Apply Now

Department of

Electronics & Computer Engineering

Welcome to E.C.M



Research Publications - Journal


S.NoName(s) of the AuthorTitleNational / InternationalConf/Jur NameYear
1D.Aruna KumariNetwork intrusion detection using data miningINTInternational journal of systems and technolgy(IJST)2009
2G. Rajesh ChandraA New Algorithm for Multi Scale Communication in Sensor NetworksINTGESJCST2010
3D.Aruna KumariPrivacy Preserving Distributed Datamining:a Approach Using Stegnography TechniquesINTCIT Internationa of Engineering and Research2010
4D.Aruna KumariDistributed data mining: A new Approach using Steganography techniquesINTCIT International journal of Research and educations2010
5D.Aruna KumariDistributed Data Mining Based On Communication CostsINTCIT National Journal Of Research2010
6M.Venkateswara RaoAd-Hoc Low Powered 802.15.1 Protocol Based Automation System for Residence using Mobile DevicesINTIJCST2011
7S.BalajiA Novel iris Recognition System Using Statical Feature Analysis By Haar WaveletINTIJCSIT2011
8K.Sreenivasa RaviCross Platform Comptibility on Mobile Operating SystemINTIJCST2011
9K.Ravi KumarEnhancement in Encryption through LocalizationINTInternational Journal of Engineering Research and Applications2011
10M.Suman Direct Marketing with the Application of Data MiningINTIISTE2011
11Y. Madhavi lathaSymbolic execution for software testing based on DART and CUTEINTGJCAT2011
12U.Jyothi KameswariNovel Techniques for Test Suite ReductionINTInternational Journal of Science and Advanced Technology2011
13T.AnuradhaRecent Trends in Parallell and Distributed APRIORI AlgorithmINTInternational Journal of Engineering Research and Applications2011
14G.Rajesh ChandraA New Algorithm for pervasive Computing in MANETINTIJESAT2011
15V.HariniBlock Thresholding Algorithm for Enhancement of an Audio signal Corrupted by NoiseINTijrras2011
16S. Balaji Design and Development of a RFID based Mobile RobotINTIJESAT2011
17G.S.Sarma A Case Study on Pervasive Computing in MANETINTIJSER2011
18D.Aruna KumariPrivacy preserving clustering in data mining using vector quantizationINTResearch Journal of Computer Systems Engineering-RJCSE2011
19D.Aruna KumariDistributed data mining: A new Approach using Steganography techniquesINTCIT International journal of Research and educations2011
20N.Rajesh BabuDesign of ARM Based EMBEDDED Ethernet Interface For SensorsINTGJCAT2011
21M.SumanA frequent mining algorithm based on FP-tree &Apriori algorithmINTResearch Journal of Computer Systems Engineering-RJCSE2011
22D.Aruna KumariPrivacy Preserving distributed data mining: A new approaches for Detecting network traffic using SteganographyINTInternational journal of systems and technolgy(IJST)2011
23S.NagendramSecure congestion aware routing protocol for wriless sensor networksINTInternational Journal of Science and Advanced Technology2011
24D.HarithaDiscovery of Reliable Software using GOM on Interval Domain DataINTInternational Journal of Computer Applications2011
25D. Aruna KumariPrivacy preserving clustering in data mining using vector quantizationINTResearch journal of Computer science and engineering (RJCSE)2011
26M.SumanItem set extraction without using constraintsINTInternational Journal of computer science and informatics2011
27 K.SandeepImplementation of Speech-IC in Sixth Sense TechnologyINTIJMSA2011
28T.AnuradhaIdentifying weak subjects using association rule miningINTIJSER2011
29K.Ravi KumarImproving Quantitative Measurements using Different Segmantation Techniques for Satellite ImagesINTIJCTA2011
30K.Ravi KumarA Novel Processor Architecture for Pairing based Cryptography ApplicationsINTIJCTA2011
31Y.madhavi LathaA Software Framework to Alleviate the Developemnt of DR Management SystemsINTIJSER2011
32S.NagenamForce-Skilled Protocol for wireless Feeler NetworksINTIFRSA''s International journal of Computing2011
33S.NagendramA Novel Method of Exploring Human Reasoning Power In Image AnalysisINTInternational Journal of Science and Advanced Technology2011
