Apply Now

Department of

Electronics & Computer Engineering

Welcome to E.C.M



Research Publications - Journal


S.NoName(s) of the AuthorTitleNational / InternationalConf/Jur NameYear
1Md Ali HussainMaking DHCP viable for Wireless Sensor NetworksINTAWMC2013
2K.PrathyushaDetecting Frauds In Online Auction SystemINTIJARCSSE2013
3Dr S. BalajiAn Introduction to Wireless USB Flash DevicesINTIJETT2013
4Dr S. BalajiAn approach for segmentation of medical images using pillar k-means algorithmINTIJCTT2013
5Dr S. BalajiDenoising of a color image using fuzzy filtering technologyINTIJCOT2013
6D.Aruna KumariCompreesion in privacy preserving data miningINTIJACT2013
7D.Aruna KumariPrivacy Preserving data miningINTIJERT2013
8D.Aruna KumariPrivacy preserving data mining based on vector quantizationINTIJDMS2013
9Md. Ali HussianThe feature VOIP Challnges issues- Implementing PSTN Architecture in WIMAX NetworksINTIJCTT2013
10Md. Ali HussianAn efficient apporach for countering black hole attack in MANETSINTIJCER2013
11Md. Ali HussianOptimal Energy efficient multicast algorthim for MANETSINTIJCTT2013
12Md. Ali HussianEfficient security & tracking with Authenticated locking system using RFID and WSNINTIJCTT2013
13K.R.R. Mohan RaoApplying Ambient Intelligence to industrial storageINTIJCSET2013
14P Koteswara RaoScening of an accidental alarm syatem of vehicles with a heart beat sensorINTIJETTCS2013
15Md Ali HussainA study of Information Security in E-commerce ApplicationsINTICES2013
16K.PrathyushaRecend Trends in FPGA Architecture for testing the datapath using BSCANINTIJAIEM2013
17M.Kameswara Raousing human cognitive abilities to distinguish computers and humans for prventing BOT attacksINTIJCSE2013
18T. AnuradhaPerformance evaluation of Apriori with memory mapped filesINTIJCSI2013
19Syed UmarMedia-Oriented Rate selection algorithm for IEEE 802.11 WLAN''sINTIJCER2013
20G. Asa JyothiComparative study on combinational triangular , exponential serrated antennasINTIJST2013
21Md Ali HussainThrough Estimatred Probability, Path Detection routing in delay tolerant networksINTAETS2013
22Md Ali HussainMaking DHCP viable for Wireless Sensor NetworksINTAWMC2013
23K.Ravi KumarA Comparative Study of 6T, 8T and 10T SRAM Cells based on performance and word organisationINTIJAR2013
24D HarithaDetecting Reliable Software Using SPRT: An Order Statistics ApproachINTIJCST2013
25D Harithasequential Probability Ratio Test in Assessing Software Quality Using LPETMINTIJITEE2013
26D HarithaSoftware Quality Assurance Based on Order StatisticsINTIJCST2013
27D HarithaA Statistical Process Control to Monitor the Software QualityINTIJCA2013
28T.V.SuryanarayanaLaptop tracking mechanism using GSM/GPS technologyINTElixer international Journal2013
29T.V.SuryanarayanaTopologies and Metrics Relevant for Wireless Sensor NetworksINTIJCSET2013
30T.V.SuryanarayanaA CHANNEL ACCESS MECHANISM IN WIRELESS SENSOR NETWORKSINTThe South Asian Academic Research Journals2013
31T.V.SuryanarayanaA STUDY ON ADHOC NETWORK ROUTING PROTOCOLSINTInternational Journal of Computer and Electronics Research2013
32T.V.SuryanarayanaInnovative Ideas in Requirements Engineering For E-Commerce ApplicationsINTInternational Journal of Modern Engineering Research2013
33K.PrathyushaA Real- Time Irrigation Control Systems for Precision Agriculture using WSN in Indian Agricultural SectorsINTIJCSEA2013
34T. AnuradhaPerformance evaluation of Apriori with memory mapped files INTIJCSI2013
35Dr. Md Ali HussainMaking DHCP viable for Wireless Sensor Networks INTAWMC2013
36G. Sowmya BalaThrough Estimatred Probability, Path Detection routing in delay tolerant networks INTAETS2013
37Syed UmarMedia-Oriented Rate selection algorithm for IEEE 802.11 WLAN''s INTIJCER2013
38Dr kuppala Kondaiah, A study on routing protocols in wireless sensor networksINTIJCSET2013
39Dr. Md Ali HussainA study of Information Security in E-commerce Applications INTICES2013
40Dr. Md Ali HussainA Study on black hole attack against OLSR based manets INTIJCNWM C 2013
41K.PrathyushaDetecting Frauds In Online Auction System INTIJARCSS E 2013
42Dr S. Balaji,An Introduction to Wireless USB Flash Devices INTIJETT2013
