Apply Now

Department of

Electronics & Computer Engineering

Welcome to E.C.M



Research Publications - Journal


S.NoName(s) of the AuthorTitleNational / InternationalConf/Jur NameYear
1MD.ALI HUSSAINAN OPTIMIZED DECISION TREES APPROACH FOR KNOWLEDGE DISCOVERY USING ORTHOGONAL RANDOM MATRIX PROJECTION WITH OUTLIER DETECTION INTIJDTA2016
2DR.N.VENKATRAMWATERMARKING USING LIFTING WAVELET TRANSFORM (LWT) AND ARTIFICIAL NEURAL NETWORKS (ANN) INTINDJST2016
3K.GOWTHAMIIMPLEMENTATION OF XENOMAI FRAMEWORK IN GNU/LINUX ENVIRONMENT TO RUN APPLICATIONS IN A REAL TIME ENVIRONMENT INTINDJST2016
4DR.JKR SASTRY PRICING OPTIONS CONSIDERING BANKRUPTCY OF UNDERLYING ISSUER INTINDJST2016
5HEMA DHANEKULAGSM AND WEB APPLICATION BASED REAL- TIME AUTOMATIC IRRIGATION SYSTEM USING RASPBERRY PI 2 AND 8051 INTINDJST2016
6SK. NAZMA SULTANACHALLENGES OF DIGITAL FORENSICS IN CLOUD COMPUTING ENVIRONMENT INTINDJST2016
7DR.T.ANURADHAPASSWORD VERIFICATION IN MILITARY NETWORKS BY USING SECURE HASH ALGORITHMINTINDJST2016
8DR.R.BULLI BABUCONTENT BASED IMAGE RETRIEVAL USING COLOR, TEXTURE, SHAPE AND ACTIVE RE-RANKING METHODINTINDJST2016
9DR.JKR SASTRYA DATA DRIVEN APPROACH TO CALCULATE OPTIMUM COLLATERAL AMOUNT FOR VULNERABLE OPTIONINTINDJST2016
10DR.MD.ALI HUSSAINComparative Study of Algorithms on Class Imbalanced DatasetsINTINDJST2016
11DR.K.RAGHAVA RAOSelection of Anchor Nodes in Time of Arrival for Localization in Wireless Sensor NetworksINTAISC2016
12NVK RAMESHFace recognition based attendance management system with raspberry pi 2 using eigen faces algorithmINTARPN-JEAS2016
13DR.JKR SASTRYBuilding fault tolerance within clouds at network level INTIJECE2016
14NVK RAMESHIOT Based Smart IR Device using CC3200INTINDJST2016
15D.B.K.KAMESHBuilding fault tolerance within clouds for providing uninterrupted software as serviceINTJATIT2016
16DR.M.KAMESWARA RAOApplication of Time Synchronization process to KerberosINTprocedia computer science2016
17DR.M.KAMESWARA RAOA novel video CAPTCHA technique to prevent BOT AttacksINTprocedia computer science2016
18DR.K.SRENIVASA RAVIAn Advanced Industrial Monitoring System using raspberry-pi controller in IOTINTIJEA2016
19M.VENKATESWARA RAOLow power RAM based hierarchical Cam on FPGAINTIJET2016
20PSG ARUNA SRIA FRAMEWORK ON BIG DATA-SURVEYINTIJCR2016
21R.BULLI BABUA SURVEY ON CLASS IMBALANCE LEARNING ALGORITHMSINTIJSER2016
22R.BULLI BABUA REVIEW ON CLASS IMBALANCE LEARNING IN KNOWLEDGE DISCOVERYINTIJDSR2016
23DR.K.SRENIVASA RAVIIDENTIFICATION OF MISPLACED OBJECTS INTINDJST2016
24DR.R.BULLI BABUDETECTION OF CRIMES USING UNSUPERVISED LEARNING TECHNIQUES INTINDJST2016
25D.ARUNA KUMARIA FRAMEWORK FOR EXPLORING ALGORITHMS FOR BIG DATA MININGINTINDJST2016
26DR.K.V.DAYA SAGARIMPLEMENTATION OF IOT BASED RAILWAY CALAMITY AVOIDANCE SYSTEM USING CLOUD COMPUTING TECHNOLOGYINTINDJST2016
