S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | Md Ali Hussain | Making DHCP viable for Wireless Sensor Networks | INT | AWMC | 2013 |
2 | K.Prathyusha | Detecting Frauds In Online Auction System | INT | IJARCSSE | 2013 |
3 | Dr S. Balaji | An Introduction to Wireless USB Flash Devices | INT | IJETT | 2013 |
4 | Dr S. Balaji | An approach for segmentation of medical images using pillar k-means algorithm | INT | IJCTT | 2013 |
5 | Dr S. Balaji | Denoising of a color image using fuzzy filtering technology | INT | IJCOT | 2013 |
6 | D.Aruna Kumari | Compreesion in privacy preserving data mining | INT | IJACT | 2013 |
7 | D.Aruna Kumari | Privacy Preserving data mining | INT | IJERT | 2013 |
8 | D.Aruna Kumari | Privacy preserving data mining based on vector quantization | INT | IJDMS | 2013 |
9 | Md. Ali Hussian | The feature VOIP Challnges issues- Implementing PSTN Architecture in WIMAX Networks | INT | IJCTT | 2013 |
10 | Md. Ali Hussian | An efficient apporach for countering black hole attack in MANETS | INT | IJCER | 2013 |
11 | Md. Ali Hussian | Optimal Energy efficient multicast algorthim for MANETS | INT | IJCTT | 2013 |
12 | Md. Ali Hussian | Efficient security & tracking with Authenticated locking system using RFID and WSN | INT | IJCTT | 2013 |
13 | K.R.R. Mohan Rao | Applying Ambient Intelligence to industrial storage | INT | IJCSET | 2013 |
14 | P Koteswara Rao | Scening of an accidental alarm syatem of vehicles with a heart beat sensor | INT | IJETTCS | 2013 |
15 | Md Ali Hussain | A study of Information Security in E-commerce Applications | INT | ICES | 2013 |
16 | K.Prathyusha | Recend Trends in FPGA Architecture for testing the datapath using BSCAN | INT | IJAIEM | 2013 |
17 | M.Kameswara Rao | using human cognitive abilities to distinguish computers and humans for prventing BOT attacks | INT | IJCSE | 2013 |
18 | T. Anuradha | Performance evaluation of Apriori with memory mapped files | INT | IJCSI | 2013 |
19 | Syed Umar | Media-Oriented Rate selection algorithm for IEEE 802.11 WLAN''s | INT | IJCER | 2013 |
20 | G. Asa Jyothi | Comparative study on combinational triangular , exponential serrated antennas | INT | IJST | 2013 |
21 | Md Ali Hussain | Through Estimatred Probability, Path Detection routing in delay tolerant networks | INT | AETS | 2013 |
22 | Md Ali Hussain | Making DHCP viable for Wireless Sensor Networks | INT | AWMC | 2013 |
23 | K.Ravi Kumar | A Comparative Study of 6T, 8T and 10T SRAM Cells based on performance and word organisation | INT | IJAR | 2013 |
24 | D Haritha | Detecting Reliable Software Using SPRT: An
Order Statistics Approach | INT | IJCST | 2013 |
25 | D Haritha | sequential Probability Ratio Test in Assessing
Software Quality Using LPETM | INT | IJITEE | 2013 |
26 | D Haritha | Software Quality Assurance Based on Order Statistics | INT | IJCST | 2013 |
27 | D Haritha | A Statistical Process Control to Monitor the Software Quality | INT | IJCA | 2013 |
28 | T.V.Suryanarayana | Laptop tracking mechanism using GSM/GPS technology | INT | Elixer international Journal | 2013 |
29 | T.V.Suryanarayana | Topologies and Metrics Relevant for Wireless
Sensor Networks | INT | IJCSET | 2013 |
30 | T.V.Suryanarayana | A CHANNEL ACCESS MECHANISM IN WIRELESS SENSOR NETWORKS | INT | The South Asian Academic Research Journals | 2013 |
31 | T.V.Suryanarayana | A STUDY ON ADHOC NETWORK ROUTING PROTOCOLS | INT | International Journal of Computer and Electronics Research | 2013 |
32 | T.V.Suryanarayana | Innovative Ideas in Requirements Engineering For E-Commerce Applications | INT | International Journal of Modern Engineering Research | 2013 |
33 | K.Prathyusha | A Real- Time Irrigation Control Systems for Precision Agriculture using WSN in Indian Agricultural Sectors | INT | IJCSEA | 2013 |
34 | T. Anuradha | Performance
evaluation of Apriori with memory mapped files
| INT | IJCSI | 2013 |
35 | Dr. Md Ali Hussain | Making DHCP viable
for Wireless Sensor
Networks
| INT | AWMC | 2013 |
36 | G. Sowmya Bala | Through Estimatred
Probability, Path
Detection routing in delay tolerant networks
| INT | AETS | 2013 |
37 | Syed Umar | Media-Oriented Rate
selection algorithm for IEEE 802.11
WLAN''s
| INT | IJCER | 2013 |
38 | Dr kuppala Kondaiah, | A study on routing protocols in wireless sensor networks | INT | IJCSET | 2013 |
39 | Dr. Md Ali Hussain | A study of
Information Security
in E-commerce
Applications
| INT | ICES | 2013 |
40 | Dr. Md Ali Hussain | A Study on black hole
attack against OLSR
based manets
| INT | IJCNWM
C
| 2013 |
41 | K.Prathyusha | Detecting Frauds In
Online Auction
System
| INT | IJARCSS
E
| 2013 |
42 | Dr S. Balaji, | An Introduction to
Wireless USB Flash
Devices
| INT | IJETT | 2013 |
43 | Dr S. Balaji, | An Introduction to
Wireless USB Flash
Devices
| INT | IJETT | 2013 |
44 | Dr S. Balaji, | An approach for
segmentation of medical images using pillar k-means algorithm
| INT | IJCTT | 2013 |
45 | Dr S. Balaji, | An approach for
segmentation of medical images using pillar k-means algorithm
| INT | IJCTT | 2013 |
46 | Dr S. Balaji, | Denoising of a color image using fuzzy
filtering technology
| INT | IJCOT | 2013 |
47 | Dr.
