | INT | IJCSE | 2011 |
40 | N.V.K.Ramesh | investigation of performance parameters by varying the dimensions of microstrip rectangular patch antenna at higher frequency | INT | JETCIS | 2011 |
41 | M.Suman | A frequent mining algorithm based on FP-tree &Apriori algorithm | INT | Research Journal of Computer Systems Engineering-RJCSE | 2011 |
42 | D.Aruna Kumari | Privacy Preserving distributed data mining: A new approaches for Detecting network traffic using Steganography | INT | International journal of systems and technolgy(IJST) | 2011 |
43 | U.Jyothi Kameswari | Novel Techniques for Test Suite Reduction | INT | IJSAT | 2011 |
44 | S.Nagendram | Secure congestion aware routing protocol for wriless sensor networks | INT | IJSAT | 2011 |
45 | T.Anuradha | Frequent Pattern Mining for Efficient library management | INT | IJCSE | 2011 |
46 | M.Suman | Application level load balancing in a web switch or ssecurity oriented filtering based on the content signatures for deep packet inspection and delayed input DFA | INT | IJSER | 2011 |
47 | M.Nalini SRI | Automatic Test Case Prioritization Using Rgrasp | INT | International Journal of Computer Applications | 2011 |
48 | S.Nagendram | Secure congestion aware routing protocol for wriless sensor networks | INT | International Journal of Science and Advanced Technology | 2011 |
49 | D.Haritha | Discovery of Reliable Software using GOM on Interval Domain Data | INT | International Journal of Computer Applications | 2011 |
50 | D. Aruna Kumari | Privacy preserving clustering
in data mining using vector quantization | INT | Research journal
of Computer science and engineering (RJCSE) | 2011 |
51 | M.Suman | Item set extraction without using constraints | INT | International Journal of computer science and informatics | 2011 |
52 |
K.Sandeep | Implementation of Speech-IC in Sixth Sense Technology | INT | IJMSA | 2011 |
53 | T.Anuradha | Identifying weak subjects using association rule mining | INT | IJSER | 2011 |
54 | K.Ravi Kumar | Improving Quantitative Measurements using Different Segmantation Techniques for Satellite Images | INT | IJCTA | 2011 |
55 | K.Ravi Kumar | A Novel Processor Architecture for Pairing based Cryptography Applications | INT | IJCTA | 2011 |
56 | Y.madhavi Latha | A Software Framework to Alleviate the Developemnt of DR Management Systems | INT | IJSER | 2011 |
57 | S.Nagenam | Force-Skilled Protocol for wireless Feeler Networks | INT | IFRSA''s International journal of Computing | 2011 |
58 | S.Nagendram | A Novel Method of Exploring Human Reasoning Power In Image Analysis | INT | International Journal of Science and Advanced Technology | 2011 |
59 | S.Balaji | Different Pattern Recognition in Re-Ranking Process Using Image Based Retrieval | INT | IJSER | 2011 |
60 | G.Rajesh Chandra | An effective power utilization Technique for Embedded based Irrigation sytem Using Cellphone | INT | IJESAT | 2011 |
61 | G.Rajesh Chandra | The Higher Security Systems for Smart Home Using Adavanced Technology | INT | IJESAT | 2011 |
62 | D.Haritha | Detection of Reliable Software Using HLSRGM | INT | IJCIS | 2011 |
63 | D.Haritha | Detection of Reliable Software Using Particle Swarm Optimization | INT | GJCAT | 2011 |
64 | M.Nalini Sri | Testing of Network Intrusion Detection System
| INT | IJCTA | 2011 |
65 | V.Harini
| Sub-Adaptive Filter with Critical
Sampling for White | INT | IJECE | 2011 |
66 | V.Harini
| Novel Navigation Mobile Robot
Implementation based on
RFID Navigation System | INT | IJAERS | 2011 |
67 | M.Suman | Speech Signal Compression and its Enhancement
| INT | IJESCC | 2011 |
68 | K.Sreenivasa Ravi | Smart Sensor System for agricultural Chronology | INT | IJCSIT | 2011 |
69 | D.Aruna Kumari | Privacy preserving clustering in data mining using vector quantization | INT | RJCSE | 2011 |
70 | M.Suman | Dimensions of performance in compressed signal and its enhancement | INT | International journal of Engineering Science Research (IJESR) | 2011 |
71 | M.Nalini Sri | Network Based Approach of
Human Interaction with Real
World Objects Through Semantics | INT | IJCST | 2011 |
72 | D Aruna Kumari | Distributed Data Mining: Server Selection and Query Processing based on communication costs | INT | RJCSE | 2011 |
73 | K.Madhuri | Application level load balancing in a web switch or ssecurity oriented filtering based on the content signatures for deep packet inspection and delayed input DFA | INT | IJSER | 2011 |
74 | S.Nagendram | Force-Skilled Protocol for wireless Feeler Networks | INT | IFRSA''s International journal of Computing | 2011 |
75 | S.Nagendram | Efficient Resource Scheduling in data centers using MRIS | INT | IJCSE | 2011 |
76 | S.Nagendram | A Novel Method of Exploring Human Reasoning Power In Image Analysis | INT | IJSAT | 2011 |
77 | K.Ravi Kumar | Different Pattern Recognition in Re-Ranking Process Using Image Based Retrieval | INT | IJSER | 2011 |
78 | Y.Madhavi Latha | A Software Framework to Alleviate the Developemnt of DR Management Systems | INT | IJSER | 2011 |
79 | M.Venkateswara rao | Self-Test Techniques in SoC for Low Power Consumption | INT | IJCTA | 2011 |
80 | K.Ravi Kumar | A NOVEL PROCESSOR ARCHITECTURE FOR PAIRING BASED Cryptography Applications | INT | IJCTA | 2011 |
81 | K.Ravi Kumar | Improving Quantitative Measurements using Different Segmantation Techniques for Satellite Images | INT | IJCTA | 2011 |
82 | S.Balaji | A Novel iris Recognition System Using Statical Feature Analysis By Haar Wavelet | INT | IJCSIT | 2011 |
83 | K.Sandeep | Implementation of Speech-IC in Sixth Sense Technology | INT | IJMSA | 2011 |