S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | D.Aruna Kumari | Network intrusion detection using data mining | INT | International journal of systems and technolgy(IJST) | 2009 |
2 | G. Rajesh Chandra | A New Algorithm for Multi Scale Communication in Sensor Networks | INT | GESJCST | 2010 |
3 | D.Aruna Kumari | Privacy Preserving Distributed Datamining:a Approach Using Stegnography Techniques | INT | CIT Internationa of Engineering and Research | 2010 |
4 | D.Aruna Kumari | Distributed data mining: A new
Approach using Steganography techniques | INT | CIT International
journal of Research
and educations | 2010 |
5 | D.Aruna Kumari | Distributed Data Mining Based On Communication Costs | INT | CIT National Journal Of Research | 2010 |
6 | M.Venkateswara Rao | Ad-Hoc Low Powered 802.15.1 Protocol Based Automation System for Residence using Mobile Devices | INT | IJCST | 2011 |
7 | S.Balaji | A Novel iris Recognition System Using Statical Feature Analysis By Haar Wavelet | INT | IJCSIT | 2011 |
8 | K.Sreenivasa Ravi | Cross Platform Comptibility on Mobile Operating System | INT | IJCST | 2011 |
9 | K.Ravi Kumar | Enhancement in Encryption through Localization | INT | International Journal of Engineering Research and Applications | 2011 |
10 | M.Suman
| Direct Marketing with the
Application of Data Mining | INT | IISTE | 2011 |
11 | Y. Madhavi latha | Symbolic execution for software testing based on DART and CUTE | INT | GJCAT | 2011 |
12 | U.Jyothi Kameswari | Novel Techniques for Test Suite Reduction | INT | International Journal of Science and Advanced Technology | 2011 |
13 | T.Anuradha | Recent Trends in Parallell and Distributed APRIORI Algorithm | INT | International Journal of Engineering Research and Applications | 2011 |
14 | G.Rajesh Chandra | A New Algorithm for pervasive Computing in MANET | INT | IJESAT | 2011 |
15 | V.Harini | Block Thresholding Algorithm for Enhancement of an Audio signal Corrupted by Noise | INT | ijrras | 2011 |
16 | S. Balaji
| Design and Development of a RFID based Mobile Robot | INT | IJESAT | 2011 |
17 | G.S.Sarma
| A Case Study on Pervasive Computing in MANET | INT | IJSER | 2011 |
18 | D.Aruna Kumari | Privacy preserving clustering in data mining using vector quantization | INT | Research Journal of Computer Systems Engineering-RJCSE | 2011 |
19 | D.Aruna Kumari | Distributed data mining: A new Approach using Steganography techniques | INT | CIT International journal of Research and educations | 2011 |
20 | N.Rajesh Babu | Design of ARM Based EMBEDDED Ethernet Interface For Sensors | INT | GJCAT | 2011 |
21 | M.Suman | A frequent mining algorithm based on FP-tree &Apriori algorithm | INT | Research Journal of Computer Systems Engineering-RJCSE | 2011 |
22 | D.Aruna Kumari | Privacy Preserving distributed data mining: A new approaches for Detecting network traffic using Steganography | INT | International journal of systems and technolgy(IJST) | 2011 |
23 | S.Nagendram | Secure congestion aware routing protocol for wriless sensor networks | INT | International Journal of Science and Advanced Technology | 2011 |
24 | D.Haritha | Discovery of Reliable Software using GOM on Interval Domain Data | INT | International Journal of Computer Applications | 2011 |
25 | D. Aruna Kumari | Privacy preserving clustering
in data mining using vector quantization | INT | Research journal
of Computer science and engineering (RJCSE) | 2011 |
26 | M.Suman | Item set extraction without using constraints | INT | International Journal of computer science and informatics | 2011 |
27 |
K.Sandeep | Implementation of Speech-IC in Sixth Sense Technology | INT | IJMSA | 2011 |
