Research Publications
Research Publications - Journal
S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|---|---|---|---|---|
1 | Indeti, H., Katta, A., Goli, M., Settalluri, V.S., Felice, C.S. | Statistical validation of a novel bioanalytical method for determination of thiamine hydrochloride | NAT | Pharma Research | 2011 |
2 | Lalitha Manasa.P, Shanmukha Kumar.J.V.Vijaya Saradhi.S , Rajesh.V | Validation of novel spectrophotometric methods for estination of Deferasirox | INT | International Journal of Pharmacuetical and Biomedical Research | 2011 |
3 | V Rajesh | An inference Routing Tree Topology Algorithm for Reducing Overhead in Packet Probing | INT | IJCSIT | 2011 |
4 | K Supriya | Voice Recognition browser for reduced vision and vision loss learners. | INT | IJSER | 2011 |
5 | P.Lakshmi Prasanna | Intrusion Detection System Using Genetic Algorithm | INT | IJCTT | 2011 |
6 | K Deepthi | Security issues on inter vehicle communications | INT | IJCSIT | 2011 |
7 | J Praveen Kumar | SMesh Frame Work for dynamic groups in peer to peer systems | INT | GJCAT | 2011 |
8 | Dayanand Sagar K | Data Security in Cloud: A Proposal towards the Security Issues | INT | IJCSET | 2011 |
9 | T S Ramya Krishna | Accomplishing Constraints Using Artifact-Centric Operational Modeling in Multiple Artifacts | INT | IJRST | 2011 |
10 | M.Ravi Tej | Re-Ranking process for image based retrieval using Geometric Techniques | INT | IJCT | 2011 |
11 | Pradeep G | Ad-Hoc Low Powered 802.15.1 Protocol Based Automation System for Residence using Mobile Devices | INT | IJCST | 2011 |
12 | Sriharsha | A Cloud Model to Implement SaaS | INT | Advanced Materials Research | 2011 |
13 | T.Vamsidhar | Analysis and Groping of Movable Object Patterns Using Similarity Measure of Trajectories in Wireless Sensor Networks | INT | IJCSET | 2011 |
14 | sarat raja rishi | Synchronous Distributed path Computation Algorithm For High Speed Networks | INT | GJCAT | 2011 |
15 | K.Rosaiah | Acceptance Decision Rule for type I Generalized Half Logistic Distribution | INT | PRAJNA | 2011 |
16 | B sekhar babu | An Overview of Intrusion detection System Strategies and Issues | INT | IJCST | 2011 |
17 | Sudheesha | Analysis of Finite state Machine and Classical Iterative Cluster Labeling for 3D Images on Mobile Computing Strategies | INT | IJCSET | 2011 |
18 | Ch Maduvani | Distributed Performance Evaluation Tool for Inferring Router Packet Forwarding Based on Priority | INT | IJEST | 2011 |
19 | D R Lavanya | Searching Multidimensional Historical Data Using Quisea Algorithm in P2P Networks | INT | IJCSET | 2011 |
20 | GS Pavanindra | A Novel Approach for Live Streaming Using ZigZag & Splitstream | INT | GJCAT | 2011 |
21 | Grace Pricilla | A Generalized Method for Data Extraction from Web Pages | INT | GJCAT | 2011 |
22 | D Navya | Outlier Detection for Dynamic Data Streams Using Weighted k-Means | INT | IJEST | 2011 |
23 | Vamisdhar | Analysis and Grouping of Movable Object Patterns Using Similarity Measure of Trajectories in Wireless Sensor Networks | INT | IJCSET | 2011 |
24 | S Nagendram | SCARP: Secure Congestion Aware Routing Protocol For Wireless Sensor Networks | INT | IJCSE | 2011 |
25 | yed Yasin, Vara Prasad, Jyothsna Devi | Ontology based Data Mining Application for the Enhancement of Privacy | INT | IJASCT | 2011 |
