S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | Md Ali Hussain | A Study of DBSCAN algorithms for spatial data clustering techniques | INT | IJCST | 2012 |
2 | G. Asa Jyothi | Triple Band Triangular and Exponential Serrated MSP antenna for S and C band Applications | INT | IJERD | 2012 |
3 | G.Asa Jyothi | Triple Band Triangular and Exponential Serrated MSP Antennas for S and C Band Applications | INT | International Journal of Engineering Research and Development | 2012 |
4 | S.Balaji | Security Evaluation of Fingerprint based Authentication System | INT | GJCAT | 2012 |
5 | A.S.N Chakravarthy | Performance Evaluation of Password
Authentication using Associative Neural Memory Models
| INT | IJAIT | 2012 |
6 | K.Naga Prakesh | Designing and implementation of Secured OFDM communication on a Multi-core Software-defined Radio Platform | INT | IJESAT | 2012 |
7 | K.Naga Prakesh | Sensor less dust cleaning in motors using controllers | INT | GJCAT | 2012 |
8 | K.Naga Prakesh | Web page analyser for TCP/UDP/IP/HTTP on ENC28J60 based AVR Kit | INT | GJCAT | 2012 |
9 | A.S.N. Chakravarthy | Survey on Computer Crime Scene Investigation Forensic tools | INT | IJCTT | 2012 |
10 | A.Rama Krishna | Prototyping of a MC-UART
Controller On Spatern 3E FPGA | INT | IJECT | 2012 |
11 | N.Venkatram | Software architecture for Implementation of identification systems within Intelligent TAGS | INT | International Journal of Advances in Science and Technology | 2012 |
12 | N.Venkatram | On Building Intelligence for
Securing Communication between
the TAGS and the Mobile devices | INT | IFRSA | 2012 |
13 | N.Venkatram | Software architecture for
implementing efficient altering
system within an intelligent TAG | INT | IJCIS | 2012 |
14 | K. Sreenivasa Ravi | Design of Embedded System for Wireless data Acquition and control using PIC micro controller | INT | IJVES | 2012 |
15 | A. Rama Krishna | Design of an Intelligent Spy Robot for Military Based Appliances | INT | IJCIS | 2012 |
16 | K. Sreenivasa Ravi | Pilgrims tracking and identification using RFID technology | INT | AEES | 2012 |
17 | T. Anuradha | Incorporating visual Data Mining in on-line test analysis | INT | ACSA | 2012 |
18 | D. Aruna kumari | Privacy preserving data mining using LBG design algorithm | INT | IJCSIT AIRCC | 2012 |
19 | M.Venkateswara Rao | RISC based embedded system
monitor and controlling using web | INT | International Journal of Computer Applications | 2012 |
20 | G.Kalyan Mohan | Design and Implementation of Remote home Security System based on WSNS and GSM Technology | INT | IJESAT | 2012 |
21 | D Haritha | Assessing Reliable Software using SPRT based on LPETM | INT | IJCA | 2012 |
22 | K.Prathyusha | Design of Embedded Systems for the Automation of Drip Irrigation | INT | IJAIEM | 2012 |
23 | M.K.Tyagi | Enhanced Local Texture Feature sets for Face using KLADA and Gradient Face Features | INT | IJESAT | 2012 |
24 | N.Rajesh Babu | Replacing Passport using
Bio-Chip | INT | IJESAT | 2012 |
25 | T.Anuradha | Design of Zigbee sensor network
for building
power controlling with
device | INT | IJETED | 2012 |
26 | D.Aruna Kumari | Vector quantization for privacy preserving clustering in data mining | INT | Advanced computing : International Journal | 2012 |
27 | S.Balaji | A Novel Approach for Enhancing Security in Smart Cards Using Biometrics | INT | International Journal of Computer Applications | 2012 |
28 | S.Balaji | Security Evaluation of Online Signature Verification System Using Webcams | INT | International Journal of Computer Applications | 2012 |
29 | T.Anuradha | Design of Low Power RISC Processor by applying Clock Gating Technique | INT | International Journal of Computer Applications | 2012 |
30 | K.Ravi Kumar | Implementation of INS in
three Dimensional space | INT | International Journal of Computer Applications | 2012 |
31 | M.Suman | A Generalized Embedded Webserver Based on Wireless Sensor Network for Industrial Monitoring | INT | IJESAT | 2012 |
32 | M.Suman | An Innovative Cost Effective Ethernet Gate Way Based on Embedded Serial Device | INT | IJESAT | 2012 |
33 | M.Suman | A New Approach on Compression of Speech Signals Using MSVQ and its Enhancement Using Spectral Subtraction Under Noise free and Noisy Enviornment | INT | Advances in Digital Multimedia(ADMM) | 2012 |