28 | T.Anuradha | Identifying weak subjects using association rule mining | INT | IJSER | 2011 |
29 | K.Ravi Kumar | Improving Quantitative Measurements using Different Segmantation Techniques for Satellite Images | INT | IJCTA | 2011 |
30 | K.Ravi Kumar | A Novel Processor Architecture for Pairing based Cryptography Applications | INT | IJCTA | 2011 |
31 | Y.madhavi Latha | A Software Framework to Alleviate the Developemnt of DR Management Systems | INT | IJSER | 2011 |
32 | S.Nagenam | Force-Skilled Protocol for wireless Feeler Networks | INT | IFRSA''s International journal of Computing | 2011 |
33 | S.Nagendram | A Novel Method of Exploring Human Reasoning Power In Image Analysis | INT | International Journal of Science and Advanced Technology | 2011 |
34 | S.Balaji | Different Pattern Recognition in Re-Ranking Process Using Image Based Retrieval | INT | IJSER | 2011 |
35 | G.Rajesh Chandra | An effective power utilization Technique for Embedded based Irrigation sytem Using Cellphone | INT | IJESAT | 2011 |
36 | G.Rajesh Chandra | The Higher Security Systems for Smart Home Using Adavanced Technology | INT | IJESAT | 2011 |
37 | D.Haritha | Detection of Reliable Software Using HLSRGM | INT | IJCIS | 2011 |
38 | D.Haritha | Detection of Reliable Software Using Particle Swarm Optimization | INT | GJCAT | 2011 |
39 | M.Nalini Sri | Testing of Network Intrusion Detection System
| INT | IJCTA | 2011 |
40 | V.Harini
| Sub-Adaptive Filter with Critical
Sampling for White | INT | IJECE | 2011 |
41 | V.Harini
| Novel Navigation Mobile Robot
Implementation based on
RFID Navigation System | INT | IJAERS | 2011 |
42 | M.Suman | Speech Signal Compression and its Enhancement
| INT | IJESCC | 2011 |
43 | K.Sreenivasa Ravi | Smart Sensor System for agricultural Chronology | INT | IJCSIT | 2011 |
44 | D.Aruna Kumari | Privacy preserving clustering in data mining using vector quantization | INT | RJCSE | 2011 |
45 | M.Suman | Dimensions of performance in compressed signal and its enhancement | INT | International journal of Engineering Science Research (IJESR) | 2011 |
46 | M.Nalini Sri | Network Based Approach of
Human Interaction with Real
World Objects Through Semantics | INT | IJCST | 2011 |
47 | D Aruna Kumari | Distributed Data Mining: Server Selection and Query Processing based on communication costs | INT | RJCSE | 2011 |
48 | K.Madhuri | Application level load balancing in a web switch or ssecurity oriented filtering based on the content signatures for deep packet inspection and delayed input DFA | INT | IJSER | 2011 |
49 | S.Nagendram | Force-Skilled Protocol for wireless Feeler Networks | INT | IFRSA''s International journal of Computing | 2011 |
50 | K.Ravi Kumar | Different Pattern Recognition in Re-Ranking Process Using Image Based Retrieval | INT | IJSER | 2011 |
51 | Y.Madhavi Latha | A Software Framework to Alleviate the Developemnt of DR Management Systems | INT | IJSER | 2011 |
52 | S.Balaji | Design And Development of A Rfid Based Mobile Robot. | INT | IJESAT | 2011 |
53 | M.Venkateswara Rao | Self-Test Techniques in SoC for Low Power Consumption | INT | IJCTA | 2011 |
54 | P.Vikram | Scheduling in Wi-Max Networks | INT | IJCSIT | 2011 |
55 | K.Sandeep | Implementation of Speech-IC in Sixth Sense Technology | INT | IJMSA | 2011 |
56 | M.Venkateswara Rao | Time –Frequency Representation of Vocal Source Signal for Speaker Verification | INT | International Journal of Computer Applications | 2011 |
57 | P.Vikram | Rain fall Forecasting Using Non linear SVM based on PSO | INT | IJCSIT | 2011 |
58 | G. Asa Jyothi | Triple Band Triangular and Exponential Serrated MSP antenna for S and C band Applications | INT | IJERD | 2012 |
