S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | DR.K.SRENIVASA RAVI | Computer Vision and web framework for bank security locker system using ARM processor | INT | IJSER | 2015 |
2 | DR.K.SRENIVASA RAVI | An efficient and optimal systems for medical and industries with concept of IOT | INT | IJERA | 2015 |
3 | Dr.T.Anuradha | Recent trends in data mining for crime detection | INT | IJAER | 2015 |
4 | Dr.K. srinivasa Ravi | The Android Application for Sending SMS in Regional Languages | INT | IJRET | 2015 |
5 | T. Narendra Babu | Implementation of PUF on FPGA | INT | IJVDCS | 2015 |
6 | Dr.K.Raghava Rao | A robust routing protocol for adhoc vehicular networks | INT | IRECOS | 2015 |
7 | Dr.D.Aruna Kumari | Privacy Preserving Data mining in healthcare applications | INT | IJACT | 2015 |
8 | Dr.M. Suman | A New Approach for Text summarizer | INT | IJACT | 2015 |
9 | Dr.K. Kiran kumar | Architecture of Hyper-threading on Intel Xenon Processor | INT | IJARECE | 2015 |
10 | Dr.D.Aruna Kumari | Intrusion detection using data mining techniques(classification)” | INT | IJCSIT | 2015 |
11 | Dr.D.Aruna Kumari | Echo chamber effect in Big data | INT | IJCSMC | 2015 |
12 | Dr.G.VIJAY KUMAR | A Portable and Secure Healthcare Maintenance System | INT | IJCSIT | 2015 |
13 | Dr.G.VIJAY KUMAR | A Review on Security and Privacy issues in Big Data | INT | IJEATS | 2015 |
14 | Dr.KVD SAGAR | A Secure Data DE duplication Scheme for Cloud Storage | INT | IJSA | 2015 |
15 | Dr.KVD SAGAR | Four-way File Synchronization Mechanism in Cloud Storage System | INT | IJCAT | 2015 |
16 | P s G Aruna Sri | Improving The Usage Of Encryption And Decryption Algorithms | INT | IJMEIT | 2015 |
17 | N.V.K.RAMESH | Analysis of Pathloss Models For 3g Mobile Signals Inurban, Suburban and Rural Environment | INT | IJAER | 2015 |
18 | Dr.K.Raghava Rao | Implementation of a smart governance using Big data Technologies | INT | IJAR | 2015 |
19 | Dr.K.Raghava Rao | A survey on clustering techniques to improve energy efficient routing in wireless sensor networks | INT | IJAER | 2015 |
20 | Dr.J K R Sastry | A Computationally more efficient distance based VaR methodology for real-time market risk measurement | INT | WSEAS-TISA | 2015 |
21 | Dr.J K R Sastry | A Data driven approach to calculate optimum collateral amount for vulnerable option | INT | WSEAS-TISA | 2015 |
22 | Dr.J K R Sastry | Pricing Options Considering Bankruptcy of Underlying Issuer | INT | British Journal of Sciences | 2015 |
23 | Dr.J K R Sastry | Incorporating implied volatility in Pricing Options using Binomial Tree | INT | IJET | 2015 |
24 | Dr.J K R Sastry | Optimizing Communication between heterogeneous distributed Embedded Systems using CAN protocol | INT | ARPN-JEAS | 2015 |
25 | Dr.J K R Sastry | Building Heterogeneous Distributed Embedded Systems through RS485 Communication Protocol | INT | ARPN-JEAS | 2015 |
26 | Dr.J K R Sastry | I2C based Networking for implementing Heterogeneous Microcontroller based Distributed Embedded Systems | INT | Indian Journal of Science and | 2015 |
27 | Dr.J K R Sastry | On Testing Distributed Embedded Systems through Scaffolding | INT | IJECE | 2015 |
28 | Dr.J K R Sastry | USB based Networking for implementing Heterogeneous Microcontroller based Distributed Embedded Systems | INT | IJECE | 2015 |
29 | M.Kameswara Rao | Gesture Based Authentication | INT | IJAIR | 2015 |
30 | Dr.T.Anuradha | Securing the Personal Health Records in Cloud Using ABE and Analyzing them using Rule Based Classification in Data Mining | INT | IJMER | 2015 |
31 | M.Kameswara Rao | An Efficient approach for Remote Update Firmware for embedded systems | INT | IJAIR | 2015 |
32 | M.Kameswara Rao | Security Issues in Big data Analytics | INT | JECET | 2015 |
33 | Dr.MD.ALI HUSSAIN | Data and Information Storage Security from Advanced Persistent Attack in Cloud Computing | INT | IJAER | 2015 |
34 | T. Ravi | Threshold based image compression | INT | IJAER | 2015 |
35 | M.Kameswara Rao | Evaluation of new technique to secure end user information using cloud monitoring approach | INT | IJECSE | 2015 |
