Research Publications

S.No Title Author's Journal Name Publication Year ISSN NO
1 Development of an expert system for iron ore classification Ashok Kumar Patel &Snehamoy Chatterjee & Amit Kumar GoraiIJET Arabian Journal of Geosciences 2018 1866-7538
2 Observations Of Spiking Phenomenon In Electron Beam Welded Etp Copper Plates Vara Prasad, Ram Sai, K.P.K. Chakravarthy, L. Ranganath, Venkata Naresh Mandhala IJMET 2018 0976-6359
3 Online Business Site Quality Assessment B. Chaitanya Krishna, P Sai Mounish, U Vinay Kumar, A Divya Mallika IJET 2018 2227-524X
4 Prioritizing Software Maintenance Issues Through Acquisition Process Dr.B.Chaitanya Krishna, K.Rajesh Kumar Reddy, V.H.N.V.R.S.Sai Pavan and M.Shanthi IJMET 2018 0976-6359
5 Analysing software quality using cmmi-2 with agile-scrum framework B Chaitanya Krishna, A Yeshwanth Srinath , N Bhavani , G Jaya Sai IJET 2018 2227-524X
6 Detection of noxious gases by implementing internet of things technology G. ArunSai, B.BharatKumar, K.Sai Likhitha3,Raju Anitha IJET 2018 2227-524X
7 Real-time logs in virtual data-center Dr.Chalasani Srinivas IJET 2018 2227-524X
8 Secure Quantum Key Distribution Encryption method for Efficient Data Communication in Wireless Body Area SensorNet-works Y. Sai Suguna, B. Kavya Reddy, V. Keerthi Durga, A. Roshini IJET 2018 2227-524X
9 Testcase Prioritization With Special Emphasis On Automation Testing Using Hybrid Framework Koneru Srinivas, Dr. Mohammed Ismail.B JATIT 2018 1992-8645
10 Collaborative filtering-based recommendation of online social voting Mohammed Ismail, Bhanu Prakash Kolla, Dr M. Nagabhushana Rao IJET 2018 2227-524X
11 State Dependency to Optimize Access of Home Appliances using Remote Control Dr. Vijaya Sri Kompalli, K. Sandhya, K. AsrithaThanmai, D. Siva Sree IJET 2018 2227-524X
12 Efficient smart garbage management system using IOT technique Dr. K. Vijaya Sri, R. Vamsi Krishna , M. J. K. Surya ,D. Venkatesh Babu IJET 2018 2227-524X
13 A Light Protocol for Tracking Secure Stuff for the Internet of Things Dr.Chalasani Srinivas, Dr. Srinivas Malladi IJET 2018 2227-524X
14 Traffic Light Controlling System using IoT Dr.Chalasani Srinivas Associate JARDCS 2018 1943-023X
15 An Efficient Data Replication Scheme for Hadoop Distributed File System T. Lakshmi Siva Rama Krishna, J. Priyanka, N. Nikhil Teja, Sd. Mahiya Sultana, B. Jabber IJET 2018 2227-524X
16 Denoising Of Digital Images Using Sparse Representation of Edges and Separable Wavelet Transform MagantiSyamala ,N.J.Nalini , R. Ragupathy , Lakshmana PhaneendraMaguluri JARDCS 2018 1943-023X
17 Adopting Centrality Measure Models in the Visualized Stock Market Network Ganesh Naidu Ummadisetti,Lakshmana PhaneendraMaguluri, Maganti Syamala JARDCS 2018 1943-023X
18 Controlling Home Appliances Using IOT V.Rama Krishna, Y.Prem Satish, N.Raj Kumar, E.SaiKeerthie IJET 2018 2227-524X
19 Milk quality testing using intelligent inference performance evaluation system integrated with IoT G Suresh Babu, V Rama Krishna, V Dharma Teja, S Balraj Yadav IJET 2018 2227-524X
20 Hybrid Compressed Hash Based Homomorphic ABEncryption Algorithm forSecurity of data in the Cloud Environment Pachipala YellammaDr. Challa Narasimham International Journal on Future Revolution in Computer Science & Communication Engineering 2018 2454-4248
21 Advanced Q-MAC: Optimal Resource Allocating for Dynamic Application in Mobile Cloud Computing Using QoS with Cache Memory K.Tara Phani Surya Kiran, K V V Satyanarayana, P Yellamma IJET 2018 2227-524X
22 Implementing Robots in Defence Through Motion Capture with Mixed Reality Pachipala Yellamma, Ch. Madhav Bharadwaj, K. R. Krishna Sai, Challa Narasimham IJET 2018 2227-524X
23 Controling And Monitoring Home Appliances Through Cloud Using IOT Pachipala Yellamma1,V Saranya Manasa,A Ramya,G.V Kalyani4,Challa Narasimham PONTE 2018 0032-423X
24 A Novel Approach for Prediction of Heart Disease: Machine Learning Technique V Srinivas, K Aditya, G Prasanth, R G.Babukarthik, S Satheeshkumar, G Sambasivam IJET 2018 2227-524X
25 Decentralization For Knowledge Sharing In Cloud Environment For Anonymous Protection Manjula Josephine. B, Shilpa Itnal and Ramya Mounika Devineni IJPAM 2018 1311-8080
26 Stock Market Prediction Based on Machine Learning Approaches) V. Lalithendra Nadh and G. Syam Prasad SpringerBriefs in Applied Sciences and Technology 2018 2191-530X
27 Enhanced Hybrid QoS Framework for Intelligent Decision Making (IDM) in Fog Computing. G. Sambasivam J. Amudhavel and R.G.Babukarthik Biosci. Biotech. Research Communications 2018 0974-6455
28 Improving if algorithm for data aggregation techniques in wireless sensor networks Ingle M., Prasada Rao P.V.R.D. International Journal of Electrical and Computer Engineering 2018 10.11591/ijece.v8i6.pp.5162-5168
29 A novel approach for feature selection and classifier optimization compressed medical retrieval using hybrid cuckoo search Vamsidhar E., Saichandana B., Harikiran J. Indonesian Journal of Electrical Engineering and Informatics 2018 10.11591/ijeei.v6i4.584
30 Security Risks in Internet of Things: A Survey Niraja K.S., Murugan, Prabhu C.S.R. 2017 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2017 2018 10.1109/ICCIC.2017.8524355
31 Characterization of gypseous soil stabilized with fly ash geopolymer analyzed by fl-RBF model Rao S.K., Kumar S. International Journal of Civil Engineering and Technology 2018 0976 - 6316 
32 Impact of mrai timer on bgp updates and convergence time Devikar R.N., Patil D.V., Chandraprakash V. Indonesian Journal of Electrical Engineering and Computer Science 2018 10.11591/ijeecs.v12.i2.pp.873-882
33 Neural network based approach for improving combinatorial coverage in combinatorial testing approach Patil R., Prakash V.C. Journal of Theoretical and Applied Information Technology 2018 1992-8645
34 Framework to avoid similarity attack in big streaming data Puri G.D., Haritha D. International Journal of Electrical and Computer Engineering 2018 10.11591/ijece.v8i5.pp.2920-2925
35 Fuzzy clustering algorithm efficient implementation using centre of centres Ramesh C.R., Rao K.R., Jena G. International Journal of Intelligent Engineering and Systems 2018 10.22266/IJIES2018.1031.01
36 Development and testing of message scheduling middleware algorithm with SOA for message traffic control in IoT environment Gupta P., Satyanarayan K.V.V., Shah D.D International Journal of Intelligent Engineering and Systems 2018 10.22266/IJIES2018.1031.28
37 Structural Health Monitoring of Railway Tracks Using WSN Rajendra Dhage M., Vemuru S. 2017 International Conference on Computing, Communication, Control and Automation, ICCUBEA 2017 2018 10.1109/ICCUBEA.2017.8463976
38 An extended channel estimation technique for cognitive radio Kolluru S.B., Vemuru S. Advances in Modelling and Analysis B 2018 10.18280/ama_b.610302
39 Pixel Overlapping Image Steganography Using PVD and Modulus Function Sahu A.K., Swain G.. 3D Research 2018 10.1007/s13319-018-0188-5
40 Extensive analysis on generation and consensus mechanisms of clustering ensemble: A survey Leela Sandhya Rani Y., Sucharita V., Satyanarayana K.V.V. International Journal of Electrical and Computer Engineering 2018 10.11591/ijece.v8i4.pp2351-2357
41 Fuzzy inference ACO islanding detection and stability analysis of integrated power system Reddy K.H., Raju S.G., Amerandra A. 2018 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2018 2018 10.1109/ISGT.2018.8403369
42 Challenges for the preliminary technological development in the health network system of wireless sensors Kiran Kumar K., Narayana G., Venunath M., Umar S. Proceedings of the 2nd International Conference on Inventive Systems and Control, ICISC 2018 2018 10.1109/ICISC.2018.8398989
43 Smart street lights using IoT Maguluri L.P., Sorapalli Y.S.V., Nakkala L.K., Tallari V. Proceedings of the 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2017 2018 10.1109/ICATCCT.2017.8389119
44 Stock exchange analysis using Hadoop user experience (Hue) Sirisha N., Kiran K.V.D. Proceedings of the International Conference on Intelligent Sustainable Systems, ICISS 2017 2018 10.1109/ISS1.2017.8389363
45 A effective cross layer multi-hop routing protocol for heterogeneous wireless sensor network Dhage M.R., Vemuru .S. Indonesian Journal of Electrical Engineering and Computer Science 2018 10.11591/ijeecs.v10.i2.pp664-671
46 An energy aware resource utilization framework to control traffic in cloud network and overloads Sultanpure K.A., Reddy L.S.S. International Journal of Electrical and Computer Engineering 2018 10.11591/ijece.v8i2.pp1018-1027
47 Tiarrah computing: The next generation of computing Pradhananga Y., Rajarajeswari P. International Journal of Electrical and Computer Engineering 2018 10.11591/ijece.v8i2.pp1247-1255
48 Routing design issues in heterogeneous wireless sensor network Dhage M.R., Vemuru S. International Journal of Electrical and Computer Engineering 2018 10.11591/ijece.v8i2.pp1028-1039
49 Query-Specific Distance and Hybrid Tracking Model for Video Object Retrieval Ghuge C.A., Ruikar S.D., Prakash V.C. Journal of Intelligent Systems 2018 10.1515/jisys-2016-0106
50 Proficient energy hole prevention scheduling in Wireless Sensor Networks Narasimharao G.B., Lakshmi A.J., Kiran P.S. Proceedings of the 2nd International Conference on Communication and Electronics Systems, ICCES 2017 2018 10.1109/CESYS.2017.8321171
51 IoT multitasking: Development of hybrid execution service oriented architecture (HESOA) to reduce response time for iot application Gupta P., Satyanarayan K.V.V., Shah D.D. Journal of Theoretical and Applied Information Technology 2018 1992-8645
52 Cluster-Based Opportunistic Spectrum Allocation in CRWMN’s Using Co-operative Mechanism Marouthu A., Vemuru S. Wireless Personal Communications 2019 10.1007/s11277-017-5152-9
53 Initial analysis of brain EEG signal for mental state detection of human being Kimmatkar N.V., Vijaya Babu B. Proceedings - International Conference on Trends in Electronics and Informatics, ICEI 2017 2019 10.1109/ICOEI.2017.8300934
54 Image segmentation for pattern recognition in surveillance Sheela Rani C.M., Dheeraj K., Sai Vineeth Reddy P., Satyasai K. International Journal of Engineering and Advanced Technology 2019 ISSN: 2249-8958 
55 A secured and efficient biometric cryptographic authentication in pervasive computing Swetha K., Pavan Kumar Reddy P.S.A., Maneesha Durga S., Gautham A.V. International Journal of Engineering and Advanced Technology 2019 ISSN: 2249-8958 
56 Concept drift identification using classifier ensemble approach Deshpande L., Rao M.N. International Journal of Electrical and Computer Engineering 2019 10.11591/ijece.v8i1.pp19-25
57 Civil engineering approach on the classification algorithms with the comparison perspective Vignesh U., Charishma S., Jayadeep K. International Journal of Civil Engineering and Technology 2019 0976 - 6316 
58 A combined clustering and geometric data perturbation approach for enriching privacy preservation of healthcare data in hybrid clouds Reddy V.S., Rao B.T. International Journal of Intelligent Engineering and Systems 2019 10.22266/ijies2018.0228.21
59 An efficient cloud scheduling algorithm for the conservation of energy through broadcasting Sultanpure K.A., Gupta A., Reddy L.S.S. International Journal of Electrical and Computer Engineering 2019 10.11591/ijece.v8i1
60 A contemporary way for enhanced modeling of context aware privacy system in PPDM Supriya Menon M., Rajarajeswari P. Journal of Advanced Research in Dynamical and Control Systems 2019 1943-023X
61 Rotational key algorithm for secured device to device communication Satish Kumar M., Prasada Rao P.V.R.D. Journal of Advanced Research in Dynamical and Control Systems 2019 1943-023X
62 Cognitive radio networks: state of research domain in next-generation wireless networks—an analytical analysis Anusha M., Vemuru S. Lecture Notes in Networks and Systems 2019 2367-3370
63 Comparative analysis of recommender systems and its enhancements Pradeep I.K., Jaya Bhaskar M. International Journal of Engineering and Technology(UAE) 2019 2227-524X 
64 BPS: Breast cancer prediction system using wisconsin breast cancer dataset Anisha P.R.., Vijaya Babu B. Journal of Advanced Research in Dynamical and Control Systems 2019 1943-023X
65 A study on conceptual overview of data mining classification and security Swapna Goud N., Mathur A. Journal of Advanced Research in Dynamical and Control Systems 2019 1943-023X
66 EBPS: Effective method for early breast cancer prediction using wisconsin breast cancer dataset Anisha P.R., Vijaya Babu B. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
67 An efficient localization scheme for mobile WSN Tambe K., Mohan G.K. International Journal of Innovative Technology and Exploring Engineering 2019 10.5755/j01.itc.47.4.19593
68 A survey on applications and performance of deep convolution neural network architecture for image segmentation disease classification from MRI images Reddy A.V.N., Phani Krishna C. Journal of Advanced Research in Dynamical and Control Systems 2019 1943-023X
69 Performance analysis of hybrid hierarchical K-means algorithm using correspondence analysis for thyroid drug data Srinivas K., Kiran K.V.D. Journal of Advanced Research in Dynamical and Control Systems 2019 1943-023X
70 A data hiding technique by mixing MFPVD and LSB substitution in a pixel Swain. G.. Information Technology and Control 2019 10.14419/ijet.v7i4.5.20189
71 A systematic study of security challenges and infrastructures for Internet of Things Koteswara Rao N., Swain G. International Journal of Engineering and Technology(UAE) 2019 2227-524X 
72 Secure data deduplication with dynamic ownership management in cloud storage Swami K.S., Sai Kiran P. Journal of Advanced Research in Dynamical and Control Systems 2019 1943-023X
73 Detecting SQL injection using correlative log analysis Sreeja T., Chetty M.S.R., Boddu S.B. International Journal of Engineering and Technology(UAE) 2019 2227-524X 
74 Analysis and presenting the educational techniques in Machine and Deep Learning short communication Rahul S. International Journal of Engineering and Technology(UAE) 2019 2227-524X 
75 Digital image steganography using eight-directional PVD against RS analysis and PDH analysis Swain G.. Advances in Multimedia 2019 ----
76 A schematic survey on different handover techniques in the LTE networks Babu K.S., Vemuru S. Journal of Advanced Research in Dynamical and Control Systems 2019 1943-023X
77 FCNB: Fuzzy Correlative Naive Bayes Classifier with MapReduce Framework for Big Data Classification Banchhor C., Srinivasu N. Journal of Intelligent Systems 2019 2191-026X
78 Identification and avoidance of malicious nodes by using certificate revocation method Vamshi krishna H., Swain G. International Journal of Engineering and Technology(UAE) 2019 2227-524X 
79 Reservoir computing for healthcare analytics Pathak S.S., Rajeswara Rao D. International Journal of Engineering and Technology(UAE) 2019 2227-524X 
80 A new encryption algorithm using symmetric key cryptography Tumati G., Rajesh Y., Manogna T., Ram Kumar J. International Journal of Engineering and Technology(UAE) 2019 2227-524X 
81 Wireless network based smart irrigation system using IOT Verma A.K., Bhagavan K., Akhil V., Singh A. International Journal of Engineering and Technology(UAE) 2019 2227-524X 
82 Augmented powell-based krill herd optimization for roadside unit deployment in vehicular ad hoc networks Saravanan, D., Janakiraman, S., Chandraprabha, K., Kalaipriyan, T., Raghav, R.S., Venkatesan, S. Journal of Testing and Evaluation 2019 10.1520/JTE20180494
83 Constraints handling in combinatorial interaction testing using multi-objective crow search and fruitfly optimization Ramgouda, P., Chandraprakash, V. Soft Computing 2019 10.1007/s00500-019-03795-w
84 Feature selection, optimization and clustering strategies of text documents Kousar Nikhath, A., Subrahmanyam, K. International Journal of Electrical and Computer Engineering 2019 10.11591/ijece.v9i2.pp.1313-1320
85 Distributed based serial regression multiple imputation for high dimensional multivariate data in multicore environment of cloud Lavanya, K., Reddy, L.S.S., Eswara Reddy, B.. International Journal of Ambient Computing and Intelligence 2019 10.4018/IJACI.2019040105
86 ImageSuBXSS: An image substitute technique to prevent Cross-Site Scripting attacks Nagarjun, P.M.D., Ahamad, S.S. International Journal of Electrical and Computer Engineering 2019 10.11591/ijece.v9i2.pp.1393-1398
87 A Novel n-Rightmost Bit Replacement Image Steganography Technique Sahu, A.K., Swain, G. 3D Research 2019 10.1007/s13319-018-0211-x
88 BTS algorithm: An energy efficient mobility management in mobile cloud computing system for 5G heterogeneous networks Pallavi, L., Jagan, A., Thirumala Rao, B. Journal of Theoretical and Applied Information Technology 2019 1992-8645
89 Comparative assessment on privacy preservation in health care sectors coupled with IoT Kathavate, P.N., Amudhavel, J. International Journal of Recent Technology and Engineering 2019  ISSN:2277-3878
90 A framework to automate cloud based service attacks detection and prevention Ravinder Rao, P., Sucharita, V. International Journal of Advanced Computer Science and Applications 2019 2156-5570 
91 Impact of trimet graph optimization topology on scalable networks Amiripalli, S.S., Bobba, V. Journal of Intelligent and Fuzzy Systems 2019 10.3233/JIFS-169954
92 Key node selection network analysis and centrality measurements on a dataset of cancer documents Mnssvkr Gupta, V., Phani Krishna, V. ARPN Journal of Engineering and Applied Sciences 2019 1819-6608
93 High data availability with effective data integrity and user revocation using abe scheme for cloud storage Mane, P.M., Sheela Rani, C.M. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
94 Novel routing protocol for secure data transmission in wireless ad hoc networks Arage Chetan, S., Satyanarayana, K.V.V. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
95 An efficient pricing strategy based on tilization of the user in GPUACC (GPU-accelerated cloud computing) Siva Thirdha, S., Satyanarayana, K.V.V., Tabassum, S.K., Hima Vamsi, G. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
96 Machine learning techniques to improve the results of student performance Mohiddin, S.K., Kumar, P.S., Sai, S.A.M., Santhi, M.V.B.T. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
97 Detection of disaster affected regions based on change detection using deep architecture Naga Pavan Srivathsav, C., Anitha, K., Anvitha, K., Maneesha, B., Sagar Imambi, S. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
98 Recognition of fake currency note using convolutional neural networks Navya Krishna, G., Sai Pooja, G., Naga Sri Ram, B., Yamini Radha, V., Rajarajeswari, P. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
99 An efficient test case prioritization using hierarchical clustering for enhancing regression testing Rupa Sri, G., Supriya, A.L., Reddy, E.R.A., Mandhala, V.N. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
100 Survey on sensing algorithms for solid waste management Vignesh, U., Vasanthi, N., Srinivas, D., Sashank, K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
101 A secure and efficient fog computing storage using bio-metric Reddy, B.T., Chowdary, C.H.A., Tirupathiraidu, C.V., Vamsi, G.K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
102 Heart disease prediction using machine learning algorithms Bommadevara, H.S.A., Sowmya, Y., Pradeepini, G. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
103 Inquisition the prospect of ranking cloud service provider using distinctive algorithms Kiranbabu, M.N.V., Satyanarayana, K.V.V. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
104 Hybrid K-Mir algorithm to predict type of lung cancer among stoicism Venkata Ramana, N., Kolli, C.S., Ravi Kumar, T., Nagesh, P. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
105 Probabilistic recurrent neural network for topic modeling Lakshmi Prasanna, P., Rajeswara Rao, D.. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
106 Hybrid approach for securing the IoT devices Sai Prasanthi, M., Katragadda, V.B., Perumalla, H., Sowmya, B. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
107 Ailment prognosis and propose antidote for skin using deep learning Phani Madhuri, N., Meghana, A., Prasada Rao, P.V.R.D., Prem Kumar, P. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
108 A new scheme to safeguard data for cloud integrated internet things Rajesh, B., Nagesh, P., Gowtham, K., Vivek, G., Srinivasu, N. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
109 A text mining research based on topic modeling using latent dritchlent allocation Lakshmi Prasanna, P., Rajeswara Rao, D. International Journal of Recent Technology and Engineering 2019  ISSN:2277-3878
110 Dynamic dispatching of elevators in elevator group control system with time-based floor preference Sale, M.D., Prakash, V.C. International Journal of Recent Technology and Engineering 2019  ISSN:2277-3878
111 Majority voting algorithm for diagnosing of imbalanced malaria disease Sajana, T., Narasingarao, M.R. Lecture Notes in Computational Vision and Biomechanics 2019 10.1007/978-3-030-00665-5_4
112 A novel LtR and RtL framework for subset feature selection (reduction) for improving the classification accuracy Potharaju, S.P., Sreedevi, M. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-13-1708-8_20
113 Trust and Security to Shared Data in Cloud Computing: Open Issues Dhote, B.L., Krishna Mohan, G. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-13-2673-8_14
114 An agent-based approach for dynamic load balancing using hybrid NSGA II Mannava, V., Kodeboyina, S.S., Bodempudi, S.B., Addada, C.S.P. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-10-8639-7_64
115 Large-scale compute-intensive constrained optimization problems: GPGPU-based approach Mane, S.U., Narsinga Rao, M.R. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-13-0589-4_54
116 A novel trimet graph optimization (TGO) topology for wireless networks Amiripalli, S.S., Bobba, V., Potharaju, S.P. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-13-0617-4_8
117 A comparison review on comb–needle model for random wireless sensor networks Shanmukhi, M., Amudahavel, J., Vasanthi, A., Naga Sathish, G. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-13-1580-0_42
118 Providing security towards the MANETs based on chaotic maps and its performance Mohammad, A.A.K., Mahmood, A.M., Vemuru, S. Lecture Notes in Electrical Engineering 2019 10.1007/978-981-13-1906-8_16
119 An effective multi-faceted cost model for auto-scaling of servers in cloud Praveen, S.P., Rao, K.T. Smart Innovation, Systems and Technologies 2019 10.1007/978-981-13-1921-1_58
120 Deformable facial fitting using active appearance model for emotion recognition Videla, L.S., Rao, M.R.N., Anand, D., Vankayalapati, H.D., Razia, S. Smart Innovation, Systems and Technologies 2019 10.1007/978-981-13-1921-1_13
121 Stock Market Prediction Based on Machine Learning Approaches Lalithendra Nadh, V., Syam Prasad, G. SpringerBriefs in Applied Sciences and Technology 2019 10.1007/978-981-13-0544-3_7
122 Data Engineered Content Extraction Studies for Indian Web Pages Kolla, B.P., Raman, A.R. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-10-8055-5_45
123 A Study of High-Dimensional Data Imputation Using Additive LASSO Regression Model Lavanya, K., Reddy, L.S.S., Eswara Reddy, B. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-10-8055-5_3
124 A survey on efficient data deduplication in data analytics Prathima, C., Reddy, L.S.S. SpringerBriefs in Applied Sciences and Technology 2019 10.1007/978-981-13-0059-2_12
125 A review on application security management using web application security standards Rakesh Phanindra, A., Narasimha, V.B., PhaniKrishna, C.V. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-10-8848-3_45
126 Auto-encoder based K-means clustering algorithm Rachapudi, V., Venkata Suryanarayana, S., Subha Mastan Rao, T. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
127 Identification of effective parameters for designing a data channel Venkateswarlu, S., Kamesh, D.B.K., Sastry, J.K.R., Rani, C.R. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-13-1580-0_10
128 PSO algorithm support switching pulse sequence ISVM for six-phase matrix converter-fed drives Amarendra, C., Harinadha Reddy, K. Smart Innovation, Systems and Technologies 2019 10.1007/978-981-13-1921-1_55
