Research Publications
Research Publications - Journal
S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|---|---|---|---|---|
1 | P.Naga Lakshmi | A Novel Architecture for personalized Image Retrieval from Social Websites | INT | IJARCS | 2013 |
2 | T.Haritha | A Survey On Chemical Agent Detectors | INT | IJERT | 2013 |
3 | K. Sai Rohit Singh | Designing a WI-FI Enabled ROBOT | INT | IJCER | 2013 |
4 | G.Radhika | Efficient Framework for Deploying Information in Virtual Datacenter with cloud security Application | INT | IJETAE | 2013 |
5 | .G.S.Ragavendra | Channel Model Components And Modeling types in wireless systems | INT | ijarcsee | 2013 |
6 | G.M Deepa | Attacking Cloud Through Cache based Side Channel in Virtualized Environment | INT | ijarcsee | 2013 |
7 | N.Venu Gopal | Survey on Different types of attacks and counter Measures in wireless networks | INT | IJCSIT | 2013 |
8 | T.Gopi Kiran | Neural network desin in Cloud Computing | INT | IJCTT | 2013 |
9 | Jaya Prakash | Multi Clouds Model For Service Avalability And Security | INT | IJCSET | 2013 |
10 | M.Anil Kumar | Survey of IEEE 802.11 Standards | INT | IJSR | 2013 |
11 | B.Raj kumar | Secure Sharing of Personal Health Records in Cloud Computing | INT | IJSR | 2013 |
12 | Rajesh | A Comprehensive Study on Making food using Rice cooker with Fuzzy logic technique | INT | IJCSIT | 2013 |
13 | S.Jaya Prakash | Improvised K-means Clustering Algorithm in Data Mining | INT | GJCER | 2013 |
14 | K. Ganesh kumar | 3D media Filter Design for Iris Recognition | INT | IJMER | 2013 |
15 | B.V.SriRam | Security Through Multiple Unrelated Clods in Cloud Computing | INT | IJCTT | 2013 |
16 | K.Venkat Reddy | Hand Writen Character Detection By using Fuzzy Logic Techniques | INT | IJETAE | 2013 |
17 | K.Rajesh | Hand Writen Character And digit recognition using Artificial Neural Networks | INT | IJARCSSE | 2013 |
18 | K.Rajesh | A Novel Study on Complex Fuzzy Logic | INT | IJSR | 2013 |
19 | T.Srikanth | Datawarehouse as a Service | INT | IJAIR | 2013 |
20 | Ram Sandilya | Effective Use of HTML5 for Developing Offline web Application | INT | IJAIR | 2013 |
21 | K.Yamini | Cloud Services Portability for Secure Migration | INT | IJCTT | 2013 |
22 | Pratheek Singel | Optimizing Aggregation Query Processing | INT | IJAIR | 2013 |
23 | K.Deepa | Password Authentication System for Cloud Environment | INT | IJACSIT | 2013 |
24 | Chaitanya | Enable Open Verifiability and Data Dynamics for Storage Protection in Cloud Computing | INT | IJCTT | 2013 |
25 | Sudheerraja | Data Retrieval from Cloud With Cache Implementation | INT | IJAIR | 2013 |
26 | M.Sudheer Raja | An Asymmetric Approach For Coperative Caching in Multi Hop Wireless Adhoc Networks | INT | IJCNWC | 2013 |
27 | V.Samson Dev Kumar | Cognitive Radio Wireless Mesh Networks:A Survey on Routing Protocols | INT | IJCSET | 2013 |
28 | Raja Mohan | Privacy Preserving Public auditing System for data storage security in cloud computing | INT | IJCTT | 2013 |
29 | sri rashmi, | Providing Cloud Services over mobile cloud data | INT | IJCTT | 2013 |
30 | Venkata Naresh | Ranked Keyword Search in cloud computing | INT | IJCTT | 2013 |
