Research Publications - K L Deemed to be University

Koneru Lakshmaiah Education Foundation

(Deemed to be University)

Research Publications

Research Publications - Journal
S.NoName(s) of the AuthorTitleNational / InternationalConf/Jur NameYear
1SVPN Pavan KumarA Novel Method for Enhancing Biometric System Security Using WatermarkingINTGJCAT2012
2P.PraveenUser Authentication in ATM Using Fingerprint BiometricsINTGJCAT2012
3G.Sowmya BalaPrototyping of a MC-UART Controller on Spartan 3E FpGAINTIJECT2012
4Saradhi NimmagaddaSmart sensor system to Trigger irrigationINTACSA2012
5Balasai Chaitanya, T.V., Mallipeddi, K., Bondili, J.S., Nayak, PEffect of aluminum exposure on superoxide and peroxide handling capacities by liver, kidney, testis and temporal cortex in ratNATIndian Journal of Biochemistry and Biophysics2012
6M Hema MadhuriRivet on Disseminated Problem Solving Techniques in Airtraffic Flow ManagementINTIJCSET2012
7M Hema MadhuriExcogitating File Replication and Consistency maintenance strategies intended for Providing high Performance at low cost in peer to peer networksINTIJCSET2012
8 B Arun KumarA Survey on Best Scheduling policies for multihop wireless networksINTIJCST2012
9G PraveenPrivacy Defensive of Public Auditing data storage in Cloud EnvironmentINTIJETED2012
10N RameshImplementation of MA-ABE for better Data Security in cloudINTIJCST2012
11G PraveenExtension of MA-ABE for better data Security in Cloud-Large Universe ConstructionINTIJASRT2012
12Sk Mansoor RehmanA New Stravation Mitigation Algorithm for wireless networksINTIJCST2012
13Dr. J K R Sastry, N Venkatram, Ms Sahithy Ramya , Dr L S S Reddy.On dynamic configurability and Adaptability of Intelligent Tags with Handheld Mobile DevicesINTIIJECS2012
14Ms Sahithy RamyaOn dynamic configurability and Adaptability of Intelligent Tags with Handheld Mobile DevicesINTIIJECS2012
15 Mr G PradeepOn Locating intelligent TagsINTIIJECS2012
16 Sasi Veena D Performance Analysis of Network Resources in Standard Access ProtocolsINTIJCSIT2012
17Kolluri Raju Analysis on Fuzzy Membership Functions for Image Segmentation using UltrafusinessINTI managers journal on Software Engineering2012
18M.SureshDesign on Security of Hybrid Cloud Business Intelligence SystemINTIJCMI2012
19T.Gopi KiranDesign of virtual File System in Cloud EnvironmentsINTijarcsse2012
20R.Syamala KalyaniZIGBEE Sensor network for Multichannel Adavanced Metering InfrastructureINTIJESAT2012
21Y.Sambasiva RaoBilingual Dictionary Using Phonetic TransliterationINTAITM2012
22Ch. S.L. PrasannaImplementation of a scalable µc/os-II based Multitasking monitoring systemINTIJCST2012
23Y. Bala KrishnaZigbee based Voice Control System For Smart phoneINTIJTA2012
24Y. Hari KrishnaAutomatic Bus Recognistion Through MobileINTIJCTT2012
25Harika Indeti, Anitha Katta, Madhuri Goli, Vijayasaradhi settaluri and C.S.FeliceStatistical Valiation of a novel bioanalytical method for determinaton of Thiamine HyderochlorideINTThe Pharma research2012
26Santosh umar, J Devi Durga, K Ruth Ramya, N Vahini, Gyan PandyInteracting with Dynamic Web Portals in Local LanguageINTIJSER2012
27Sriram Murthy, Balavenkata KishoreUDA: Update Driven Approach for Continously Moving ObjectsINTIJSER2012
28 V N D priyanka, C Naven Reddy, k Pavani, K Dana reddyAnalysis of Intrusion Detection TechniquesINTGJCAT2012
29S Sushmitha, B Divya, G Riharika, G Viaya Raghu RamRanking and Suggesting popular items sets In mobile stores using modified Apriori AlgorithmINTIJMER2012
30Anil Kumar, S Babu kotha, Venkateswarlu SExploring data Aggregation techniques in wireless on basis of network topology and security issuesINTIJESAT2012
31 RSS Vishnu priya, Panini Sai, N. ChandrasekharImproved Decision tree algorithm for data streams with concepts drift adaptationINTIJSER2012
32R.N.V.Pavan kumarReal time Multicast Data Transfer in Mobile NetworksINTIJSTIRRJGRT2012
33MD.Khaja zikriyaExchange of Peer to Peer Identity Reputatio Using Cryptology ConventionsINTIJCSIT2012
34Grace prisillaAn Efficient Mechanism for Intrusion Detection and Prevention SystemINTIJSTIRRJGRT2012
35G.Rajesh chandra.Simulation of Frequency Selective Raleigh Faded HF Channel for Data Transmission Using Decision Feedback EqualizerINTIJESAT2012