129 Big data analytics and iot gadgets for tech savvy cities Venkata Ramana, N., Nagesh, P., Lanka, S., Karri, R.R. Advances in Intelligent Systems and Computing 2019 10.1007/978-3-030-03302-6_12
130 Fuzzy clustering and Fuzzy C-Means partition cluster analysis and validation studies on a subset of CiteScore dataset Rajkumar K.V., Yesubabu A., Subrahmanyam K. International Journal of Electrical and Computer Engineering 2019 10.11591/ijece.v9i4.pp2760-2770
131 Metrics for assessing quality of a web site Sujatha M.M., Prasada Rao P.V.R.D., Sastry J.K.R. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
132 OpenCV algorithms for facial recognition Tumuluru P., Ramani B.L., Saibaba C.M.H., Venkateswarlu B., Ravinder N. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
133 Testing embedded system through optimal mining technique (OMT) based on multi-input domain Sastry J.K.R., Lakshmi Prasad M. International Journal of Electrical and Computer Engineering 2019 10.11591/ijece.v9i3.pp2141-2151
134 ERMO2 algorithm: An energy efficient mobility management in mobile cloud computing system for 5G heterogeneous networks Pallavi L., Jagan A., Thirumala Rao B. International Journal of Electrical and Computer Engineering 2019 10.11591/ijece.v9i3.pp1957-1967
135 A smart industrial pollution monitoring system using Iot Vardhan C.H., Sai K.R.K., Vamsi N.M., Yellamma P. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
136 Warehousing of medical data using blockchain Latha K.K., Prakash B.R.S., Rao P.V.R.D.P. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
137 Implementing security mechanisms for internet of things (IOT) Padilam T.R., Malladi S. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
138 Search engine optimization on big data Satish Babu J., Reddy J.P., Sai Lohit D.S.V., Chandu R., Krishna Mohan G. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
139 Revocable identity-based encryption for secure data storage in cloud Sunanda N., Sriyuktha N., Sankar P.S. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
140 Skyline based keyword search aware repeated queries from incentive environment Srilatha T., Subrahmanyam K., Amarendra K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
141 A hybrid collaborative filtering for tag based movie recommendation system Prasanna K.N.L., Naresh K., Hari Kiran V. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
142 Detection and defense of DDOS attack for WSN Prathyusha Reddy Y., Manasa B., Jyothi V., Srikanth V. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
143 Smart garbage monitoring system using ultra sonic sensor and node MCU Nithish Y., Sreekar Varma D., Pavan Koundinya L., Sekahr Babu B. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
144 Efficient privacy protection for e-health records over mobile cloudlet based on advanced security mechanism Rishitha T.S.S., Mohan G.K., Babu J.S. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
145 Calculating the impact of event using emotion detection Shiva T., Kavya T., Reddy N.A., Bano S. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
146 Enhanced water management system using IOT Chandan M., Bharghavi S., Salma S.K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
147 Advanced snort driven collaborative framework for DDOS attack detection in network classification Arshiya M., Srikanth V. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
148 Automated street lighting system Santhi Sri T., Varma R., Hari Krishna V.V.S., Varun Chowdary K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
149 Volatile memory acquisition and extracting of data using volatility framework and web GUI application Sai Vaibhav N., Haritha D. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
150 Adaptive framework combining sensors for data monitoring Satyanarayana K.V.V., Vijay Kumar S. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
151 Malicious event detection using ELK stack through cyber threat intelligence Harikanth M., Rajarajeswari P. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
152 Rainfall prediction using machine learning techniques Sai Tarun G.B., Sriram J.V., Sairam K., Sreenivas K.T., Santhi M.V.B.T. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
153 Optimized micro service based IOT sophisticated model over distributed environment Vivek Reddy S., Tirupathi Rao K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
154 Preventing insider collusion attacks secure data sharing in clouds Nithinsai Kumar U., Gopi Chand V., Rao K.T. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
155 Source based privacy for confidential data in cloud based e-healthcare systems Keerthi G., Kiran P.S. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
156 Adaptive cloud framework to explore outsourced data in wireless iot computing systems Sai Shankar S., Krishna Reddy V. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
157 An efficient data loss prevention in cloud computing with data classification Vurukonda N., Sai Teja K.V., Naveen C., Hemamadhuri K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
158 Patient treatment interval used in forecast algorithm and solicitations in hospital queuing management Naveen Kumar R., Vege H.K., Sreeram G. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
159 A smart way of reduce power usage using iot gadget Venkata Ramana N., Ravi Kumar T., Sikhakolli H., Aslam S. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
160 Opinion mining for drug reviews Babu J.S., Rao C.S.K., Banerjee D., Imambi S.S., Mohan G.K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
161 A cuisine based recommender system using K-Nn and Mapreduce approach Kodali S., Dabbiru M., Rao B.T. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
162 Performance on fraud detection in medical claims of healthcare data Jyothi P.N., Lakshmi D.R., Rama Rao K.V.S.N. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
163 Garbage bin monitoring and management system using GSM Kavitha M., Srinivasulu S., Savitri K., Sameera Afroze P., Akhil Venkata Sai P., Asrith S. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
164 Performance analysis on human activity detection using KNN and random forest Reddy L.S.N., Kiran K.S., Brahmani K.N., Vamsidhar E. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
165 Cardiac disease prediction using naïve bayes machine learning algorithm Soumya B., Sushma V., Divya V., Kumar S.L., Venkateswarulu B. International Journal of Engineering and Advanced Technology 2019 ISSN :2249-8958
166 Performance evaluation of free space optics using different modulation techniques at various link ranges Sree Madhuri A., Immadi G., Mounika V., Teja A.T., Aakash T., Srinivasa N.S. International Journal of Engineering and Advanced Technology 2019 ISSN :2249-8958
167 Consummation and contrastive analysis of digital modulation schemes using cell based design Kondamacharyulu D., Srinivasulu N., Sivasai Didugu D.V., Satyanarayana P. International Journal of Engineering and Advanced Technology 2019 ISSN :2249-8958
168 Enhancing visibility of low-light images using deep learning techniques Praveena M., Pavan Kumar V., Asha Deepika R., Sai Raghavendhar C.H., Rahul Sai Reddy J. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
169 Heart rate monitoring system using heart rate sensor and arduino uno with web application Talluri R.S.P., JaiSurya Y., Manchala S.L. International Journal of Engineering and Advanced Technology 2019 ISSN :2249-8958
170 Visible spectroscopy analysis of fat content in milk using labVIEW Sujatha M., Nagarjuna P., Ram A.B.S., Sai A.H.V., Tarun K., Ahammad S.H. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
171 Prediction of heart diseases in comparison with different machine learning algorithms Jayakiran K., Pranavi M., Novika M., Tejaswini V., Rajesh N. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
172 A comprehensive data analysis on handwritten digit recognition using machine learning approach Zohra M., Rajeswara Rao D. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
173 Twitter sentimental analysis using machine learning techniques Maturi V.L., Boya N.R., Polisetti J., Adavi S., Sai Baba C.M.H. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
174 Sentiment analysis of tweets using rapid miner tool Devisetty S.D.P., Sai Y.M., Yadav A.V., Vidyullatha P. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
175 Alcohol detection and ignition interlock system Sadhana B., Nanduru Y., Vihari L., Ravi Kumar T., Mandhala V.N. International Journal of Engineering and Advanced Technology 2019 ISSN :2249-8958
176 A novel approach for ultrasonic sensor obstacle detection using internet of things Sai D.V., Kiranbabu C., Sai Akhil K., Vurukonda N., Patel A.K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
177 Identity based proxy reencryption with null deduplication for secure communication in cloud environment Dixit R., Ravindranath K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
178 Priority based resource allocation and scheduling using artificial bee colony (ABC) optimization for cloud computing systems Phani Sheetal A., Ravindranath K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
179 Lung semantic segmentation using convolutional neural networks Sarada N., Thirupathi Rao K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
180 Enhanced IOT accessing security Divya K., Vinod Kumar J., Raja Sujana J., Pavan Kumar T. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
181 Classification of 72 Melakartha ragas using PAM clustering method: Carnatic music Kumar K.P., Peram S.R., Mandhala V.N., Banerjee D. International Journal of Engineering and Advanced Technology 2019 ISSN :2249-8958
182 Securing cloud data using face recognition and deep learning Reddy B.K., Nikhil C., Kolluri M., Ramya K.R., Mandhala V.N. International Journal of Engineering and Advanced Technology 2019 2249-8958
183 Network selection in heterogeneous wireless network technology: Taxonomy Pallavi L., Jagan A., Rao B.T. International Journal of Innovative Technology and Exploring Engineering 2019 I2278-3075
184 A novel multi stego-image based data hiding method for gray scale image Sahu A.K., .Swain G. Pertanika Journal of Science and Technology 2019 0128-7680
185 Effect on the Performance of a Support Vector Machine Based Machine Vision System with Dry and Wet Ore Sample Images in Classification and Grade Prediction Patel A.K., Chatterjee S., Gorai A.K. Pattern Recognition and Image Analysis 2019 10.1134/S1054661819010097
186 An Efficient Way to Manage Constrained Devices in Internet of Things Chakurkar P., Mukhopadhyay D., Babu B.V. Proceedings - 2018 IEEE Global Conference on Wireless Computing and Networking, GCWCN 2018 2019 10.1109/GCWCN.2018.8668624
187 Text data analysis computer aided automated assessment system: A survey Tejaswi Sai Kumar P., Bhavana Lakshmi Priya M., Sai Sreeram P., Surya Kiran J. Journal of Advanced Research in Dynamical and Control Systems 2019 1943-023X
188 An Optimal TGO Topology Method for a Scalable and Survivable Network in IOT Communication Technology Amiripalli S.S., Bobba V. Wireless Personal Communications 2019 10.1007/s11277-019-06315-z
189 Quality of Service-Based Cloud Models in Manufacturing Process Automation Potluri S., Subba Rao K., Vijaya Lakshmi A. Lecture Notes in Networks and Systems 2019 10.1007/978-981-10-8201-6_26
190 Analysis of recent developments in brushless DC motors controlling techniques Ramachandra Y., Akhileshwar M., Pandian A., Nalli R., Subbarao K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
191 Influence of magnetic field, heat radiation and external surface temperature on nanofluids with different base fluids in mixed convective flows over a vertical circular cylinder Radha Madhavi M., Nalleboyina V., Nagesh P. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
192 Dynamic dispatching of elevators in elevator group control system: Research and survey Sale M.D., Chandra Prakash V. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
193 Image recognition for automatic number plate surveillance Meghana P., Sagar Imambi S., Sivateja P., Sairam K. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
194 An ensemble feature selection framework of sonar targets using symmetrical uncertainty and multi-layer perceptron (su-mlp) Potharaju S.P., Sreedevi M., Amiripalli S.S. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-13-0617-4_24
195 Novel approach to segment the pectoral muscle in the mammograms Shinde V., Thirumala Rao B. Advances in Intelligent Systems and Computing 2019 10.1007/978-981-13-0617-4_22
196 An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function Sahu A.K., Swain G. Wireless Personal Communications 2019 10.1007/s11277-019-06393-z
197 A deep transfer learning approach for improved post-traumatic stress disorder diagnosis Banerjee D., Islam K., Xue K., Mei G., Xiao L., Zhang G., Xu R., Lei C., Ji S., Li J. Knowledge and Information Systems 2019 10.1007/s10115-019-01337-2
198 Large Scale Farming Analysis With The Help of IOT & Data Analytics G.Pandu Ranga Rao, V.V.S.Indira, P.Manikanta, Dr.M.Srinivas Advanced Multidisciplinary Scientific Research (IJAMSR) 2019 ISSN:2581-4281
199 Predicting Social Emotions from Readers’ Perspective Venkata Sai Mahesh.K, Shubham Deepak.K , Shiva Koushik Reddy.A,Vijay Kumar.V International Journal of Engineering and Advanced Technology (IJEAT) 2019 ISSN: 2249 8958
200 Emergency Driving Assistance for Debilitating Drivers Savya Nidhi, D. Sri Sai Praveen, M.V Rama Krishna, Raju Anitha International Journal of Engineering and Advanced Technology (IJEAT) 2019 ISSN: 2249-8958
201 Sentiment Analysis for Hotel Rating using Machine Learning Algorithms P. Sanjay Bhargav, G. Nagarjuna Reddy, R.V. Ravi Chand, K.Pujitha, Anjali Mathur International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2019 ISSN: 2278-3075
202 Customer Review Rating Analysis Using Opinion Mining K. Sowmya, K. Monika, M. Radha, V. Vijay Kumar International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2019 ISSN: 2278–3075
203 IoT Based Home Intrusion Detection System M. Kavitha, K Anvesh, P Arun Kumar, P Sravani International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
204 SSR Method for Private Medical Data in HSN using Light Weight Encoding Method Radhika Rani Chintala,. Somu Venkateswarlu, M. Sri Lakshmi International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
205 Introducing Secured Offline Payments using FRoDO P.S.V.S Sridhar, T.V.S. Rohitkumar, G. Dharani, V.B.S. Akhila International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2019 ISSN: 2278-3075
206 Effective Analysis of Adaptive Ranking Techniques for Mapping of Bug Report P.S.V.S.Sridhar, Y.Saikumar, B.K.Venkata Surya, R.H.Sai Krishna, G.Akhila International Journal of Engineering and Advanced Technology (IJEAT) 2019 ISSN: 2249-8958,
207 Speech Emotion Recognition using Cross Correlational Database with Feature Fusion Methodology G. Chandrika Sri Lakshmi, K. Sri Sundeep, G. Yaswanth, Niranjan S R Mellacheruvu, Swarna Kuchibhotla, Venkata Naresh Mandhala International Journal of Engineering and Advanced Technology (IJEAT) 2019 ISSN: 2249 – 8958
208 A nuclei segmentation method based on Butterfly Algorithm for H&E stained images Venubabu Rachapudi, G. Lavanya Devi, N. Sai Chaitanya International Journal of Engineering and Advanced Technology (IJEAT) 2019 ISSN: 2249-8958
209 Application of Machine Learning Techniques in Predicting Breast Cancer – A Survey K.Prasuna, K.V.S.N.Rama Rao, CH.M.H.Saibaba International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2019 ISSN: 2278-3075
210 Design and Implementation of Student Chat Bot using AIML and LSA K.Naga Lakshmi, Y. Kishore Reddy, M. Kireeti, T.Swathi, Mohammad Ismail International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2019 ISSN: 2278-3075
211 An Effective Heart Disease Prediction Method using Artificial Neural Network Mohammad Ismail, V. Harsha Vardhan, V. Aditya Mounika,K. Surya Padmini International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2019 ISSN: 2278-3075
212 Multimodal Eye Biometric System Based on Contour Based E-CNN and Multi Algorithmic Feature Extraction Using SVBF Matching Mrunal Pathak, Vinayak Bairagi, N. Srinivasu International Journal of Innovative Technology and Exploring Engineering 2019 ISSN:2278-3075
213 A comparative study of various security threats and solutions for the security of hadoop framework in terms of authentication and authorization Shahane, R., Shruthi, P., Viswanadh, B.R.V.V.N.L., Abhilash, D. International Journal of Innovative Technology and Exploring Engineering 2019 ISSN: 1599-1602
214 A Biometric Security for Cloud Data UsingVoice a s A Key B. Konda Reddy, Ch. Gowri Supriya, B. Durga Prasad, K. Ruth Ramya International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
215 A Comparative Analysis of Parallel and Distributed FSM approaches on Large scale Graph Data S. Ajay Kumar, Pellakuri Vidyullatha International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
216 A Forensic Approach to perform Android Device Analysis Masanam. Sai Prasanna Lakshmi, Pasupuleti Rajesh International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
217 A New Scheme For Maximum Utilization Of Resources In Load Balancing Algorithm’s in Cloud Computing Architecture K Ravindranath, Jigisha D Gadhia, K. Samaikya Reddy International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
218 A Systematic Study of Asset Management using Hybrid Cyber Security Maturity Model Sai Sireesha Veerapaneni, K.Raja Sekhar International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
219 An effective straggler tolerant scheme in Big Data processing systems using Machine Learning Shyam Deshmukh, K. Thirupathi Rao, B. Thirumala Rao, Vaibhav Pawar International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
220 Analysis of Load Balancing Mechanisms in Public Cloud Service R.Ramya, B.Seetha, S. Puvini Vigneshwari, N.Angayarkanni International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
221 Approaches
f or Mitigating Insider Attacks i n
Cloud Infrastructure
Divya Vadlamudi, Pushpitha.M, Sarika.G, Tejaswini.N International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
222 Currency Note Verification and Denomination Recognition on Indian Currency System Kaza Deepthi Sudha, Pooja Kilaru, Manna Sheela Rani Chetty International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
223 Data Security Using Multi Prime RSA in Cloud Sunanda Nalajala, Pratyusha Ch, Meghana A, Phani Meghana B International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
224 Detecting and Analyzing the Malicious Windows Events using Winlogbeat and ELK Stack J. N. Praneeth, M. Sreedevi International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
225 Document Classification Using KNN with Fuzzy Bags of Word Representation P.Lakshmi Prasanna, S.Manogni , P.Tejaswini , K.Tanmay Kumar , K.Manasa International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
226 Enhanced Biomedical data modeling using unsupervised probabilistic machine learning technique Syed Rizwana, Kamala Challa, Shaik Rafi, S.Sagar Imambi, International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
227 Expert system for building Cognitive model of a student using Crypt Arithmetic game and for Career Assessment V. Chandra Prakash, V. Kantharao , JKR Sastry, V. Bala Chandrika International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
228 Hive Based Geospatial Analysis for Tracking and Envisioning of Geospatial Data in Hadoop Environment Asha Kiran M, M. Sreedevi International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
229 Identification of Opinionated Features Extraction from Unstructured Textual Reviews Haritha Donavalli, Balaji Penubaka International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN 2277-3878 
230 IOT Ecosystem with Blockchain and Smart Contracts Maneesha Poluri, Abhishek Kumar, Sunandha Allam , K.V.D.Kiran International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
231 Machine learning approach for student career assessment in the modern world V. Sai kuswanth, Gogineni Krishna Chaitanya, B.Sekhar Babu, Uppuluri Lakshmi Soundharya International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN 2277-3878 
232 OS X Artifact Analysis Bhavana Maddu, P.V.R.D Prasad Rao International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
233 Particle Filtering Based Opticle Flow Computation Model for Crowd Anomaly Detection Using Gaussian Mixture Model Vijay A. Kotkar, V. Sucharita International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
234 Performance Analysis of Regression Based Machine Learning Techniques for Prediction of Stock Market Movement Nitin Nandkumar Sakhare, S. Sagar Imambi International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
235 Prediction of Chronic Kidney Disease Using C4.5 Algorithm M. Praveena, N. Bhavana International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
236 Privacy Preserving Multi Keyword Search over Outsourced Cloud Data Using N Gram V.Krishna Reddy, Ch.Srikala, Nishmai chowdary V, G. Sai Raghava, Roshan baig International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
237 Reverse Engineering the Behaviour of NotPetya Ransomware R Lakshmi Prasanna Sai, T. Pavan Kumar International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
238 Risk Assessment Strategy Performance Measure Using Confusion Matrix Kunamneni Avinash, Betha Yasaswi, D Naga Malleswari International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
239 Secure Access Control For Cloud Data UsingAttribute Based Encryption Schemes Divya Vadlamudi, Sunanda Garlapati, Qhairunnisa Syed, and Krishna Kishore Nunna International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
240 SSR Method for Private Medical Data in HSNusing Light Weight Encoding Method Radhika Rani Chintala, Somu Venkateswarlu, M. Sri Lakshmi International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
241 Text Classification Using Fuzzy Neural Network U. Sree Krishna, Hima Shree, K. Jayadeep, P.Lakshmi Prasanna International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
242 Video Steganography using LSB Scheme for Secure and Efficient Data Transmission C. N. Sujatha, Y V Raghava Rao International Journal of Recent Technology and Engineering (IJRTE) 2019 ISSN: 2277-3878
243 A systematic analysis of load balancing in cloud computing Bezawada A., Marella S.T., Gunasekhar T. International Journal of Simulation: Systems, Science and Technology 2019 10.5013/IJSSST.a.19.06.04
244 CFSES Optimization Feature Selection with Neural Network Classification for Microarray Data Analysis Patra B., Bisoyi S.S. Proceedings - 2nd International Conference on Data Science and Business Analytics, ICDSBA 2018 2019 10.1109/ICDSBA.2018.00016
245 Statistical anatomizing and visualization of data for planning and decision making using POSTGRES and GIS tools Asha Kiran M., Sreedevi M. International Journal of Simulation: Systems, Science and Technology 2019 10.5013/IJSSST.a.19.06.06
246 Support vector regression and extended nearest neighbor for videoobject retrieval C. A. Ghuge · Sachin D. Ruikar · V. Chandra Prakash Evolutionary Intelligence 2019 1864-5909
247 Solvening Virtual Machine olacement in Cloud data centre based on Noval Firefly algorithm T.Kalaipriyan, J.Amudhavel and Sujatha Pothula Biosci. Biotech. Research Communications 2019 0974-6455
248 The improved optimized skyline queries over global data Rao, P.V., Divija, K., Sunitha, Y.S. International Journal of Engineering and Advanced Technology 2019 2249-8958
249 Applications of sentimentel analysis on customer reviews of various products T.Sajana,Kalyan chakravarthi.B, Ramya krishna sri.R International Journal of Recent Technology and Engineering 2019 2277-3878
250 A soft-computing approach to reduce the network convergence time R.N.Devikar,D.V.Patil, V.Chandra Prakesh Alexandria University, Alexandria Engineering Journal 2019 2405-4569
251 Trust-based intrusion detection and clustering approach for wirless body area networks Dinesh kumar anguraj,S.Smys Wireless Personal Communications 2019 https://doi.org/10.1007/s11277-018-6005-x
252 Optimal component architecture using partiale swarm optimization algorithm for self-adaptive software architecture Y.MohanaRoopa, M.Ramesh babu, Jetti kumar, D.Kishore babu International journal of Engineering & Technology 2019 2277-3878.