34S.BalajiDifferent Pattern Recognition in Re-Ranking Process Using Image Based RetrievalINTIJSER2011
35G.Rajesh ChandraAn effective power utilization Technique for Embedded based Irrigation sytem Using CellphoneINTIJESAT2011
36G.Rajesh ChandraThe Higher Security Systems for Smart Home Using Adavanced TechnologyINTIJESAT2011
37D.HarithaDetection of Reliable Software Using HLSRGMINTIJCIS2011
38D.HarithaDetection of Reliable Software Using Particle Swarm OptimizationINTGJCAT2011
39M.Nalini SriTesting of Network Intrusion Detection System INTIJCTA2011
40V.Harini Sub-Adaptive Filter with Critical Sampling for WhiteINTIJECE2011
41V.Harini Novel Navigation Mobile Robot Implementation based on RFID Navigation SystemINTIJAERS2011
42M.SumanSpeech Signal Compression and its Enhancement INTIJESCC2011
43K.Sreenivasa RaviSmart Sensor System for agricultural ChronologyINTIJCSIT2011
44D.Aruna KumariPrivacy preserving clustering in data mining using vector quantizationINTRJCSE2011
45M.SumanDimensions of performance in compressed signal and its enhancementINTInternational journal of Engineering Science Research (IJESR)2011
46M.Nalini SriNetwork Based Approach of Human Interaction with Real World Objects Through SemanticsINTIJCST2011
47D Aruna KumariDistributed Data Mining: Server Selection and Query Processing based on communication costsINTRJCSE2011
48K.MadhuriApplication level load balancing in a web switch or ssecurity oriented filtering based on the content signatures for deep packet inspection and delayed input DFAINTIJSER2011
49S.NagendramForce-Skilled Protocol for wireless Feeler NetworksINTIFRSA''s International journal of Computing2011
50K.Ravi KumarDifferent Pattern Recognition in Re-Ranking Process Using Image Based RetrievalINTIJSER2011
51Y.Madhavi LathaA Software Framework to Alleviate the Developemnt of DR Management SystemsINTIJSER2011
52S.BalajiDesign And Development of A Rfid Based Mobile Robot.INTIJESAT2011
53M.Venkateswara RaoSelf-Test Techniques in SoC for Low Power ConsumptionINTIJCTA2011
54P.VikramScheduling in Wi-Max NetworksINTIJCSIT2011
55K.SandeepImplementation of Speech-IC in Sixth Sense TechnologyINTIJMSA2011
56M.Venkateswara RaoTime –Frequency Representation of Vocal Source Signal for Speaker VerificationINTInternational Journal of Computer Applications2011
57P.VikramRain fall Forecasting Using Non linear SVM based on PSOINTIJCSIT2011
58G. Asa JyothiTriple Band Triangular and Exponential Serrated MSP antenna for S and C band ApplicationsINTIJERD2012
59M.Venkateswara RaoRISC based embedded system monitor and controlling using webINTInternational Journal of Computer Applications2012
60G.Kalyan MohanDesign and Implementation of Remote home Security System based on WSNS and GSM TechnologyINTIJESAT2012
61M.K.TyagiEnhanced Local Texture Feature sets for Face using KLADA and Gradient Face FeaturesINTIJESAT2012
62N.Rajesh BabuReplacing Passport using Bio-ChipINTIJESAT2012
63T.AnuradhaDesign of Zigbee sensor network for building power controlling with deviceINTIJETED2012
64D.Aruna KumariVector quantization for privacy preserving clustering in data miningINTAdvanced computing : International Journal2012
65S.BalajiA Novel Approach for Enhancing Security in Smart Cards Using BiometricsINTInternational Journal of Computer Applications2012
66S.BalajiSecurity Evaluation of Online Signature Verification System Using WebcamsINTInternational Journal of Computer Applications2012
67T.AnuradhaDesign of Low Power RISC Processor by applying Clock Gating TechniqueINTInternational Journal of Computer Applications2012
68K.Ravi KumarImplementation of INS in three Dimensional spaceINTInternational Journal of Computer Applications2012
69M.SumanA Generalized Embedded Webserver Based on Wireless Sensor Network for Industrial MonitoringINTIJESAT2012
70M.SumanAn Innovative Cost Effective Ethernet Gate Way Based on Embedded Serial DeviceINTIJESAT2012
