Research Publications
Research Publications - Journal
S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|---|---|---|---|---|
1 | SVPN Pavan Kumar | A Novel Method for Enhancing Biometric System Security Using Watermarking | INT | GJCAT | 2012 |
2 | P.Praveen | User Authentication in ATM Using Fingerprint Biometrics | INT | GJCAT | 2012 |
3 | G.Sowmya Bala | Prototyping of a MC-UART Controller on Spartan 3E FpGA | INT | IJECT | 2012 |
4 | Saradhi Nimmagadda | Smart sensor system to Trigger irrigation | INT | ACSA | 2012 |
5 | Balasai Chaitanya, T.V., Mallipeddi, K., Bondili, J.S., Nayak, P | Effect of aluminum exposure on superoxide and peroxide handling capacities by liver, kidney, testis and temporal cortex in rat | NAT | Indian Journal of Biochemistry and Biophysics | 2012 |
6 | M Hema Madhuri | Rivet on Disseminated Problem Solving Techniques in Airtraffic Flow Management | INT | IJCSET | 2012 |
7 | M Hema Madhuri | Excogitating File Replication and Consistency maintenance strategies intended for Providing high Performance at low cost in peer to peer networks | INT | IJCSET | 2012 |
8 | B Arun Kumar | A Survey on Best Scheduling policies for multihop wireless networks | INT | IJCST | 2012 |
9 | G Praveen | Privacy Defensive of Public Auditing data storage in Cloud Environment | INT | IJETED | 2012 |
10 | N Ramesh | Implementation of MA-ABE for better Data Security in cloud | INT | IJCST | 2012 |
11 | G Praveen | Extension of MA-ABE for better data Security in Cloud-Large Universe Construction | INT | IJASRT | 2012 |
12 | Sk Mansoor Rehman | A New Stravation Mitigation Algorithm for wireless networks | INT | IJCST | 2012 |
13 | Dr. J K R Sastry, N Venkatram, Ms Sahithy Ramya , Dr L S S Reddy. | On dynamic configurability and Adaptability of Intelligent Tags with Handheld Mobile Devices | INT | IIJECS | 2012 |
14 | Ms Sahithy Ramya | On dynamic configurability and Adaptability of Intelligent Tags with Handheld Mobile Devices | INT | IIJECS | 2012 |
15 | Mr G Pradeep | On Locating intelligent Tags | INT | IIJECS | 2012 |
16 | Sasi Veena D | Performance Analysis of Network Resources in Standard Access Protocols | INT | IJCSIT | 2012 |
17 | Kolluri Raju | Analysis on Fuzzy Membership Functions for Image Segmentation using Ultrafusiness | INT | I managers journal on Software Engineering | 2012 |
18 | M.Suresh | Design on Security of Hybrid Cloud Business Intelligence System | INT | IJCMI | 2012 |
19 | T.Gopi Kiran | Design of virtual File System in Cloud Environments | INT | ijarcsse | 2012 |
20 | R.Syamala Kalyani | ZIGBEE Sensor network for Multichannel Adavanced Metering Infrastructure | INT | IJESAT | 2012 |
21 | Y.Sambasiva Rao | Bilingual Dictionary Using Phonetic Transliteration | INT | AITM | 2012 |
22 | Ch. S.L. Prasanna | Implementation of a scalable µc/os-II based Multitasking monitoring system | INT | IJCST | 2012 |
23 | Y. Bala Krishna | Zigbee based Voice Control System For Smart phone | INT | IJTA | 2012 |
24 | Y. Hari Krishna | Automatic Bus Recognistion Through Mobile | INT | IJCTT | 2012 |
25 | Harika Indeti, Anitha Katta, Madhuri Goli, Vijayasaradhi settaluri and C.S.Felice | Statistical Valiation of a novel bioanalytical method for determinaton of Thiamine Hyderochloride | INT | The Pharma research | 2012 |
26 | Santosh umar, J Devi Durga, K Ruth Ramya, N Vahini, Gyan Pandy | Interacting with Dynamic Web Portals in Local Language | INT | IJSER | 2012 |
27 | Sriram Murthy, Balavenkata Kishore | UDA: Update Driven Approach for Continously Moving Objects | INT | IJSER | 2012 |
