S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | MD.ALI HUSSAIN | AN OPTIMIZED DECISION TREES APPROACH FOR KNOWLEDGE DISCOVERY USING ORTHOGONAL RANDOM MATRIX PROJECTION WITH OUTLIER DETECTION | INT | IJDTA | 2016 |
2 | DR.N.VENKATRAM | WATERMARKING USING LIFTING WAVELET TRANSFORM (LWT) AND ARTIFICIAL NEURAL NETWORKS (ANN) | INT | INDJST | 2016 |
3 | K.GOWTHAMI | IMPLEMENTATION OF XENOMAI FRAMEWORK IN GNU/LINUX ENVIRONMENT TO RUN APPLICATIONS IN A REAL TIME ENVIRONMENT | INT | INDJST | 2016 |
4 | DR.JKR SASTRY |
PRICING OPTIONS CONSIDERING BANKRUPTCY OF UNDERLYING ISSUER
| INT | INDJST | 2016 |
5 | HEMA DHANEKULA | GSM AND WEB APPLICATION BASED REAL- TIME AUTOMATIC IRRIGATION SYSTEM USING RASPBERRY PI 2 AND 8051 | INT | INDJST | 2016 |
6 | SK. NAZMA SULTANA | CHALLENGES OF DIGITAL FORENSICS IN CLOUD COMPUTING ENVIRONMENT | INT | INDJST | 2016 |
7 | DR.T.ANURADHA | PASSWORD VERIFICATION IN MILITARY NETWORKS BY USING SECURE HASH ALGORITHM | INT | INDJST | 2016 |
8 | DR.R.BULLI BABU | CONTENT BASED IMAGE RETRIEVAL USING COLOR, TEXTURE, SHAPE AND ACTIVE RE-RANKING METHOD | INT | INDJST | 2016 |
9 | DR.JKR SASTRY | A DATA DRIVEN APPROACH TO CALCULATE OPTIMUM COLLATERAL AMOUNT FOR VULNERABLE OPTION | INT | INDJST | 2016 |
10 | DR.MD.ALI HUSSAIN | Comparative Study of Algorithms on Class Imbalanced Datasets | INT | INDJST | 2016 |
11 | DR.K.RAGHAVA RAO | Selection of Anchor Nodes in Time of Arrival for Localization in Wireless Sensor Networks | INT | AISC | 2016 |
12 | NVK RAMESH | Face recognition based attendance management system with raspberry pi 2 using eigen faces algorithm | INT | ARPN-JEAS | 2016 |
13 | DR.JKR SASTRY | Building fault tolerance within clouds at network level | INT | IJECE | 2016 |
14 | NVK RAMESH | IOT Based Smart IR Device using CC3200 | INT | INDJST | 2016 |
15 | D.B.K.KAMESH | Building fault tolerance within clouds for providing uninterrupted software as service | INT | JATIT | 2016 |
16 | DR.M.KAMESWARA RAO | Application of Time Synchronization process to Kerberos | INT | procedia computer science | 2016 |
17 | DR.M.KAMESWARA RAO | A novel video CAPTCHA technique to prevent BOT Attacks | INT | procedia computer science | 2016 |
18 | DR.K.SRENIVASA RAVI | An Advanced Industrial Monitoring System using raspberry-pi controller in IOT | INT | IJEA | 2016 |
19 | M.VENKATESWARA RAO | Low power RAM based hierarchical Cam on FPGA | INT | IJET | 2016 |
20 | PSG ARUNA SRI | A FRAMEWORK ON BIG DATA-SURVEY | INT | IJCR | 2016 |