27NVK RAMESHATTENDANCE MANAGEMENT AND USER SECURITY SYSTEM’S BASED ON EIGEN FACES ALGORITHM USING RASPBERRY PI 2 AND ETHERNETINTINDJST2016
28D.ARUNA KUMARIANALYZING AND PERFORMING PRIVACY PRESERVING DATA MINING ON MEDICAL DATABASES INTINDJST2016
29D.ARUNA KUMARIMAGNIFIED CIPHER BLOCK CHAINING MODE USING DES TO ENSURE DATA SECURITY IN CLOUD COMPUTING INTINDJST2016
30K.RAVI KUMAREFFICIENT USAGE OF RESOURCES THROUGH RFID CARDS INTINDJST2016
31DR.M.KAMESWARA RAOA PROTOTYPE FOR IOT BASED CAR PARKING MANAGEMENT SYSTEM FOR SMART CITIES INTINDJST2016
32DR.JKR SASTRYINCORPORATING IMPLIED VOLATILITY IN PRICING OPTIONS USING BINOMIAL TREE INTINDJST2016
33DR.K.SRENIVASA RAVIGPS AND GSM ENABLED EMBEDDED VEHICLE SPEED LIMITING DEVICE INTINDJST2016
34DR.K.RAGHAVA RAOSENCAR SCHEDULING ALGORITHM BASED ON PACKET LIFETIME IN WSN’S INTINDJST2016
35DR.K.SRENIVASA RAVIAUTOMATION OF IRRIGATION SYSTEM BASED ON WI-FI TECHNOLOGY AND IOT INTINDJST2016
36DR.K.RAGHAVA RAOFIRE ACCIDENT DETECTION AND PREVENTION MONITORING SYSTEM USING WIRELESS SENSOR NETWORK ENABLED ANDROID APPLICATION INTINDJST2016
37DR.K.RAGHAVA RAOHASHING TECHNIQUE DATA OPTIMIZATION FOR LOW POWER CONSUMPTION IN WIRELESS SENSOR NETWORK INTINDJST2016
38G.VIJAY KUMARMINING POPULAR PATTERNS FROM MULTIDIMENSIONAL DATABASE INTINDJST2016
39DR.K.SRENIVASA RAVIAN EFFICIENT IDENTIFICATION OF DYNAMIC FAULTS USING CAN AND ARM7 IN A WIND TURBINE INTINDJST2016
40DR.M.KAMESWARA RAOAN EFFECTIVE ON-CHIP NETWORK TOPOLOGY FOR NETWORK ON CHIP (NOC) TRADE-OFFS INTINDJST2016
41D.ARUNA KUMARIGEOGRAPHICAL LOCATION BASED HIERARCHICAL ROUTING STRATEGY FOR WSN USING MOVABLE ROUTERSINTINDJST2016
42DR.K.SRENIVASA RAVIEFFECTIVE ARCHITECTURE FOR GREENHOUSE CONTROLLING AND MONITORING USING WI-FI PEER TO PEER DIRECT PROTOCOLINTINDJST2016
43DR.T.ANURADHAAN ENERGY EFFICIENT POWER USAGE CONTROLLING AND MONITORING USING WIRELESS SENSOR NETWORKINTINDJST2016
44DR.N.VENKATRAMESTABLISHING EFFICIENT SECURITY SCHEME IN HOME IOT DEVICES THROUGH BIOMETRIC FINGER PRINT TECHNIQUE INTINDJST2016
45D.ARUNA KUMARIA RECONSTRUCTION ALGORITHM USING BINARY TRANSFORM FOR PRIVACY-PRESERVING DATA MININGINTINDJST2016
46DR.N.VENKATRAMWATERMARKING USING LIFTING WAVELET TRANSFORM (LWT) AND ARTIFICIAL NEURAL NETWORKS (ANN) INTINDJST2016
47DR.JKR SASTRY PRICING OPTIONS CONSIDERING BANKRUPTCY OF UNDERLYING ISSUER INTINDJST2016
48DR.T.ANURADHAPASSWORD VERIFICATION IN MILITARY NETWORKS BY USING SECURE HASH ALGORITHMINTINDJST2016
49R.BULLI BABUCONTENT BASED IMAGE RETRIEVAL USING COLOR, TEXTURE, SHAPE AND ACTIVE RE-RANKING METHODINTINDJST2016
50DR.JKR SASTRYA DATA DRIVEN APPROACH TO CALCULATE OPTIMUM COLLATERAL AMOUNT FOR VULNERABLE OPTIONINTINDJST2016
51DR.MD.ALI HUSSAINComparative Study of Algorithms on Class Imbalanced DatasetsINTINDJST2016