31 | Ambati Nikila | Learning Structure in cloud | INT | IJAIR | 2013 |
32 | T.Anitha | Network Security Using Quantum Cryptography | INT | IJCTT | 2013 |
33 | T.V.N Sai Sindhura | Dependable and Secure Storage services in cloud computing | INT | IJCTT | 2013 |
34 | Y.Venkateswara Rao | Secure and Dependable Storage in cloud computing | INT | IJCTT | 2013 |
35 | Sonawane | Xml Document Mining | INT | IJRCEE | 2013 |
36 | M.Devi Kavya Priya | Random Indexing Based Web User Clustering for faster Navigation | INT | IJCSIT | 2013 |
37 | G.Kiran Kumar | Reduction of Greedy Forwarding Using Overlay Multicasting in Mobile Ad Hoc Networks | INT | IJCTT | 2013 |
38 | T.Geethika | Transaction Based Prioritizatioh Stratagies for E-mail Applications | INT | IJARET | 2013 |
39 | U.D.S.V Prasad | Tmaper Proof JAR Client For Distributed Accounrability for Data Sharing in the Cloud | INT | IJDCST | 2013 |
40 | Sunaina Sultana | An extraction Relation of machine learning by identifying disease treatment relations in the research methodologies | INT | IJAIR | 2013 |
41 | P.Radha Krishna | A Novel q-parameter Automation in Tsallis Entropy for Image Segmentation | INT | IJCA | 2013 |
42 | M.Mohan Chandra | Protecting and Planing Amenable Basic Routing | INT | IJAR | 2013 |
43 | M.Devi Kavya Priya | A Novel Framework for Virtual Desktop Environment with vApp | INT | IJCA | 2013 |
44 | U.Ankaiah | Detection of error prone software modules using neural network | INT | IJCST | 2013 |
45 | U.Ankaiah | Image Retrieval System Using Fuzzy Soft max MLP neural network | INT | IJAR | 2013 |
46 | Santhi Swaroop | Survey on Advanced Data Mining Applications | INT | IJEA | 2013 |
47 | D.Sowmya | Image Retrieval effective methods in image processing | INT | IJCSMR | 2013 |
48 | 1.Dr.M.R Narasinga Rao,2.K.Lokesh Kumar | Damage Detection in Cantilever Beams using Artificial Neural Networks | INT | IJMPERD | 2013 |
49 | 1.T.Subha Masthan Rao,2.Thinley Lendup,3.Thingly Wandi,4.Sujatha | Hybrid Model for Preprocessing & Clustering of Web Service Logs | INT | IJCAES | 2013 |
50 | 1.N.Janardhan,2.Y.Raja Sree | Cloud data Protection For the Masses | INT | IJCTT | 2013 |
51 | 1.N.Janardhan,2.Y.Raja Sree,3.Himaja | Data Invulnerability and data integrity Verification of multi cloud storage | INT | IJCTT | 2013 |
52 | 1.K.V.D.Kiran,2.Sitaram chowdary,3.P.Vittal Kumar | Game theory :A new Approach for video streaming in mobile networks | INT | IJCSMR | 2013 |
53 | 1.K.V.D.Kiran,2.Gidla John | Apple Talk | INT | IJCSMR | 2013 |
54 | Y.Divya | Reliable Proxy Re encryption in unreliable clouds | INT | IJARCSSE | 2013 |
55 | Siva Nagaraju | Wireless Sensor Networks in Cloud Computing | INT | IJAIR | 2013 |
56 | Ravi Kanth | Tosca Enabling Cloud Portability | INT | IJARCET | 2013 |
57 | A.Dhana Lakshmi | Routing Security Against Flooding Attack In Wireless Adhoc Networks | INT | IJAIR | 2013 |
58 | Suhasini | Approaching Protected and Reliable Storage Space Services in cloud computing | INT | IJEA | 2013 |
59 | A.Shiva Rama Rao | Standadization of systems and processes for CDR Based Billing System | INT | IJCER | 2013 |