36 | Dr.K.Raghava Rao | an enhanced cbc algorithm for data security in the cloud | INT | GJCST | 2015 |
37 | Dr.k. kondaiah | improved approaches to handle biig data through hadoop | INT | GJCST | 2015 |
38 | Dr.KVD SAGAR | a novel approach for elastic query processing in the cloud | INT | GJCST | 2015 |
39 | Dr.K. Kiran kumar | Image Based Retrieval Using Edge Detection Algorithm” | INT | IJMETMR | 2015 |
40 | Dr.D.Aruna Kumari | Vector Quantization for Privacy during Big Data Analysis and for Compression of Big Data” | INT | IJCSMC | 2015 |
41 | Dr.KVD SAGAR | IMPLEMENTATION OF MINING ON INTERNET MOVIE DATABASE | INT | IJESR | 2015 |
42 | Dr.DBK Kamesh | A Review of Data Mining using Bigdata in Health Informatics | INT | IJSR | 2015 |
43 | Abdul Ahad | DATA MINING USING HACE THEOREM | INT | IJRAMR | 2015 |
44 | Dr.JVN Ramesh | Automated Traffic Control System For Emergency Services | INT | IJAER | 2015 |
45 | N.V.K.RAMESH | Developing Killer Apps for Industrial Augmented Reality | INT | GJRE | 2015 |
46 | N.V.K.RAMESH | A Survey on Human Computer Interfaces | INT | IJSR | 2015 |
47 | Dr.KVD SAGAR | BIG data analysis using rhadoop | INT | IJIRAE | 2015 |
48 | M.Kameswara Rao | Graphical Password Using Captcha (CaRP) | INT | JECET | 2015 |
49 | Dr.D.Aruna Kumari | Privacy during Data mining | INT | AISC | 2015 |
50 | Dr.K. srinivasa Ravi | automated traffic control and route assisting system for emergency services | INT | IJAER | 2015 |
51 | Dr.k. kondaiah | an efficient approach for inter process synchronization | INT | IJSEA | 2015 |
52 | Dr.J K R Sastry | Development of data recovery system for the data transmitted over rayleigh faded channel | INT | IJAER | 2015 |
53 | Dr.J K R Sastry | A novel binomial tree approach to calculate collateral amount for an option with credit risk | INT | JATIT | 2015 |
54 | Dr.M. Suman | Indomitable Forensic Tools of Computer Aided Investigative Environment Linux | INT | IJAER | 2015 |
55 | Dr.J K R Sastry | a novel decision tree approach for option pricing using a clustering based learning algorithm | INT | ARPN-JAES | 2015 |
56 | Dr.J K R Sastry | Generating Test cases for Testing WEB sites through Neural Networks and Input Pairs | INT | IJAER | 2015 |
57 | Dr.K. Kiran kumar | Virtual Switch Using Image Processing | INT | IJAER | 2015 |
58 | Dr.K. Kiran kumar | Security Improvement Using Oracle Database | INT | IJAER | 2015 |
59 | Dr.JVN Ramesh | An Effective Self-test Scheduling for Realtime Processor based System | INT | IJSH | 2015 |
60 | Dr.JVN Ramesh | Holographic Data Storage | INT | IJAER | 2015 |
61 | M.Kameswara Rao | Security Enhancement in Image Steganography a MATLAB Approach | INT | MEJSR | 2015 |
62 | M.Kameswara Rao | Graphical password based authentication for mobile devices | INT | IJAER | 2015 |
63 | Dr.MD.ALI HUSSAIN | LWE Encryption using LZW Compression | INT | MEJSR | 2015 |
64 | Dr.T.Anuradha | Multimedia database for attainment targets | INT | IJACCC | 2015 |
65 | Dr.K. Kiran kumar | Introduction to Techniques of Query Processing and Optimization | INT | IJIRAE | 2015 |
66 | Dr.JVN Ramesh | energy utilization of tcp in adhoc networks | INT | GJCST | 2015 |
67 | T. Narendra Babu | a survey on visual cryptoography | INT | IJAER | 2015 |
68 | Dr.DBK Kamesh | home autmation using gsm | INT | IJESR | 2015 |
69 | Dr.M. Suman | Speech Recognition using MFCC & VQLBG | INT | JECET | 2015 |
70 | K RAGHAVA RAO | REMOTE TEMPERATURE AND HUMIDITY MONITORIGNG SYSTEM USING WIRLESS SENSOR NETWORKS | INT | IJRET | 2015 |
71 | K. srinivas ravi | AN ADVANCED INDUSTRIAL MONITORING SYSTEM USING RASPBERRY-PI CONTROLLER IN IOT | INT | IJEATS | 2015 |
72 | K.RAGHAVA RAO | A REPORT ON REDUCING DIMENSIONS FOR BIG DATA USING KERNEL METHODS | INT | JATIT | 2015 |
73 | JKR SASTRY | NETWORKING HETEROGENEOUS MICROCONTROLLER BASED SYSTEMS THROUGH UNIVERSAL SERIAL BUS | INT | IJECE | 2015 |
74 | NVK RAMESH | COMPARATIVE ANALYSIS OF PATH LOSS ATTENUATION AT OUTDOOR FOR 1.8GHZ ,2.1GHZ IN URBAN ENVIRONMENT | INT | JATIT | 2015 |
75 | MD.ALI HUSSAIN | PERFORMANCE AND SECURITY ANALYSIS FOR IMAGE ENCRYPTION USING KEY IMAGE | INT | INDJST | 2015 |