253 An efficient and secured secret passeord sharing technique using block chain Adury vijay kumar,Avvaru anil kumar,Kotra mounica, Sambangi hitesh International Journal of Recent Technology and Engineering (IJRTE) 2019 2277-.3878
254 Cardiac Disease Prediction Using Naïve Bayes Machine Learning Algorithm B.Soumya, V.Sushma, V.Divya, S.Lalith Kumar, B.Venkateswarulu International Journal of Engineering and Advanced Technology (IJEAT). 2019 2249- 8958
255 A Mechanism for Monitoring Database Access Patterns for Anomaly Detection J. Satish Babu, Chinnam Siva Koteswara Rao, Venkata Naresh Mandhala, A. Sai Sasank, P. Siva Sathya, M. Chanakya International Journal of Engineering and Advanced Technology (IJEAT) 2019 2249- 8959
256 An Automatic Web based Placement Assessment M. Ashok Kumar, B. L. N. Phaneendra Kumar, V. Radhesyam, Venkata Naresh Mandhala International Journal of Engineering and Advanced Technology (IJEAT.) 2019 2249- 8960
257 Sentiment Analysis Using Naïve Bayes Classifier Kavya Suppala, Narasinga Rao International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2019 2278-3075
258 An Automated Evaluation of Live Forensic Approach Swarna Poojithakolli, K.V.D.Kiran International Journal of Engineering and Advanced Technology .(IJEAT) 2019 2249 – 8958
S.No Title Author's Journal Name Publication Year ISSN NO
1 Toxic gas detection and monitoring utilizing internet of things Srinivas C., Kumar Ch.M. International Journal of Civil Engineering and Technology 2017 9766308
2 IPCCR framework devised for application maintenance and support projects Rao Kosiganti S., Prasanth Y. International Journal of Civil Engineering and Technology 2017 9766308
3 Smart solid waste management system by IOT Vaisali G., Bhargavi K.S., Kumar S., Satyanarayana S. International Journal of Mechanical Engineering and Technology 2017 9766340
4 A survey on applications of internet of things Shaik R., Kumar Gudapati N., Kumar Balijepalli N., Medida H.R. International Journal of Civil Engineering and Technology 2017 9766308
5 General survey on implementation of security in IOT Kumar M.C.H., Shahbaz S., Varma M., Shri T. International Journal of Mechanical Engineering and Technology 2017 9766340
6 A study on data analysis of movie tweets using machine learning techniques Reddy M.Y., Bhavana V., Yeshwanth P., Santhi M.V.B.T. International Journal of Mechanical Engineering and Technology 2017 9766340
7 Buried pipes detection through ground penetrating radar images Srinivas C., Srinivasarao T. International Journal of Mechanical Engineering and Technology 2017 9766340
8 Evolutionary hybrid particle swarm optimization algorithm for solving NP-hard no-wait flow shop scheduling problems Bewoor L.A., Chandra Prakash V., Sapkal S.U. Algorithms 2017 19994893
9 Neuroendoscopy adapter module development for better brain tumor image visualization Bangare S.L., Pradeepini G., Patil S.T. International Journal of Electrical and Computer Engineering 2017 20888708
10 Enhanced attack resistant agent based dynamic key management in dynamic wireless sensor networks Shaik R., Ahamad S.S. International Journal of Civil Engineering and Technology 2017 9766308
11 Impact of lean software development into agile process model with integration testing prior to unit testing Shahabuddin S.M., Yalla P. Journal of Theoretical and Applied Information Technology 2017 19928645
12 A novel probabilistic based DDOS attack detection and prevention framework for dynamic LAN/WLAN networks Arshad M., Hussain M.A. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
13 Test case selection using logistic regression prediction model Jammalamadaka K., Ramakrishna V. International Journal of Mechanical Engineering and Technology 2017 9766340
14 A review on active data access control for multi-authority cloud storage systems with users Reddy G.V., Rao B.T., Vurukonda N. Proceedings of the 2017 International Conference On Big Data Analytics and Computational Intelligence, ICBDACI 2017 2017  
15 CommTrust: Reputation based trust evaluation in E-Commerce applications Balaji P., Nagaraju O., Haritha D. Proceedings of the 2017 International Conference On Big Data Analytics and Computational Intelligence, ICBDACI 2017 2017  
16 Levels of sentiment analysis and its challenges: A literature review Balaji P., Nagaraju O., Haritha D. Proceedings of the 2017 International Conference On Big Data Analytics and Computational Intelligence, ICBDACI 2017 2017  
17 Brain tumor classification using mixed method approach Bangare S.L., Pradeepini G., Patil S.T. 2017 International Conference on Information Communication and Embedded Systems, ICICES 2017 2017  
18 Hash counter hash method for privacy and security in cloud computing with attribute-based encryption Vurukonda N., Thirumala Rao B. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
19 Comparative analysis of document level text classification algorithms using R Syamala M., Nalini N.J., Maguluri L., Ragupathy R. IOP Conference Series: Materials Science and Engineering 2017 17578981
20 A transfer learning framework for traffic video using neuro-fuzzy approach Ashok Kumar P.M., Vaidehi V. Sadhana - Academy Proceedings in Engineering Sciences 2017 2562499
21 A survey on development of pattern evolving model for discovery of patterns in text mining using data mining techniques Changala R., Rajeswara Rao D. Journal of Theoretical and Applied Information Technology 2017 19928645
22 Reduction of refusal of service attacks using software puzzle Vaddempudi S., Muntha H., Bhavani M., Sunitha S., Amudhavel J. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
23 Nearest neighbour keyword search using R* algorithm Mounica Lahari M., Sravanthi N., Sai Kalyan K., Ravinder N., Amudhavel J. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
24 MONO, DI and TRI SSRs data extraction & storage from 1403 virus genomes with next generation retrieval mechanism Murthy K.V.S.S.R., Satyanarayana K.V.V. Data in Brief 2017 23523409
25 Effects, challenges, opportunities and analysis on security based cloud resource virtualization Amudhavel J., Kathavate P., Reddy L.S.S., Satyanarayana K.V.V. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
26 An enhanced ARIMA model for predicting life cycle of the batteries for remote Wi-Fi enabled devices Sandhyarani N., Veeraiah D., Shanmugam M., Raviraju B., Amudhavel J. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
27 Assessment on authentication mechanisms in distributed system: A case study Amudhavel J., Kathavate P., Reddy L.S.S., Bhuvaneswari Aadharshini A. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
28 Fine grained multi access control via group sharing in distributed cloud data Ranjeeth Kumar M., Srinivasu N., Reddy L.C. Journal of Theoretical and Applied Information Technology 2017 19928645
29 Implementation of k-Anonymity using android sdk Sheshikala M., Prakash R.V., Rao D.R. Proceedings - 7th IEEE International Advanced Computing Conference, IACC 2017 2017  
30 A Map-Reduce Framework for Finding Clusters of Colocation Patterns-A Summary of Results Sheshikala M., Rajeswara Rao D., Vijaya Prakash R. Proceedings - 7th IEEE International Advanced Computing Conference, IACC 2017 2017  
31 Protection of encroachment on bigdata aspects Sirisha N., Kiran K.V.D. International Journal of Mechanical Engineering and Technology 2017 9766340
32 Hybrid method for framing abstractive summaries of tweets Akkineni H., Papineni V.S.L., Burra V.B. International Journal of Intelligent Engineering and Systems 2017 2185310X
33 Optimized secure confirmations using smart card evaluation in multi cloud storage Susmitha U., Rajeswara Rao D. ARPN Journal of Engineering and Applied Sciences 2017 18196608
34 Optimization of energy aware path routing protocol in wireless sensor networks Krishna M.N.V., Harsha N.S., Kasula V.D.K., Swain G. International Journal of Electrical and Computer Engineering 2017 20888708
35 Detection and diagnosis of diaphyseal femur fracture Balaji G.N., Gopu A., Rajesh Kumar E., Anandan R. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
36 Designing of dynamic Re-clustering leach protocol for calculating total residual time and performance Umar S., Subbarayudu Y., Kumar K.K., Bashwanth N. International Journal of Electrical and Computer Engineering 2017 20888708
37 A survey of Cloud Auction mechanisms & decision making in Cloud Market to achieve highest resource & cost efficiency Shinde N., Kiran P.S. International Conference on Automatic Control and Dynamic Optimization Techniques, ICACDOT 2016 2017  
38 A secure virtualized cloud environment with pseudo-hypervisor IP based technology Mahesh Babu K., Sai Kiran P. Proceedings on 2016 2nd International Conference on Next Generation Computing Technologies, NGCT 2016 2017  
39 Survey on high performance analytics of bigdata with apache spark Maheshwar R.C., Haritha D. Proceedings of 2016 International Conference on Advanced Communication Control and Computing Technologies, ICACCCT 2016 2017  
40 A systematic survey on dynamic schedulers in Hadoop Sai V.S.V., Gowthami K., Shyam N.M.V.R., Rao K.T., Gunasekhar T., Sarada N. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
41 A comparative study on image segmentation techniques: Thresholding, K-means and ANT colony optimization Nayak S.R., Routray S., Mohapatra S.K. International Journal of Pure and Applied Mathematics 2017 13118080
42 A framework for efficient decision tree using attributes elimination and dual processing techniques Moulana M., Hussain M.A. International Journal of Pure and Applied Mathematics 2017 13118080
43 Snort rule detection for countering in network attacks Somu V., Kamesh D.B.K., Sastry J.K.R., Sitara S.N.M. Advances in Intelligent Systems and Computing 2017 21945357
44 Designing E-PAT method in WSN Devare A.S., Mohan G.K. Journal of Engineering and Applied Sciences 2017 1816949X
45 Mashup service implementation on multi-cloud environment using map reduction approach Venkateswara Rao P., Hussain M.A. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
46 Comparison of UKF and MGEKF for target tracking using bearings and elevation measurements Kavitha Lakshmi M., Koteswara Rao S., Subramanyam K. International Journal of Pure and Applied Mathematics 2017 13118080
47 A comparative study of support vector machine and logistic regression for the diagnosis of thyroid dysfunction Gurram D., Narasinga Rao M.R. International Journal of Engineering and Technology(UAE) 2017 2227524X
48 Object tracking in passive constraints with ownship maneuver Kavitha Lakshmi M., Koteswara Rao S., Subramanyam K.   2017 13118080
49 Weather analytics using map reduce technique Adithya C.V.S., Vijaya Sai N., Thirumala Rao B. International Journal of Civil Engineering and Technology 2017 9766308
50 An efficient method on supervised joint topic modeling approach by analyzing sentiments Maguluri L.P., Bhavitha I., Sai Abhinay Reddy V., Tejaswi Reddy N., Chowdary A. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
51 Appertaining “abc analysis” on quality attributes for measly cost in utilization of csp resources to clients accountability in cloud computing Kiranbabu M.N.V., Satyanarayana K.V.V. International Journal of Pure and Applied Mathematics 2017 13118080
52 Performance analysis of passive object tracking using UKF algorithm KavithaLakshmi M., Koteswara Rao S., Subrahmanyam K. International Journal of Pure and Applied Mathematics 2017 13118080
53 An adaptive gravitational search algorithm aided effective beam forming and spectral efficiency maximization in LTE based system Babu K.S., Vemuru S. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
54 The analysis of data representation techniques for early prediction of breast cancer Shaik R., Bojja P., Manne N., Vandavasi M.K., Nunna M.K. International Journal of Pure and Applied Mathematics 2017 13118080
55 Airport luggage tracking system using RFID and GSM Siva Nageswara Rao G., Jayanth T.V.M., Shabzan S., Supritha B. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
56 Effect of noise determination on estimation of fractal dimension of digital images Nayak S.R., Mishra J., Routray S. International Journal of Pure and Applied Mathematics 2017 13118080
57 Adaptive data transmission in WSN using enhanced path assured transmission protocol Devare A., Krishna Mohan G., Nikam H.B. Advances in Intelligent Systems and Computing 2017 21945357
58 Comparative analysis of metaheuristic approaches for makespan minimization for no wait flow shop scheduling problem Bewoor L.A., Prakash V.C., Sapkal S.U. International Journal of Electrical and Computer Engineering 2017 20888708
59 Handling wormhole attacks in WSNs using location based approach Naidu S.M., Himaja V.B. Advances in Intelligent Systems and Computing 2017 21945357
60 Mining negative and positive itemset in parallel and distributed data bases using vertical format Pavan Kumar N.V.S., Rajasekhara Rao K. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
61 A survey on secure sharing and auditing process using privacy preserving tool in cloud data storage Prakash H., Pradeep J., Kodhai E., Ali Hussain Md., Rama Krishna V. International Journal of Pure and Applied Mathematics 2017 13118080
62 Health care monitoring using wifi through mobile devices Chaitanya G.K., Soundarya U.L., Chandan M., Sandeep S. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
63 Fractal geometry: The beauty of computer graphics Das S.K., Nayak S.R., Mishra J. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
64 A secure and lightweight protocol for mobile DRM based on DRM community cloud (DCC) Alsaghier H.M., Shakeel Ahamad S., Udgata S.K., Reddy L.S.S. Advances in Intelligent Systems and Computing 2017 21945357
65 Performance of multimodal biometric system based on level and method of fusion Pathak M., Srinivasu N. Advances in Computing Applications 2017  
66 Static program behavior tracing for program similarity quantification Raman D., Bezawada B., Rajinikanth T.V., Sathyanarayan S. Bioorganic and Medicinal Chemistry Letters 2017 0960894X
67 Path planning of autonomous mobile robots: A survey and comparison Victerpaul P., Saravanan D., Janakiraman S., Pradeep J. Journal of Advanced Research in Dynamical and Control Systems 2017 1943023X
68 An extended DBC approach by using maximum Euclidian distance for fractal dimension of color images Nayak S.R., Mishra J., Palai G. Optik 2018 304026
69 A effective cross layer multi-hop routing protocol for heterogeneous wireless sensor network Dhage M.R., Vemuru S. Indonesian Journal of Electrical Engineering and Computer Science 2018 25024752
70 A novel approach certificate revocation in MANET using fuzzy logic Jayanthi E., Ali Hussain M. Indonesian Journal of Electrical Engineering and Computer Science 2018 25024752
71 A modified approach to estimate fractal dimension of gray scale images Nayak S.R., Mishra J., Palai G. Optik 2018 304026
72 An energy aware resource utilization framework to control traffic in cloud network and overloads Sultanpure K.A., Reddy L.S.S. International Journal of Electrical and Computer Engineering 2018 20888708
73 Routing design issues in heterogeneous wireless sensor network Dhage M.R., Vemuru S. International Journal of Electrical and Computer Engineering 2018 20888708
74 Tiarrah computing: The next generation of computing Pradhananga Y., Rajarajeswari P. International Journal of Electrical and Computer Engineering 2018 20888708
75 Query-Specific Distance and Hybrid Tracking Model for Video Object Retrieval Ghuge C.A., Ruikar S.D., Prakash V.C. Journal of Intelligent Systems 2018 3341860
76 Cluster-Based Opportunistic Spectrum Allocation in CRWMN’s Using Co-operative Mechanism Marouthu A., Vemuru S. Wireless Personal Communications 2018 9296212
77 A combined clustering and geometric data perturbation approach for enriching privacy preservation of healthcare data in hybrid clouds Reddy V.S., Rao B.T. International Journal of Intelligent Engineering and Systems 2018 2185310X
78 Concept drift identification using classifier ensemble approach Deshpande L., Rao M.N. International Journal of Electrical and Computer Engineering 2018 20888708
79 Fuzzy C-means algorithm based satellite image segmentation Rehman S.N., Hussain M.A. Indonesian Journal of Electrical Engineering and Computer Science 2018 25024752
80 An efficient cloud scheduling algorithm for the conservation of energy through broadcasting Sultanpure K.A., Gupta A., Reddy L.S.S. International Journal of Electrical and Computer Engineering 2018 20888708
81 Image resolution enhancement using transform Nazeeburrehman S., Hussain M.A. Indonesian Journal of Electrical Engineering and Computer Science 2018 25024752
82 EECLA: Clustering and localization techniques to improve energy efficient routing in wireless sensor networks Gummadi A., Rao K.R. Indonesian Journal of Electrical Engineering and Computer Science 2018 9752854
83 Three-dimensional MRI brain image analysis on hadoop platform Patil J.S., Pradeepini G. Advances in Intelligent Systems and Computing 2018 21945357
84 Analysis of QoS for PAT and EnOPATr System in WSN Devare Avinash S., Krishna Mohan G. International Journal of Engineering and Technology(UAE) 2018 2227524X
85 Evaluating the quality of navigation designed for a WEB site Sahana G., Mary Manasa S., Sastry J.K.R., Chandra Prakash V. International Journal of Engineering and Technology(UAE) 2018 2227524X
86 A novel approach to cyber hazard management intelligence system Bharathi B.B., Babu E.S. International Journal of Engineering and Technology(UAE) 2018 2227524X
87 A survey on applications and performance of deep convolution neural network architecture for image segmentation Reddy A.V.N., Krishna Ch.P. International Journal of Pure and Applied Mathematics 2018 13118080
88 An efficient fog computing for comprising approach to avoid data theft attack Pavan Kumar T., Eswar B., Ayyappa Reddy P., Sindhu Bhargavi D. International Journal of Engineering and Technology(UAE) 2018 2227524X
89 Embedded Linux based agricultural field monitoring and automation using IoT Aditya B.L.V.S., Subrahmanyam K. International Journal of Engineering and Technology(UAE) 2018 2227524X
90 A Comparative study of machine learning algorithms on thyroid disease prediction Razia S., Swathi Prathyusha P., Vamsi Krishna N., Sathya Sumana N. International Journal of Engineering and Technology(UAE) 2018 2227524X
91 Analysis and prediction of television show popularity rating using incremental K-means algorithm Anand D., Satyavani A.V., Raveena B., Poojitha M. International Journal of Mechanical Engineering and Technology 2018 9766340
92 EECLA: Clustering and localization techniques to improve energy efficient routing in vehicle tracking using wireless sensor networks Gummadi A., Raghava Rao K. International Journal of Engineering and Technology(UAE) 2018 2227524X
93 Energy-aware multi-objective differential evolution in cloud computing Kollu A., Sucharita V. Advances in Intelligent Systems and Computing 2018 21945357
94 Effective security in social data security in OSNs Balakrishna A.S.V., Srinivasu N. Advances in Intelligent Systems and Computing 2018 21945357
95 IOT wearable device for the safety and security of women and girl child Pramod M., Uday Bhaskar Ch.V., Shikha K. International Journal of Mechanical Engineering and Technology 2018 9766340
96 Anomaly detection in health care Yamini Devi J., Keerthi G., Jyotsna Priya K., Geethasree Lakshmi B. International Journal of Mechanical Engineering and Technology 2018 9766340
97 Automatic test cases for persistent software reliability based on metamorphic relations Lohitha M., Vatsalya D.Y., Jahnavi M.S., Rao V.T., Lingareddy L. International Journal of Pure and Applied Mathematics 2018 13118080
98 Encryption techniques & access control models for data security: A survey Dixit R., Ravindranath K. International Journal of Engineering and Technology(UAE) 2018 2227524X
99 Data migration in cloud computing using honey encryption Ravindranadh K., Kiran M.S., Durga Sai Pavan Kumar B., Priyanka D. International Journal of Engineering and Technology(UAE) 2018 2227524X
100 Software traceability data retrieval based on temporal query relevance Sridhar P.S.V.S., Vivek G., Vardhan P.H., Rizvi M.J., Rao K.H. International Journal of Pure and Applied Mathematics 2018 13118080
101 An efficient smart car parking system based on iot concept Tanooj kumar M., Sudheer G., Harish V., Baradwaj J. International Journal of Mechanical Engineering and Technology 2018 9766340
102 Migration of Virtual Machine to improve the Security in Cloud Computing Chandrakala N., Thirumala Rao B. International Journal of Electrical and Computer Engineering 2018 20888708
103 A systematic analysis of how to read, write and where to publish a paper Magulur L.P., Ramya D., Dheeraj D. Journal of Advanced Research in Dynamical and Control Systems 2018 1943023X
104 Vehicular fog computing: The need for a new paradigm and its issues Sri Gnana Deepika G., Sai Kiran P. International Journal of Engineering and Technology(UAE) 2018 2227524X
105 Class imbalance learning of defective prone modules using adaptive neuro fuzzy inference system Maddipati S.S., Pradeepini G. International Journal of Pure and Applied Mathematics 2018 13118080
106 Smart home system based on IoT Pavan Kumar T., Hemanth Krishna R., Sai krishna M., Meghana J. International Journal of Engineering and Technology(UAE) 2018 2227524X
107 Information extraction in current Indian web documents Prakash K.B. International Journal of Engineering and Technology(UAE) 2018 2227524X
108 Critical review attacks and countermeasures in internet of things enabled environments Mohan Kumar C., Kameswara Rao M. International Journal of Engineering and Technology(UAE) 2018 2227524X
109 Milk quality testing using intelligent inference performance evaluation system integrated with IoT Suresh Babu G., Rama Krishna V., Dharma Teja V., Balraj Yadav S. International Journal of Engineering and Technology(UAE) 2018 2227524X
110 Dynamic load balancing environment in cloud computing based on VM ware off-loading Dastagiraiah C., Krishna Reddy V., Pandurangarao K.V. Advances in Intelligent Systems and Computing 2018 21945357
111 Enhanced security using secure multiparty computation to E-voting application in cloud Chaudhari U.K., Vijaya Kumar A., Venkata Sai G. International Journal of Engineering and Technology(UAE) 2018 2227524X
112 A review on security issue in security model of cloud computing environment Venkatakotireddy G., Thirumala Rao B., Vurukonda N. Advances in Intelligent Systems and Computing 2018 21945357
113 Secure automated threat detection and prevention (SATDP) Ramaiah C., Adithya Charan D., Syam Akhil R., Pavan Kumar P. International Journal of Engineering and Technology(UAE) 2018 2227524X
114 A novel audio based human interaction proof for visually challenged users Srinivas C. International Journal of Civil Engineering and Technology 2018 9766308
115 Software metric evaluation on cloud based applications Phani Sheetal A., Ravindranath K. International Journal of Engineering and Technology(UAE) 2018 2227524X
116 A survey on advances in security threats and its counter measures in cognitive radio networks Ganesh D., Pavan Kumar T. International Journal of Engineering and Technology(UAE) 2018 2227524X
117 Improved virtual machine allocation strategy using particle swarm optimization algorithm Thirumala Rao B., Nandavardhini K., Navya K., Krishna Venkata Sunil G. International Journal of Engineering and Technology(UAE) 2018 2227524X
118 Analysis and prediction of defects using reliability growth models Prasanth Y., Bharathi N.V., Tejaswini B.S., Krishna P.S. International Journal of Civil Engineering and Technology 2018 9766308
119 Internet of things survey on crop field smart irrigation automation using IOT Pavan Kumar T., Lala S.K., Sravani B., Sandeep A. International Journal of Engineering and Technology(UAE) 2018 2227524X
120 Quantitative risk identification for different code version in embedded software reliability Kaka P., Tandu G., Krishnakanth R.V., Ravuri V.V., Sridhar P.S.V.S. International Journal of Pure and Applied Mathematics 2018 13118080
121 Enhanced decision-making approach for crime prediction Sesham B.S., Barige T.R. International Journal of Pure and Applied Mathematics 2018 13118080
122 Personalized web search on e-commerce using ontology based association mining Sekhar Babu B., Lakshmi Prasanna P., Vidyullatha P. International Journal of Engineering and Technology(UAE) 2018 2227524X
123 A Novel Subset Feature Selection Framework for Increasing the Classification Performance of SONAR Targets Potharaju S.P., Sreedevi M. Procedia Computer Science 2018 18770509
124 A secure attribute-Based encryption scheme in cloud computing Vurukonda N., Trijan Kumar S., Rajasekhar Reddy J.V., Adithya A., Boddu S.B. International Journal of Engineering and Technology(UAE) 2018 2227524X
125 Multilevel classification of security threats in cloud computing Srinivasu N., Sree Priyanka O., Prudhvi M., Meghana G. International Journal of Engineering and Technology(UAE) 2018 2227524X
126 A critical study on applicability of sokoban game for building cognitive model of a student for career assessment Prakash V.C., Sastry J.K.R., Kantha Rao V., Vineetha T., Harika V., Reddy A.A. International Journal of Engineering and Technology(UAE) 2018 2227524X
127 A study on light weight cryptography algorithms for data security in IOT Sri Lakshmi M., Srikanth V. International Journal of Engineering and Technology(UAE) 2018 2227524X
128 Remote monitoring through tab Ramaiah C.H., Parimala V.S., Kumar S.P., Reddy G.B., Rahul Y. International Journal of Mechanical Engineering and Technology 2018 9766340
129 Introduction to dynamic malware analysis for cyber intelligence and forensics Vara Prasad P.V., Sowmya N., Rajasekhar Reddy K., Jayant Bala P. International Journal of Mechanical Engineering and Technology 2018 9766340
130 Secure and effective random paths selection (SERPS) algorithm for security in MANETs Suma P., Hussain M.A. International Journal of Engineering and Technology(UAE) 2018 2227524X
131 An automated SMS-update system through iot using raspberry PI Anitha R., Harsha Vardhan S., Akhil Ch., Sona G. International Journal of Mechanical Engineering and Technology 2018 9766340
