Apply Now

Department of

Electronics & Computer Engineering

Welcome to E.C.M



Research Publications - Journal


S.NoName(s) of the AuthorTitleNational / InternationalConf/Jur NameYear
1DR.K.SRENIVASA RAVIComputer Vision and web framework for bank security locker system using ARM processorINTIJSER2015
2DR.K.SRENIVASA RAVIAn efficient and optimal systems for medical and industries with concept of IOTINTIJERA2015
3Dr.T.AnuradhaRecent trends in data mining for crime detectionINTIJAER2015
4Dr.K. srinivasa RaviThe Android Application for Sending SMS in Regional LanguagesINTIJRET2015
5T. Narendra BabuImplementation of PUF on FPGAINTIJVDCS2015
6Dr.K.Raghava RaoA robust routing protocol for adhoc vehicular networksINTIRECOS2015
7Dr.D.Aruna Kumari Privacy Preserving Data mining in healthcare applicationsINTIJACT2015
8Dr.M. SumanA New Approach for Text summarizerINTIJACT2015
9Dr.K. Kiran kumarArchitecture of Hyper-threading on Intel Xenon ProcessorINTIJARECE2015
10Dr.D.Aruna Kumari Intrusion detection using data mining techniques(classification)” INTIJCSIT2015
11Dr.D.Aruna Kumari Echo chamber effect in Big data INTIJCSMC2015
12Dr.G.VIJAY KUMARA Portable and Secure Healthcare Maintenance SystemINTIJCSIT2015
13Dr.G.VIJAY KUMARA Review on Security and Privacy issues in Big DataINTIJEATS2015
14Dr.KVD SAGARA Secure Data DE duplication Scheme for Cloud StorageINTIJSA2015
15Dr.KVD SAGARFour-way File Synchronization Mechanism in Cloud Storage SystemINTIJCAT2015
16P s G Aruna SriImproving The Usage Of Encryption And Decryption AlgorithmsINTIJMEIT2015
17N.V.K.RAMESHAnalysis of Pathloss Models For 3g Mobile Signals Inurban, Suburban and Rural EnvironmentINTIJAER2015
18Dr.K.Raghava RaoImplementation of a smart governance using Big data TechnologiesINTIJAR2015
19Dr.K.Raghava RaoA survey on clustering techniques to improve energy efficient routing in wireless sensor networksINTIJAER2015
20Dr.J K R SastryA Computationally more efficient distance based VaR methodology for real-time market risk measurementINTWSEAS-TISA2015
21Dr.J K R SastryA Data driven approach to calculate optimum collateral amount for vulnerable optionINTWSEAS-TISA2015
22Dr.J K R SastryPricing Options Considering Bankruptcy of Underlying IssuerINTBritish Journal of Sciences2015
23Dr.J K R SastryIncorporating implied volatility in Pricing Options using Binomial TreeINTIJET2015
24Dr.J K R SastryOptimizing Communication between heterogeneous distributed Embedded Systems using CAN protocolINTARPN-JEAS2015
25Dr.J K R SastryBuilding Heterogeneous Distributed Embedded Systems through RS485 Communication ProtocolINTARPN-JEAS2015
26Dr.J K R SastryI2C based Networking for implementing Heterogeneous Microcontroller based Distributed Embedded SystemsINTIndian Journal of Science and2015
27Dr.J K R SastryOn Testing Distributed Embedded Systems through ScaffoldingINTIJECE2015
28Dr.J K R SastryUSB based Networking for implementing Heterogeneous Microcontroller based Distributed Embedded SystemsINTIJECE2015
29M.Kameswara RaoGesture Based AuthenticationINTIJAIR2015
30Dr.T.AnuradhaSecuring the Personal Health Records in Cloud Using ABE and Analyzing them using Rule Based Classification in Data MiningINTIJMER2015
31M.Kameswara RaoAn Efficient approach for Remote Update Firmware for embedded systems INTIJAIR2015
32M.Kameswara RaoSecurity Issues in Big data AnalyticsINTJECET2015
33Dr.MD.ALI HUSSAINData and Information Storage Security from Advanced Persistent Attack in Cloud ComputingINTIJAER2015
34T. RaviThreshold based image compressionINTIJAER2015