71M.SumanA New Approach on Compression of Speech Signals Using MSVQ and its Enhancement Using Spectral Subtraction Under Noise free and Noisy EnviornmentINTAdvances in Digital Multimedia(ADMM)2012
72S.BalajiFPGA Based an Adavanced LUT Methodology for Design of a Digital FilterINTIJESAT2012
73M.Venkateswara RaoDesign of µC/ Os II RTOS Based Scalable Cost Effective, Monitoring System Using Arm Powered MicrocontrollerINTIJSRP2012
74G.S.SarmaA Novel Method of SAR Image Regularization with Fast Approximate Discrete MinimizationINTAdvances in Digital Multimedia2012
75 K. Sreenivasa RaviMulti Platform Compatibility on Mobile Operating SystemsINTAdvances in Computer Science and its Applications2012
76A.S.N. ChakravarthyNovel Approach for the propagation and detection of active worm in a Virtual SystemINTACSA2012
77D.Aruna KumariPrivacy Preserving Clustering in DDM using CryptographyINTRJCSE2012
78M.K.TyagiNymble: Intercepts Misbehaving usersINTACSA2012
79A.S.N ChakravarthyEvaluation of Watermarking TechniquesINTIJMTT2012
80A.S.N ChakravarthySurvey on Hsrd Disk DuplicationINTAMEA2012
81N.Venkat RamCRT and ART Based Watermarking Scheme in DCT DomainINTIJEAT2012
82A.S.N ChakravarthyDocument Clustering in Web Search EngineINTIJCTT2012
83N.Venkat RamOn Integrating distributed heterogeneous embedded codes for implementing homogeneous embedded intelligent Tag related ApplicationINTIJCIS2012
84N.Venkat RamEfficient Power management Techniques for Increasing The Longevity of Intelligent TagsINTITEECE2012
85N.Venkat RamOn Identifying Intelligent tags With Remote HOSTINTITEECE2012
86N.Venkat RamBuilding Intelligent into TAGS for Tamper ProofingINTInternational Journal of Advances in Science and Technology2012
87M.K.TyagiA Novel method of face recognition using LBP, LTP and Gabor FeaturesINTIJEED2012
88A. Rama KrishnaDesign And Implementation of A Robotic ARM Based on Haptic TechnologyINTInternational Journal of Engineering Research and Applications2012
89N.Venkat RamAn architecture framework for implementing add-on applications on mobile phones that runs on Android operating system for effecting peer communication with application components resident on intelligent tagsINTITEECE2012
90T.AnuradhaParallelizing Apriori onual Core sing OpenMPINTInternational Journal of Computer Applications2012
91D.Aruna KumariPrivacy preserving data mining using VQ code book generationINTAIRCEE2012
92A. Rama KrishnaDesign of a Resue Robot Assist at Fire DisasterINTInternational Journal of Computer Applications2012
93Y.Madhavi LathaA Novel approach for the Detection of Sync Flood attackINTIJCTT2012
94K.Ravi KumarA Comparative Study of 6T, 8T and 10T SRAM Cells based on performance and word organisationINTIJAR2013
95Dr S. BalajiDenoising of a color image using fuzzy filtering technologyINTIJCOT2013
96Dr.DBK Kameshhome autmation using gsmINTIJESR2015
97T. Narendra Babua survey on visual cryptoographyINTIJAER2015
98DR.K.SRENIVASA RAVIComputer Vision and web framework for bank security locker system using ARM processorINTIJSER2015
99DR.K.SRENIVASA RAVIAn efficient and optimal systems for medical and industries with concept of IOTINTIJERA2015
100K. srinivas raviAN ADVANCED INDUSTRIAL MONITORING SYSTEM USING RASPBERRY-PI CONTROLLER IN IOTINTIJEATS2015
101Dr.T.AnuradhaRecent trends in data mining for crime detectionINTIJAER2015
102Dr.K. srinivasa RaviThe Android Application for Sending SMS in Regional LanguagesINTIJRET2015
103T. Narendra BabuImplementation of PUF on FPGAINTIJVDCS2015
104Dr.K.Raghava RaoA robust routing protocol for adhoc vehicular networksINTIRECOS2015
105Dr.D.Aruna Kumari Privacy Preserving Data mining in healthcare applicationsINTIJACT2015
106Dr.M. SumanA New Approach for Text summarizerINTIJACT2015
107Dr.K. Kiran kumarArchitecture of Hyper-threading on Intel Xenon ProcessorINTIJARECE2015
108Dr.D.Aruna Kumari Intrusion detection using data mining techniques(classification)” INTIJCSIT2015
109Dr.D.Aruna Kumari Echo chamber effect in Big data INTIJCSMC2015