132 Data mining techniques for herbs Satish Babu J., Niveditha M., Bhavya V., Gowthami K. International Journal of Engineering and Technology(UAE) 2018 2227524X
133 Prevention of Spoofing offensive in Wireless Sensor Networks Lakshmi Sowmya U., Sai Kumar Reddy M., Madhu Babu K., Kiran K.V.D. International Journal of Engineering and Technology(UAE) 2018 2227524X
134 Dynamic secure deduplication in cloud using genetic programming Pandu Ranga Rao K.V., Krishna Reddy V., Yakoob S.K. Advances in Intelligent Systems and Computing 2018 21945357
135 Pairing-free identity-based mutual authentication and key agreement protocol for wireless mobile communications (WMN) Kumar J., Gogulamudi S., Maddala K. International Journal of Pure and Applied Mathematics 2018 13118080
136 Online business site quality assessment Chaitanya Krishna B., Sai Mounish P., Vinay Kumar U., Divya Mallika A. International Journal of Engineering and Technology(UAE) 2018 2227524X
137 Quantifying quality of WEB sites based on content Venkata Raghavarao Y., Sasidhar K., Sastry J.K.R., Chandra Prakash V. International Journal of Engineering and Technology(UAE) 2018 2227524X
138 Applicability of Sudoku game for building the cognitive model of a student for career assessment - An analytical study Prakash V.C., R. Sastry J.K., Anusha K.B., Spandana A.B., Dhatrija N., Nikhil V. International Journal of Engineering and Technology(UAE) 2018 2227524X
139 A secure data packet transmission in wireless sensor network using HECC algorithm and finding malicious packet Venkateswara Rao M., Raghava Rao K. International Journal of Engineering and Technology(UAE) 2018 2227524X
140 Adding big value to big businesses: A present state of the art of big data, frameworks and algorithms Radhika D., Aruna Kumari D. Advances in Intelligent Systems and Computing 2018 21945357
141 Topology optimization of dual octagonal array antenna for low frequency applications Venu Madhav P., Siva Ganga Prasad M. International Journal of Engineering and Technology(UAE) 2018 2227524X
142 Passive object tracking using MGEKF algorithm Kavitha Lakshmi M., Koteswara Rao S., Subrahmanyam K., Gopi Tilak V. Advances in Intelligent Systems and Computing 2018 21945357
143 Classification of imbalanced malaria disease using naïve bayesian algorithm Sajana T., Narasingarao M.R. International Journal of Engineering and Technology(UAE) 2018 2227524X
144 A novel approach for cDNA image segmentation using SLIC based SOM methodology Kondisetty D.P., Hussain M.A. International Journal of Engineering and Technology(UAE) 2018 2227524X
145 A novel chaotic hash-based attribute-based encryption and decryption on cloud computing Tamma L.N.D., Ahamad S.S. International Journal of Electronic Security and Digital Forensics 2018 1751911X
146 An overview on opinion mining techniques and sentiment analysis Balaji P., Haritha D., Nagaraju O. International Journal of Pure and Applied Mathematics 2018 13118080
147 A study on potential of big visual data analytics in construction Arena Bhargava M.G., Vidyullatha P., Venkateswara Rao P., Sucharita V. International Journal of Engineering and Technology(UAE) 2018 2227524X
148 Automation of an IoT hub using artificial intelligence techniques Yasaswini A., DayaSagar K.V., ShriVishnu K., HariNandan V., Prasadara Rao P.V.R.D. International Journal of Engineering and Technology(UAE) 2018 2227524X
149 Testing embedded systems using test cases generated through combinatorial techniques Mudarakola L.P., Sastry J.K.R., Chandra Prakash V. International Journal of Engineering and Technology(UAE) 2018 2227524X
150 Coalesce based binary table: An enhanced algorithm for mining frequent patterns Sireesha M., Vemuru S., TirumalaRao S.N. International Journal of Engineering and Technology(UAE) 2018 2227524X
151 Digital image steganography using bit flipping Sahu A.K., Swain G., Suresh Babu E. Cybernetics and Information Technologies 2018 13119702
152 Dynamic Health Supporting System Using Smart Intelligence Surapaneni P., Syamala M., Maguluri L.P. International Journal of Pure and Applied Mathematics 2018 13118080
153 Centralized real-time logs investigation in virtual data-center Vinay G., Pavan Kumar T. International Journal of Engineering and Technology(UAE) 2018 2227524X
154 Solid Waste Management in Smart Cities using IoT Surapaneni P., Symala M., Maguluri L.P. International Journal of Pure and Applied Mathematics 2018 13118080
155 Implementation for brain tumor detection and three dimensional visualization model development for reconstruction Bangare S.L., Pradeepini G., Patil S.T. ARPN Journal of Engineering and Applied Sciences 2018 18196608
156 IOT home mechanization framework Kumar C.R., Srinivas C. International Journal of Civil Engineering and Technology 2018 9766308
157 A prototype analysis of machine learning methodologies for sentiment analysis of social networks Atmakur V.K., Siva Kumar P. International Journal of Engineering and Technology(UAE) 2018 2227524X
158 A literature survey on data mining approach to effectively handle cancer treatment Nallamala S.H., Pathuri S.K., Koneru S.V. International Journal of Engineering and Technology(UAE) 2018 2227524X
159 An optimized rendering solution for ranking heterogeneous VM instances Phani Praveen S., Thirupathi Rao K. Advances in Intelligent Systems and Computing 2018 21945357
160 Robust feature selection technique for Intrusion Detection System Indira Priyadarsini P., Sai M.S.S., Suneetha A., Santhi M.V.B.T. International Journal of Control and Automation 2018 20054297
161 A context establishment framework for cloud computing information security risk management based on the STOPE view Gogulamudi S., Kumar P.R., Kumar S.V.S., Koti Mani Kumar T. International Journal of Pure and Applied Mathematics 2018 13118080
162 An accurate classification of imbalanced streaming data using deep convolutional neural network Tayar Y., Ram Prasad R.S., Satayanarayana S. International Journal of Mechanical Engineering and Technology 2018 9766340
163 Dynamic and secure authentication using IKC for distributed cloud environment Kumar M.R., Srinivasu N., Reddy L.C. Advances in Intelligent Systems and Computing 2018 21945357
164 Data mining approach for accelerating the classification accuracy of cardiotocography Potharaju S.P., Sreedevi M., Ande V.K., Tirandasu R.K. Clinical Epidemiology and Global Health 2018 22133984
165 SAML based context aware IDM a fine-grained proxy re-encryption approach to improve the privacy of users identity data in cloud environment Srinivasa Reddy Modugula T.S., Vijaya Babu B., Pachala S., Chiramdasu R., Sumalatha L. International Journal of Engineering and Technology(UAE) 2018 2227524X
166 Design of jitter spectral shaping as robust with various oversampling techniques in OFDM Umar S., Priya N., Gayathri P., Subba Reddy T., Abdul A.M. Smart Innovation, Systems and Technologies 2018 21903018
167 Dimensionality Reduction of Facial Features to Recognize Emotion State Gaikwad K.P., Sheela Rani C.M., Mahajan S.B., Sanjeevikumar P. Lecture Notes in Electrical Engineering 2018 18761100
168 Privacy preserving proof of ownership for data in cloud storage systems Tirapathi Reddy B., Chandra Sekhara Rao M.V.P. International Journal of Engineering and Technology(UAE) 2018 2227524X
169 A Layered Approach to Fraud Analytics for NFC-Enabled Mobile Payment System Vishwakarma P.P., Tripathy A.K., Vemuru S. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2018 3029743
170 Event-driven SOA-based IoT architecture Gupta P., Mokal T.P., Shah D.D., Satyanarayana K.V.V. Advances in Intelligent Systems and Computing 2018 21945357
171 A survey on existing IP trace back mechanisms and their comparisons Shariff V., Ruth Ramya K., Devi B.B., Bhattacharyya D., Kim T.-H. International Journal of Engineering and Technology(UAE) 2018 2227524X
S.No Title Author's Journal Name Publication Year ISSN NO
1 A modern approach in cloud computing storage by using compression and crypto mechanism Saidhbi, S., Rao, K.T. International Journal of Applied Engineering Research 2016 - 2017 9734562
2 A review on association rule mining techniques with respect to their privacy preserving capabilities Supriyamenon, M., Rajarajeswari, P. International Journal of Applied Engineering Research 2016 - 2017 9734562
3 Many-objective optimization: Problems and evolutionary algorithms - a short review Mane, S.U., Narasinga Rao, M.R. International Journal of Applied Engineering Research 2016 - 2017 9734562
4 Parallel frequent dataset mining and feature subset selection for high dimensional data on hadoop using map-reduce Waghere, S.S., Rajarajeswari, P. International Journal of Applied Engineering Research 2016 - 2017 9734562
5 Review on techniques and applications involved in web usage mining Bhavani, B., Sucharita, V., Satyanarana, K.V.V. International Journal of Applied Engineering Research 2016 - 2017 9734562
6 A Comprehensive Study on Risk Assessment techniques in development of Sensitive Information Management System D. Naga Malleswari, K. Subrahmanyam Journal of Chemical and Pharmaceutical Sciences 2016 - 2017 9742115
7 Design of a secure system for reading patients data using medical sensor networks Radhika rani Chintala,Manda Rama Narasinga rao,Somu Venkateswarlu Journal of chemical and pharmaceutical sciences 2016 - 2017 9742115
8 Proposed Model for Detecting Frauds
in ATM Transaction Using Statistical
Assumption Theory
Nilesh R. Pardeshi and K.V.D. Kiran International Journal of Control Theory and Applications 2016 - 2017 9745572
9 Cloud Computing in Healthcare: A Survey Salendra Suresh , P. Niranjan , K.V.V. Satyanarayana International Journal of Control Theory and Applications 2016 - 2017 9745572
10 A Novel Approach of Efficient Localization Scheme for Wireless Sensor Network Kailas Tambe, Yaswanth Kumar Avulapati, G. Krishna Mohan and Vivek S. Deshpande Indian Journal of Science and Technology 2016 - 2017 9746846
11 A Survey on Test Case Prioritization Techniques for Regression Testing G. Pardha Sagar , P. V. R. D. Prasada Rao Indian Journal of Science and Technology 2016 - 2017 9746846
12 Fire accident detection system in industries Harika S; Srikanth V; Vikram P Indian Journal of Science and Technology 2016 - 2017 9746846
13 Digital Image Steganography based on Seven Way Digital Image Steganography based on Seven Way
Pixel Value Differencing
Anita Pradhan, K. Raja Sekhar and Gandharba Swain Indian Journal of Science and Technology 2016 - 2017 9746846
14 A comparative analysis for big data challenges and big data issues using information security encryption techniques1, 2 Bandi R., Gouse S., Amudhvel J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
15 A comparative analysis on estimation of fractal dimension of gray scale images Nayak, S.R., Mishra, J., Sethy, A., Mohapatra, S.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
16 A comparison of unsupervised learning techniques in jaundice diagnosis Tirudeedhula S., Kanaparthi P., Burramukku C., Gade A., Narasingarao M.R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
17 A framework for mitigating insider attacks in cloud infrastructure Rao K.T., Alekhya M., Pavani M.S., Kumar M.N., Gunasekhar T. 2016 - 2017 13118080
18 A framework to implement secure de-duplication using SHA-512 in cloud environment Sai Nikhila B., Kiranmaiee K., Vadlamudi D., Thirupathi Rao K., Rani D.R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
19 A GUI based application testing using UFT Prasanth Y., Guru Dev G.V., Akhil K., Narendra A. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
20 A model for detection of abnormal activities in cloud Kumar, S.S., Akhil, T., Akhil, L.V.S.S., Dheeraj, K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
21 A new technique of hiding message in encrypted images Patro S.B., Reddy K.P.K., Chandrika G.R., Anvesh T., Vinay S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
22 A novel approach for countermeasure selection in virtual network systems with intrusion detection Veeraiah T., Kumar N.S., Krishna B.S., Raghava M.S., Praneeth S., Rao S.K.M., Amudhavel J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
23 A novel approach for detecting anomaly set for categorical data Ramya K.V.G.N., RamyaChowdary J., Brahmani M., RajeshKumar E. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
24 A novel approach for software defect prediction based on design metrics in relational databases Sridevi D.U., Sasidhar P., Hezekiah P., Ramya J., Murty A.S.R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
25 A novel encryption algorithm for end to end secured fiber optic communication Alapatt, B.P., Kavitha, A., Amudhavel, J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
26 A novel ensemble defect detection models for uncertain data Sreedevi E., Prasanth Y. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
27 A novel framework for multifaceted qosbased web service discoveryand composition Sambasivam G., Balaji N., Amudhavel J., Vengattaraman T. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
28 A novel weighted extreme learning machine (WELM) based ensemble classifier for medical databases Sudha Rani, P.R., Kiran Kumar, K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
29 A productive survey on resource usage and migration by client towards csp resource allotments in risk state of cloud computing based on SLA's Kiranbabu, M.N.V., Satyanarayana, K.V.V. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
30 A ranking approach for mapping bug reports Mohammed U.F., Nersu R.K., Shaik M.V., Govindu A., Chidipudi N.R., Sarathi V.T. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
31 A review on disease diagnosis using machine learning techniques Razia, S., Prathyusha, P.S., Krishna, N.V., Sumana, N.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
32 A robust method for reducing image noise in microarray images Kondisetty, D.P., Hussain, M.A. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
33 A scalable frequent itemset mining strategy using EFP-growth algorithm Rajarajeswari P., Sindhuja T., Sanjana B., Yaswanth V. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
34 A secure intrusion detection system for multipath TCP Sandeep P.M.V.K., Mukesh V.B.S., Swain G. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
35 A secured symmetric key encryption technique using images as secret keys Utkam S.G., Parasa R., Kondapaneni A., Tulabandula P.R.K., Kuppala D.R., Amudhavel J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
36 A simple data compression algorithm for anomaly detection in Wireless Sensor Networks Uthayakumar, J., Vengattaraman, T., Amudhavel, J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
37 A study on weather forecast using data streams Devi J.Y., Chinnam S.K., Srilekha J.D., Lakshmi P.V., Krishna T.H. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
38 A survey of issues in cloud computing Vasuyadav D., Krishnareddy V. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
39 A survey of machine learning techniques applied for breast cancer prediction Uddaraju, S., Narasingarao, M.R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
40 A survey of multi-tire fog computing in smart cities Sai Kiran, P., Sri Gnana Deepika, G., Tirupathi Reddy, B. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
41 A survey on structural health monitoring based on internet of things Nithya, Ms., Rajaduari, R., Ganesan, M., Anand, K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
42 A trivial solution for detection of dropped packets forgery attack via aodv with location based hierarchy in wireless sensor networks Reddy G.R., Shankar T.N., Deka B. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
43 Advanced face detection to trend analysis in image processing based on drone primitives Satayanaryana S., Niharika D., Sravya P., Priya G.B. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
44 Aggressive risk management in software reliability using genetic programming Srinivas S.S., Sreeja M., Varma K.R., Krishnaveni K., Rao S.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
45 An analysis of cloud data security issues and mechanisms Garikapati G., Yakobu D., Nitta G.R., Amudhavel J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
46 An efficient energy utilization using routing protocols in heterogeneous wireless sensor networks Venkata Narayana K., Peddineni S.N., Sri Harsha L.S.V.S., Bhavesh Reddy P.V., Geetha Pallavi N.N. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
47 An empirical comparison of decision tree algorithms for breast cancer datasets Sivakumar, S., Siva Kumar, P., Haritha, D., Jeyapalan, D.P. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
48 An expert system for assessing intelligence quotient of a student in building a cognitive model Ravalika C., Harsha M.V.S., Sandeep P., Prasanth G., Kantharao V. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
49 An improvised partition-based workflow scheduling algorithm Prathyusha J., Sandhya G., Reddy V.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
50 Analysis of two-phase queuing system with impatient customers, server breakdowns and delayed repair Rao, S.H., Kumar, V.V., Kumar, B.S., Rao, T.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
51 Anqosbased web service discovery approach – A comprehensive study Sambasivam G., Balaji N., Amudhavel J., Vengattaraman T. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
52 Appertaining “abc analysis on quality attributes for measly cost in utilization of csp resources to clients accountability in cloud computing Kiranbabu, M.N.V., Satyanarayana, K.V.V. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
53 Application of machine learning techniques on failure data to estimate parameters of reliability Anusha R., Lalitha G., Vyshnavi G.M., Rajasekhar T., Murty A. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
54 Arduino based home automation using internet of things Nikita V., Srikanth D.D., Pratap C.R., Prasad M.S.R., Amudhavel J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
55 Ascii based symmetric key algorithm for data security Rohini S.G., Jyothsna C., Ramaiah C., Sunny S.M. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
56 Assessing effort estimation in information system using quantitative approach by halstead’s principles Subrahmanyam K., Krishna B.C., Manasa G., Annapareddy R., Peddigari R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
57 Assessing software reliability through search based technique Mohan G.K., Harika U., Harshitha D., Rao V.K., Aswini K.C. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
58 Assessing the intelligence of a student through Tic-Tac-Toe game for career guidance Chandra Prakash, V., Sastry, J.K.R., Mohana Priyanka, B., Pavan Kuma, K., Deepika, Ch., Yadav, N.P.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
59 Automatic test generation with ochiai algorithm Murthy A.S.R., Dhiraj M.V.S., Ravindra T., Mohan Y., Rao P.U.M. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
60 Brilliant group in shrewd urban areas: Genuine living, city scale arrangements of a sensor based participatory crowd administration control Anne V.P.K., Harika C.N., Supriya V.S., Pooja B. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
61 CDA Generation and integration based on cloud computing Lahari K., Kumar D.P., Chandra Sekhar L.K.S., Srinivasu N. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
62 Classification of fuzzy rule based order-statistic filters for color images Veeraiah T., Rao S.K.M., Amudhavel J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
63 Code version modifications - A qualitative analysis and detection based method Kondareddy B., Pankaj Sai Gupta K., VamsiKrishna K., Veerababu J., Murty A.S.R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
64 Collaborative fault identification in embedded software systems Srija K., Mohan G.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
65 Cost optimization for big data handling in geo distributed data centres Vasantham V.K., Paruchuri S.C., Kantham S.L.D.M., Kothapalli A. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
66 Data deduplication in cloud Harish B., Harshitha K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
67 Data deduplication in cloud storage with proof of ownership Kiran, P.S., Reddy, J.B., Sainadh, K.G. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
68 Deduplication in cloud storage with proof of ownership Reddy, B.T., Sasidhar, A.P.N., Mounika, N.N., Kashyap, M.V.S.M. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
69 Design and development of software application to analyze and extract required knowledge from reviews of various social sites Bindu Sravya K., Mounika N., Tejadharrao Y., Sreedevi M. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
70 Design of compensator for reduction of power oscilations in grid connected dg Chinmayee, B., Reddy, K.V.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
71 Design of secure routing protocol with costefficiency for wireless sensor networks Vemuri, S., Mamilla, R.T., Patnala, R., Tata, D.S., Ummadisetti, K.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
72 Detecting greyhole & blackhole attack using IDEA cryptography in MANET Namburi V.M., Bolisetty S., Velugoti S.K., Shankar T.N. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
73 Detecting greyhole & blackhole attack using IDEA cryptography in MANET Namburi, V.M., Bolisetty, S., Velugoti, S.K., Shankar, T.N. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
74 Development of an expert system for student career assessment in Java based on cognitive models Kumar K.D., Vardhan K.H., Gayathri M., Mokshnagna D., Vinjamuri K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
75 Digital certificates validation by smart card using LUHN algorithm Sai Asritha G., Sai Raaga Sowmya T., Vaishnava Dhaatri N., Jagajeevan Rao L. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
76 Dynamic ranked virtual machine instances using resource deep analytics Phani Praveen, S., Thirupathi Rao, K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
77 Educational data mining on social media RamiReddy A., Niveditha A., Mary Anila K., Priyanka V. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
78 Efficient limited scale-free overlay topologies for peer-to-peer network architecture Anantharaj, B., Balaji, N., Sambasivam, G., Saleem Basha, M.S., Vengattaraman, T. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
79 Efficient multi-keyword search over encrypted data in cloud Paruchuri V.L., Battula B.P., Attada V.A., Bhimavarapu S., Soodireddy A. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
80 Enforcing the sentimental analysis on reviews of e-commerce sites Rajarajeswari P., Sindhuja T., Sanjana B., Yaswanth V. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
81 Enhanced two factor authentication fine grained access control in cloud data Sagar K.V.D., Kumar C.R., Geethika C.S., Yathisha M. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
82 Enhancement of power quality with hybrid-fuzzy based active compensation scheme for grid connected-hybrid power generator Reddy, K.V.S., Mohan, G., Bhargava, B.S., Naga Sai, N.V.D. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
83 Enhancing expectation maximization by introducing concept of identifiers for effective clustering of data Atluri Y.S., Peddi J.V., Kakkireni H.P., Satya Kalyan A. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
F Environmental smart agriculture monitoring system using internet of things Nuvvula J., Adiraju S., Mubin S., Bano S., Valisetty V.R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
85 Estimation of risk using data mining algorithms Malleswari D.N., Subramanyam K., Keerthana L. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
86 Face detection using various techniques Mandhala V., Bhattacharyya D., Kalluri H.K., Yadlapalli H., Prasad R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
87 Flexible cloud data cessations using time span algorithms Rama Krishna G., Thirumala Rao B. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
88 Health care monitoring using Wi-fithrough mobile devices Harshita K., Yasaswini B., Poojitha M., Krishna Chaitanya G. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
89 Home automation of lights & fans using iot Reddy T.I., Nalluri A., Bhamidipati K., lakshmi M.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
90 Home automation of lights & fans using iot Reddy, T.I., Nalluri, A., Bhamidipati, K., lakshmi, M.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
91 HSF-hypervisor security framework for achieving data security in a cloud environment Talasila S., Reddy P.H.S., Chaitanya V., Reddy V.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
92 Hybrid encryption scheme: An approach for securing the data using symmetric and compression algorithms Padyala V.V.P., Srinivas P., Gopi S.Y., Teja V.S., Bharat P. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
93 Hybrid query processing in reliable data extraction from deep web interfaces Kumar C.N., Sreedevi M. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
94 Identifying major challenges on mobile app user behavior in software development Kiran Y.T., Tej K.V.S.G., Naishada K.L., Hanush N., Rao S.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
95 Identifying malicious packet dropping in ad-hoc networks Kiran K.V.D., Bhusamsetti A., Raghuvaran S., Madhav V., Lakkaraju H. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
96 Image denoising by profunditymap methodusing diagram base change and group scanty Veeraiah T., Mahamkali A., Kishore B.N.P., Rao A.N., Rao S.K.M., Amudhavel J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
97 Implementation & performance analysis of security in human sensor networks Chintala R.R., Narasinga Rao M.R., Venkateswarlu S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
98 Implementation & performance analysis of security in human sensor networks Chintala, R.R., Narasinga Rao, M.R., Venkateswarlu, S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