59 | M.Venkateswara Rao | RISC based embedded system
monitor and controlling using web | INT | International Journal of Computer Applications | 2012 |
60 | G.Kalyan Mohan | Design and Implementation of Remote home Security System based on WSNS and GSM Technology | INT | IJESAT | 2012 |
61 | M.K.Tyagi | Enhanced Local Texture Feature sets for Face using KLADA and Gradient Face Features | INT | IJESAT | 2012 |
62 | N.Rajesh Babu | Replacing Passport using
Bio-Chip | INT | IJESAT | 2012 |
63 | T.Anuradha | Design of Zigbee sensor network
for building
power controlling with
device | INT | IJETED | 2012 |
64 | D.Aruna Kumari | Vector quantization for privacy preserving clustering in data mining | INT | Advanced computing : International Journal | 2012 |
65 | S.Balaji | A Novel Approach for Enhancing Security in Smart Cards Using Biometrics | INT | International Journal of Computer Applications | 2012 |
66 | S.Balaji | Security Evaluation of Online Signature Verification System Using Webcams | INT | International Journal of Computer Applications | 2012 |
67 | T.Anuradha | Design of Low Power RISC Processor by applying Clock Gating Technique | INT | International Journal of Computer Applications | 2012 |
68 | K.Ravi Kumar | Implementation of INS in
three Dimensional space | INT | International Journal of Computer Applications | 2012 |
69 | M.Suman | A Generalized Embedded Webserver Based on Wireless Sensor Network for Industrial Monitoring | INT | IJESAT | 2012 |
70 | M.Suman | An Innovative Cost Effective Ethernet Gate Way Based on Embedded Serial Device | INT | IJESAT | 2012 |
71 | M.Suman | A New Approach on Compression of Speech Signals Using MSVQ and its Enhancement Using Spectral Subtraction Under Noise free and Noisy Enviornment | INT | Advances in Digital Multimedia(ADMM) | 2012 |
72 | S.Balaji | FPGA Based an Adavanced LUT Methodology for Design of a Digital Filter | INT | IJESAT | 2012 |
73 | M.Venkateswara Rao | Design of µC/ Os II RTOS
Based Scalable Cost Effective,
Monitoring System Using
Arm Powered Microcontroller | INT | IJSRP | 2012 |
74 | G.S.Sarma | A Novel Method of SAR Image Regularization with Fast Approximate Discrete Minimization | INT | Advances in Digital Multimedia | 2012 |
75 |
K. Sreenivasa Ravi | Multi Platform Compatibility on Mobile Operating Systems | INT | Advances in Computer Science and its Applications | 2012 |
76 | A.S.N. Chakravarthy | Novel Approach for the propagation and detection of active worm in a Virtual System | INT | ACSA | 2012 |
77 | D.Aruna Kumari | Privacy Preserving
Clustering in DDM
using Cryptography | INT | RJCSE | 2012 |
78 | M.K.Tyagi | Nymble: Intercepts
Misbehaving users | INT | ACSA | 2012 |
79 | A.S.N Chakravarthy | Evaluation of Watermarking Techniques | INT | IJMTT | 2012 |
80 | A.S.N Chakravarthy | Survey on Hsrd Disk Duplication | INT | AMEA | 2012 |
81 | N.Venkat Ram | CRT and ART Based
Watermarking Scheme in
DCT Domain | INT | IJEAT | 2012 |
82 | A.S.N Chakravarthy | Document Clustering in Web Search Engine | INT | IJCTT | 2012 |
83 | N.Venkat Ram | On Integrating distributed heterogeneous embedded codes for implementing homogeneous embedded intelligent Tag related Application | INT | IJCIS | 2012 |
84 | N.Venkat Ram | Efficient Power management
Techniques for Increasing
The Longevity of Intelligent Tags | INT | ITEECE | 2012 |
85 | N.Venkat Ram | On Identifying Intelligent tags
With Remote HOST | INT | ITEECE | 2012 |
86 | N.Venkat Ram | Building Intelligent into TAGS
for Tamper Proofing | INT | International Journal of Advances in Science and Technology | 2012 |