28 | V N D priyanka, C Naven Reddy, k Pavani, K Dana reddy | Analysis of Intrusion Detection Techniques | INT | GJCAT | 2012 |
29 | S Sushmitha, B Divya, G Riharika, G Viaya Raghu Ram | Ranking and Suggesting popular items sets In mobile stores using modified Apriori Algorithm | INT | IJMER | 2012 |
30 | Anil Kumar, S Babu kotha, Venkateswarlu S | Exploring data Aggregation techniques in wireless on basis of network topology and security issues | INT | IJESAT | 2012 |
31 | RSS Vishnu priya, Panini Sai, N. Chandrasekhar | Improved Decision tree algorithm for data streams with concepts drift adaptation | INT | IJSER | 2012 |
32 | R.N.V.Pavan kumar | Real time Multicast Data Transfer in Mobile Networks | INT | IJSTIRRJGRT | 2012 |
33 | MD.Khaja zikriya | Exchange of Peer to Peer Identity Reputatio Using Cryptology Conventions | INT | IJCSIT | 2012 |
34 | Grace prisilla | An Efficient Mechanism for Intrusion Detection and Prevention System | INT | IJSTIRRJGRT | 2012 |
35 | G.Rajesh chandra. | Simulation of Frequency Selective Raleigh Faded HF Channel for Data Transmission Using Decision Feedback Equalizer | INT | IJESAT | 2012 |
36 | B aruna Kumari | Enhancing the Security for Information with Virtual Data Centers in Cloud | INT | Springer | 2012 |
37 | B.Minny Priscilla | A Survey on Traffic Flow Correlation Attacks in Anonymity Networks | INT | IJESAT | 2012 |
38 | T.sasi dhar | ABIQUO: A Proficient Enterprise Cloud Management Platform Intended for Hyper Visor Independency, Integrity and Scalability | INT | IJESAT | 2012 |
39 | I.Pavan kumar | A Generalized Framework for Building Scalable Load Balancing Architectures in the Cloud | INT | IJCSIT | 2012 |
40 | Sudheesha | Efficacious Distributed Arbitary Node Duplication Attacks in Wireless Networks | INT | IJCTT | 2012 |
41 | Sudheesha | Data Transferring Mechanisms for Multipath Routing Using Concentrated Dissimilate Algorithm in Wireless Networks | INT | IJCTT | 2012 |
42 | Venkata suman | Analysis and Performance of ARCP for Multi Region Mobile Emissary Environments | INT | IJCSIT | 2012 |
43 | K Parvati Devi | Study of Anomaly Identification Techniques in Large scale Systems | INT | IJCTT | 2012 |
44 | P Tejaswi | Mining Items From Large Database Using Coherent Rules | INT | IJESAT | 2012 |
45 | Navya | Automated Personalization of web Directories for Usage data using web usage Mining | INT | IJESAT | 2012 |
46 | Sriram Murthy | UDA: Update Driven Approach for Continously Moving Objects | INT | IJSER | 2012 |
47 | Anil Kumar | Exploring data Aggregation techniques in wireless on basis of network topology and security issues | INT | IJESAT | 2012 |
48 | R Nagendra Bab | IEB: Integrated Testing Environment on Loop Boundaries | INT | IJESAT | 2012 |
49 | CH Venkatesh | A CSMA/HN Algorithm for Optimized throughput in Wireless Networks | INT | GJCAT | 2012 |
50 | D Bhargava reddy | Implementation of SaaS in a cloud computing environment | INT | IJCST | 2012 |
51 | K Satya Teja | Relevant data clustering in web search engine | INT | IJCSIT | 2012 |
52 | A Siddhrdha Reddy | A Cluster Based MARDL Algorithm for Drifting Categorical Data | INT | IJMER | 2012 |
53 | Ashok Kumar | A Novel Approach of Link/Path Protection in Dual-Link Failures | INT | IJMER | 2012 |
54 | Sk Rahaman | An Algorithm Approach to Avoid Starvation in Wireless Mesh Networks | INT | IJCA | 2012 |
55 | M Hema maduri | Pondering of Agent Technologies in Road Transportation System and their Critical Issues | INT | IJCSIT | 2012 |