99 Implementation of captcha based on human feelings Rao, P.V., Sreeja, C., Krishna, N.V., Saisirisha, A., Sureenddra, C.H. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
100 Implementation of cloud scheduling algorithms Srikar K., Akhil M., Reddy V.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
101 Implementation of communication protocol stack for 6lowpan network domain in internet of things Sinha P.K., Babu E.S., Gupta N., Naz K.A., Khatoon H. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
102 Implementation of hashed skyline algorithm for better defaulting and querying of data in data pre-processing Abhigna J., VijayaBabu B., Sunitha P. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
103 Implementation of message authentication using DTLS by contiki Srikanth V., Kumar A., Durga P., Panjwani N. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
104 Implementation of risk assessment using qualitative approach Krishna B.C., Saiteja M., Sharmista K.V., Maanasa T., Navya N. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
105 Implementation of sentiment analysis on twitter data Thirupathi Rao K., Allamsetty S.B., Pinnamaraju C.V. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
106 Implementing security in mobile communication Sripuram D., Pottimurthy K.C., Nimmagadda N., Saguturu R., Bhumireddy P. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
107 improving fault tolerances with in a cloud using crossbar networks Sagar K.V.D., Asha J.M.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
108 Improving quality and service of a software based on agile framework approaches Hemanth P., Reddy Y.Y., Jagadish B., Sumanth V.R., Murty A.S.R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
109 Improving quality of service in wireless sensor networks Makkena T., Kothapalli A., Swain G. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
110 Instantaneous monitoring of road traffic from twitter stream analysis Rani Chetty M.S., Yamarthi M.D., Varikuti S.M., Jasti M.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
111 Machine learning techniques for predicting the wellbeing in diabetes Udayini A.V.N., Gullapudi R., Gonuguntla M., Rao MR N. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
112 Medical virtual physical structures using homomorphic encryption techniques Chintala R.R., chaitanya N.K., Devanaboina D., Mahesh C., Manikanta A. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
113 Mobile robot based seamless linking solution for mobilead-hoc networK Sai P.A., Sarath P.K., Nihanth V., Krishna S.S., Shankar T.N. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
114 Multi level regualaritemset mining using vertical format Pavan Kumar N.V.S., Karanam A., Inapakolla V.M., Vayugundla H.H. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
115 Mxperimental investigation on heat transfer enhancement on plate heat exchanger with zno nano fluid Vishnuvardhan, K., Teressa, T., Rajeshkumar, R., Chiranjeevi, A., Aditya, K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
116 Object identification in multispectral image using classification approach Jabber B., Vasumathi D. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
117 On tenant transaction recovery in cloud security Kiran, P.S., Ravipalli, A. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
118 Optimal slot configuration based heterogeneous cluster management Jabber B., Teja K.S., Krishna N.B., Nikhitha M. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
119 Optimising genetic algorithm for neural networks Rao P.V.R.D.P., Muppa C.B., Nalajala D., Kumar P.V.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
120 Optimized test generation in search based structural test generation based on higher serendipitous collateral coverage Saradhi T.V., Vardhan T.G., Prasanna K.D., Nithusha B. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
121 Performance analysis of load balancing in cloud computing by using scheduling algorithms Utpala S., Mitta B.S., Sudhabattula P.C.R., Kota K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
122 Performance evaluation of various data deduplication schemes in cloud storage Tirapathi Reddy, B., Chandra Sekhara Rao, M.V.P. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
123 Performance Measure of Exceptional Frequent Pattern Mining using Optimized Sampling from Large Database Mishra, P., Bisoyi, S.S., Mishra, S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
124 Pinpointing the attacker using an hybrid IP trace back mechanism Ramya K.R., Gururaj K.A., Prasanth S., Gayathri K., Kumar A. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
125 Policy based data deduplication in cloud storage Sowmya P., Revathi P., Thirumala Rao B., Tech B. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
126 Premier storage resources model on multi cloud disaster recovery service Nadella S.P.B., Kasarla V., Josyula P., Kopparti V.V.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
127 Privacy based data compression in wireless sensor networks based on location services Rafeeq, S., Srikanth, V., Srilakshmi, M. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
128 Prohibited word analysis Priya M.D.K., Chandra T.M., Bharath G., Kiran S.S., Sunny G. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
129 Quality assessment of search engines using metamorphic testing Sridhar, P.S.V.S., Lokjith, P.V.N., Rajashekar, B., Lavanya, K.V. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
130 Random forest classifier approach for blurred images Syamala M., Nalini N.J., Ragupathy R., Magulur L.P., Amudhavel J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
131 Reliability evaluation of stochastic-flow network through two minimal intersecting paths under budget and time constraints Panda, D.K., Dash, R.K., Mohapatra, S.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
132 Retrospective analysis of road accidents data using UN/Supervised learning techniques Lavanya C.S., Harika K., Abhishek M., Vijay Babu V.B. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
133 Review of skill set requirement for proffessional carrier Abhigna, J., Subramanyam, K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
134 Robustness framework for dynamic quality based software services Dindu P., Chennam S., Dara M., Bodempudi S., Lingareddy L. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
135 Scalable attribute based encryption scheme for accessing cloud data Sandhya A., Harshini T., Vyshnavi T., Vurukonda N., Rao B.T., Amudhavel J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
136 Secured approach to design e-Learning technologieS Kumar G.D., Prasad B.S., SriPradha J., Mounika D.R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
137 Secured information sharing model for dynamic group in cloud platform Gaddam M.P.P., Kota S., Gurijala V., Adury V.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
138 Security for targeted malicious electronic mail attack Satyanarayana K.V.V., Manasa C., Chandana R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
139 Security issues of information centric networks Sridhara Rao L., Manogna G., Sindhu S., Himaja K., Hemanth M. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
140 security risk assessment and management in web applications Subhramanyam K., Vyshnavi Y., Dharani Y., Bhavani K.S., Shaik F.R. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
141 Sentiment analysis on micro-blogs for enhancing trustworthiness of reviews Nimmagadda D., Penugonda S.V., Utsav K., Rajesh N., Amudhavel J. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
142 Service oriented allocation to manage distributed services in cloud storage environment Sankarasetty V., Masina R., Katragadda T., Pathuri S.K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
143 Smoke detection using internet of things Krishna V.R., Maanvi C., Ramya P., Anusha Y. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
144 Spatial data mining using clustering techniques Tarakasravani B., Srineha S., Tejaswini G., Raj K.K., Santhi M.V.B.T. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
145 Strategical detection of modern Sybil nodes using integrated algorithms Dayasagar, P., Kumar, T.P., Kanth, V.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
146 Student performance analysis using classification techniques Sai Baba C.H.M.H., Govindu A., Sai Raavi M.K., Somisetty V.P. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
147 Study and implementation of testing strategies for GUI based hotel management system Subrahmanyam K., Tejaswini B.S., Chaitanya K.S., Baby Y.M., Malakshmi C.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
148 Temporal traceability links for mining the reliable data of software requirements Tadi T.R., Yenumula A.R., Pattan Z.K., Tadikonda K., Sridhar P.S.V.S. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
149 The effect of data portrayal on regression and back propagation Rao D.R., Harish T.R.S., Kumar B.R., Triveni K. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
150 The survey of an efficient search scheme over encrypted data on mobile cloud tees Punitha Devi, S., Subha, M., Danapaquiame, N., Siva Nageswara Rao, G., Yellamma, P. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
151 Thrifty data transmission over large data streams using column wise security Mettu N., Wuyyuru H.S., Cheetharala S.K., Gadde S.S., Kiran K.V.D. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
152 Using multi-keyword ranked search scheme over encrypted in secure and dynamic cloud data Syam Prasad, G., Gupta, A.S.A.L.G.G., Ashok, R., Sudheer Kumar, P. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
153 Web page suggestion in view of web utilization Kunapareddy S., Shanmukh K.V., Kumar P.G. International Journal of Pure and Applied Mathematics 2016 - 2017 13118080
154 Multi-Objective Optimization Model for QoS-Enabled Web Service Selection in Service-Based Systems Pawar S.S., Prasanth Y. New Review of Information Networking 2016 - 2017 13614576
155 A Fast Spatial and temporal querying keywords K.Bhargavi, M.R.Narasinga rao Asian Journal of Information Technology 2016 - 2017 16823915
156 DSR Protocol Hierarchy for detection of black hole attacks L.Tejaswini,KV.D.Kiran,S,Satyanarayana,B.V.Veeramallu Asian Journal of Information Technology 2016 - 2017 16823915
157 Resource Scheduling in Signature Driven Load Management with Cloud Load Balancer Varsha and Dr. G. Krishna Mohan Asian Journal of Information Technology 2016 - 2017 16823915
158 Directed bee colony optimization algorithm to solve the nurse rostering problem Rajeswari M., Amudhavel J., Pothula S., Dhavachelvan P. Computational Intelligence and Neuroscience 2016 - 2017 16875265
159 Morphism of m-Polar Fuzzy Graph Ramprasad C., Varma P.L.N., Satyanarayana S., Srinivasarao N. Advances in Fuzzy Systems 2016 - 2017 16877101
160 Vertex Degrees and Isomorphic Properties in Complement of an m-Polar Fuzzy Graph Ramprasad C., Varma P.L.N., Satyanarayana S., Srinivasarao N. Advances in Fuzzy Systems 2016 - 2017 16877101
161 A smart heuristic scanner for an intrusion detection system using two-stage machine learning techniques Rao, K.V.S.N.R., Battula, S.K., Krishna, T.L.S.R. International Journal of Advanced Intelligence Paradigms 2016 - 2017 17550386
162 In silico virtual screening of PubChem compounds against phosphotransacetylase, a putative drug target for Staphylococcus aureus Varma P.B.S., Adimulam Y.B., Subrahmanyam K. International Journal of Computational Biology and Drug Design 2016 - 2017 17560756
163 Opportunity and Challenges for Migrating Big Data Analytics in Cloud Amitkumar Manekar S., Pradeepini G. IOP Conference Series: Materials Science and Engineering 2016 - 2017 17578981
164 A novel clustering based candidate feature selection framework using correlation coefficient for improving classification performance Potharaju, S.P., Sreedevi, M. Journal of Engineering Science and Technology Review 2016 - 2017 17919320
165 A novel M-cluster of feature selection approach based on symmetrical uncertainty for increasing classification accuracy of medical datasets Potharaju, S.P., Sreedevi, M. Journal of Engineering Science and Technology Review 2016 - 2017 17919320
166 An efficient resource allocation strategy based on improved particle swarm optimization (IPSO) Naresh, T., Lakshmi, A.J., Reddy, V.K. Pakistan Journal of Biotechnology 2016 - 2017 18121837
167 An appraisal on sanctuaryissues in mobile adhoc network (manet) Srilakshmi R., Muthukuru J. ARPN Journal of Engineering and Applied Sciences 2016 - 2017 18196608
168 Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks Pradhan, A., Sekhar, K.R., Swain, G. Security and Communication Networks 2016 - 2017 19390114
169 Reviw on image splicing forgery detection PNRL Chandra sekhar, T N Sankar Journal of computerscience- IJCSIS 2016 - 2017 19475500
170 A neuro computing frame work for thyroid disease diagnosis using machine learning techniques Razia S., Narasingarao M.R. Journal of Theoretical and Applied Information Technology 2016 - 2017 19928645
171 An advanced cost and search space reduction and optimized pattern generation using mapreduce Syed H., Yalla P. Journal of Theoretical and Applied Information Technology 2016 - 2017 19928645
172 Malicious node detection and reconstruction of network in sensor actor network Chowdary K., Satyanarayana K.V.V. Journal of Theoretical and Applied Information Technology 2016 - 2017 19928645
173 Multi cross protocol with hybrid topography control for manets Pranavi.Kolagani K.Aditya N.Venkatesh Dr.K.V.D.Kiran Journal of Theoretical and Applied Information Technology 2016 - 2017 19928645
174 SABE: Efficient and scalable filtered access control in distributed cloud data storage Vurukonda N., Thirumala Rao B. Journal of Theoretical and Applied Information Technology 2016 - 2017 19928645
175 Deep learning image processing technique for early detection of alzheimer's disease Anitha, R., Jyothi, S., Mandhala, V.N., Bhattacharyya, D., Kim, T.-H. International Journal of Advanced Science and Technology 2016 - 2017 20054238
176 Information hiding using group of bits substitution Sahu A.K., Swain G. International Journal on Communications Antenna and Propagation 2016 - 2017 20395086
177 Issues of K Means Clustering While Migrating to Map Reduce Paradigm with Big Data: A Survey K. R. Nirmal, K. V. V. Satyanarayana International Journal of Electrical and Computer Engineering 2016 - 2017 20888708
178 Quality of service based task scheduling algorithms in cloud computing Potluri S., Rao K.S. International Journal of Electrical and Computer Engineering 2016 - 2017 20888708
179 Analysis of genetic algorithm for effective power delivery and with best upsurge Umar S., Sridevi G. Indonesian Journal of Electrical Engineering and Informatics 2016 - 2017 20893272
180 GWO-LPWSN: Grey Wolf Optimization Algorithm for Node Localization Problem in Wireless Sensor Networks Rajakumar R., Amudhavel J., Dhavachelvan P., Vengattaraman T. Journal of Computer Networks and Communications 2016 - 2017 20907141
181 Improving Hadoop performance by enhancing name node capabilities Thanekar S.A., Bagwan A., Subrahmanyam K. Fronteiras 2016 - 2017 22388869
182 Key management schemes of wireless sensor networks -a survey Shaik, R., Ahamad, S.S. Fronteiras 2016 - 2017 22388869
183 A Frame work for Natural Disaster Management Using TWITTER Data Dr. M. Nagabhushana Rao,M.Sangameswara Rao International Journal Of Engineering And Computer Science 2016 - 2017 23197242
184 MONO, DI and TRI SSRs data extraction & storage from 1403 virus genomes with next generation retrieval mechanism Murthy, K.V.S.S.R., Satyanarayana, K.V.V. Data in Brief 2016 - 2017 23523409
185 Mobile Banking Adeptness on Man-In- The-Middle and Man-In-The-Browser Attacks    P.S.Jagadeesh Kumar, Wenli Hu, Xianpei Li, Kundan LalP IOSR Journal of Mobile Computing & Application 2016 - 2017 23940050
186 Range-valued fuzzy colouring of interval-valued fuzzy graphs Dr.S.Satyanarayana Pesipic science and engineering 2016 - 2017 24058823
187 A Review on LSB Substitution and PVD Based Image
Steganography Techniques
Aditya Kumar Sahu ,Gandharba Swain Indonesian Journal of Electrical Engineering and Computer Science 2016 - 2017 25024752
188 Attacks of denial-of-service on networks layer of OSI model and maintaining of security Abdul A.M., Umar S. Indonesian Journal of Electrical Engineering and Computer Science 2016 - 2017 25024752
189 Data integrity and security [DIS] based protocol for cognitive radio ad hoc networks Abdul A.M., Umar S. Indonesian Journal of Electrical Engineering and Computer Science 2016 - 2017 25024752
190 Designing of Medical Processor unit for Intelligent
Network-Based Medical Usage
P. ILA Chandana Kumari, P. Gayathri, N. Rajesh, Syed Umar, G. Chandra Sekhar,
Azeem Mohammed Abdul
Indonesian Journal of Electrical Engineering and Computer Science 2016 - 2017 25024752
191 Notification of data congestion intimation for IEEE 802.11 adhoc network with power save mode Abdul A.M., Umar S. Indonesian Journal of Electrical Engineering and Computer Science 2016 - 2017 25024752
192 A framework for assessing quality of a web site Sastry J.K.R., Talluri S.L. Ponte 2016 - 2017 0032423X
193 A recommendation system for E-commerce products based on priority enriched multivendor faceted search Rao T.S.M., RamaKrishna G., Satya Kalyan A. Ponte 2016 - 2017 0032423X
194 An effective model for testing distributed embedded systems using Scaffolding method Sastry J.K.R., Chaitanya K., Rao K.R.S., Kamesh D.B.K. Ponte 2016 - 2017 0032423X
195 An efficient method for testing distributed embedded systems using in-circuit emulators Sastry J.K.R., Chaitanya K., Rao K.R.S., Kamesh D.B.K. Ponte 2016 - 2017 0032423X
196 Effective multi model based communication systems for managing traffic with-in smart cities Sasi Bhanu J., Sastry J.K.R. Ponte 2016 - 2017 0032423X
197 On building cognitive expert system for managing road traffic within smart cities Sasi Bhanu J., Sastry J.K.R. Ponte 2016 - 2017 0032423X
198 Standards and analysis of intrusion detection based system: A comparative study Krishna Anne V.P., Rajasekhara Rao K. Ponte 2016 - 2017 0032423X
199 Hybrid Intelligent Learning Method for training the ANFIS Model with Novel PSO Optimization Technique P.Vidyullatha,Dr.D Rajeswarao Ponte 2016 - 2017 0032423X
200 Standards and Analysis of Intrusion Detection Based System: A Comparative Study V P Krishna Anne ,Dr.K Rajasekhara Rao PONTE 2016 - 2017 0032423X
201 Computerized diabetic patients image screening for lesion regions detection and grading Ratna Bhargavi V, Ranjan K. Senapati, Gandharba Swainand P.M.K Prasad Biomedical Research  2016 - 2017 0970938X
202 Renovating Health care and medical Remote services through cognitive wireless neworks Anusha M,   Dr.Srikanth Vemuru International Journal of Pharmacy and Technology 2016 - 2017 0975766X
203 Digital image steganography combining LSB substitution with five way PVD in 2×3 pixel blocks Anita Pradhan, K. Raja Sekhar, Gandharba Swain International Journal of Pharmacy and Technology 2016 - 2017 0975766X
204 A Statisitcal approach for skin color segmentation using hierarchical clustering B.N.Jagadesh,A.V.S.N.Murty International Journal of Pharmacy and Technology 2016 - 2017 0975766X
205 Energy efficient mac protocol in cognitive radio network's Anusha M,Dr.Srikanth Vemuru International Journal of Pharmacy and Technology 2016 - 2017 0975766X
206 USER AUTHENTICATION IN INTERNET OF THINGS: A SURVEY S. Jagadeesh, Riaz Shaik, Gandharba Swain* , K. Rahul International Journal of Pharmacy and Technology 2016 - 2017 0975766X
207 Digital Image Steganography Techniques In Spatial Domain: A Study Aditya Kumar Sahu, Monalisa Sahu International Journal of Pharmacy and Technology 2016 - 2017 0975766X
208 Knowledge Based Information Mining on Unemployed Graduate Data Using Statistical Approaches P.Vidyullatha,Dr.D Rajeswarao International Journal of Pharmacy and Technology 2016 - 2017 0975766X
209 A Study on Interval - Valued Fuzzy Graphs Ch.Ramprasad,N.Srinivasarao,S.Satyanarayana Computer Science and Telecommunications - GESJ 2016 - 2017 15121232
210 Contributions on s-Edge Regular Bipolar Fuzzy Graphs Ch.Ramprasad,N.Srinivasarao,S,Satyanarayana,G.Srinivasarao Computer Science and Telecommunications - GESJ 2016 - 2017 15121232
211 A Bot Driven Framework for Testing Web Applications K.Bhanu sai Prasanth and Dr. G. Krishna Mohan Asian Journal of Information Technology, 2016 - 2017 16823915
212 Illumination invariant Face Recgnoition Model using Tetrolet Transform and Truncated Gaussian Mixture Model B.N.Jagaeesh,Nazma sultana shaik,Venkata Naresh Mandhala,Debnath Bhattacharyya International Journal of Software Engineering and its Applications 2016 - 2017 17389984
213 Multi-fingerprint unimodel-based biometric authentication supporting cloud computing Rajeswari P., Viswanadha Raju S., Ashour A.S., Dey N. Journal of Engineering and Applied Sciences 2016 - 2017 1860949X
214 A comprehensive study: On artificial-neural network techniques for estimation of coronary-artery disease Pratuisha K., Rajeswara Rao D., Amudhavel J., Murthy J.V.R. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
215 A framework to analysis of tweets using multi-level tree algorithms LaxmiNarasamma, V., Sreedevi, M. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
216 A novel data hiding technique based on image processing techniques Varalakshmi K., Ashok Kumar P.M., Rami Reddy A., Kavitha D. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
217 A novel integrity verification based privacy preserving model for real-time vanet’s against malicious attacks Shaik, K., Hussain, M.A. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
218 A novel secured data transmission and authentication technique against malicious attacks in WSNs Krishna Chowdary, T.V., Satyanarayana, K.V.V. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
219 Acquiring possible cost to client usage of CSP resources imposing knapsack approach on SLA’s negotiations requirements Kiranbabu, M.N.V., Satyanarayana, K.V.V. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
220 Adaptive probabilistic broadcast and safety contention window for progressive data in VANETs Karimulla Basha, S., Shankar, T.N. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
Advanced data sharing and group scheduling procedure for dynamic resource allocation of cloud computing Phanikumar V., Satyanarayana K.V.V. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
222 An agent-based hybrid approach for dynamic key management system in dynamic wireless sensor network Shaik, R., Ahamad, S.S. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
223 An expert system to assess memory power of a student for selection of a suitable career Chandra Prakash V., Sastry J.K.R., Kantharao V., Sriharshini V., Sriram G., Ganesh C.H.V.S. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
224 Application of machine learning techniques on naval and telecommunication system failure data Prasanth Y., Grace Hepsiba M., Mounika T., Pavan Kumar T., Raghavendra Kumar G. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
225 Data compression algorithm to maximize network lifetime in wireless sensor networks Uthayakumar J., Vengattaraman T., Amudhavel J. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
226 Data deduplication in cloud storage using dynamic perfect hash functions Tirapathi Reddy, B., Chandra Sekhara Rao, M.V.P. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
227 Data security mechanism in private cloud – A case study Rao, K.T., Saidhbi, S. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
228 Detection of the presence of micro aneurysms in retinal images using FCM Sai Sreenivas K., Pradeepin G. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
229 Development and analysis of support vector machine techniques for early prediction of breast cancer and thyroid Razia S., Narasingarao M.R., Bojja P. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
230 Efficient multilevel authentication in an integrated pervasive healthcare environment Moganarangan N., Sambasivam G., Balaji N., Babukarthik R.G. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
231 Energy aware routing protocol with QoS constraint in wireless multimedia sensor networks Amudhavel J., Satyanarayana K.V.V., Kathavate P., Reddy L.S.S. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
232 Enhanced check sum approach for secure deduplication file system in integrated cloud system Ramya, U., Reddy, B.T., Sekhara Rao, M.V.P.C., Amudhavel, J. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
233 Fuzzy based clustering to maximize network lifetime in wireless mobile sensor networks Buvanesvari M., Uthayakumar J., Amudhavel J. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
234 Hash based defaulting in running high dimensional software systems Naga Malleswari, D., Suresh Babu, S., Moparthi, N.R., Mandhala, V.N., Bhattacharyya, D. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
235 Hash based defaulting in running map reduce procedure for high dimensional data Thirunasri S., ThirupathiRao K. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
236 Hybrid approach for task scheduling in heterogeneous cloud based systems Siva Nageswara Rao G., Srinivasu S.V.N. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
237 Impact of steganography in secure data transaction under private cloud- an analytical survey Rao, K.T., Saidhbi, S. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
238 Implementation of aes algorithm using GF (3<sup>n</sup>) modulo system Mallepeddi, V.S.U., Pathakottu, S.R., Gattupalli, V.K.C., Rajasekhar, K. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
239 Implementation of aes algorithm using GF (3n) modulo system Mallepeddi V.S.U., Pathakottu S.R., Gattupalli V.K.C., Rajasekhar K. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
240 IoT (Internet of things) based smart E-learning campus Nithin Rao K., Sreenivasa Ravi K. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