60 | Y.S Lakshmi | Collectional Activities Forecast via insution using social network sites | INT | IJSR | 2013 |
61 | Y.S Lakshmi | Study and Scalable eruditries by using Communel activities | INT | IJETAE | 2013 |
62 | S.pavani | A New Clustering Technique Based on user search Histories | INT | IJDCST | 2013 |
63 | G.R.Sreehitha, M.Kiran Kumar | Transient Performance of a Series Compensated Transmission System | INT | IJIRD | 2013 |
64 | B. Mohan, K. Naresh | SIMULATION APPROACH FOR NON Linear Behaviour in spasticity | INT | IJEST | 2013 |
65 | Ch.Amarendra, P.V.Pattabhi Ram | Comparative Study of DSVM and ISVM for Matrix Converter | INT | IJAR | 2013 |
66 | A.Radha Krishna, Ch.Kasi Rama Krishna Reddy | Power Quality Problems and it''s Improvement Using FACTS devices | INT | IJETT | 2013 |
67 | B. SAI SINDURA, B.N. Karthik | Speed Control of Induction Motor using Cycloconverter | INT | IJETT | 2013 |
68 | M.SUNITHA, B.N. Karthik | Elimination of Harmonics Using Active Power Filter Based on DQ Reference Frame Theory | INT | IJETT | 2013 |
69 | V.P.S. Nikitha.Peddada, B.N.Karthik | Attacking of Embedded Systems by Using Simple Power Analysis | INT | IJETT | 2013 |
70 | Narisetti Sai Lakshmi, B.N. Karthik | SRF Based Cascaded Multilevel Active Filter | INT | IJETT | 2013 |
71 | P.Divya Sri, Dr.P. HARI KRISHNA PRASAD | Single Phase Dual Full Bridge Bi-Directional DC-DC Converter for High Power Applications | INT | IJAR | 2013 |
72 | N Uday Kumar, RBR Prakash | Control Scheme for Implementation for SHAPF Using Fuzzy(P-Q Theory) Under Unbalanced Conditions | INT | IJEEER | 2013 |
73 | Ch.Kiran Kumar, G.Srinivasa Rao | Performance Analysis from the Energy Audit of a Thermal Power Plant | INT | IJETT | 2013 |
74 | G.R.Mahesh, G.Srinivas rao, M.V Gridhar | energy audit of boiler feed pump system and air compressor in a thermal power plant | INT | IJERT | 2013 |
75 | A Lakshmi Priyanka, M.Srikanth | Three Phase and Five Phase SVM Applied to the Five Level Inverter | INT | IJEEER | 2013 |
76 | M.Bala Krishna, M.Kiran Kumar | A New C-Dump Converter with Power Factor Correction Feature for BLDC drive | INT | IJEEER | 2013 |
77 | P.vamsi Krishna, D.Narasimha Rao | Obtaining Speed Response of Linear Induction Motor with Fuzzy Logic Controller with End Effect | INT | IJEEER | 2013 |
78 | Bhavani Sindhooja V, Chakradhar Kaza,D.Narasimha Rao | Polymer and FRP Technology-An Alternative to Conventional Porcelain for Future Power Sector | INT | IJERT | 2013 |
79 | Bhavani Sindhoora Velaga, Chakradhar Kaza, Dokuparthy Narasimha Rao | Polymer and FRP Technology - An Alternative to Conventional Porcelain for Future Power Sector | INT | International Journal of Engineering Research & Technology | 2013 |
80 | M.Bala Raghav, K.Naga Bhavya, Y.Suchitra, G.Srinivas Rao | Design of Solar Power Based Water Pumping System | INT | IJERT | 2013 |
81 | TSSS Bharat, D.Seshi Reddy | Recovery of HVDC System After Fault with Reactive Power Injection | INT | IJEEER | 2013 |
82 | K.Kareemulla Khan, K.Naresh, Vaddi Ramesh, Mahaboob Shreef Syed | Simulation of Reactive Power Compensation Using STATCOM | INT | IJETED | 2013 |