56 | M Hema Maduri | Probing Agent Based Anomaly Solving Strategies for Dynamic Distributed Scheduling in Railway Transportation | INT | IJCSET | 2012 |
57 | K anusha, k Chanti,, V Sri Vidya, P Praven Kumar | A Class Based Approach for Medical Classification of Chest Pain | INT | IJETT | 2012 |
58 | VH Bhindu, K L Durga, G Lokhiswar, G Ashok Kumar, | An Efficient Face Recognition System by Declining Rejection Rate Using PCA | INT | IJESAT | 2012 |
59 | C Niveditha, G Anusha, U Sindhu, SK Silar | Analysis of Data Mining Techniques for Increasing Search Speed in Web | INT | IJMER | 2012 |
60 | M Sravanthi, Naga Mrudhula, J Sandeep,K Swapna | Automated Anomaly and Root Cause Detection in Distributed Systems | INT | IJETT | 2012 |
61 | B anusha, G poornima, G anusha, K tejaswi | Decision Making and Reduction Techniques for Tax Revenue using Data Warehouse | INT | IJETT | 2012 |
62 | CH Venkatesh | A CSMA/HN Algorithm for Optimized throughput in Wireless Networks | INT | GJCAT | 2012 |
63 | narendhra babu, B Ramesh, TV Prasad Reddy | Minimizing Inference Through Channel Assignment in Multiradio Wireless Mesh Networks | INT | IJCAES | 2012 |
64 | S Harinadh Babu, T Satesh Kumar, K Jairam, K Siva naga Babu | An Efficient Approach for Debugging the WPAN Using Packet Analyzer | INT | IJCST | 2012 |
65 | M Praveen Kumar, R Ravindhra Babu, B Aditya Reddy, MD Rahaman | An Effective Analysis of Weblog Files to Improve Website Performance | INT | IJCSCN | 2012 |
66 | Sindhu Ch, Sandeep, Vani and Venkatesh | Energy Efficient ,Scalable and Relaiable MAC Protocal for Electromagnetic Communication among Nano Devices | INT | IJDPS | 2012 |
67 | Santhosh B, Y Sasidhar Kumar , Sk Mastan Vali,A Peda Gopi | Web Usage Mining on Cluster Architecture | INT | GJCAT | 2012 |
68 | B Navya, M Swetha, B Sindhusha and T Murali Kalyan | A Cryptographic Approach to Securely Share Genomic Sequences | INT | IJCSIT | 2012 |
69 | K Srinivasa Rao, K Anusha, B Leela, I Bhavana and S V S K Gowtham | Emotion Recognition from Speech | INT | IJCSIT | 2012 |
70 | P Siva Durga Bhavani, M Revathi, N Kiran Kumar and V Sara | An Enhanced Frametwork For Performing Pre-Processing On Web Server Logs | INT | IJETT | 2012 |
71 | BVSN Chaitanya, K Krishna Chaitanya, G Anil Reddy and V Harish | A Secure Architecture for Anonymizer Networks | INT | IJCSIT | 2012 |
72 | G Divya, K Aishwarya, Y Vijaya Durga and SK Wasim | Optimal State Allocation for Multicast Communications withExplicit Multicast Forwarding | INT | IJERA | 2012 |
73 | A Manogna, Ch Yasaswini, A Aparna and S Ravi Teja | Behaviour based Trust Management Using Geometric mean approach for Wireless Sensor Networks | INT | IJCTT | 2012 |
74 | A Vamsi Krishna, B Charan Teja, K sandeep and P Kartik | Design of a browser for people with low vision | INT | IJCSIT | 2012 |
75 | Rajesh V, G Ravi Kiran, K Keshav Ram and K Rudra Pavan | An Enhanced secure method for mobile agents | INT | GJCAT | 2012 |
76 | Vishnu Priya, P Panini Sai , N Chandra Sekhar, K Venkata Prasad and PD Nageswara Rao | Mobile PC Suite: Using Mobile Phone as Remote to control Pc Operations | INT | IJCSIT | 2012 |
77 | LV Ramya, M Tanuja, S Pavani and M Swathi | Sentence Level Semantic Classification on Online Product Reviews of Mixed Opinions Using naivedayes Clasifier | INT | IJCSIT | 2012 |
78 | M Mohan Rao, Ch S Sasanka, K Jayanth Kumar and B Uday Kiran | An Enchanced Pre Processing Research Framework for Weblog Data | INT | IJARCSSE | 2012 |