87 | M.K.Tyagi | A Novel method of face recognition using LBP, LTP and Gabor Features | INT | IJEED | 2012 |
88 | A. Rama Krishna | Design And Implementation of A Robotic ARM Based on Haptic Technology | INT | International Journal of Engineering Research and Applications | 2012 |
89 | N.Venkat Ram | An architecture framework for implementing add-on applications on mobile phones that runs on Android operating system for effecting peer communication with application components resident on intelligent tags | INT | ITEECE | 2012 |
90 | T.Anuradha | Parallelizing Apriori onual
Core sing OpenMP | INT | International Journal of Computer Applications | 2012 |
91 | D.Aruna Kumari | Privacy preserving data mining using VQ code book generation | INT | AIRCEE | 2012 |
92 | A. Rama Krishna | Design of a Resue Robot Assist at Fire Disaster | INT | International Journal of Computer Applications | 2012 |
93 | Y.Madhavi Latha | A Novel approach for the Detection of Sync Flood attack | INT | IJCTT | 2012 |
94 | K.Ravi Kumar | A Comparative Study of 6T, 8T and 10T SRAM Cells based on performance and word organisation | INT | IJAR | 2013 |
95 | Dr S. Balaji | Denoising of a color image using fuzzy filtering technology | INT | IJCOT | 2013 |
96 | Dr.DBK Kamesh | home autmation using gsm | INT | IJESR | 2015 |
97 | T. Narendra Babu | a survey on visual cryptoography | INT | IJAER | 2015 |
98 | DR.K.SRENIVASA RAVI | Computer Vision and web framework for bank security locker system using ARM processor | INT | IJSER | 2015 |
99 | DR.K.SRENIVASA RAVI | An efficient and optimal systems for medical and industries with concept of IOT | INT | IJERA | 2015 |
100 | K. srinivas ravi | AN ADVANCED INDUSTRIAL MONITORING SYSTEM USING RASPBERRY-PI CONTROLLER IN IOT | INT | IJEATS | 2015 |
101 | Dr.T.Anuradha | Recent trends in data mining for crime detection | INT | IJAER | 2015 |
102 | Dr.K. srinivasa Ravi | The Android Application for Sending SMS in Regional Languages | INT | IJRET | 2015 |
103 | T. Narendra Babu | Implementation of PUF on FPGA | INT | IJVDCS | 2015 |
104 | Dr.K.Raghava Rao | A robust routing protocol for adhoc vehicular networks | INT | IRECOS | 2015 |
105 | Dr.D.Aruna Kumari | Privacy Preserving Data mining in healthcare applications | INT | IJACT | 2015 |
106 | Dr.M. Suman | A New Approach for Text summarizer | INT | IJACT | 2015 |
107 | Dr.K. Kiran kumar | Architecture of Hyper-threading on Intel Xenon Processor | INT | IJARECE | 2015 |
108 | Dr.D.Aruna Kumari | Intrusion detection using data mining techniques(classification)” | INT | IJCSIT | 2015 |
109 | Dr.D.Aruna Kumari | Echo chamber effect in Big data | INT | IJCSMC | 2015 |
110 | Dr.G.VIJAY KUMAR | A Portable and Secure Healthcare Maintenance System | INT | IJCSIT | 2015 |
111 | Dr.G.VIJAY KUMAR | A Review on Security and Privacy issues in Big Data | INT | IJEATS | 2015 |
112 | Dr.KVD SAGAR | A Secure Data DE duplication Scheme for Cloud Storage | INT | IJSA | 2015 |
113 | Dr.KVD SAGAR | Four-way File Synchronization Mechanism in Cloud Storage System | INT | IJCAT | 2015 |
114 | P s G Aruna Sri | Improving The Usage Of Encryption And Decryption Algorithms | INT | IJMEIT | 2015 |
115 | N.V.K.RAMESH | Analysis of Pathloss Models For 3g Mobile Signals Inurban, Suburban and Rural Environment | INT | IJAER | 2015 |
116 | Dr.K.Raghava Rao | Implementation of a smart governance using Big data Technologies | INT | IJAR | 2015 |
117 | Dr.K.Raghava Rao | A survey on clustering techniques to improve energy efficient routing in wireless sensor networks | INT | IJAER | 2015 |
118 | Dr.J K R Sastry | A Computationally more efficient distance based VaR methodology for real-time market risk measurement | INT | WSEAS-TISA | 2015 |