MD. Ali Hussian
| An efficient apporach
for countering black hole attack in MANETS
| INT | IJCER | 2013 |
48 | Dr.
MD. Ali Hussian, | Optimal Energy
efficient multicast algorthim for MANETS
| INT | IJCTT | 2013 |
49 | Dr. Md Ali Hussain | Efficient security &
tracking with
Authenticated locking system using RFID and WSN
| INT | IJCTT | 2013 |
50 | D.Aruna Kumari , | Compreesion in
privacy preserving data mining
| INT | IJACT | 2013 |
51 | D.Aruna Kumari , | Privacy Preserving
data mining
| INT | IJERT | 2013 |
52 | D.Aruna Kumari , | Privacy Preserving
data mining
| INT | IJERT | 2013 |
53 | D.Aruna Kumari , | Privacy Preserving
data mining
| INT | IJERT | 2013 |
54 | D.Aruna Kumari , | Privacy preserving
data mining based on vector quantization
| INT | IJDMS | 2013 |
55 | Dr. MD. Ali Hussian | The feature VOIP
Challnges issues- Implementing PSTN Architecture in WIMAX Networks
| INT | IJCTT | 2013 |
56 | Dr. K.R.R. Mohan
Rao, | Applying Ambient
Intelligence to industrial storage
| INT | IJCSET | 2013 |
57 | NVK Ramesh | A novel approach of
security Evaluation of Iris and Finger print based verification systems
| INT | IJSETR | 2013 |
58 | Dr. Md Ali Hussain | Location based
routing protocols for underwater sensor networks
| INT | IJETTCS | 2013 |
59 | Dr.K.sreenivasa
Rao, | Design of a Wearable
System for Interactive Caption and Posture Recognition using Wireless Sensor Networks
| INT | IJETT | 2013 |
60 | M.Kameswara
Rao,
| A Secured Firmware
update Procedure to prevent cross channel scripting attack in embedded device
| INT | IJECE | 2013 |
61 | Dr Venkat Surya narayana T. | Topologies and Metric relevant for Wireless Sensor networks. | INT | IJCSET | 2013 |
62 | Sri.T.Narendra Babu | A Novel method for Vehicle Authentication and theft control system based on voice Recognisation. | INT | IJERT | 2013 |
63 | Sri.T.Narendra Babu | A Survey on content
Addressable Memory
| INT | IJETTCS | 2013 |
64 | T.Anuradha, | Parallelizing Apriori
on Hyper-Threaded
Multi-Core Processor
| INT | IJARCSS
E
| 2013 |
65 | Venkata Surya Narayana T | Laptop tracking mechanism using GSM/GPS technology | INT | ELIXIR, | 2013 |
66 | Prathyusha.K | A Real time irrigation control system for precision agriculture using WSN in Indian agriculture sectors | INT | IJCSEA | 2013 |
67 | Prathyusha.K | A Real time irrigation control system for precision agriculture using WSN in Indian agriculture sectors | INT | IJCSEA | 2013 |
68 | Prathyusha.K | A Real time irrigation control system for precision agriculture using WSN in Indian agriculture sectors | INT | IJCSEA | 2013 |
69 | M.suman | Enhancement of compressed speech signal using recursive
Filter
| INT | IJAC | 2013 |
70 | MD. Ali Hussain | A Study on black hole attack against OLSR based manets | INT | IJCNWMC | 2013 |
71 | Dr. Md. Ali
Hussain, | Making DHCP viable
for Wireless Sensor
Networks
| INT | AWMC | 2013 |
72 | Dr. Md. Ali
Hussain, | Social Tagging of multimedia content a model | INT | IJMER | 2013 |
73 | T.Anuradha, | Parallelizing Apriori on Hyper-Threaded Multi-Core Processor | INT | IJARCSSE | 2013 |
74 | NVK Ramesh | A novel approach of security Evaluation of Iris and Finger print based verification systems | INT | IJSETR | 2013 |
75 | T.Narendra babu | A novel method for vehicle authentication and theft control system based on voice recognisation | INT | IJERT | 2013 |
76 | MD. Ali Hussain | Location based routing protocols for underwater sensor networks | INT | IJETTCS | 2013 |
77 | Dr.K.sreenivasa Rao | Design of a Wearable System for Interactive Caption and Posture Recognition using Wireless Sensor Networks | INT | IJETT | 2013 |
78 | M.Kameswara Rao | A Secured Firmware update Procedure to prevent cross channel scripting attack in embedded device | INT | IJECE | 2013 |
79 | M. kameswara Rao | A Symbol based graphical schema resistant to peeping attack | INT | IJCSI | 2013 |
80 | D. Aruna kumari | Privacy preserving data mining using LBG and ELBG | INT | IJESR | 2013 |
81 | M Kumar Tyagi | Design of traditional /hybrid software tracking technique: state space approach | INT | WTISA | 2013 |
82 | Dr Syed Umar | A Review of lightweight security mechanism for ATM Networks | INT | IJCSET | 2013 |
83 | K.Ramohana Rao | An Insilco approach to restrain HIV replication through clustering and virtual screening. | INT | IJCST | 2013 |