36B aruna KumariEnhancing the Security for Information with Virtual Data Centers in CloudINTSpringer2012
37B.Minny PriscillaA Survey on Traffic Flow Correlation Attacks in Anonymity NetworksINTIJESAT2012
38T.sasi dharABIQUO: A Proficient Enterprise Cloud Management Platform Intended for Hyper Visor Independency, Integrity and ScalabilityINTIJESAT2012
39I.Pavan kumarA Generalized Framework for Building Scalable Load Balancing Architectures in the CloudINTIJCSIT2012
40 SudheeshaEfficacious Distributed Arbitary Node Duplication Attacks in Wireless NetworksINTIJCTT2012
41SudheeshaData Transferring Mechanisms for Multipath Routing Using Concentrated Dissimilate Algorithm in Wireless NetworksINTIJCTT2012
42Venkata sumanAnalysis and Performance of ARCP for Multi Region Mobile Emissary EnvironmentsINTIJCSIT2012
43K Parvati DeviStudy of Anomaly Identification Techniques in Large scale SystemsINTIJCTT2012
44 P TejaswiMining Items From Large Database Using Coherent RulesINTIJESAT2012
45 NavyaAutomated Personalization of web Directories for Usage data using web usage MiningINTIJESAT2012
46Sriram MurthyUDA: Update Driven Approach for Continously Moving ObjectsINTIJSER2012
47 Anil KumarExploring data Aggregation techniques in wireless on basis of network topology and security issuesINTIJESAT2012
48 R Nagendra BabIEB: Integrated Testing Environment on Loop BoundariesINTIJESAT2012
49CH VenkateshA CSMA/HN Algorithm for Optimized throughput in Wireless NetworksINTGJCAT2012
50D Bhargava reddyImplementation of SaaS in a cloud computing environmentINTIJCST2012
51K Satya TejaRelevant data clustering in web search engineINTIJCSIT2012
52A Siddhrdha ReddyA Cluster Based MARDL Algorithm for Drifting Categorical DataINTIJMER2012
53Ashok KumarA Novel Approach of Link/Path Protection in Dual-Link FailuresINTIJMER2012
54Sk Rahaman An Algorithm Approach to Avoid Starvation in Wireless Mesh NetworksINTIJCA2012
55 M Hema maduriPondering of Agent Technologies in Road Transportation System and their Critical IssuesINTIJCSIT2012
56 M Hema MaduriProbing Agent Based Anomaly Solving Strategies for Dynamic Distributed Scheduling in Railway TransportationINTIJCSET2012
57 K anusha, k Chanti,, V Sri Vidya, P Praven KumarA Class Based Approach for Medical Classification of Chest PainINTIJETT2012
58VH Bhindu, K L Durga, G Lokhiswar, G Ashok Kumar,An Efficient Face Recognition System by Declining Rejection Rate Using PCAINTIJESAT2012
59C Niveditha, G Anusha, U Sindhu, SK SilarAnalysis of Data Mining Techniques for Increasing Search Speed in WebINTIJMER2012
60M Sravanthi, Naga Mrudhula, J Sandeep,K SwapnaAutomated Anomaly and Root Cause Detection in Distributed SystemsINTIJETT2012
61B anusha, G poornima, G anusha, K tejaswiDecision Making and Reduction Techniques for Tax Revenue using Data WarehouseINTIJETT2012
62CH VenkateshA CSMA/HN Algorithm for Optimized throughput in Wireless NetworksINTGJCAT2012
63narendhra babu, B Ramesh, TV Prasad ReddyMinimizing Inference Through Channel Assignment in Multiradio Wireless Mesh NetworksINTIJCAES2012
64S Harinadh Babu, T Satesh Kumar, K Jairam, K Siva naga BabuAn Efficient Approach for Debugging the WPAN Using Packet AnalyzerINTIJCST2012
65 M Praveen Kumar, R Ravindhra Babu, B Aditya Reddy, MD RahamanAn Effective Analysis of Weblog Files to Improve Website PerformanceINTIJCSCN2012
66 Sindhu Ch, Sandeep, Vani and VenkateshEnergy Efficient ,Scalable and Relaiable MAC Protocal for Electromagnetic Communication among Nano DevicesINTIJDPS2012
67Santhosh B, Y Sasidhar Kumar , Sk Mastan Vali,A Peda GopiWeb Usage Mining on Cluster ArchitectureINTGJCAT2012
68B Navya, M Swetha, B Sindhusha and T Murali KalyanA Cryptographic Approach to Securely Share Genomic SequencesINTIJCSIT2012
69K Srinivasa Rao, K Anusha, B Leela, I Bhavana and S V S K GowthamEmotion Recognition from SpeechINTIJCSIT2012
70P Siva Durga Bhavani, M Revathi, N Kiran Kumar and V SaraAn Enhanced Frametwork For Performing Pre-Processing On Web Server LogsINTIJETT2012
71BVSN Chaitanya, K Krishna Chaitanya, G Anil Reddy and V HarishA Secure Architecture for Anonymizer NetworksINTIJCSIT2012