110Dr.G.VIJAY KUMARA Portable and Secure Healthcare Maintenance SystemINTIJCSIT2015
111Dr.G.VIJAY KUMARA Review on Security and Privacy issues in Big DataINTIJEATS2015
112Dr.KVD SAGARA Secure Data DE duplication Scheme for Cloud StorageINTIJSA2015
113Dr.KVD SAGARFour-way File Synchronization Mechanism in Cloud Storage SystemINTIJCAT2015
114P s G Aruna SriImproving The Usage Of Encryption And Decryption AlgorithmsINTIJMEIT2015
115N.V.K.RAMESHAnalysis of Pathloss Models For 3g Mobile Signals Inurban, Suburban and Rural EnvironmentINTIJAER2015
116Dr.K.Raghava RaoImplementation of a smart governance using Big data TechnologiesINTIJAR2015
117Dr.K.Raghava RaoA survey on clustering techniques to improve energy efficient routing in wireless sensor networksINTIJAER2015
118Dr.J K R SastryA Computationally more efficient distance based VaR methodology for real-time market risk measurementINTWSEAS-TISA2015
119Dr.J K R SastryA Data driven approach to calculate optimum collateral amount for vulnerable optionINTWSEAS-TISA2015
120Dr.J K R SastryPricing Options Considering Bankruptcy of Underlying IssuerINTBritish Journal of Sciences2015
121Dr.J K R SastryIncorporating implied volatility in Pricing Options using Binomial TreeINTIJET2015
122Dr.J K R SastryOptimizing Communication between heterogeneous distributed Embedded Systems using CAN protocolINTARPN-JEAS2015
123Dr.J K R SastryBuilding Heterogeneous Distributed Embedded Systems through RS485 Communication ProtocolINTARPN-JEAS2015
124Dr.J K R SastryI2C based Networking for implementing Heterogeneous Microcontroller based Distributed Embedded SystemsINTIndian Journal of Science and2015
125Dr.J K R SastryOn Testing Distributed Embedded Systems through ScaffoldingINTIJECE2015
126Dr.J K R SastryUSB based Networking for implementing Heterogeneous Microcontroller based Distributed Embedded SystemsINTIJECE2015
127M.Kameswara RaoGesture Based AuthenticationINTIJAIR2015
128Dr.T.AnuradhaSecuring the Personal Health Records in Cloud Using ABE and Analyzing them using Rule Based Classification in Data MiningINTIJMER2015
129M.Kameswara RaoAn Efficient approach for Remote Update Firmware for embedded systems INTIJAIR2015
130M.Kameswara RaoSecurity Issues in Big data AnalyticsINTJECET2015
131M.Kameswara RaoGraphical Password Using Captcha (CaRP)INTJECET2015
132Dr.T.AnuradhaMultimedia database for attainment targetsINTIJACCC2015
133Dr.K. Kiran kumarIntroduction to Techniques of Query Processing and OptimizationINTIJIRAE2015
134Dr.JVN Rameshenergy utilization of tcp in adhoc networksINTGJCST2015
135K RAGHAVA RAOREMOTE TEMPERATURE AND HUMIDITY MONITORIGNG SYSTEM USING WIRLESS SENSOR NETWORKSINTIJRET2015
136Dr.M. SumanSpeech Recognition using MFCC & VQLBGINTJECET2015
137R.BULLI BABUA REVIEW ON CLASS IMBALANCE LEARNING IN KNOWLEDGE DISCOVERYINTIJDSR2016
138R.BULLI BABUA SURVEY ON CLASS IMBALANCE LEARNING ALGORITHMSINTIJSER2016
139PSG ARUNA SRIA FRAMEWORK ON BIG DATA-SURVEYINTIJCR2016
140DR.K.SRENIVASA RAVIAn Advanced Industrial Monitoring System using raspberry-pi controller in IOTINTIJEA2016
141MD.ALI HUSSAINAN OPTIMIZED DECISION TREES APPROACH FOR KNOWLEDGE DISCOVERY USING ORTHOGONAL RANDOM MATRIX PROJECTION WITH OUTLIER DETECTION INTIJDTA2016
142MD.ALI HUSSAINAN OPTIMIZED DECISION TREES APPROACH FOR KNOWLEDGE DISCOVERY USING ORTHOGONAL RANDOM MATRIX PROJECTION WITH OUTLIER DETECTION INTIJDTA2016
143R.BULLI BABUA REVIEW ON CLASS IMBALANCE LEARNING IN KNOWLEDGE DISCOVERYINTIJDSR2016
144PSG ARUNA SRIA FRAMEWORK ON BIG DATA-SURVEYINTIJCR2016
145R.BULLI BABUA SURVEY ON CLASS IMBALANCE LEARNING ALGORITHMSINTIJSER2016
146Suresh Babu. BBeacon Optimisation Foroptimized Routing Model Using Tsch NetworkINTIJRECE2018
147M. Lakshmi PrasadGeneration of Test Cases Using Combinatorial Methods Based Multi-Output Domain of an Embedded System through the Process of Optimal SelectionINTInternational Journal of Pure and Applied Mathematics2018
148B. Balaji BhanuMechanized Irrigation System Cataloging with Remote Sensor Set-UpINTIJRECE2018