52DR.K.RAGHAVA RAOSelection of anchor nodes in time of arrival for localization in wireless sensor networksINTAISC2016
53M.KAMESWARA RAO AN RTOS BASED ARCHITECTURE FOR PATIENT MONITORING SYSTEM WITH SENSOR NETWORKSINTINDJST2016
54DR.K.RAGHAVA RAOSENCAR SCHEDULING ALGORITHM BASED ON PACKET LIFETIME IN WSN’S INTINDJST2016
55DR.K.SRENIVASA RAVIIDENTIFICATION OF MISPLACED OBJECTS INTINDJST2016
56R.BULLI BABUDETECTION OF CRIMES USING UNSUPERVISED LEARNING TECHNIQUES INTINDJST2016
57DR.D.ARUNA KUMARIA FRAMEWORK FOR EXPLORING ALGORITHMS FOR BIG DATA MININGINTINDJST2016
58K.V.DAYA SAGARIMPLEMENTATION OF IOT BASED RAILWAY CALAMITY AVOIDANCE SYSTEM USING CLOUD COMPUTING TECHNOLOGYINTINDJST2016
59N.V.K.RAMESHATTENDANCE MANAGEMENT AND USER SECURITY SYSTEM’S BASED ON EIGEN FACES ALGORITHM USING RASPBERRY PI 2 AND ETHERNETINTINDJST2016
60DR.D.ARUNA KUMARIANALYZING AND PERFORMING PRIVACY PRESERVING DATA MINING ON MEDICAL DATABASES INTINDJST2016
61DR.D.ARUNA KUMARIMAGNIFIED CIPHER BLOCK CHAINING MODE USING DES TO ENSURE DATA SECURITY IN CLOUD COMPUTING INTINDJST2016
62DR.K.SRENIVASA RAVIAUTOMATION OF IRRIGATION SYSTEM BASED ON WI-FI TECHNOLOGY AND IOT INTINDJST2016
63DR.K.RAGHAVA RAOFIRE ACCIDENT DETECTION AND PREVENTION MONITORING SYSTEM USING WIRELESS SENSOR NETWORK ENABLED ANDROID APPLICATION INTINDJST2016
64DR.K.RAGHAVA RAOHASHING TECHNIQUE DATA OPTIMIZATION FOR LOW POWER CONSUMPTION IN WIRELESS SENSOR NETWORK INTINDJST2016
65DR.G.VIJAY KUMARMINING POPULAR PATTERNS FROM MULTIDIMENSIONAL DATABASE INTINDJST2016
66DR.K.SRENIVASA RAVIAN EFFICIENT IDENTIFICATION OF DYNAMIC FAULTS USING CAN AND ARM7 IN A WIND TURBINE INTINDJST2016
67M.KAMESWARA RAOAN EFFECTIVE ON-CHIP NETWORK TOPOLOGY FOR NETWORK ON CHIP (NOC) TRADE-OFFS INTINDJST2016
68DR.D.ARUNA KUMARIGEOGRAPHICAL LOCATION BASED HIERARCHICAL ROUTING STRATEGY FOR WSN USING MOVABLE ROUTERSINTINDJST2016
69DR.K.SRENIVASA RAVIEFFECTIVE ARCHITECTURE FOR GREENHOUSE CONTROLLING AND MONITORING USING WI-FI PEER TO PEER DIRECT PROTOCOLINTINDJST2016
70DR.T.ANURADHAAN ENERGY EFFICIENT POWER USAGE CONTROLLING AND MONITORING USING WIRELESS SENSOR NETWORKINTINDJST2016
71DR.N.VENKATRAMESTABLISHING EFFICIENT SECURITY SCHEME IN HOME IOT DEVICES THROUGH BIOMETRIC FINGER PRINT TECHNIQUE INTINDJST2016
72DR.D.ARUNA KUMARIA RECONSTRUCTION ALGORITHM USING BINARY TRANSFORM FOR PRIVACY-PRESERVING DATA MININGINTINDJST2016
73K.RAVI KUMAREFFICIENT USAGE OF RESOURCES THROUGH RFID CARDS INTINDJST2016
74M.KAMESWARA RAOA PROTOTYPE FOR IOT BASED CAR PARKING MANAGEMENT SYSTEM FOR SMART CITIES INTINDJST2016
75DR.JKR SASTRYINCORPORATING IMPLIED VOLATILITY IN PRICING OPTIONS USING BINOMIAL TREE INTINDJST2016
76DR.K.SRENIVASA RAVIGPS AND GSM ENABLED EMBEDDED VEHICLE SPEED LIMITING DEVICE INTINDJST2016