119 | Dr.J K R Sastry | A Data driven approach to calculate optimum collateral amount for vulnerable option | INT | WSEAS-TISA | 2015 |
120 | Dr.J K R Sastry | Pricing Options Considering Bankruptcy of Underlying Issuer | INT | British Journal of Sciences | 2015 |
121 | Dr.J K R Sastry | Incorporating implied volatility in Pricing Options using Binomial Tree | INT | IJET | 2015 |
122 | Dr.J K R Sastry | Optimizing Communication between heterogeneous distributed Embedded Systems using CAN protocol | INT | ARPN-JEAS | 2015 |
123 | Dr.J K R Sastry | Building Heterogeneous Distributed Embedded Systems through RS485 Communication Protocol | INT | ARPN-JEAS | 2015 |
124 | Dr.J K R Sastry | I2C based Networking for implementing Heterogeneous Microcontroller based Distributed Embedded Systems | INT | Indian Journal of Science and | 2015 |
125 | Dr.J K R Sastry | On Testing Distributed Embedded Systems through Scaffolding | INT | IJECE | 2015 |
126 | Dr.J K R Sastry | USB based Networking for implementing Heterogeneous Microcontroller based Distributed Embedded Systems | INT | IJECE | 2015 |
127 | M.Kameswara Rao | Gesture Based Authentication | INT | IJAIR | 2015 |
128 | Dr.T.Anuradha | Securing the Personal Health Records in Cloud Using ABE and Analyzing them using Rule Based Classification in Data Mining | INT | IJMER | 2015 |
129 | M.Kameswara Rao | An Efficient approach for Remote Update Firmware for embedded systems | INT | IJAIR | 2015 |
130 | M.Kameswara Rao | Security Issues in Big data Analytics | INT | JECET | 2015 |
131 | M.Kameswara Rao | Graphical Password Using Captcha (CaRP) | INT | JECET | 2015 |
132 | Dr.T.Anuradha | Multimedia database for attainment targets | INT | IJACCC | 2015 |
133 | Dr.K. Kiran kumar | Introduction to Techniques of Query Processing and Optimization | INT | IJIRAE | 2015 |
134 | Dr.JVN Ramesh | energy utilization of tcp in adhoc networks | INT | GJCST | 2015 |
135 | K RAGHAVA RAO | REMOTE TEMPERATURE AND HUMIDITY MONITORIGNG SYSTEM USING WIRLESS SENSOR NETWORKS | INT | IJRET | 2015 |
136 | Dr.M. Suman | Speech Recognition using MFCC & VQLBG | INT | JECET | 2015 |
137 | R.BULLI BABU | A REVIEW ON CLASS IMBALANCE LEARNING IN KNOWLEDGE DISCOVERY | INT | IJDSR | 2016 |
138 | R.BULLI BABU | A SURVEY ON CLASS IMBALANCE LEARNING ALGORITHMS | INT | IJSER | 2016 |
139 | PSG ARUNA SRI | A FRAMEWORK ON BIG DATA-SURVEY | INT | IJCR | 2016 |
140 | DR.K.SRENIVASA RAVI | An Advanced Industrial Monitoring System using raspberry-pi controller in IOT | INT | IJEA | 2016 |
141 | MD.ALI HUSSAIN | AN OPTIMIZED DECISION TREES APPROACH FOR KNOWLEDGE DISCOVERY USING ORTHOGONAL RANDOM MATRIX PROJECTION WITH OUTLIER DETECTION | INT | IJDTA | 2016 |
142 | MD.ALI HUSSAIN | AN OPTIMIZED DECISION TREES APPROACH FOR KNOWLEDGE DISCOVERY USING ORTHOGONAL RANDOM MATRIX PROJECTION WITH OUTLIER DETECTION | INT | IJDTA | 2016 |
143 | R.BULLI BABU | A REVIEW ON CLASS IMBALANCE LEARNING IN KNOWLEDGE DISCOVERY | INT | IJDSR | 2016 |
144 | PSG ARUNA SRI | A FRAMEWORK ON BIG DATA-SURVEY | INT | IJCR | 2016 |
145 | R.BULLI BABU | A SURVEY ON CLASS IMBALANCE LEARNING ALGORITHMS | INT | IJSER | 2016 |
146 | Suresh Babu. B | Beacon Optimisation Foroptimized Routing Model Using Tsch Network | INT | IJRECE | 2018 |
147 | M. Lakshmi Prasad | Generation of Test Cases Using Combinatorial
Methods Based Multi-Output Domain of an
Embedded System through the Process of Optimal
Selection | INT | International Journal of Pure and Applied Mathematics | 2018 |
148 | B. Balaji Bhanu | Mechanized Irrigation System Cataloging with Remote Sensor Set-Up | INT | IJRECE | 2018 |