43Dr S. Balaji,An Introduction to Wireless USB Flash Devices INTIJETT2013
44Dr S. Balaji,An approach for segmentation of medical images using pillar k-means algorithm INTIJCTT2013
45Dr S. Balaji,An approach for segmentation of medical images using pillar k-means algorithm INTIJCTT2013
46Dr S. Balaji, Denoising of a color image using fuzzy filtering technology INTIJCOT2013
47Dr. MD. Ali Hussian An efficient apporach for countering black hole attack in MANETS INTIJCER2013
48Dr. MD. Ali Hussian, Optimal Energy efficient multicast algorthim for MANETS INTIJCTT2013
49Dr. Md Ali HussainEfficient security & tracking with Authenticated locking system using RFID and WSN INTIJCTT2013
50D.Aruna Kumari ,Compreesion in privacy preserving data mining INTIJACT2013
51D.Aruna Kumari ,Privacy Preserving data mining INTIJERT2013
52D.Aruna Kumari ,Privacy Preserving data mining INTIJERT2013
53D.Aruna Kumari ,Privacy Preserving data mining INTIJERT2013
54D.Aruna Kumari ,Privacy preserving data mining based on vector quantization INTIJDMS2013
55Dr. MD. Ali HussianThe feature VOIP Challnges issues- Implementing PSTN Architecture in WIMAX Networks INTIJCTT2013
56Dr. K.R.R. Mohan Rao,Applying Ambient Intelligence to industrial storage INTIJCSET2013
57NVK RameshA novel approach of security Evaluation of Iris and Finger print based verification systems INTIJSETR2013
58Dr. Md Ali HussainLocation based routing protocols for underwater sensor networks INTIJETTCS2013
59Dr.K.sreenivasa Rao,Design of a Wearable System for Interactive Caption and Posture Recognition using Wireless Sensor Networks INTIJETT2013
60M.Kameswara Rao, A Secured Firmware update Procedure to prevent cross channel scripting attack in embedded device INTIJECE2013
61Dr Venkat Surya narayana T.Topologies and Metric relevant for Wireless Sensor networks.INTIJCSET2013
62Sri.T.Narendra BabuA Novel method for Vehicle Authentication and theft control system based on voice Recognisation.INTIJERT2013
63Sri.T.Narendra BabuA Survey on content Addressable Memory INTIJETTCS2013
64T.Anuradha, Parallelizing Apriori on Hyper-Threaded Multi-Core Processor INTIJARCSS E 2013
65Venkata Surya Narayana TLaptop tracking mechanism using GSM/GPS technologyINTELIXIR,2013
66Prathyusha.KA Real time irrigation control system for precision agriculture using WSN in Indian agriculture sectorsINTIJCSEA2013
67Prathyusha.KA Real time irrigation control system for precision agriculture using WSN in Indian agriculture sectorsINTIJCSEA2013
68Prathyusha.KA Real time irrigation control system for precision agriculture using WSN in Indian agriculture sectorsINTIJCSEA2013
69M.sumanEnhancement of compressed speech signal using recursive Filter INTIJAC2013
70MD. Ali HussainA Study on black hole attack against OLSR based manetsINTIJCNWMC2013
71Dr. Md. Ali Hussain, Making DHCP viable for Wireless Sensor Networks INTAWMC2013
72Dr. Md. Ali Hussain, Social Tagging of multimedia content a modelINTIJMER2013
73T.Anuradha, Parallelizing Apriori on Hyper-Threaded Multi-Core ProcessorINTIJARCSSE2013
74NVK RameshA novel approach of security Evaluation of Iris and Finger print based verification systemsINTIJSETR2013
75T.Narendra babuA novel method for vehicle authentication and theft control system based on voice recognisationINTIJERT2013
76MD. Ali HussainLocation based routing protocols for underwater sensor networksINTIJETTCS2013
77Dr.K.sreenivasa RaoDesign of a Wearable System for Interactive Caption and Posture Recognition using Wireless Sensor NetworksINTIJETT2013
78M.Kameswara RaoA Secured Firmware update Procedure to prevent cross channel scripting attack in embedded deviceINTIJECE2013
79M. kameswara RaoA Symbol based graphical schema resistant to peeping attackINTIJCSI2013
80D. Aruna kumariPrivacy preserving data mining using LBG and ELBGINTIJESR2013
81M Kumar TyagiDesign of traditional /hybrid software tracking technique: state space approachINTWTISA2013
82Dr Syed UmarA Review of lightweight security mechanism for ATM NetworksINTIJCSET2013
83K.Ramohana RaoAn Insilco approach to restrain HIV replication through clustering and virtual screening.INTIJCST2013