Research Publications

Research Publications - Journal
S.NoName(s) of the AuthorTitleNational / InternationalConf/Jur NameYear
1Chakravarthy Y.K., Sultana M.S., Srinath A., Kumar G.R.S.N.A mathematical model to determine the torque for a prosthetic leg-lagrangian equationINTInternational Journal of Pure and Applied Mathematics2018
2Polina S., Barathula P.K., Rao K.P.P.Autonomous obstacle avoiding and path following roverINTInternational Journal of Pure and Applied Mathematics2018
3Kumar T.R., Gattu K.R.Multi objective particle swarm optimisation (PSO) algorithm for ideal siting and sizing of distributed generation (DG) systemsINTJournal of Advanced Research in Dynamical and Control Systems2018
4Mayukha M.B., Krishna N.M., Sankar P.S., Reddy M.S.K.Step up resonant converter for grid connected renewable energy sourcesINTInternational Journal of Pure and Applied Mathematics2018
5Rami Reddy Ch., Harinadha Reddy K.Islanding detection method for inverter based distributed generation based on combined changes of rocoap and rocorpINTInternational Journal of Pure and Applied Mathematics2018
6Kumaraswamy G., Srinivasa Varma P., Chandrasekhar P.Grid interconnected multi-level inverter based PV systemINTJournal of Advanced Research in Dynamical and Control Systems2018
7Babu Y.R., Rao R.S., Reddy P.L.Shunt active power filter connected to mppt based photo voltaic array for PQ enhancementINTInternational Journal of Pure and Applied Mathematics2018
8K. Naga Tejaswini, G. kesava raoConsensus based economic dispatch including system power lossesINTInternational Journal of Engineering & technology2018
9Mohammad ArshadA Novel multi-level attack detection and prevention model for Dynamic LAN/WLAN networks.INTRevista Tecnica de la Facultad de Ingenieria Universidad del Zulia2018
10Mohammad ArshadA Real-time LAN/WAN and Web Attack Prediction Framework Using Hybrid Machine Learning ModelINTInternational Journal of Engineering and Technology(UAE)2018
11Kareemulla Shaik,Broadcast Message Authentication Mechanism to Detect Clone and Sybil attacks in VANET''s based on ID -Based Signature SchemeINTInternational Journal of Engineering and Technology(UAE)2018

Back