79 | U Thripathi Rao, Sk Mastan Vali, Ch Samba siva rao, Krishna | Enhanced Dynamical Hierarchical Mobile Internet Protocol for Mobile IP Networks | INT | IJCSIT | 2012 |
80 | M Prathyusha, B Surekha Devi, N Jahnavi, G Sujai | Utilization of Timestamp Records for An Hospital Centralization with consideration of Emergency Cases | INT | IJMER | 2012 |
81 | B Navya, M Swetha, B Sindhusha and T Murali Kalyan | A Cryptographic Approach to Securely Share Genomic Sequences | INT | IJCSIT | 2012 |
82 | K Srinivasa Rao, K Anusha, B Leela, I Bhavana and S V S K Gowtham | Emotion Recognition from Speech | INT | IJCSIT | 2012 |
83 | P Siva Durga Bhavani, M Revathi, N Kiran Kumar and V Sara | An Enhanced Frametwork For Performing Pre-Processing On Web Server Logs | INT | IJETT | 2012 |
84 | BVSN Chaitanya, K Krishna Chaitanya, G Anil Reddy and V Harish | A Secure Architecture for Anonymizer Networks | INT | IJCSIT | 2012 |
85 | G Divya, K Aishwarya, Y Vijaya Durga and SK Wasim | Optimal State Allocation for Multicast Communications withExplicit Multicast Forwarding | INT | IJERA | 2012 |
86 | P Ajithand, Dr. K Rajasekhara | Role of Data Mining : A Technical Education Perspective | INT | IJECST | 2012 |
87 | U Nanaji and Prof Chandan mazumdar. | Application and Protocol Architecture in Wireless Adhoc Networks | INT | IJAIR | 2012 |
88 | Korada Vasudevarao,Uppe Nanaji and Y Swapana. | Nymble: Blocking Misbehaving Users in Anonymizing Networks | INT | IJAIR | 2012 |
89 | M.R.Narasinga rao.rahul.p.raju | A Study of Psychosocial and Built environment factors for diabetes using MLP Neural networks | INT | international journal of computer applications | 2012 |
90 | K V D Kiran. | Secure System of Attack Patterns towards Application Security Metric Derivation | INT | 9/1/2012 | 2012 |
91 | Sasi Veena D , Yojana Y and K V D Kiran. | Performance Analysis of Network Resources in Standard Access Protocols | INT | IJCSIT | 2012 |
92 | K Raja Sekhar, Dr L S S Reddy and U J Kameswari. | Secure System of Attack Patterns towards Application Security Metric Derivation | INT | IJCA | 2012 |
93 | Sk.Meerja jaha,B.Rupa sravani,Saroja sarma,Chandra kanth.B | A Novel Approach for Classification of a Database Using Decision Tree Induction | INT | GJCAT | 2012 |
94 | K Raja Sekhar,ch.sarat , varun.j,k.prahasith | The Fault Management System Using Amazon EC2: Web Application Deployment on cloud | INT | IJCSIT | 2012 |
95 | U Thripathi Rao, Sk Mastan Vali, Ch Samba siva rao, Krishna | Enhanced Dynamical Hierarchical Mobile Internet Protocol for Mobile IP Networks | INT | IJCSIT | 2012 |
96 | V. Ravindhranadhan, P Sarat, , M Gopi mahesh, M Rajashekar | Analysis and Individualization of Clients concern based on the Internet Browsing History | INT | IJCSIT | 2012 |
97 | M Prathyusha, B Surekha Devi, N Jahnavi, G Sujai | Utilization of Timestamp Records for An Hospital Centralization with consideration of Emergency Cases | INT | IJMER | 2012 |
98 | A Vini Bharati, P Laxmi durga Maduri, Phanendra Babu, A sravani | Analysis of Dendogram Tree for Identifying and Visualizing Trends in Multi-attribute Transactional Data | INT | IJETT | 2012 |
99 | G Pugita,S Karthik, K Gopala Krishna | Deep Web Mining Using The Concepts Of Bayesian Network And Active Learning | INT | GJCAT | 2012 |
100 | CH Rama Prakash, A Pavan kumar, BKN Syamala Rao, A Vijay | Dynamic Item Set Counting and Fuzzy association Rule Mining in Stock Market | INT | GJCAT | 2012 |
101 | B Syam Prasad Reddy, K Vagdhan Kumar, B Musala reddy , N Raja Nayak | ANN Approach for Weather Prediction Using Back propagation | INT | IJETT | 2012 |