241 Literature survey on text classification: A review Lakshmi Prasanna, P., Rajeswara Rao, D. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
242 Machine learning techniques for malaria disease diagnosis - A review Sajana T., Narasingarao M.R. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
243 Particle swarm optimization based profiling and scheduling of big data applications Koti P., Dhavachelvan P., Amudhavel J. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
244 Proof of ownership scheme for de-duplication using yes-no bloom filter Tirapathi Reddy, B., Manjusha, V., Pavani, G., Sri Sainath, Y. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
245 Reversible steganography: Data hiding with image enhancement Roshini A., Sri Sai Manish K., Vedavyas R., Lakshmidhar V., Prathyusha V., Mohan Kumar B. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
246 Secure sharing of outsourced data in cloud computing with comparison of different attribute based encryption schemes: A review Vurukonda N., Thirumala Rao B. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
247 Study of prediction algorithms for selecting appropriate classifier in machine learning Anila, M., Pradeepini, G. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
248 Testing software through genetic algorithms – a survey Chandraprakash V., Sastry J.K.R., Sravani G., Manasa U.S.L., Khyathi A., Harini A. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
249 The statistical approach for slot machine Satish Babu J., Dhulipalla V.K., Girish Kumari B., Bhargavi K., SriChaitanya G. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
250 Two phase active counter mechanism embedded with particle swarm optimization technique for segmentation of bio-medical images Jyothula, H., Rao, S.K., Vallikumari, V. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
251 User specific event detection in twitter by using spatio temporal model Ashok P.M., Kasyap B., Navaneeth U., Srilakshmi M., Bhagya Shree S., Kavitha D. Journal of Advanced Research in Dynamical and Control Systems 2016 - 2017 1943023X
252 NDynamic framework for secure VM migration over cloud computing Rathod S.B., Reddy V.K. Journal of Information Processing Systems 2016 - 2017 1976913X
S.No Title Author's Journal Name Publication Year ISSN NO
1 A study on digital forensics in hadoop Thanekar S.A., Subrahmanyam K., Bagwan A.B. International Journal of Control Theory and Applications 2015 - 2016 9745572
2 An investigation on some theorems on K-path vertex cover Durga Bhavani P., Vijay Kumar K., Satyanarayana S. Global Journal of Pure and Applied Mathematics 2015 - 2016 9731768
3 Intrusion Detection System In Manets With Elgamal Digital Signature K. Spurthy, Srinivasarao Tammireddy, Satyabrata Patro, T. N. Shankar, G. Swain And Ranjan K. Senapati Far East Journal of Electronics and Communications 2015 - 2016 9737006
4 A decision support system for assessing risk using halstead approach and principal component analysis Krishna B.C., Subrahmanyam K. Journal of Chemical
and Pharmaceutical Sciences
2015 - 2016 9742115
5 A comparative study of various edge enhancement filters in spatial domain Murty A.V.S.N., Jagadesh B.N., Bhagavan K., Satyanarayana S. Research Journal of Pharmacy and Technology 2015 - 2016 9743618
6 A germane prognosis paradigm for climate and weather research Anisha P.R., Vijaya Babu B. International Journal of Control Theory and Applications 2015 - 2016 9745572
7 A model to quantify and improve software test automation Jammalamadaka K., Ramakrishna V. International Journal of Control Theory and Applications 2015 - 2016 9745572
8 A review on enhancing map reduce performance with data locality in heterogeneous environment Radha K., Thirumala Rao B. International Journal of Control Theory and Applications 2015 - 2016 9745572
9 Advanced role of internet of things in the smart grid technology Mandhala V.N., Bhagavan K., Suresh Babu S., Lakshmipathi Anantha N. International Journal of Control Theory and Applications 2015 - 2016 9745572
10 Algorithms for energy efficiency &amp; coverage problems in wireless sensor networks Dongaonkar S., Srinivasu N. International Journal of Control Theory and Applications 2015 - 2016 9745572
11 Extraction of tweets using wrappers and streaming API Akkineni H., Lakshmi P.V.S., Vijaya Babu B. International Journal of Control Theory and Applications 2015 - 2016 9745572
12 ISLGAS: Improved supervised learning in quest using gain ratio as attribute selection measure to nowcast snow/no-snow Kishor Kumar Reddy C., Babu V. International Journal of Control Theory and Applications 2015 - 2016 9745572
13 Research issues and challenges of big data Radha K., Thirumala Rao B. International Journal of Control Theory and Applications 2015 - 2016 9745572
14 Scheme critic-an automated opinion mining system for policy making Akkineni H., Lakshmi P.V.S., Vijaya Babu B. International Journal of Control Theory and Applications 2015 - 2016 9745572
15 Trusted location based services using kNN queries in IOT Padmaja B., Jayabhaskar M. International Journal of Control Theory and Applications 2015 - 2016 9745572
16 A Mathematical Approach to Improve the Network Performance Devikar, R.N., Patil, D.V., Chandraprakash, V. Indian Journal of Science and Technology 2015 - 2016 9746846
17 A neuro-fuzzy controller for multilevel renewable energy system Pavan Kumar T., Kartheek B.N. Indian Journal of Science and Technology 2015 - 2016 9746846
18 A novel technique for optimal power allocation efficient spectrum sharing radio cognitive networks Reddy CH V Satwik; Rao G Siva Nageswara; Vurukonda Naresh; Gunasekhar T Indian Journal of Science and Technology 2015 - 2016 9746846
19 A review on cloud security challenges and issues Balaji K; Kiran P Sai Indian Journal of Science and Technology 2015 - 2016 9746846
20 A Soft Computing Approach to improve network performance ROHITH N DEVIKAR,D.V.PATIL AND V.CHANDRA PRAKASH Indian Journal of Science and Technology 2015 - 2016 9746846
21 A soft computing approach to improve the network performance Devikar R.N., Patil D.V., Chandraprakash V. Indian Journal of Science and Technology 2015 - 2016 9746846
22 A survey on clustering techniques for big data mining Sajana T., Sheela Rani C.M., Narayana K.V. Indian Journal of Science and Technology 2015 - 2016 9746846
23 An Efficient Scheme to Establish Content and Audit liveness in the cloud T. Santhoshi Rupa, K. V. V. Satyanarayana Indian Journal of Science and Technology 2015 - 2016 9746846
24 An Improved Prediction Of Kidney Disease Using Smote Sai Prasad Potharaju ,M.Sree devi Indian Journal of Science and Technology 2015 - 2016 9746846
25 Analytical model for evaluating the bottleneck node in MANETs Mohammad A.A.K., Mirza A., Vemuru S. Indian Journal of Science and Technology 2015 - 2016 9746846
26 Big data analytics with apache hadoop mapreduce framework Greeshma L; Pradeepini G Indian Journal of Science and Technology 2015 - 2016 9746846
27 Cluster Based Mutual authenticated key agreement based on Chaotic Maps for Mobile Ad Hoc Networks Mohammad A.A.K., Mirza A., Vemuru S. Indian Journal of Science and Technology 2015 - 2016 9746846
28 Comparative analysis of ANFIS, ARIMA and polynomial curve fitting for weather forecasting Srikanth P., Rajeswara Rao D., Vidyullatha P. Indian Journal of Science and Technology 2015 - 2016 9746846
29 Computational Optimization of Placement and Routing using Genetic Algorithm Hussain S.N., Kishore K.H. Indian Journal of Science and Technology 2015 - 2016 9746846
30 Data gathering in wireless sensor and actor networks Chowdary T V Krishna; Satyanarayana K V V Indian Journal of Science and Technology 2015 - 2016 9746846
31 Detection of fingerprints in advanced biometric system design Lakkoju P.K., Shankar T.N. Indian Journal of Science and Technology 2015 - 2016 9746846
32 Digital image steganography based on seven way pixel value differencing Pradhan A., Raja Sekhar K., Swain G. Indian Journal of Science and Technology 2015 - 2016 9746846
33 Distributed authentication for federated clouds in secure cloud data storage Reddy V.K., Sushmitha Y., Rao K.T. Indian Journal of Science and Technology 2015 - 2016 9746846
34 effecient of stream processing engines for processing big data streams B.V.S Srikanth,Dr.V.Krishna Reddy Indian Journal of Science and Technology 2015 - 2016 9746846
35 Efficiency of Stream Processing Engines for Processing BIGDATA Streams B. V. S. Srikanth,V. Krishna Reddy Indian Journal of Science and Technology 2015 - 2016 9746846
36 Email phishing attack mitigation using server side email addon Kumar J.D., Srikanth V., Tejeswini L. Indian Journal of Science and Technology 2015 - 2016 9746846
37 Falsification: An advanced tool for detection of Duplex code Janardhan Reddy U., Krishna Rao K.S., Nirupama Bhat M., Sastry K.B.S. Indian Journal of Science and Technology 2015 - 2016 9746846
38 Finding the effectiveness of prioritized test suite using neural networks Chandraprakash V., Narasingarao M.R., Sindhu Saraswathi M., Dorothy William N., Lavanya Kumari T., Venkata Sujith K. Indian Journal of Science and Technology 2015 - 2016 9746846
39 Improved cooperative bait detection method using multiple disjoint path technique Arage Chetan S; Satyanarayana K V V; Amudhavel J Indian Journal of Science and Technology 2015 - 2016 9746846
40 Innovations on bayesian approaches of software cost estimation model Syed Hussain; Yalla Prasanth Indian Journal of Science and Technology 2015 - 2016 9746846
41 Integration testing prior to unit testing: A paradigm shift in object oriented software testing of agile software engineering Shahabuddin S.M., Prasanth Y. Indian Journal of Science and Technology 2015 - 2016 9746846
42 Machine learning techniques for thyroid disease diagnosis - A review Razia S., Narasinga Rao M.R. Indian Journal of Science and Technology 2015 - 2016 9746846
43 Modeling of tweet summarization systems using data mining techniques: A review report Laxmi Narasamma V., Sreedevi M. Indian Journal of Science and Technology 2015 - 2016 9746846
44 Performance analysis of load balancing algorithms in cloud computing environment Reddy V.K., Deva Surya K., Sai Praveen M., Lokesh B., Vishal A., Akhil K. Indian Journal of Science and Technology 2015 - 2016 9746846
45 Performance evaluation of energy efficient power models for digital cloud Jena S.R., Vijayaraja V., Sahu A.K. Indian Journal of Science and Technology 2015 - 2016 9746846
46 Survey big data analytics, applications and privacy concerns Puri G.D., Haritha D. Indian Journal of Science and Technology 2015 - 2016 9746846
47 Two dimensional medical images diagnosis using map reduce Patil Jyoti S; Pradeepani G Indian Journal of Science and Technology 2015 - 2016 9746846
  A study on digital forensics in hadoop Thanekar S.A., Subrahmanyam K., Bagwan A.B. Indonesian Journal of Electrical Engineering and Computer Science 2015 - 2016 25024752
49 Two dimensional medical images diagnosis using MapReduce Patil J.S., Pradeepani G. Indian Journal of Science and Technology 2015 - 2016 9746846
50 A secure and Privacy Aware and Establishing Distributed Services Across Inter Cloud Communication K.Prapulla Devi, Dr.K.Subba Rao International Journal of Computational Mathematical Ideas(IJCMI) 2015 - 2016 9748652
51 Development Of Efficient Model For The Assessment Of Hart Risk Stratification G.Jagadeesh,Suraj Narayan,Dr.D.Rajeswara Rao,Prathyusha Devi International Journal of Pharma and Bio Sciences 2015 - 2016 9756299
52 Modeling on thyroid diagnosis using machine learning approaches - A review Gurram D., Narasinga Rao M.R. International Journal of Pharma and Bio Sciences 2015 - 2016 9756299
53 Modeling On Thyroid Diagnosis Using Machine Learning Approaches-A Review Deepti Gurram,M.R Narasinga Rao International Journal of Pharma and Bio Sciences 2015 - 2016 9756299
54 Progressive decision making in the department of cardiology by optimized rough set model Pellakuri V., Rajeswara Rao D. International Journal of Pharma and Bio Sciences 2015 - 2016 9756299
55 Progressive Decision Making In The Department Of Cardiology By Optimized Rough Set Model. Vidyullatha,D.Rajeswara Rao International Journal of Pharma and Bio Sciences 2015 - 2016 9756299
56 Adaptive pixel value differencing steganography using both vertical and horizontal edges Swain G. Multimedia Tools and Applications 2015 - 2016 13807501
57 Adaptive pixel value differencing steganography using both vertical and horizontal edges G.Swain   Multimedia Tools and Applications 2015 - 2016 13807501
58 Mining positive and negative regular item-sets using vertical databases Pavan Kumar N.V.S., Rajasekhar Rao K. International Journal of Simulation: Systems, Science and Technology 2015 - 2016 14738031
59 A Panoramic Bayesian analogy based method for software project cost estimation Hussain Syed, Dr.Y.Prashanth Asian Journal of Information technology 2015 - 2016 16823915
60 A panoramic bayesian analogy based method for softwere project cost estimation Syed H., Prasanth Y. Asian Journal of Information Technology 2015 - 2016 16823915
61 An efficient feature subset algorithm for high dimensional data Divya T., Vijaya Babu B. Asian Journal of Information Technology 2015 - 2016 16823915
62 An novel approach on software reliability growth modelin using the data mining techniques Nandini G., Sridevi G. Asian Journal of Information Technology 2015 - 2016 16823915
63 Burr type X software reliability growth model Sridevi G., Akbar S. Asian Journal of Information Technology 2015 - 2016 16823915
64 Dynamic resource utilization in energy aware resource management in cloud Tejaswini C.V., Prasanth Y. Asian Journal of Information Technology 2015 - 2016 16823915
65 Dynamic resource utilization over parallel slot configuration in distributed computing Divya Bharathi K., Prasada Rao P.V.R.D. Asian Journal of Information Technology 2015 - 2016 16823915
66 Dynamic searchable encryption over ditributed cloud storage Swetha K., Narasinga Rao M.R. Asian Journal of Information Technology 2015 - 2016 16823915
67 Harvesting deep web extractions based on hybrid classification procedures Yamini Satya T., Pradeepini G. Asian Journal of Information Technology 2015 - 2016 16823915
68 Hash Based Security for Malicious Attacks in Vanets Sardius Nithin Y.S., Kiran K.V.D. Asian Journal of Information Technology 2015 - 2016 16823915
69 Securing provenance for efficient maintanence and lineage tracking of data in cloud environmement

Divya V,
K.Thirupathi rao
Asian journal of information technology 2015 - 2016 16823915
70 Securing provenance for efficient maintenance and lineage tracking of data in cloud environment: A literature survey Vadlamudi D., Thirupathi Rao K. Asian Journal of Information Technology 2015 - 2016 16823915
71 Test case generation for pairwise+testing Chandra Prakash V., Priyanka K. Asian Journal of Information Technology 2015 - 2016 16823915
72 The efficient technique to protect and maintain content based queries of mobile networks Teja D., Rama G. Asian Journal of Information Technology 2015 - 2016 16823915
73 User activity monitoring using keylogger Venkatesh R., Raja Sekhar K. Asian Journal of Information Technology 2015 - 2016 16823915
74 Face detection using image morphology - A review Mandhala V.N., Bhattacharyya D., Kim T.-H. International Journal of Security and its Applications 2015 - 2016 17389976
75 User behaviour profiling in cloud using one class SVM: A review Paruchuri V.L., Suresh Babu S., Sridhar P.S.V.S., Bhattacharyya D., Kim H.-J. International Journal of Security and its Applications 2015 - 2016 17389976
76 User revocation mechanism for service oriented wireless Adhoc Networks Prasadu R., Babu M.J., Gouse S.M., Bhattacharyya D., Kim T.-H. International Journal of Security and its Applications 2015 - 2016 17389976
77 A new privacy approach using graph-EMD Saibaba C.H.M.H., Uday Kumar V., Praveenkumar K., Bhattacharyya D. International Journal of Software Engineering and its Applications 2015 - 2016 17389984
78 Acquiring business intelligence through temporal mining of smart meter data Chinnam S.K.R., Krishna Prasad A.V., Premamayudu B., Vinod M., Kim H.-J. International Journal of Software Engineering and its Applications 2015 - 2016 17389984
79 Ciphertext-policy attribute-based encryption for access control of data in cloud Paruchuri V.L., Anantha N.L., Konagala V.L., Bhattacharyya D. International Journal of Software Engineering and its Applications 2015 - 2016 17389984
80 Distance based String Search using IR-Tree Vijaya Lakshmi Paruchuri International Journal of Software Engineering and Its Applications 2015 - 2016 17389984
81 Dynamic Access Control Policies In Secure Our Sourced Data In Cloud Storage S.SAMPATH, B.TIRAPATHI REDDY International Journal of Software Engineering and Its Applications 2015 - 2016 17389984
82 Illumination Invariant Face Recognition Model using Tetrolet Transform and Truncated Gaussian Mixture Model B. N. Jagadesh, Nazma Sultana Shaik, Venkata Naresh Mandhala and Debnath Bhattacharyya International Journal of Software Engineering and Its Applications 2015 - 2016 17389984
83 Prediction Model of Survival Analysis for Customer Relationship Management
C.M.Velu,
J. Yamini Devi
Vijay Krishna Dhulipalla
and Debnath
Bhattacharyya
International Journal of Software Engineering and Its Applications 2015 - 2016 17389984
84 Prediction model of survival analysis for customer relationship management Velu C.M., Yamini Devi J., Dhulipalla V.K., Bhattacharyya D. International Journal of Software Engineering and its Applications 2015 - 2016 17389984
85 Software engineering and natural language processing- how can they be together? Sharma N., Yalla P. International Journal of Software Engineering and its Applications 2015 - 2016 17389984
86 Ensembled rule based classification algorithms for predicting imbalanced kidney disease data Potharaju S.P., Sreedevi M. Journal of Engineering Science and Technology Review 2015 - 2016 17919320
87 Inspired Pseudo Biotic DNA Based
Cryptographic Mechanism Against Adaptive
Cryptographic Attacks
E. Suresh Babu, C. Naga Raju, and Munaga HM Krishna Prasad International Journal of Network Security 2015 - 2016 18163548
88 Efficient big data analytics with optimized parallel processing Sravanthi S., Thirupathi Rao K. International Journal of Soft Computing 2015 - 2016 18169503
89 Ascertainment of wormhole and black hole attacks inmanet using dowb algorithm Kumar T.P., Srikanth V., Reddy B.L. ARPN Journal of Engineering and Applied Sciences 2015 - 2016 18196608
90 Generating automatic certifying refactored engine for software legacy system Srinivas M., Rama Krishna G., Rajasekhara Rao K. ARPN Journal of Engineering and Applied Sciences 2015 - 2016 18196608
91 Profile based personalized web search using Greedy Algorithms Lakshmi Prasanna P., Sekhar Babu B., Rajeswara Rao D., Lakshmi Anusha J., Pratyusha A., Ravi Chand A. ARPN Journal of Engineering and Applied Sciences 2015 - 2016 18196608
92 Security analysis for control policy in OSNs Balakrishna A.S.V., Srinivasu N. ARPN Journal of Engineering and Applied Sciences 2015 - 2016 18196608
93 CNB-MRF: Adapting correlative naive bayes classifier and MapReduce framework for big data classification Banchhor C., Srinivasu N. International Review on Computers and Software 2015 - 2016 18286003
94 A proposal for packet drop attacks in MANETS Swarna M., Umar S., Suresh Babu E. Lecture Notes in Electrical Engineering 2015 - 2016 18761100
95 A Steganographic Method Combining LSB Substitution and PVD in a Block Swain G. Procedia Computer Science 2015 - 2016 18770509
96 A Study on Data Storage Security Issues in Cloud Computing Vurukonda N., Rao B.T. Procedia Computer Science 2015 - 2016 18770509
97 Digital Image Steganography Using Variable Length Group of Bits Substitution Swain G. Procedia Computer Science 2015 - 2016 18770509
98 Maximum Utility Item Sets for Transactional Databases Using GUIDE Rao D.S., Sucharita V. Procedia Computer Science 2015 - 2016 18770509
99 Parallel Approach for Finding Co-location Pattern - A Map Reduce Framework Sheshikala M., Rao D.R., Prakash R.V. Procedia Computer Science 2015 - 2016 18770509
100 IPHDBCM: Inspired pseudo hybrid DNA based cryptographic mechanism to prevent against collabrative black hole attack in wireless ad hoc networks Babu E.S., Nagaraju C., Prasad M.H.M.K. International Journal of Information Security and Privacy 2015 - 2016 19301650
101 Enhancement Of Intrusion-Detection System In Manets With The Digital Signature Via Elliptic Curve Cryptosystem K. Spurthy
T. N. Shankar
S.Sabari Giri Murugan
K. Spurthy
T. N. Shankar
S.Sabari Giri Murugan
International Journal Of Computer Science And Information Security (IJCSIS), 2015 - 2016 19475500
102 Effort monitoring and tracking system Rajesh Kumar T., Anand D., Rama Krishna Srinivas G., Bhattacharyya D., Kim H.-J. International Journal of Multimedia and Ubiquitous Engineering 2015 - 2016 19750080
103 A decision support system for predicting diabetic retinopathy using neural networks Chandana K., Prasanth Y., Prabhu Das J. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
104 A dynamic approach to task scheduling in cloud computing using genetic algorithm Durga Lakshmi R., Srinivasu N. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
105 A machine learning approach for identifying disease treatment relations in short texts Sairam T.V.M., Rama Krishna G. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
106 A novel probabilistic based feature selection model for credit card anomaly detection Siva Prasad Y.A., Ramakrishna G. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
107 A novel rank based co-location pattern mining approach using map-reduce Sheshikala M., Rajeswara Rao D., Vijaya Prakash R. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
108 A Novel Rank Based Co-Location Pattern MiningApproach Using MAP-Reduce M Sheshikala, Dr.D.Rajeswara Rao,R.Vijaya Prakash Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
109 A proposal for mitigation of gray hole attack in wireless mesh ad-hoc networks using S-DSDV Sumanth K., Gutta S., Umar S., Kiran Kumar K., Hussain A. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
110 A Proposal forb mitigation ofgray hole attack in wireless mesh Ad-HocNetworks using S-DSDV K.Sumanth,Dr.G.Sridevi,Dr.Syed Umar,Dr.K.Kiran Kumar,Dr.M D Ali Hussian Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
111 An efficient cloud based key aggregate data sharing Srinivas Kumar P., Thirumala Rao B. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
112 Computing iceberg queries having non anti monotone constrains with bit map number Ravi P., Haritha D., Polala N. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
113 Computing iceberg quries having non anti monotone constraints with bitmap number P.Ravi,D.Haritha,P.Niranjan Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
114 Des secured K-NN query over secure data in clouds Ranjeeth Kumar M., Srinivasu N., Reddy L.C. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
115 Des Secured K-Nn Query Over Secure Data InClouds
Ranjeeth Kumar M, N Srinivasu, Lokanatha C Reddy Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
116 Detection of Blackhole & greyhole attacks in MANETs based on acknowledgement based approach Chaitanya K., Venkateswarlu S. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
117 Detection Of Blackhole & Greyhole Attacks In Manets Based On Cknowledgement Based Approach K.Chaitanya,Dr.S.Venkateswarlu Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
118 Detection of Blackhole &amp; greyhole attacks in MANETs based on acknowledgement based approach Chaitanya K., Venkateswarlu S. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
119 Diagnosis of heart disease using neural networks-comparative study of Bayesian regularization with multiple regression model Sai Krishnasree K., Narasinga Rao M.R. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
120 Dynamic access control policies in secure our sourced data in cloud stotage Sampath S., Tirapathi Reddy B. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
121 Energy aware routing for MANETs based on current processing state of nodes Mohammad A.A.K., Mirza A., Vemuru S. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
122 ERHR-efficient and reliable heterogeneous routing protocol for sensor networks Sai T.S.R., Vemuri S. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
123 Extraction and processing of situation spatiotemporal traffic using SVM algorithm with big data Hema Latha S., Subrahmanyam K. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
124 Fuzzy oriented risk assessment in enterprise information systems Bharat G.M., Prasad M.S. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
125 Gompertz Based spirit : MLE Dr.R.Satya Prasad,v.suryanarayana,Dr.G.Krishna mohan Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
126 Gompertz based SPRT: MLE Satya Prasad R., Suryanarayana V., Krishna Mohan G. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
127 HBase bulk loading job scheduler for multi user accessibility Likhitha S., Rao D.R. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
128 HBASE Bulk loading job scheduler for multiuser accessability S.Likitha,D.Rajeswara Rao Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
129 How the smrtcard makes the certification verification easy Rao L.J., Rao M.V., Saradhi T.V. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
130 Incremental evolutionary genetic algorithm based optimal document clustering (ODC) Kousar Nikhath A., Subrahmanyam K. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
131 Input split frequent pattern tree using mapreduce paradigm in hadoop Greeshma L., Pradeepini G. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
132 Join-less approach for finding co-location patterns-using map-reduce framework Sheshikala M., Rajeswara Rao D., Vijaya Prakash R. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
133 Least-mean difference round robin (LMDRR) cpu scheduling algorithm Rohith Roshan D., Subba Rao K. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
134 pattern based evaluation for etracting personalized profiles P.Sathvik naga sai,Dr.P.Siva kumar Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