26 | k Priyaka, K Anusha, Y A Siva Prasad | An Effective Strategy for Identifying Phishing Websites using Class-Based Approach | INT | IJSER | 2011 |
27 | SN Anjinailu, KVD Kiran | Performance on ARCP for Various Region Mobile Emissary Environments | INT | GJCAT | 2011 |
28 | B G Gowthami, A Divya Sree, Ch Sindhuri , Y Sri Divya and B Bhanu Vidhya Kiran | Intelligent Data Mining in Autonomous Heterogeneous Distributed Bio Databases | INT | IJCSIT | 2011 |
29 | B Prudhvi Teja, K Krishna Sameera and B Pavan Sai | Randamization method and group based anonymization in privacy preserving data mining | INT | GJCAT | 2011 |
30 | K Krishna Sameera, I Bala Krishna Das and P Prudhvi | A joint 2 level and multilevel approach for sentiment analysis at document level | INT | GJCAT | 2011 |
31 | P.Tanuj prabhakar,M.ravi teja,Sk.Khaja moin, K.Venkateswararao | Online Mobile Backup and Power Optimized Retrieval Through Messaging | INT | IJESAT | 2011 |
32 | Y.pavan kumar,N.Rajesh babu | Development of Software Architecture for Building Intelligence to Secure the Communication between the Tags and Mobile Devices | INT | IJVES | 2011 |
33 | N.N.V.V.S.S.Pavan,N.Rajesh babu | Software Architecture for implementing tamper detection system within an intelligent tag related embedded system | INT | IJCEA | 2011 |
34 | K.Naga teja,N.devi kavya priya.D.Vineela.,K.immanuel | An Approach towards Development of Communication Standard around CAN Protocol Suite for Networking Embedded Systems | INT | IJAST | 2011 |
35 | S.vishnu karthik,D.G.V.D.sai pradeep,K.vijay sailesh | An Approach to Cognition Built-in Knowledge Discovery | INT | IIJDWM | 2011 |
36 | Bharathi,D.Srinivas,Sk.jai sankar,K.sirisha,Dr.j.Ravi chandra | An Efficient Architecture for the development of open Cloud computing Backbone | INT | IJCIS | 2011 |
37 | sk.Asha,Y.anusha,R.priyanka,P.Chanikya,Dr.Ravi chandra | An Architecture for Mining WEB Content Hosted on clustered backend Servers | INT | IIJDWM | 2011 |
38 | A.G.Pushpa,G.satya prakash,G.Tejaswi,T.Munikumari | An Open Specification for Firewire Standard to Extend its Suitability to Diversified applications | INT | ITEECE | 2011 |
39 | Haritha.G,V.Laxmi | Automated Generation of Test cases for Testing critical regions of Embedded Systems through Adjacent Pair-wise Testing | INT | IJMCMST | 2011 |
40 | N.N.V.V.S.S.Pavan,N.Rajesh babu,Y.pavan kumar | Building Intelligence into TAGs for Tamper Proofing | INT | IJAST | 2011 |
41 | NVS sashank,P.Venkatesh,P rakesh,G.anudeep | Simulation Models for Adding Cognition into Traffic Management systems | INT | IIJC | 2011 |
42 | G.V.Ajaresh,I.jaikumar naik,D.Parusuram.D.Karunaprasad | A New Approach to Maintain Privacy and Accuracy in Classification Data Mining | INT | IJCSET | 2011 |
43 | S.Nagarjuna,P Prasanna satwik,Ch.Ravi teja, Ch.Avinash | Efficient Approaches for the Preventions of Unsolicited Access to Sensitive Data | INT | GJCAT | 2011 |
44 | T.divakar.,B.srinivasa rao | A Novel Edge Detection Technique using Gray Level Spatial Correlation based on Statistical Parameters | INT | IJARCS | 2011 |
45 | N V Pavan Kumar, D Balakrishna Kamesh, DVSS Subramanyam | An Efficient Elliptic Curve Cryptography Application in Constrained Mobile Environment | INT | GJCAT | 2011 |