21 | R.BULLI BABU | A SURVEY ON CLASS IMBALANCE LEARNING ALGORITHMS | INT | IJSER | 2016 |
22 | R.BULLI BABU | A REVIEW ON CLASS IMBALANCE LEARNING IN KNOWLEDGE DISCOVERY | INT | IJDSR | 2016 |
23 | DR.K.SRENIVASA RAVI | IDENTIFICATION OF MISPLACED OBJECTS | INT | INDJST | 2016 |
24 | DR.R.BULLI BABU | DETECTION OF CRIMES USING UNSUPERVISED LEARNING TECHNIQUES | INT | INDJST | 2016 |
25 | D.ARUNA KUMARI | A FRAMEWORK FOR EXPLORING ALGORITHMS FOR BIG DATA MINING | INT | INDJST | 2016 |
26 | DR.K.V.DAYA SAGAR | IMPLEMENTATION OF IOT BASED RAILWAY CALAMITY AVOIDANCE SYSTEM USING CLOUD COMPUTING TECHNOLOGY | INT | INDJST | 2016 |
27 | NVK RAMESH | ATTENDANCE MANAGEMENT AND USER SECURITY SYSTEM’S BASED ON EIGEN FACES ALGORITHM USING RASPBERRY PI 2 AND ETHERNET | INT | INDJST | 2016 |
28 | D.ARUNA KUMARI | ANALYZING AND PERFORMING PRIVACY PRESERVING DATA MINING ON MEDICAL DATABASES | INT | INDJST | 2016 |
29 | D.ARUNA KUMARI | MAGNIFIED CIPHER BLOCK CHAINING MODE USING DES TO ENSURE DATA SECURITY IN CLOUD COMPUTING | INT | INDJST | 2016 |
30 | K.RAVI KUMAR | EFFICIENT USAGE OF RESOURCES THROUGH RFID CARDS | INT | INDJST | 2016 |
31 | DR.M.KAMESWARA RAO | A PROTOTYPE FOR IOT BASED CAR PARKING MANAGEMENT SYSTEM FOR SMART CITIES | INT | INDJST | 2016 |
32 | DR.JKR SASTRY | INCORPORATING IMPLIED VOLATILITY IN PRICING OPTIONS USING BINOMIAL TREE | INT | INDJST | 2016 |
33 | DR.K.SRENIVASA RAVI | GPS AND GSM ENABLED EMBEDDED VEHICLE SPEED LIMITING DEVICE | INT | INDJST | 2016 |
34 | DR.K.RAGHAVA RAO | SENCAR SCHEDULING ALGORITHM BASED ON PACKET LIFETIME IN WSN’S | INT | INDJST | 2016 |
35 | DR.K.SRENIVASA RAVI | AUTOMATION OF IRRIGATION SYSTEM BASED ON WI-FI TECHNOLOGY AND IOT | INT | INDJST | 2016 |
36 | DR.K.RAGHAVA RAO | FIRE ACCIDENT DETECTION AND PREVENTION MONITORING SYSTEM USING WIRELESS SENSOR NETWORK ENABLED ANDROID APPLICATION | INT | INDJST | 2016 |
37 | DR.K.RAGHAVA RAO | HASHING TECHNIQUE DATA OPTIMIZATION FOR LOW POWER CONSUMPTION IN WIRELESS SENSOR NETWORK | INT | INDJST | 2016 |
38 | G.VIJAY KUMAR | MINING POPULAR PATTERNS FROM MULTIDIMENSIONAL DATABASE | INT | INDJST | 2016 |
39 | DR.K.SRENIVASA RAVI | AN EFFICIENT IDENTIFICATION OF DYNAMIC FAULTS USING CAN AND ARM7 IN A WIND TURBINE | INT | INDJST | 2016 |
40 | DR.M.KAMESWARA RAO | AN EFFECTIVE ON-CHIP NETWORK TOPOLOGY FOR NETWORK ON CHIP (NOC) TRADE-OFFS | INT | INDJST | 2016 |
41 | D.ARUNA KUMARI | GEOGRAPHICAL LOCATION BASED HIERARCHICAL ROUTING STRATEGY FOR WSN USING MOVABLE ROUTERS | INT | INDJST | 2016 |