135 Pattern based evaluation for extracting personalized profiles Sathvik Naga Sai P., Siva Kumar P. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
136 Powerful Network Monitoring System with Additional services increasing the network Performance Chitluru Veerabhadra Rao, T Pavan Kumar, Dr.V Srikanth Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
137 Real time scheduling for dynamic process execution using round robin switching Siva Nageswara Rao G. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
138 Reduced file hash foot prints for optimized deduplication in cloud platforms Jyothirmai M., Thirupathi Rao K. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
139 Regular pattern mining on dynamic database using vertical formate on given user regularity threshold M.N.S.Gangadhar,Dr.M.Sreedevi Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
140 Regular pattern mining on dynamic databases using vertical formate on given user regularity threshold Gangadhar M.N.S., Sreedevi M. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
141 Securing data stored in clouds using multi keys and proxy injection schemes Girishma V., Satyanarayana K.V.V. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
142 Test case prioritization on real time applications Pasala S., Prasad M.S.R., Rama Krishna V. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
143 Training and Development of artificial neural network models:single layer feedforward and multilayer feedforward neural network Vidyullatha,D.Rajeswara Rao Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
144 Training and development ofartificial neural network models: Single layer feedforward and multi layer feedforward neural network Pellakuri V., Rajeswara Rao D. Journal of Theoretical and Applied Information Technology 2015 - 2016 19928645
145 Data Mining Techniques Based on Effective Pattern Discovery S. Suresh Babu,Vahiduddin Shariff , CH. M. H. Saibaba and Debnath Bhattacharyya International Journal of u- and e- Service, Science and Technology 2015 - 2016 20054246
146 Jackknife estimation of incomplete data for data marts for customer relationship management Mandhala V.N., Lakshmipathi Anantha N., Dhulipalla V.K., Kim H.-J. International Journal of u- and e- Service, Science and Technology 2015 - 2016 20054246
147 Jackknife Estimation Of Incomplete Dta For Data Marts For Customer Relationship Management Venkata Naresh.M,N.Lakshmipathi Anantha,Vijay Krishna,Hye Jin Kim International Journal of u- and e- Service, Science and Technology 2015 - 2016 20054246
148 Applying Z-curve technique to compute skyline set in multi criteria decision making system Saradhi T.V., Subrahmanyam K., Rao P.V., Kim H.-J. International Journal of Database Theory and Application 2015 - 2016 20054270
149 Key aggregate based homomorphic encryption for efficient authentication for secure cloud storage Ramya K.R., Malleswari D.N., Rani C.R., Bhattacharyya D., Kim H.-J. International Journal of Database Theory and Application 2015 - 2016 20054270
150 KeyAggregate ased homomorphic Encryption for Efficient Authentication for Secure Cloud Storage K Ruth Ramya, D Naga Malleswari, Ch Radhika Rani,
Debnath Bhattacharyya
and Hye-jin Kim
International Journal of Database Theory And Application 2015 - 2016 20054270
151 Performance evaluation of feature selection methods on large dimensional databases Leela Sandhya Rani Y., Sucharita V., Bhattacharyya D., Kim H.-J. International Journal of Database Theory and Application 2015 - 2016 20054270
152 An efficient mac protocol for reducing channel interference and access delay in cognitive radio wireless mesh networks Anusha M., Vemuru S. International Journal on Communications Antenna and Propagation 2015 - 2016 20395086
153 An Efficient MAC protocol for reducing Channel Interference andAccess Delay in Cognitive Radio Wireless Mesh Networks Anusha M, Dr.V Srikanth International Journal on Communications Antenna and Propagation 2015 - 2016 20395086
154 A Secured cloud data storage with access previleges Naresh.V,
B.Thirumala Rao,
B.Thirupathi Reddy
International journal of electrical and computer engineering 2015 - 2016 20888708
155 A secured cloud data storage with access privileges Vurukonda N., Rao B.T., Reddy B.T. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
156 An IoT framework for addressing parents concerns about safety of school going children Gupta P., Shah D.D., Satyanarayana K.V.V. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
157 Analysis of legacy system in software application development: A comparative survey Srinivas M., Ramakrishna G., Rajasekhara Rao K., Suresh Babu E. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
158 Automatic detection of illegitimate websites with mutual clustering Kanaka Durga K., Rama Krishna V. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
159 Automatic Detection of illegitimate websites with Mutual Clustering [ADIWMC]. Kanaka Durga, V Rama Krishna International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
160 Big data and MapReduce challenges, opportunities and trends Thanekar S.A., Subrahmanyam K., Bagwan A.B. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
161 Designing and simulation of surrounding supporting multicast routing protocol Jani S.M., Umar S., Prasada Rao P.V.R.D., Gutta S. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
162 Implementing Dynamically Evolvable Communication with Embedded Systems through WEB Services Sasi Bhanu Jammalamadaka, Vinaya Babu A, Trimurthy A International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
163 Implementing dynamically evolvable communication with embeded system through web services J.Sasi Bhanu,A.Vinay Babu,P.Thrimurthy International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
164 Intranet Design Strategies D. Rohith Roshan, Dr.K.Subba Rao International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
165 Issues in routing mechanism for packet forwarding: A survey Devikar R.N., Patil D.V., Chandraprakash V. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
166 issues in routing mechanisms for packet forwarding:A Survey Rohith N.Divakar,deepak v patil,Dr.V.Chandra prakash International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
167 load balancing techniques for effecient traffic management in cloud environment t.sasidhar,vani havisha,sai koushik,mani deep,v.krishna reddy International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
168 Load balancing techniques for efficient traffic management in cloud environment Sasidhar T., Havisha V., Koushik S., Deep M., Krishna Reddy V. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
169 Machine learning techniques on multidimensional curve fitting data based on r- square and chi-square methods Vidyullatha P., Rajeswara Rao D. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
170 Machine Learning Techniques on Multidimensional Curve Fitting Data Based on R-Square and chi-square methods Vidyullatha,Dr.D.Rajeswara Rao International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
171 Proposed Potential Security Infrastructure in VANETS using tamper registered hardware Syed Umar,Shaik Mahaboob jani International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
172 Secure Digital Signature scheme based on eliptic curve on internet of things Sumanth K,M.Jaya bhaskar International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
173 Secure digital signature scheme based on elliptic curves for internet of things Koppula S., Muthukuru J. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
174 Secure multicast routing protocol in MANETs using efficient ECGDH algorithm Arepalli G., Erukula S.B., Gopi A.P., NagaRaju C. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
175 Study of BGP convergence time Devikar R.N., Patil D.V., Chandraprakash V. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
176 Study of BGP Convergence time:A Survey Rohith N.Divakar,deepak v patil,Dr.V.Chandra prakash International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
177 Study on improving the network life time maximazation for wireless sensor network using cross layer approach Bhandari, R.R., Rajasekhar, K. International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
178 Sufficient Authentication for Energy Consumption in Wireless Sensor Networks Hema Gopinath Sukavasi, Lokesh Kanagala, Riaz Shaik International Journal of Electrical and Computer Engineering 2015 - 2016 20888708
179 Evaluation of data mining strategies using fuzzy clustering in dynamic environment Subbalakshmi C., Ramakrishna G., Krishna Mohan Rao S. Smart Innovation, Systems and Technologies 2015 - 2016 21903018
180 Volumetric medical image compression using 3D listless embedded block partitioning Senapati R.K., Prasad P.M.K., Swain G., Shankar T.N. SpringerPlus 2015 - 2016 21931801
181 A recent study of emerging tools and technologies boosting big data analytics Pole G., Gera P. Advances in Intelligent Systems and Computing 2015 - 2016 21945357
182 Efficient DNA-based cryptographic mechanism to defend and detect blackhole attack in MANETs Suresh Babu E., Nagaraju C., Krishna Prasad M.H.M. Advances in Intelligent Systems and Computing 2015 - 2016 21945357
183 Light-weighted DNA-Based cryptographic mechanism against chosen cipher text attacks Suresh Babu E., Nagaraju C., Krishna Prasad M.H.M. Advances in Intelligent Systems and Computing 2015 - 2016 21945357
184 Mining maximal efficient closed itemsets without any redundancy Greeshma L., Pradeepini G. Advances in Intelligent Systems and Computing 2015 - 2016 21945357
185 Slot utilization and performance improvement in hadoop cluster Radha K., Rao B.T. Advances in Intelligent Systems and Computing 2015 - 2016 21945357
186 Utilizing NL text for generating UML diagrams Yalla P., Sharma N. Advances in Intelligent Systems and Computing 2015 - 2016 21945357
187 Detection and diagnosis of dilated cardiomyopathy and hypertrophic cardiomyopathy using image processing techniques Balaji G.N., Subashini T.S., Chidambaram N. Engineering Science and Technology, an International Journal 2015 - 2016 22150986
188 Advanced Role of Internet of Things in
the Smart Grid Technology
Venkata Naresh Mandhala
K. Bhagavan S. Suresh Babu and
N. Lakshmipathi Anantha
INTERNATIONAL JOURNAL OF COMPUTER TECHNOLOGY AND APPLICATIONS 2015 - 2016 22296093
189 Classification of penacid prawn spiecies using radial basis probabilistic neural networks and support vector machine V.Sucharitha,P.Venkateswara Rao,Debnath,Tai-hoon Kim International Journal of Bio-Science and Bio-Technology 2015 - 2016 22337849
190 A computational intelligence method for effective diagnosis of heart disease using genetic algorithm Siva Kumar P., Anand D., Uday Kumar V., Bhattacharyya D. International Journal of Bio-Science and Bio-Technology 2015 - 2016 22337849
191 Classification of penaeid prawn species using radial basis probabilistic neural networks and support vector machines Sucharita V., Venkateswara Rao P., Bhattacharyya D., Kim T.-H. International Journal of Bio-Science and Bio-Technology 2015 - 2016 22337849
192 Analysis of deduplication in secure cloud storage Pandu Ranga Rao K.V., Krishna Reddy V., Yakoob S.K. International Journal of Engineering and Technology 2015 - 2016 23198613
193 Analysis of keyword searchable methodologies in encrypted cloud data Yakoob S., Krishna Reddy V., Dastagiraiah C. International Journal of Engineering and Technology 2015 - 2016 23198613
194 Evaluation of Various VM Based Load Balancing Procedures in Cloud Environment C. Dastagiraiah, Dr. V Krishna Reddy, K.V.Pandurangarao International Journal of Engineering and Technology 2015 - 2016 23198613
195 Rough Set Reasoning based classification model generating decision rule on early stage of chronic kidney disease Vidyullatha,D.Rajeswara Rao International Journal of Advanced Research in Computer Sciences and Management studies 2015 - 2016 23217782
196 Modeling and Visualizing the Extraction of Opinions from Twitter Haritha Akkineni, P.V.S. Lakshmi, B. Vijay Babu, G.Lakshmi INTERNATIONAL JOURNAL OF INNOVATION AND ADVANCEMENT IN COMPUTER SCIENCE 2015 - 2016 23478616
197 A review on LSB substitution and PVD based image steganography techniques Sahu A.K., Swain G. Indonesian Journal of Electrical Engineering and Computer Science 2015 - 2016 25024752
198 A review on LSB sustitution and PVD based image stegnographic techniques Aditya kumar sahu,Gandharba Swain Indonesian journal of Electrical Engineering and Computer Science 2015 - 2016 25024752
199 A study on mapreduce: Challenges and trends Thanekar S.A., Subrahmanyam K., Bagwan A.B. Indonesian Journal of Electrical Engineering and Computer Science 2015 - 2016 25024752
200 Information Base Security Threats and challenges in Information Forensic:A Survey Dilip Kumar Baraj,G Sridevi, syed Umar, Msr Prasad Indonesian journal of Electrical Engineering and Computer Science 2015 - 2016 25024752
201 Information base security threats and challenges’ in information forensic: A survey Barai D.K., Sridevi G., Umar S., Prasad M.S.R. Indonesian Journal of Electrical Engineering and Computer Science 2015 - 2016 25024752
202 Design and analysis of automatic verification of refactored legacy code in software systems Srinivas M., Rama Krishna G. Ponte 2015 - 2016 0032423X
203 Secure energy efficient routing in MANETs by considering packet dropping reasons Mohammad A.A.K., Mahmood A.M., Vemuru S. Ponte 2015 - 2016 0032423X
204 Computerized diabetic patients fundus image screening for lesion regions detection and grading Bhargavi V R., Senapati R.K., Swain G., Prasad P.M.K. Biomedical Research (India) 2015 - 2016 0970938X
205 Application of data reprocessing on the given data and efficient Construction of optimal binary search trees using post dynamic Programming Dr. M. Nagabhushana Rao,S.Hrushi kesava Raju IJPT- International Journalof pharmacy and Technology 2015 - 2016 0975766X
206 Pattern matching using Data Preprocessing with the help of one time look defaulting method Dr. M. Nagabhushana Rao,S.Hrushi kesava Raju IJPT- International Journalof pharmacy and Technology  2015 - 2016 0975766X
207 Application of a data mining task called data preprocessing on the Input data and efficient external sorting using refinement of Existing algorithm Dr. M. Nagabhushana Rao, S.Hrushi kesava Raju IJPT- nternational Journalof pharmacy and Technology 2015 - 2016 0975766X
208 A comparative study on data deduplication techniques in cloud storage Tirapathi Reddy B., Ramya U., Chandra Sekhar M.V.P. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
209 A statistical approach for skin colour segmentation using hierarchical clustering Jagadesh B.N., Murty A.V.S.N. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
210 An approach of detecting white spot syndrome of peaneid SHRIMP using improved FCM with hybrid back propagation neural network Venkateswara Rao P., Ramamohan Reddy A., Sucharita V. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
211 An efficient round robin cpuscheduling algorithm using dynamic time slice Siva Nageswara Rao G., Srinivasu S.V.N. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
212 Big data search space reduction based on pattern type and user perspective using mapreduce Satyanarayana S., Jagadesh B.N. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
213 Digital image steganography combining lsb substitution with five way PVD in 2×3 pixel blocks Pradhan A., Raja Sekhar K., Swain G. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
214 Digital image steganography techniques in spatial domain: A study Sahu A.K., Sahu M. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
215 Energy-efficient MAC protocols in cognitive radio network’s Anusha M., Vemuru S. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
216 Energy-efficient mac protocols in cognitive radio network's Anusha M; Vemuru Srikanth INTERNATIONAL JOURNAL OF PHARMACY AND TECHNOLOGY 2015 - 2016 0975766X
217 In silico analysis of omega-3-fattyacid for superior regulation of glucose homeostasis Rajeswari D., Bhagavan K., Jagadesh B.N., Sucharita V. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
218 Knowledge based information mining on unemployed graduates data using statistical approaches Pellakuri V., Rajeswara Rao D. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
219 Performance analysis on data de duplication cryptographic algorithms Karthik K., Anusha M., Vijay Kumar A., Meenu D. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
220 Renovating health care and medical remote services through cognitive radio wireless network’s Anusha M., Vemuru S. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
221 Renovating health care and medical remote services through cognitive radio wireless network's Anusha M; Vemuru Srikanth INTERNATIONAL JOURNAL OF PHARMACY AND TECHNOLOGY 2015 - 2016 0975766X
222 Residual risk assessment for software projects by considering sub factors for the risk factors Lingareddy L., Sridhar P.S.V.S., Swathi Nellipudi V.R.D. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
223 Task scheduling for real time applications using mean-difference round robin (MDRR) algorithm with dynamic time slice (MDDRWDTS) Siva Nageswara Rao G., Srinivasu S. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
224 User authentication in internet of things: A survey Jagadeesh S., Shaik R., Swain G., Rahul K. International Journal of Pharmacy and Technology 2015 - 2016 0975766X
225 Inspired pseudo biotic DNA based cryptographic mechanism against adaptive cryptographic attacks Suresh Babu E., Naga Raju C., Krishna Prasad M.H.M. International Journal of Network Security 2015 - 2016 1816353X
226 Workload energy efficiency scheduling for heterogeneous clouds Nagavalli T.S. Journal of Engineering and Applied Sciences 2015 - 2016 1816949X
227 An efficient component based software architecture model using hybrid PSO - CS algorithm Bolisetty, P.K., Yalla, P. International Journal of Intelligent Engineering and Systems 2015 - 2016 2185310X
228 A Study on various image processing techniques to identify the white patches syndrome of penaeus mondon P.Venkateswara Rao,A.Rammohan Reddy,R.J Ram sree,V.Sucharitha International journal of advanced research in computers and software engineering 2015 - 2016 2277128X
229 Techniques for Mining High Utility Itemsets from Transactional Databases D.Srinivasa Rao, Dr.V. Sucharita International journal of advanced research in computers and software engineering 2015 - 2016 2277128X
S.No Title Author's Journal Name Publication Year ISSN NO
1 Numerical Formulation and Simulation of Social Networks Using Graph Theory on Social Cloud Platform J.Vijaya Chandra,
Dr.Narasimham Chalal,
Sai Kiran,Dr.K.Tirupathi Rao,
Dr.V.Krishna Reddy
Global Journal of Pure and Applied Mathematics 2014 - 2015 9731768
2 A comparitive study on reliability and cost estimation for architecture-based software Sabbineni S., Rajasekhara Rao K. International Journal of Applied Engineering Research 2014 - 2015 9734562
3 A Comparitive Study On Reliability And Cost Estimation For Architercture - Bases Software S.Srinivasarao,Dr.K.Rajasekhara Rao International Journal of Applied Engineering Research 2014 - 2015 9734562
4 A Design Approach to Isolate Suspicious Code Across the Builda with Test Traces to Analyze Regression Failures J.Kiran,V.Ramakrishna International Journal of Applied Engineering Research 2014 - 2015 9734562
5 A novel approach for information security and risk management in distributed health care systems Chaitanya Krishna B., Subrahmanyam K., Sai Ramya Y., Kumar Swamy G., Rajesh M., Siddardha M. International Journal of Applied Engineering Research 2014 - 2015 9734562
6 A review on security aspects of data storage in cloud computing Ruth Ramya K., Sasidhar T., Naga Malleswari D., Rahul M.T.V.S. International Journal of Applied Engineering Research 2014 - 2015 9734562
7 An experimental study of cross domain sentiment analysis Santhi M.V.B.T., Raja Sekhara Rao D. International Journal of Applied Engineering Research 2014 - 2015 9734562
8 Analysis of avalanche effect in modified des algorithm Krovi R.S., Jetty P. International Journal of Applied Engineering Research 2014 - 2015 9734562
9 Analysis of Avalanche Effect In Modified Des Algorithm  Dr.K.Raja Sekhar,Pujyasri Jetty International Journal of Applied Engineering Research 2014 - 2015 9734562
10 Applying regression technique on environmental data by WEKA Pellakuri V., Rajeswara Rao D., Narayana L. International Journal of Applied Engineering Research 2014 - 2015 9734562
11 Applying Regression techniques on Environmental data by weks p.vidyullatha,Dr.D.Rajeswara Rao,g.deepthi,Lakshmi Narayana International Journal of Applied Engineering Research 2014 - 2015 9734562
12 Co-location data mining on uncertain datasets using a probabilistic approach Sheshikala M., Rajeswara Rao D., Ali Kadampur M. International Journal of Applied Engineering Research 2014 - 2015 9734562
13 Co-location Data Mining onUncertain Datasets Using a Probabilistic Approach M.Sheshikala, D.Rajeswara Rao, Md.Ali Kadampur International Journal of Applied Engineering Research 2014 - 2015 9734562
14 Critical review on web services and legacy systems - And its migration Sreedevi E., Prasanth Y. International Journal of Applied Engineering Research 2014 - 2015 9734562
15 Distributed differential privacy preserving mechanism on real time datasets Siva Prasad Y.A., Rama Krishna G. International Journal of Applied Engineering Research 2014 - 2015 9734562
16 Identification and translation of nouns in a bilingual code mixed language into pure form Harsh S., Prasad T.V., Rama Krishna G. International Journal of Applied Engineering Research 2014 - 2015 9734562
17 Implementation of Parallelism on Block Cipher Modes Using Des In Lab view Dr.K.Raja Sekhar,V.Sankeerthan reddy,D.Priyanka, S.Gopi Krishna,B.Vijaya sree International Journal of Applied Engineering Research 2014 - 2015 9734562
18 Nearest neighbor search using spatial inverted default method Haritha D., Poojitha M., Kumar S.P., Rahul K., Krishna K.B. International Journal of Applied Engineering Research 2014 - 2015 9734562
19 Parallel Task Mapping Offloading Algorithm For Mobile Cloud Computing K.Ravindranath,Dr.K.Rajesekhara Rao International Journal of Applied Engineering Research 2014 - 2015 9734562
20 Pivacy Preserving and match making scheme in mobile social networks T.Hema Latha,Dr.D.Rajeswara Rao,T.Sai teja,T.Rakesh Kumar International Journal of Applied Engineering Research 2014 - 2015 9734562
21 Privacy preserving and match making scheme in mobile social networks Hemalatha T., Rajeswara Rao D., Sai Teja T., Rakesh Kumar T. International Journal of Applied Engineering Research 2014 - 2015 9734562
22 SPC and Order Statistics: Log-power Model Dr. G. Krishna Mohan1 , B. Indira2 and Dr. R. Satya Prasad3 International Journal of Applied Engineering Research 2014 - 2015 9734562
23 Spc and order statistics: Plp model Srisaila A., Krishna Mohan G., Satya Prasad R. International Journal of Applied Engineering Research 2014 - 2015 9734562
24 Survey on Wireless sensor Network K.V.V Satyanarayana,T.V.Krishna Chowdary International Journal of Applied Environmental Sciences 2014 - 2015 9736077
25 Light-Weighted DNA based Hybrid Cryptographic Mechanism E Suresh Babua, C Nagaraju b, MHM Krishna Prasad c International journal of information processing 2014 - 2015 9738215
26 A Review on Security and Privacy Issues in Bigdata G.Vijay Kumar,M.Sreedevi International Journal of emerging technologies and applications in Engg., Technology and Sciences(IJ-ETA-ETS) 2014 - 2015 9743588
27 An effecient architecture for implementing syntax evolution of embeded system J.Sasi Bhanu,A.Vinay Babu,P.Thrimurthy Indian Journal of Science and Technology 2014 - 2015 9746846
28 An effective framework for integrating web services with embedded systems Sai Chaitanya B.V.S. Indian Journal of Science and Technology 2014 - 2015 9746846
29 An efficient architecture for implementing syntax evolution of embedded system Bhanu J.S., Babu A.V., Trimurthy P. Indian Journal of Science and Technology 2014 - 2015 9746846
30 Classifications of dynamic clustering based on soft computing Subbalakshmi C., Rama Krishna G., Krishna Mohan Rao S. Indian Journal of Science and Technology 2014 - 2015 9746846
31 Detection of Burr Type XII reliable software using Sequential Process Ratio Test Murali Mohan K.V., Satya Prasad R., Sridevi G. Indian Journal of Science and Technology 2014 - 2015 9746846
32 Implementing dynamically evolvable online testing of embedded systems Sasi Bhanu J., Vinaya Babu A., Trimurthy P. Indian Journal of Science and Technology 2014 - 2015 9746846
33 Implementing Dynamically evolvable online testing of embeded systems J.Sasi Bhanu,A.Vinay Babu,P.Thrimurthy Indian Journal of Science and Technology 2014 - 2015 9746846
34 Intelligence based defense system to protect from advanced persistent threat by means of social engineering on social cloud platform Vijaya Chandra J., Challa N., Pasupuleti S.K. Indian Journal of Science and Technology 2014 - 2015 9746846
35 Texture feature extraction for the classification of penaeid prawn species using gabor filter V.Sucharitha,S.Jyothi and M.Mamatha Indian Journal of Science and Technology 2014 - 2015 9746846
36 Energy Optimized Link Selection Algorithm for Mobile Cloud Computing K.Ravindranath,Dr.K.Rajesekhara Rao The International Journal of Advanced Networking and Applications 2014 - 2015 9750290
37 Virtual screening and molecular docking studies of novel inhibitors for hiv reverse transcriptase Prasada Rao P.V.R.D., Ramamohana Rao K. International Journal of Pharma and Bio Sciences 2014 - 2015 9756299
38 Excoecaria agallocha Linn (Euphrobiaceae): An overview Rajeswari K., Rao T.B. Journal of Chemical and Pharmaceutical Research 2014 - 2015 9757384
39 A Generalized Association Rule Mining Framework for Pattern Discovery Ravindra ch,Dr.D.Rajeswara Rao,G.Annapurna International Journal of Computer Science and Information Technologies 2014 - 2015 9759646
40 Detection of Burr Type XII Reliable software using SPRT on Interval Domain Data Dr.R.Satya Prasad,B.Rama Devi,Dr.G.Sridevi International Journal of Computer Science and Information Technologies 2014 - 2015 9759646