72G Divya, K Aishwarya, Y Vijaya Durga and SK WasimOptimal State Allocation for Multicast Communications withExplicit Multicast ForwardingINTIJERA2012
73A Manogna, Ch Yasaswini, A Aparna and S Ravi TejaBehaviour based Trust Management Using Geometric mean approach for Wireless Sensor NetworksINTIJCTT2012
74A Vamsi Krishna, B Charan Teja, K sandeep and P KartikDesign of a browser for people with low visionINTIJCSIT2012
75Rajesh V, G Ravi Kiran, K Keshav Ram and K Rudra PavanAn Enhanced secure method for mobile agentsINTGJCAT2012
76Vishnu Priya, P Panini Sai , N Chandra Sekhar, K Venkata Prasad and PD Nageswara RaoMobile PC Suite: Using Mobile Phone as Remote to control Pc OperationsINTIJCSIT2012
77LV Ramya, M Tanuja, S Pavani and M SwathiSentence Level Semantic Classification on Online Product Reviews of Mixed Opinions Using naivedayes ClasifierINTIJCSIT2012
78M Mohan Rao, Ch S Sasanka, K Jayanth Kumar and B Uday KiranAn Enchanced Pre Processing Research Framework for Weblog DataINTIJARCSSE2012
79U Thripathi Rao, Sk Mastan Vali, Ch Samba siva rao, KrishnaEnhanced Dynamical Hierarchical Mobile Internet Protocol for Mobile IP NetworksINTIJCSIT2012
80M Prathyusha, B Surekha Devi, N Jahnavi, G SujaiUtilization of Timestamp Records for An Hospital Centralization with consideration of Emergency CasesINTIJMER2012
81B Navya, M Swetha, B Sindhusha and T Murali KalyanA Cryptographic Approach to Securely Share Genomic SequencesINTIJCSIT2012
82K Srinivasa Rao, K Anusha, B Leela, I Bhavana and S V S K GowthamEmotion Recognition from SpeechINTIJCSIT2012
83P Siva Durga Bhavani, M Revathi, N Kiran Kumar and V SaraAn Enhanced Frametwork For Performing Pre-Processing On Web Server LogsINTIJETT2012
84 BVSN Chaitanya, K Krishna Chaitanya, G Anil Reddy and V HarishA Secure Architecture for Anonymizer NetworksINTIJCSIT2012
85G Divya, K Aishwarya, Y Vijaya Durga and SK WasimOptimal State Allocation for Multicast Communications withExplicit Multicast ForwardingINTIJERA2012
86P Ajithand, Dr. K RajasekharaRole of Data Mining : A Technical Education PerspectiveINTIJECST2012
87U Nanaji and Prof Chandan mazumdar.Application and Protocol Architecture in Wireless Adhoc NetworksINTIJAIR2012
88Korada Vasudevarao,Uppe Nanaji and Y Swapana.Nymble: Blocking Misbehaving Users in Anonymizing NetworksINTIJAIR2012
89M.R.Narasinga rao.rahul.p.rajuA Study of Psychosocial and Built environment factors for diabetes using MLP Neural networksINTinternational journal of computer applications2012
90 K V D Kiran.Secure System of Attack Patterns towards Application Security Metric DerivationINT9/1/20122012
91 Sasi Veena D , Yojana Y and K V D Kiran.Performance Analysis of Network Resources in Standard Access ProtocolsINTIJCSIT2012
92K Raja Sekhar, Dr L S S Reddy and U J Kameswari.Secure System of Attack Patterns towards Application Security Metric DerivationINTIJCA2012
93Sk.Meerja jaha,B.Rupa sravani,Saroja sarma,Chandra kanth.BA Novel Approach for Classification of a Database Using Decision Tree InductionINTGJCAT2012
94K Raja Sekhar,ch.sarat , varun.j,k.prahasithThe Fault Management System Using Amazon EC2: Web Application Deployment on cloudINTIJCSIT2012
95U Thripathi Rao, Sk Mastan Vali, Ch Samba siva rao, KrishnaEnhanced Dynamical Hierarchical Mobile Internet Protocol for Mobile IP NetworksINTIJCSIT2012
96V. Ravindhranadhan, P Sarat, , M Gopi mahesh, M RajashekarAnalysis and Individualization of Clients concern based on the Internet Browsing HistoryINTIJCSIT2012
97M Prathyusha, B Surekha Devi, N Jahnavi, G SujaiUtilization of Timestamp Records for An Hospital Centralization with consideration of Emergency CasesINTIJMER2012
98A Vini Bharati, P Laxmi durga Maduri, Phanendra Babu, A sravaniAnalysis of Dendogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional DataINTIJETT2012
99G Pugita,S Karthik, K Gopala KrishnaDeep Web Mining Using The Concepts Of Bayesian Network And Active LearningINTGJCAT2012
100CH Rama Prakash, A Pavan kumar, BKN Syamala Rao, A VijayDynamic Item Set Counting and Fuzzy association Rule Mining in Stock MarketINTGJCAT2012
101B Syam Prasad Reddy, K Vagdhan Kumar, B Musala reddy , N Raja NayakANN Approach for Weather Prediction Using Back propagationINTIJETT2012

Back