77N.V.K.RAMESHface recognition based attendance management system with raspberry pi 2 using eigen faces algorithmINTARPN-JEAS2016
78T.NARENDRA BABUFPGA IMPLEMENTATION OF HIGH SPEED ERROR DETECTION AND CORRECTION OF ORTHOGONAL CODES USING SEGMENTATION METHODINTINDJST2016
79PSG ARUNA SRISECURING MESSAGE AT ENED TO END MOBILE COMMUNICATION USING CRYPTOGRAPHIC ALGORITHMINTINDJST2016
80DR.DBK KAMESHCAMERA BASED TEXT TO SPEECH CONVERSION OBSTACLE AND CURRENCY DETECTION FOR BLIND PERSONSINTINDJST2016
81DR.DBK KAMESHAUTHENTICATING CLIENTS WITHOUT USING THEIR LOGINIDS THROUGH MIND METRICSINTINDJST2016
82DR.DBK KAMESHBUILDING FAULT TOLERANCE WITHIN CLOUDS AT NETWORK LEVELINTIJECE2016
83K.RAVI KUMARREMOVAL OF REAL WORLD NOISE IN SPEECH: COMPARISION OF VARIOUS PAARMETERS USING KALMAN AND H-INFINITY FILTER ALGORITHMSINTINDJST2016
84K.RAVI KUMARTEXTURE AND SHAPE BASED OBJECT DETECTION STRATEGIESINTINDJST2016
85DR.N.VENKATRAMINDIAN SIGN LANGUAGE RECOGNITION:A COMPARISION BETWEEN ANN AND FISINTJATIT2016
86DR.K.RAGHAVA RAOMitigating energy utilization and time delay in wireless sensor networks using multiple sink relocating methodINTINDJST2016
87DR.K.RAGHAVA RAOHigh-leach energy efficient routing protocol for wireless sensor networksINTINDJST2016
88DR.K.RAGHAVA RAOAn android based automatic irrigation system using a WSN and GPRS moduleINTINDJST2016
89N.V.K.RAMESHEstimation of doppler spread fading using modified Jake''s modelINTARPN-JEAS2016
90PSG ARUNA SRIA FRAMEWORK ON BIG DATA-SURVEYINTIJCR2016
91R.BULLI BABUA SURVEY ON CLASS IMBALANCE LEARNING ALGORITHMSINTIJSER2016
92R.BULLI BABUA REVIEW ON CLASS IMBALANCE LEARNING IN KNOWLEDGE DISCOVERYINTIJDSR2016
93MD.ALI HUSSAINAN OPTIMIZED DECISION TREES APPROACH FOR KNOWLEDGE DISCOVERY USING ORTHOGONAL RANDOM MATRIX PROJECTION WITH OUTLIER DETECTION INTIJDTA2016
94NVK RAMESHWAVELET BASED MOBILE LOCATION ESTIMATION USING RSS MEASUREMENTSINTARPN-JEAS2016
95K.RAGHAVA RAOAN EFFICIENT SCHEME FOR FACILITATING SECURE DATA SHARING IN DECENTRALIZED DISRUPTION TOLERANT NETWORKSINTINDJST2016
96K.KIRAN KUMARA PROPOSAL FOR MITIGATION OF GRAY HOLE ATTACK IN WIRELESS MESH AD-HOC NETWORKS USING S-DSDVINTJATIT2016
97R.BULLI BABUESTABLISHING PATH QUALITY MANAGEMENT IN WIRELESS SENSOR NETWORKS THROUGH CLUSTER HEAD DETERMINATIONINTINDJST2016
98M.KAMESWARA RAOA NOVEL GRAPHICAL PASSWORD AUTHENTICATION MECHANISM FOR CLOUD SERVICESINTAISC2016
99M.KAMESWARA RAOA SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD AUTHENTICATION SCHEME INTAISC2016
100JKR SASTRYA COMPUTATIONALLY MORE EFFICIENT DISTANCE BASED VAR METHODOLOGY FOR REAL TIME MARKET RISK MEASSUREMENTINTINDJST2016
101T.NARENDRA BABUIMPLEMENTATION OF HIGH SECURITY CRYPTOGRAPHIC SYSTEM WITH IMPROVED ERROR CORRECTION AND DETECTION RATE USING FPGAINTIJECE2016