42 | DR.K.SRENIVASA RAVI | EFFECTIVE ARCHITECTURE FOR GREENHOUSE CONTROLLING AND MONITORING USING WI-FI PEER TO PEER DIRECT PROTOCOL | INT | INDJST | 2016 |
43 | DR.T.ANURADHA | AN ENERGY EFFICIENT POWER USAGE CONTROLLING AND MONITORING USING WIRELESS SENSOR NETWORK | INT | INDJST | 2016 |
44 | DR.N.VENKATRAM | ESTABLISHING EFFICIENT SECURITY SCHEME IN HOME IOT DEVICES THROUGH BIOMETRIC FINGER PRINT TECHNIQUE | INT | INDJST | 2016 |
45 | D.ARUNA KUMARI | A RECONSTRUCTION ALGORITHM USING BINARY TRANSFORM FOR PRIVACY-PRESERVING DATA MINING | INT | INDJST | 2016 |
46 | DR.N.VENKATRAM | WATERMARKING USING LIFTING WAVELET TRANSFORM (LWT) AND ARTIFICIAL NEURAL NETWORKS (ANN) | INT | INDJST | 2016 |
47 | DR.JKR SASTRY |
PRICING OPTIONS CONSIDERING BANKRUPTCY OF UNDERLYING ISSUER
| INT | INDJST | 2016 |
48 | DR.T.ANURADHA | PASSWORD VERIFICATION IN MILITARY NETWORKS BY USING SECURE HASH ALGORITHM | INT | INDJST | 2016 |
49 | R.BULLI BABU | CONTENT BASED IMAGE RETRIEVAL USING COLOR, TEXTURE, SHAPE AND ACTIVE RE-RANKING METHOD | INT | INDJST | 2016 |
50 | DR.JKR SASTRY | A DATA DRIVEN APPROACH TO CALCULATE OPTIMUM COLLATERAL AMOUNT FOR VULNERABLE OPTION | INT | INDJST | 2016 |
51 | DR.MD.ALI HUSSAIN | Comparative Study of Algorithms on Class Imbalanced Datasets | INT | INDJST | 2016 |
52 | DR.K.RAGHAVA RAO | Selection of anchor nodes in time of arrival for localization in wireless sensor networks | INT | AISC | 2016 |
53 | M.KAMESWARA RAO | AN RTOS BASED ARCHITECTURE FOR PATIENT MONITORING SYSTEM WITH SENSOR NETWORKS | INT | INDJST | 2016 |
54 | DR.K.RAGHAVA RAO | SENCAR SCHEDULING ALGORITHM BASED ON PACKET LIFETIME IN WSN’S | INT | INDJST | 2016 |
55 | DR.K.SRENIVASA RAVI | IDENTIFICATION OF MISPLACED OBJECTS | INT | INDJST | 2016 |
56 | R.BULLI BABU | DETECTION OF CRIMES USING UNSUPERVISED LEARNING TECHNIQUES | INT | INDJST | 2016 |
57 | DR.D.ARUNA KUMARI | A FRAMEWORK FOR EXPLORING ALGORITHMS FOR BIG DATA MINING | INT | INDJST | 2016 |
58 | K.V.DAYA SAGAR | IMPLEMENTATION OF IOT BASED RAILWAY CALAMITY AVOIDANCE SYSTEM USING CLOUD COMPUTING TECHNOLOGY | INT | INDJST | 2016 |
59 | N.V.K.RAMESH | ATTENDANCE MANAGEMENT AND USER SECURITY SYSTEM’S BASED ON EIGEN FACES ALGORITHM USING RASPBERRY PI 2 AND ETHERNET | INT | INDJST | 2016 |
60 | DR.D.ARUNA KUMARI | ANALYZING AND PERFORMING PRIVACY PRESERVING DATA MINING ON MEDICAL DATABASES | INT | INDJST | 2016 |
61 | DR.D.ARUNA KUMARI | MAGNIFIED CIPHER BLOCK CHAINING MODE USING DES TO ENSURE DATA SECURITY IN CLOUD COMPUTING | INT | INDJST | 2016 |
62 | DR.K.SRENIVASA RAVI | AUTOMATION OF IRRIGATION SYSTEM BASED ON WI-FI TECHNOLOGY AND IOT | INT | INDJST | 2016 |