35M.Kameswara RaoEvaluation of new technique to secure end user information using cloud monitoring approachINTIJECSE2015
36Dr.K.Raghava Raoan enhanced cbc algorithm for data security in the cloudINTGJCST2015
37Dr.k. kondaiahimproved approaches to handle biig data through hadoopINTGJCST2015
38Dr.KVD SAGARa novel approach for elastic query processing in the cloud INTGJCST2015
39Dr.K. Kiran kumarImage Based Retrieval Using Edge Detection Algorithm”INTIJMETMR2015
40Dr.D.Aruna Kumari Vector Quantization for Privacy during Big Data Analysis and for Compression of Big Data” INTIJCSMC2015
41Dr.KVD SAGARIMPLEMENTATION OF MINING ON INTERNET MOVIE DATABASEINTIJESR2015
42Dr.DBK KameshA Review of Data Mining using Bigdata in Health InformaticsINTIJSR2015
43Abdul AhadDATA MINING USING HACE THEOREMINTIJRAMR2015
44Dr.JVN RameshAutomated Traffic Control System For Emergency ServicesINTIJAER2015
45N.V.K.RAMESHDeveloping Killer Apps for Industrial Augmented RealityINTGJRE2015
46N.V.K.RAMESHA Survey on Human Computer InterfacesINTIJSR2015
47Dr.KVD SAGARBIG data analysis using rhadoopINTIJIRAE2015
48M.Kameswara RaoGraphical Password Using Captcha (CaRP)INTJECET2015
49Dr.D.Aruna Kumari Privacy during Data mining INTAISC2015
50Dr.K. srinivasa Raviautomated traffic control and route assisting system for emergency servicesINTIJAER2015
51Dr.k. kondaiahan efficient approach for inter process synchronizationINTIJSEA2015
52Dr.J K R SastryDevelopment of data recovery system for the data transmitted over rayleigh faded channel INTIJAER2015
53Dr.J K R SastryA novel binomial tree approach to calculate collateral amount for an option with credit riskINTJATIT2015
54Dr.M. SumanIndomitable Forensic Tools of Computer Aided Investigative Environment Linux INTIJAER2015
55Dr.J K R Sastrya novel decision tree approach for option pricing using a clustering based learning algorithmINTARPN-JAES2015
56Dr.J K R SastryGenerating Test cases for Testing WEB sites through Neural Networks and Input PairsINTIJAER2015
57Dr.K. Kiran kumarVirtual Switch Using Image ProcessingINTIJAER2015
58Dr.K. Kiran kumarSecurity Improvement Using Oracle DatabaseINTIJAER2015
59Dr.JVN RameshAn Effective Self-test Scheduling for Realtime Processor based SystemINTIJSH2015
60Dr.JVN RameshHolographic Data StorageINTIJAER2015
61M.Kameswara RaoSecurity Enhancement in Image Steganography a MATLAB ApproachINTMEJSR2015
62M.Kameswara RaoGraphical password based authentication for mobile devicesINTIJAER2015
63Dr.MD.ALI HUSSAINLWE Encryption using LZW CompressionINTMEJSR2015
64Dr.T.AnuradhaMultimedia database for attainment targetsINTIJACCC2015
65Dr.K. Kiran kumarIntroduction to Techniques of Query Processing and OptimizationINTIJIRAE2015
66Dr.JVN Rameshenergy utilization of tcp in adhoc networksINTGJCST2015
67T. Narendra Babua survey on visual cryptoographyINTIJAER2015
68Dr.DBK Kameshhome autmation using gsmINTIJESR2015
69Dr.M. SumanSpeech Recognition using MFCC & VQLBGINTJECET2015
70K RAGHAVA RAOREMOTE TEMPERATURE AND HUMIDITY MONITORIGNG SYSTEM USING WIRLESS SENSOR NETWORKSINTIJRET2015
71K. srinivas raviAN ADVANCED INDUSTRIAL MONITORING SYSTEM USING RASPBERRY-PI CONTROLLER IN IOTINTIJEATS2015
72K.RAGHAVA RAOA REPORT ON REDUCING DIMENSIONS FOR BIG DATA USING KERNEL METHODSINTJATIT2015
73JKR SASTRYNETWORKING HETEROGENEOUS MICROCONTROLLER BASED SYSTEMS THROUGH UNIVERSAL SERIAL BUSINTIJECE2015
74NVK RAMESHCOMPARATIVE ANALYSIS OF PATH LOSS ATTENUATION AT OUTDOOR FOR 1.8GHZ ,2.1GHZ IN URBAN ENVIRONMENTINTJATIT2015
75MD.ALI HUSSAINPERFORMANCE AND SECURITY ANALYSIS FOR IMAGE ENCRYPTION USING KEY IMAGEINTINDJST2015