34 | S.Balaji | FPGA Based an Adavanced LUT Methodology for Design of a Digital Filter | INT | IJESAT | 2012 |
35 | M.Venkateswara Rao | Design of µC/ Os II RTOS
Based Scalable Cost Effective,
Monitoring System Using
Arm Powered Microcontroller | INT | IJSRP | 2012 |
36 | G.S.Sarma | A Novel Method of SAR Image Regularization with Fast Approximate Discrete Minimization | INT | Advances in Digital Multimedia | 2012 |
37 |
K. Sreenivasa Ravi | Multi Platform Compatibility on Mobile Operating Systems | INT | Advances in Computer Science and its Applications | 2012 |
38 | A.S.N. Chakravarthy | Novel Approach for the propagation and detection of active worm in a Virtual System | INT | ACSA | 2012 |
39 | D.Aruna Kumari | Privacy Preserving
Clustering in DDM
using Cryptography | INT | RJCSE | 2012 |
40 | M.K.Tyagi | Nymble: Intercepts
Misbehaving users | INT | ACSA | 2012 |
41 | A.S.N Chakravarthy | Evaluation of Watermarking Techniques | INT | IJMTT | 2012 |
42 | A.S.N Chakravarthy | Survey on Hsrd Disk Duplication | INT | AMEA | 2012 |
43 | N.Venkat Ram | CRT and ART Based
Watermarking Scheme in
DCT Domain | INT | IJEAT | 2012 |
44 | A.S.N Chakravarthy | Document Clustering in Web Search Engine | INT | IJCTT | 2012 |
45 | N.Venkat Ram | On Integrating distributed heterogeneous embedded codes for implementing homogeneous embedded intelligent Tag related Application | INT | IJCIS | 2012 |
46 | N.Venkat Ram | Efficient Power management
Techniques for Increasing
The Longevity of Intelligent Tags | INT | ITEECE | 2012 |
47 | N.Venkat Ram | On Identifying Intelligent tags
With Remote HOST | INT | ITEECE | 2012 |
48 | N.Venkat Ram | Building Intelligent into TAGS
for Tamper Proofing | INT | International Journal of Advances in Science and Technology | 2012 |
49 | T.Anuradha | Identifying weak subjects using association rule mining | INT | IJSER | 2012 |
50 | K. Madhuri | An Evaluation scheme of Software Testing Strategy | INT | SPRINGER | 2012 |
51 | M.Venkateswara Rao | Customization of Power Performance in Interconnected MPSOC for NOC | INT | International Journal of Engineering Research and Applications | 2012 |
52 | M.Venkateswara Rao | EMBEDDED ETHERNET MONITOR AND CONTROLLING USING WEB
BROWSER
| INT | IJESAT | 2012 |
53 | M.Venkateswara Rao | Power Optimization for On-Chip Communication architectures in MPSoC | INT | Advances in Information Technology and Management | 2012 |
54 | N.V.K.Ramesh | Porting the Linux Kernel to an ARM Based Development Board | INT | International Journal of Engineering Research and Applications | 2012 |
55 | S.Nagenam | Zigbee based Voice Control
System For Smart phone | INT | IJCTA | 2012 |
56 | S.Nagenam, | Zigbee based wire less home
automation system with voice
recoginition | INT | IJESAT | 2012 |
57 | M.K.Tyagi | Enhanced Local Texture feature sets for face using KLDA and Gradientface features | INT | IJESAT | 2012 |
58 | M.K.Tyagi | A Novel method of face recognition using LBP, LTP and Gabor Features | INT | IJEED | 2012 |
59 | M.Suman | A frequent Pattern Mining
Algorithm Based on FP-Tree
Structure and Apriori Algorithm | INT | International Journal of Engineering Research and Applications | 2012 |
60 | A. Rama Krishna | Design And Implementation of A Robotic ARM Based on Haptic Technology | INT | International Journal of Engineering Research and Applications | 2012 |
61 | N.V.K Ramesh | Study on simulation Antenna parameters of Helical Antenna at different frequencies | INT | IJAEST | 2012 |
62 | M.K Tyagi | Ware housing and monitoring and management with the help of WSNs & Solar Energy | INT | IJESAT | 2012 |
63 | Md Ali Hussain | A study on operating system for wireless sensor networks | INT | IJCIIS | 2012 |
64 | N.Venkat Ram | An architecture framework for implementing add-on applications on mobile phones that runs on Android operating system for effecting peer communication with application components resident on intelligent tags | INT | ITEECE | 2012 |
65 | T.Anuradha | Parallelizing Apriori onual
Core sing OpenMP | INT | International Journal of Computer Applications | 2012 |
66 | D.Aruna Kumari | Privacy preserving data mining using VQ code book generation | INT | AIRCEE | 2012 |
67 | A. Rama Krishna | Design of a Resue Robot Assist at Fire Disaster | INT | International Journal of Computer Applications | 2012 |
68 | Y.Madhavi Latha | A Novel approach for the Detection of Sync Flood attack | INT | IJCTT | 2012 |