63 | DR.K.RAGHAVA RAO | FIRE ACCIDENT DETECTION AND PREVENTION MONITORING SYSTEM USING WIRELESS SENSOR NETWORK ENABLED ANDROID APPLICATION | INT | INDJST | 2016 |
64 | DR.K.RAGHAVA RAO | HASHING TECHNIQUE DATA OPTIMIZATION FOR LOW POWER CONSUMPTION IN WIRELESS SENSOR NETWORK | INT | INDJST | 2016 |
65 | DR.G.VIJAY KUMAR | MINING POPULAR PATTERNS FROM MULTIDIMENSIONAL DATABASE | INT | INDJST | 2016 |
66 | DR.K.SRENIVASA RAVI | AN EFFICIENT IDENTIFICATION OF DYNAMIC FAULTS USING CAN AND ARM7 IN A WIND TURBINE | INT | INDJST | 2016 |
67 | M.KAMESWARA RAO | AN EFFECTIVE ON-CHIP NETWORK TOPOLOGY FOR NETWORK ON CHIP (NOC) TRADE-OFFS | INT | INDJST | 2016 |
68 | DR.D.ARUNA KUMARI | GEOGRAPHICAL LOCATION BASED HIERARCHICAL ROUTING STRATEGY FOR WSN USING MOVABLE ROUTERS | INT | INDJST | 2016 |
69 | DR.K.SRENIVASA RAVI | EFFECTIVE ARCHITECTURE FOR GREENHOUSE CONTROLLING AND MONITORING USING WI-FI PEER TO PEER DIRECT PROTOCOL | INT | INDJST | 2016 |
70 | DR.T.ANURADHA | AN ENERGY EFFICIENT POWER USAGE CONTROLLING AND MONITORING USING WIRELESS SENSOR NETWORK | INT | INDJST | 2016 |
71 | DR.N.VENKATRAM | ESTABLISHING EFFICIENT SECURITY SCHEME IN HOME IOT DEVICES THROUGH BIOMETRIC FINGER PRINT TECHNIQUE | INT | INDJST | 2016 |
72 | DR.D.ARUNA KUMARI | A RECONSTRUCTION ALGORITHM USING BINARY TRANSFORM FOR PRIVACY-PRESERVING DATA MINING | INT | INDJST | 2016 |
73 | K.RAVI KUMAR | EFFICIENT USAGE OF RESOURCES THROUGH RFID CARDS | INT | INDJST | 2016 |
74 | M.KAMESWARA RAO | A PROTOTYPE FOR IOT BASED CAR PARKING MANAGEMENT SYSTEM FOR SMART CITIES | INT | INDJST | 2016 |
75 | DR.JKR SASTRY | INCORPORATING IMPLIED VOLATILITY IN PRICING OPTIONS USING BINOMIAL TREE | INT | INDJST | 2016 |
76 | DR.K.SRENIVASA RAVI | GPS AND GSM ENABLED EMBEDDED VEHICLE SPEED LIMITING DEVICE | INT | INDJST | 2016 |
77 | N.V.K.RAMESH | face recognition based attendance management system with raspberry pi 2 using eigen faces algorithm | INT | ARPN-JEAS | 2016 |
78 | T.NARENDRA BABU | FPGA IMPLEMENTATION OF HIGH SPEED ERROR DETECTION AND CORRECTION OF ORTHOGONAL CODES USING SEGMENTATION METHOD | INT | INDJST | 2016 |
79 | PSG ARUNA SRI | SECURING MESSAGE AT ENED TO END MOBILE COMMUNICATION USING CRYPTOGRAPHIC ALGORITHM | INT | INDJST | 2016 |
80 | DR.DBK KAMESH | CAMERA BASED TEXT TO SPEECH CONVERSION OBSTACLE AND CURRENCY DETECTION FOR BLIND PERSONS | INT | INDJST | 2016 |
81 | DR.DBK KAMESH | AUTHENTICATING CLIENTS WITHOUT USING THEIR LOGINIDS THROUGH MIND METRICS | INT | INDJST | 2016 |
82 | DR.DBK KAMESH | BUILDING FAULT TOLERANCE WITHIN CLOUDS AT NETWORK LEVEL | INT | IJECE | 2016 |
83 | K.RAVI KUMAR | REMOVAL OF REAL WORLD NOISE IN SPEECH: COMPARISION OF VARIOUS PAARMETERS USING KALMAN AND H-INFINITY FILTER ALGORITHMS | INT | INDJST | 2016 |
84 | K.RAVI KUMAR | TEXTURE AND SHAPE BASED OBJECT DETECTION STRATEGIES | INT | INDJST | 2016 |
85 | DR.N.VENKATRAM | INDIAN SIGN LANGUAGE RECOGNITION:A COMPARISION BETWEEN ANN AND FIS | INT | JATIT | 2016 |
86 | DR.K.RAGHAVA RAO | Mitigating energy utilization and time delay in wireless sensor networks using multiple sink relocating method | INT | INDJST | 2016 |
87 | DR.K.RAGHAVA RAO | High-leach energy efficient routing protocol for wireless sensor networks | INT | INDJST | 2016 |
88 | DR.K.RAGHAVA RAO | An android based automatic irrigation system using a WSN and GPRS module | INT | INDJST | 2016 |
89 | N.V.K.RAMESH | Estimation of doppler spread fading using modified Jake''s model | INT | ARPN-JEAS | 2016 |
90 | PSG ARUNA SRI | A FRAMEWORK ON BIG DATA-SURVEY | INT | IJCR | 2016 |
91 | R.BULLI BABU | A SURVEY ON CLASS IMBALANCE LEARNING ALGORITHMS | INT | IJSER | 2016 |
92 | R.BULLI BABU | A REVIEW ON CLASS IMBALANCE LEARNING IN KNOWLEDGE DISCOVERY | INT | IJDSR | 2016 |
93 | MD.ALI HUSSAIN | AN OPTIMIZED DECISION TREES APPROACH FOR KNOWLEDGE DISCOVERY USING ORTHOGONAL RANDOM MATRIX PROJECTION WITH OUTLIER DETECTION | INT | IJDTA | 2016 |
94 | NVK RAMESH | WAVELET BASED MOBILE LOCATION ESTIMATION USING RSS MEASUREMENTS | INT | ARPN-JEAS | 2016 |
95 | K.RAGHAVA RAO | AN EFFICIENT SCHEME FOR FACILITATING SECURE DATA SHARING IN DECENTRALIZED DISRUPTION TOLERANT NETWORKS | INT | INDJST | 2016 |
96 | K.KIRAN KUMAR | A PROPOSAL FOR MITIGATION OF GRAY HOLE ATTACK IN WIRELESS MESH AD-HOC NETWORKS USING S-DSDV | INT | JATIT | 2016 |
97 | R.BULLI BABU | ESTABLISHING PATH QUALITY MANAGEMENT IN WIRELESS SENSOR NETWORKS THROUGH CLUSTER HEAD DETERMINATION | INT | INDJST | 2016 |
98 | M.KAMESWARA RAO | A NOVEL GRAPHICAL PASSWORD AUTHENTICATION MECHANISM FOR CLOUD SERVICES | INT | AISC | 2016 |
99 | M.KAMESWARA RAO | A SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD AUTHENTICATION SCHEME | INT | AISC | 2016 |
100 | JKR SASTRY | A COMPUTATIONALLY MORE EFFICIENT DISTANCE BASED VAR METHODOLOGY FOR REAL TIME MARKET RISK MEASSUREMENT | INT | INDJST | 2016 |
101 | T.NARENDRA BABU | IMPLEMENTATION OF HIGH SECURITY CRYPTOGRAPHIC SYSTEM WITH IMPROVED ERROR CORRECTION AND DETECTION RATE USING FPGA | INT | IJECE | 2016 |