41 Performance analysis and optimization of supervised learning technique for medical Diagonis using open source tools P.Vidyullatha,Dr.D.Rajeswara Rao,g.deepthi,M.R.Narasinga Rao International Journal of Computer Science and Information Technologies 2014 - 2015 9759646
42 Tracking of chnges in cancer data using softclustering Subbalakshmi C., Rama Krishna G., Krishna Mohan Rao S. IIOAB Journal 2014 - 2015 9763104
43 IMPROVING PERFORMANCE OF A DISTRIBUTED FILE SYSTEM USING A SPECULATIVE SYMANTIC BASED ALGORITHM T.L.Siva rama krishna,T.Raghunathan,B.Sudheer Kumar Tsinghua Science And Technology 2014 - 2015 10070214
44 A dependency analysis for information security and risk management Chaitanya Krishna B., Subrahmanyam K., Kim T.-H. International Journal of Security and its Applications 2014 - 2015 17389976
45 Homomorphic encryption for cluster in cloud Vamshinath N., Ruth Ramya K., Krishna S., Gopi Bhaskar P., Mwaseba G.L., Kim T.-H. International Journal of Security and its Applications 2014 - 2015 17389976
46 Securing embedded systems from power analysis attack Rani D.R., Venkateswarlu S., Mandhala V.N., Kim T.-H. International Journal of Security and its Applications 2014 - 2015 17389976
47 An Appilicative Approachfor Collecting and Fortyfying History of Data inCloud Environment Divya.V,M.Krishna Chaitanya,T.Srikanth,V.Bala Venu,U.Joseph International Journal of Software Engineering and its Applications 2014 - 2015 17389984
48 An applicative approach for collecting and fortifying history of data in cloud environment Vadlamudi D., Krishna Chaitanya M., Srikanth T., Bala Venu V., Joseph U., Kim T.-H. International Journal of Software Engineering and its Applications 2014 - 2015 17389984
49 Finding probabilistic skyline points by using dimensionality reduction and boundary detection approach in distributed environment Vijaya Saradhi T., Subrahmanyam K., Kim T.-H. International Journal of Software Engineering and its Applications 2014 - 2015 17389984
50 Integrating natural language processing and software engineering Yalla P., Sharma N. International Journal of Software Engineering and its Applications 2014 - 2015 17389984
51 Test report generation using JSON Navya Rupa B., Krishna Mohan G., Satish Babu J., Kim T.-H. International Journal of Software Engineering and its Applications 2014 - 2015 17389984
52 a comprehensive architecture for dynamic evolution of online testing of an embeded system J.Sasi Bhanu,A.Vinay Babu,P.Thrimurthy Journal of Theoretical and Applied Information Technology 2014 - 2015 18173195
53 A Decision Support System for predicting Thyroid disease -A Comparision of Multilayer perceptron neural network and radial basis function neural network SK.RAZIA,M.R.NARASINGA RAO,G,R,SRIDHAR Journal of Theoretical and Applied Information Technology 2014 - 2015 18173195
54 An effecient architecture for semantic evolution of embeded system J.Sasi Bhanu,A.Vinay Babu,P.Thrimurthy Journal of Theoretical and Applied Information Technology 2014 - 2015 18173195
55 Big data for mobile applications for retail market P.LAKSHMI PRASANNA,P.VIDYUL LATHA,B.SEKHAR BABU,M.NARMADA,CHOWDARY SAMHITA,ROY BHURI AND VARSHA KAMIREDDY ARPN Journal of Engineering and Applied Sciences 2014 - 2015 18196608
56 Big data for mobile applications in retail market Lakshmi Prasanna P., Vidyul Latha P., Sekhar Babu B., Narmada M., Samhita C., Bhuri R., Kamireddy V. ARPN Journal of Engineering and Applied Sciences 2014 - 2015 18196608
57 Code generation for semantic evolution of embedded systems Sasi Bhanu S.J., Vinaya Babu A., Trimurthy P. ARPN Journal of Engineering and Applied Sciences 2014 - 2015 18196608
58 Web services oriented architecture for dynamic evolution of communication with embedded systems Sasi Bhanu S.J., Vinaya Babu A., Trimurthy P. ARPN Journal of Engineering and Applied Sciences 2014 - 2015 18196608
59 Web services oriented architecture for dynamic evolution of communication with embeded systems J.Sasi Bhanu,A.Vinay Babu,P.Thrimurthy ARPN Journal of Engineering and Applied Sciences 2014 - 2015 18196608
60 A decision support system for predicting heart disease using multilayer perceptron and factor analysis Gurram D., Narasinga Rao M.R. International Review on Computers and Software 2014 - 2015 18286003
61 ISPM: Improved snow prediction model to nowcast snow/no-snow Kishor Kumar Reddy C., Vijaya Babu B. International Review on Computers and Software 2014 - 2015 18286003
62 SLGAS: Supervised learning using gain ratio as attribute selection measure to nowcast snow/no-snow Kishor Kumar Reddy C., Rupa C.H., Vijaya Babu B. International Review on Computers and Software 2014 - 2015 18286003
63 In silico functional annotation of a hypothetical protein from staphylococcus aureus P.Bharath Siva Varma,B.Yesu,adimulyam,K.Subramanyam Journal of infection and public health 2014 - 2015 18760341
64 A Proposal for packet drop attacks in MANET Mahesh swarna,Syed Umar,E.Suresh Babu Lecture Notes in Electrical Engineering 2014 - 2015 18761100
65 A method to find optimum number of clusters based on fuzzy silhouette on dynamic data set Subbalakshmi C., Rama Krishna G., Krishna Mohan Rao S., Venketeswa Rao P. Procedia Computer Science 2014 - 2015 18770509
66 Development of RLS algorithm for Localization in Wireless Sensor Networks Rao K.R., Rao P.V.R.D.P., Ramesh J.V.N., Reddy P.S., Velivela S.S.K., Rajesh T., Baji S. Procedia Computer Science 2014 - 2015 18770509
67 Mixed Convective Heat and Mass Transfer Flow of Nanofluids in Concentric Annulus Sreedevi G., Raghavendra Rao R., Chamkha A.J., Prasada Rao D.R.V. Procedia Engineering 2014 - 2015 18777058
68 A comprehensive architecture for dynamic evolution of online testing of an embedded system Bhanu J.S., Babu A.V., Trimurthy P. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
69 A conceptual framework for approaching predictive modeling using multivariate regression analysis vs artificial neural network Pellakuri V., Rajeswara Rao D., Lakshmi Prasanna P., Santhi M.V.B.T. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
70 A decision support system for prediction of thyroid disease - A comparison of multilayer perceptron neural network and radial basis function neural network Razia S., Narasingarao M.R., Sridhar G.R. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
71 A new proposed Dynamic dual processor based CPU scheduling algorithm Siva Nageswara Rao G., Srinivasu S.V.N., Srinivasu N., Naga Raju O. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
72 A NewProposed Dynamic Dual Processor Based CPU Scheduling Algorithm G.Siva Nageswara Rao, Dr.S.V.N. Srinivasu, Dr.N. Srinivasu,Dr. O Naga Raju Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
73 A novel approach for simultaneous gender and hindi vowel recognition using a multiple-input multiple-output co-active neuro-fuzzy inference system Lakra S., Prasad T.V., Ramakrishna G. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
74 A novel product filtering and product recommendation system to optimize the search space and sparsity in real time ecommerce environment Subha Mastan Rao T., Rama Krishna G. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
75 An advanced product recommendation framework by using multiple product feature analytics Subha Mastan Rao T., Rama Krishna G. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
76 An augmented dynamic round robin cpu scheduling algorithm Srinivasu N., Balakrishna A.S.V., Durga Lakshmi R. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
77 An Augumented Dynamic Round Robin Cpu Scheduling Algorithm Dr.N.Srinivasu,A.S.V.Balakrishna,R.Durga Lakshmi Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
78 An Conceptual Framework for approaching predictive modeling using multivariate regression analysis vs artificial neural network Vidyulatha.P,Dr.D.Rajeswara Rao,P.Lakshmi Prasanna,M.V.B.T Santhi Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
79 An efficient architecture for semantic evolution of embedded system Sasi Bhanu J., Vinaya Babu A., Trimurthy P. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
80 An Efficient Architecture for semantic evolution of embeded systems J.Sasi Bhanu,A.Vinay Babu,P.Thrimurthy Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
81 Comparision of software reliability analysis for burr distribution Dr.G.Sridevi,Dr.C.M Sheela Rani Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
82 Comparison of software reliability analysis for burr distribution Sridevi G., Sheela Rani C.M. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
83 Context rank based hierarchical clustering algorithm on medical databases (Crbhca) Bano S., Rajasekhara Rao K. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
84 Efficient task scheduling strategy towards QoS aware optimal resource utilization in cloud computing Mohan V.M., Satyanarayana K.V.V. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
85 Empirical performance evaluation of PUCRN and CBRP-CRN protocol in cognitive radio ADHOC mesh networks Pavan Kumar T., Suresh Babu E., Rajasekhara Rao K., Srikanth V. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
86 EMPIRICAL PERFORMANCE EVALUATION OF PUCRN
AND CBRP-CRN PROTOCOL IN COGNITIVE RADIO ADHOC
MESH NETWORKS
T. PAVAN KUMAR, E.SURESH BABU, K.RAJASEKHARA RAO, V.SRIKANTH Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
87 Graph based gene/protein prediction and clustering over uncertain medical databases Bano S., Rajasekhara Rao K. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
88 HCMX: An efficient hybrid clustering approach for multi-version XML documents Sonawane V., Rajeswara Rao D. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
89 Selective noise filtering of speech signals using an adaptive neuro-fuzzy inference system as a frequency pre-classifier Lakra S., Prasad T.V., Ramakrishna G. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
90 Using fuzzy sets to model paralinguistic content in speech as a generic solution for current problems in speech recognition and speech synthesis Lakra S., Prasad T.V., Ramakrishna G. Journal of Theoretical and Applied Information Technology 2014 - 2015 19928645
91 Enhanced precedence scheduling algorithm with dynamic time quantum G.Siva nageswara rao,S.V.N Srinivasu,N.Srinivasu,G.Ramakoteswara rao Research Journal of Applied Sciences Engineering and Technology 2014 - 2015 20407459
92 Enhanced precedence scheduling algorithm with dynamic time quantum (EPSADTQ) Siva Nageswara Rao G., Srinivasu S.V.N., Srinivasu N., Ramakoteswara Rao G. Research Journal of Applied Sciences Engineering and Technology 2014 - 2015 20407459
93 Colocation mining in uncertain data sets: A probabilistic approach Sheshikala M., Rao D.R., Kadampur M.A. Lecture Notes in Engineering and Computer Science 2014 - 2015 20780958
94 A comparative study: Change detection and querying dynamic XML documents Sonawane V., Rao D.R. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
95 A predictive model for mining opinions of an educational database using Neural Networks Narasinga Rao M.R., Gurram D., Vadde S.M., Tallam S., Sai Chand N., Kiran L. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
96 A Predictive Model for mining opnions of an educational database using Neural Networks M.R.NARASINGARAO,DEEPTHI GURRAM,SAI MAHATHI VADDE,SATHISH TALLAM,N.SAI CHAND,L.KIRAN International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
97 A user-based recommendation with a scalable machine learning tool Veena C., Vijaya Babu B. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
98 An empirical critique of on-demand routing protocols against rushing attack in MANET Kumar S.A., Babu E.S., Nagaraju C., Gopi A.P. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
99 An Optimistic approach for clustering multi-version XML documents using compressed delta Sonawane V., Rajeswara Rao D. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
100 Computing subspace skylines without dominance tests using set interaction approaches Saradhi T.V., Subrahmanyam K., Phani Krishna C.V. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
101 Designing an adversarial model against reactive and proactive routing protocols in MANETS: A comparative performance study Gopi A.P., Babu E.S., Raju C.N., Kumar S.A. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
102 Dynamic time slice calculation for round robin process scheduling using NOC Siva Nageswara Rao G., Srinivasu N., Rama Koteswara Rao G. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
103 Implementing syntax evolution of embedded systems Jammalamadaka S.B., Vinaya Babu A., Trimurthy P. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
104 Implementing syntax evolution of embeded systems J.Sasi Bhanu,A.Vinay Babu,P.Thrimurthy International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
105 Novel approach for control data theft attack in cloud computing Narasimha Sastry K., Thirumala Rao B., Gunasekhar T. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
106 Online crowds opinion-mining it to analyze current trend: A review Akkineni H., Lakshmi P.V.S., Babu B.V. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
107 Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm Bano S., Rao K.R. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
108 Security against timing analysis attack Rani D.R., Venkateswarlu S. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
109 Transmission protocols in cognitive radio mesh networks Anusha M., Vemuru S., Gunasekhar T. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
110 Tree Based Energy Balencing Routing Protocol by self organizing in wireless sensor network Syed Umar,P.V.R.D Prasada Rao,G.Sridevi International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
111 An efficient algorithm and a generic approach to reduce page fault rate and access time costs Shaik R., Momin Pasha M. Advances in Intelligent Systems and Computing 2014 - 2015 21945357
112 Privacy during data mining Kumari A., Rajasekhara Rao K., Suman M. Advances in Intelligent Systems and Computing 2014 - 2015 21945357
113 Reactive energy aware routing selection based on knapsack algorithm (RER-SK) Mohammad A.A.K., Mirza A., Razzak M.A. Advances in Intelligent Systems and Computing 2014 - 2015 21945357
114 Integrated Distributed
Architecture to Integrate
Wireless Sensor Networks(WSN)
with Grid for Healthcare
Ch V Phani Krishna,
KVD Kiran,
Tai-hoon Kim
International Journal of Bio-Science and Bio-Technology 2014 - 2015 22337849
115 A novel Dr.KSM approach for information security and risk management in health care systems Krishna B.C., Subrahmanyam K., Anjaneyulu S.S.N., Kim T.-H. International Journal of Bio-Science and Bio-Technology 2014 - 2015 22337849
116 Integrated distributed architecture to integrate wireless sensor networks (WSN) with grid for healthcare Phani Krishna C.V., Kiran K.V.D., Kim T.-H. International Journal of Bio-Science and Bio-Technology 2014 - 2015 22337849
117 Considering Residual Faults of Burr Type XII Software Reliability B.Ramadevi,Dr.R.Satya Prasad,Dr.G.Sridevi INTERNATIONAL JOURNAL OF ELECTRONICS AND COMPUTER SCIENCE ENGINEERING 2014 - 2015 22771956
118 Software Reliability using SPRT:Power law process model Dr.R.Stya Prasad,Srisaila,Dr.G.Krishna Mohan INTERNATIONAL JOURNAL OF ELECTRONICS AND COMPUTER SCIENCE ENGINEERING 2014 - 2015 22771956
119 Concept semantic mechanism for images using hybrid norms:An Overview T.Veeraiah,S.K.M Rao International Journal of Engineering and Science Research 2014 - 2015 22772685
120 Sensor Scheduling Of Nodes Using Clustered Head Mechanisms K.Tejaswi, Dr.Syed Umar International Journal of Engineering Sciences & Management 2014 - 2015 22775528
121 A Survey on cross layer solutions for routing in wireless sensor network Manisha,Dr.V.Srikanth Interanational journal of engineering research and technology 2014 - 2015 22780181
122 Cognitive Radio Networks:A Survey M.Anusha,Dr.V.Srikanth International Journal of Emerging Trends & Technology in Computer Science 2014 - 2015 22786856
123 Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks E. Suresh Babu,P S V Srinivasa Rao,M Srinivasa Rao,C Nagaraju International Journal of Advanced Engineering and Global Technology 2014 - 2015 23094893
124 Advanced Task Scheduling in Heterogeneous multiprocessor systems using evolutionary algorithms N.Srinivasu,G.Krishna Chaitanya International Journal of Innovative Research in Computer and Communication Engineering 2014 - 2015 23209801
125 Knowledge Discover Process: The Next Step for Knowledge Search Ch.Ravindra, D.Rajeswara Rao, T.JanardhanaRao, P.KiranKumar, Kareemunnisa International Journal of Innovative Research in Computer and Communication Engineering 2014 - 2015 23209801
126 Architectural Design of D2H Medicare Manne Lakshmi Mounika,Dr.Syed Umar,p.silpa International journal of recent and innovation trends in computing and communication 2014 - 2015 23218169
127 Design and Development of Data Recovery System for Faded Wireless Communication Channel S.Venkateswarlu,Ch.Radhika Rani,SNM Sistra INTERNATIONAL JOURNAL OF ADVANCED TECHNOLOGY IN ENGINEERING AND SCIENCE 2014 - 2015 23487550
128 A MULTI LEVEL AUTHENTICATION BASED ON THE RFID TECHNIQUE FOR A MULITPLE MOBILE IN CLOUD STORAGE Naresh Vurukonda ,Dr.B.Thirumala Rao International Journal of Research and Applications 2014 - 2015 23490020
129 Effects of Cyber Crime and their Access Controls G.Nageswara Rao, T.V.N.Giridhar And K.V.D.Kiran International Journal for Research in Emerging Science and Technology 2014 - 2015 23497610
130 Resource allocation methods in cloud computing: survey T.Naresh,A.Jaya lakshmi,Dr.v.krishna Reddy International Journal on Emerging Trends in Technology 2014 - 2015 23500808
131 A Review on cloud data integrity auditing methods and protocols N.Venkateswara rao,Dr.N.Srinivasu International Journal of Engineering, Technology, Science and Research 2014 - 2015 23943386
132 A Survey on Cloud computing security issues Y.Sushmitha,V.Krishna Reddy,D.Pavan Teja Reddy International Journal of computer science and innovation 2014 - 2015 24586528
133 Mitigation of insider attacks through multi-cloud T.Guna Sekhar,Dr.K.Thirupathi Rao,Dr.V.Krishna Reddy,Dr.P.Sai Kiran IJECE 2014 - 2015  20888708
134 Service level agreements in cloud computing and big data Radha k,Dr.B.Thirumala rao,sk.Masthan Babu,K.Thirupathirao,Dr.V.Krishna Reddy,Dr.P.Sai Kiran IJECE 2014 - 2015  20888708
135 Designing and simulation of soft computing method obtained on fuzzy logic systems P.Vidyulatha,D.Rajeswara Rao International Journal of Current Research 2014 - 2015 0975833x
136 Routing on Cognitive Radio Wireless Mesh Networks Survey P. N. V. Satyakonda, T. Pavankumar, E. Suresh Babu International journal of advanced research in computers and software engineering 2014 - 2015 2277128X
137 A comparitive study on CVNN default and NIVA default in internal clustering validation Sekhar Babu B., Lakshmi Prasanna P., Mahathi V., Prathyusha A. International Journal of Applied Engineering Research 2014 - 2015 9734562
138 A pragmatic methodology to predict the presence of snow/no-snow using supervised learning methodologies Kishor Kumar Reddy C., Rupa C.H., Vijaya Babu B. International Journal of Applied Engineering Research 2014 - 2015 9734562
139 A qualitative analysis of rayleigh faded frequency selective channel simulator Venkateswarlu S., Sastry J.K.R. International Journal of Applied Engineering Research 2014 - 2015 9734562
140 A review of limitations and challenges in wireless sensor networks for environmental research Umar S., Balaji Bhanu B. International Journal of Applied Engineering Research 2014 - 2015 9734562
141 A review on smart home technology to succor elderly people Hemalatha T., Venkat Bhargava P., Akhil Reddy L., Ravi Teja K. International Journal of Applied Engineering Research 2014 - 2015 9734562
142 A secure image transmission using LWE Prasad M.S.R.S., Meerja K.A., Sastry C.V. International Journal of Applied Engineering Research 2014 - 2015 9734562
143 A survey of QOS aware Mac protocol for wireless sensor network Kondaiah K., Umar S. International Journal of Applied Engineering Research 2014 - 2015 9734562
144 Allocation of resources and scheduling in cloud computing with cloud migration Radha K., Thirumala Rao B., Babu S.M., Thirupathi Rao K., Krishna Reddy V., Saikiran P. International Journal of Applied Engineering Research 2014 - 2015 9734562
145 An enhanced dynamic Round Robin CPU scheduling algorithm Siva Nageswara Rao G., Srinivasu N., Girish Kumar K., Abhishek B. International Journal of Applied Engineering Research 2014 - 2015 9734562
146 Analysis and classification scheme of risk assessment models based on different criteria for reducing the risk Kiran K.V.D., Hemanth Krishna P., Gopinath N., Reddy L.S.S. International Journal of Applied Engineering Research 2014 - 2015 9734562
147 Analysis of gateway relocation strategies in 802.16 heterogeneous networks Vadlamudi D., Raja Mohan Reddy J. International Journal of Applied Engineering Research 2014 - 2015 9734562
148 Analyzing the constant Ciphertext Policy Attribute Based Encryption Veeramallu B., Rajashakara Rao K. International Journal of Applied Engineering Research 2014 - 2015 9734562
149 Analyzing the services and privacy, conflict resolutions of shared data in OSN's Manasa D.V., Rao M.R.N., Lalitha A.S. International Journal of Applied Engineering Research 2014 - 2015 9734562
150 Cognitive radio wireless mesh networks: Routing and its challenges Pavan Kumar T., Battula R.B., Rajasekhar Rao K., Gaur M.S., Goplani D. International Journal of Applied Engineering Research 2014 - 2015 9734562
151 Common user activities behind social networks using link based clustering Rajeswara Rao D., Raghuveer A., Murthy J.V.R., Apparao Naidu G. International Journal of Applied Engineering Research 2014 - 2015 9734562
152 Comparative evaluation method and factors of risk assessment models for information security Kiran K.V.D., Bala Venu V., Manikanta Varma P.G., Reddy L.S.S. International Journal of Applied Engineering Research 2014 - 2015 9734562
153 Comparative study of ontological wrapper technique and minimum description length (MDL) principle to extract the web data Vijaya Babu B., Koniki V.K. International Journal of Applied Engineering Research 2014 - 2015 9734562
154 Comparison of HAAR, DB, SYM and COIF wavelet transforms in the detection of earthquakes using seismic signals Kishor Kumar Reddy C., Anisha P.R., Narasimha Prasad L.V., Vijaya Babu B. International Journal of Applied Engineering Research 2014 - 2015 9734562
155 Comparison of round robin CPU scheduling algorithm with various dynamic time quantum Siva Nageswara Rao G., Srinivasu N., Sagar K.V.D., Sai Madhuri P. International Journal of Applied Engineering Research 2014 - 2015 9734562
156 Customized WEB surfing of large application specific WEB sites Sastry J.K.R., Devi Kavya Priya M., Pavani Snigdha S., Sasi Bhanu J. International Journal of Applied Engineering Research 2014 - 2015 9734562
157 Data and information storage security from Advanced Persistent Attack in cloud computing Vijaya Chandra J., Challa N., Hussain M.A. International Journal of Applied Engineering Research 2014 - 2015 9734562
158 Design and analysis of Heterogenious Networks Kilaru S., Ashwini Prasad Y., Sai Kiran K., Sarath Chandra N.V. International Journal of Applied Engineering Research 2014 - 2015 9734562
159 Design and implementation of integrated testing tool based on metrics and quality assurance Reddy M.R., Yalla P., Vijaya Chandra J. International Journal of Applied Engineering Research 2014 - 2015 9734562
160 Dynamically managing the software components in deployment based architecture Srilakshmi M., VenkataKrishna S., Siva Nageswara Rao G. International Journal of Applied Engineering Research 2014 - 2015 9734562
161 EBCM: Single encryption, multiple decryptions Gunasekhar T., Thirupathi Rao K., Krishna Reddy V., Saikiran P., Thirumala Rao B. International Journal of Applied Engineering Research 2014 - 2015 9734562
162 Efficient framework for testing cross-cloud application Jameela S., Thirupathi Rao K., Krishna Reddy V., Saikiran P., Thirumala Rao B. International Journal of Applied Engineering Research 2014 - 2015 9734562
163 Generation of less number of pair wise test cases using artificial neural networks (ANNs) Mudarakola L.P., Vudatha C.P. International Journal of Applied Engineering Research 2014 - 2015 9734562
164 LESIPT: Lightweight enhanced secure incentive protocol with trusted value for multi-hop wireless networks Nashnosh M.T., Vijaya Babu B. International Journal of Applied Engineering Research 2014 - 2015 9734562
165 Mining human opinion patterns using weighted substructure DAG algorithm Aparna K., Venkataraju K. International Journal of Applied Engineering Research 2014 - 2015 9734562
166 Multi-agent system for service distribution in wireless sensor networks Phani Krishna V.C., Rama Krishna Rao K., Satyanarayana S., Rajasekhara Rao K. International Journal of Applied Engineering Research 2014 - 2015 9734562
167 Product reliability in preferable top-k products using Cronbach's alpha procedures Venkatarao J., Ramyasri C.H., Krishnareddy V., Srikanth M. International Journal of Applied Engineering Research 2014 - 2015 9734562
168 Semantic web in biomedical sciences Prasanna P.L., Rao R., Namratha Y., Yamini M., Sree N. International Journal of Applied Engineering Research 2014 - 2015 9734562
169 Sub Nyquist sampling of multiband signals Sreedhar Babu S., Rajesh V., Sravani C., Roopa G., Srinivas V., Vamsi Krishna B. International Journal of Applied Engineering Research 2014 - 2015 9734562
170 To dipping the overheads of CCP-ABE, using pattern based policy with homomorphism encryption mechanism Veeramallu B., Rajasekhara Rao K. International Journal of Applied Engineering Research 2014 - 2015 9734562
171 Energy conservation in cloud environments using alternative Email-ID approach Prasad B Krishna; Tirupathirao K; Mahesh G CN INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND ENGINEERING 2014 - 2015 9753397
172 Asynchronous data access and transaction decomposition in distributed databases Srinivasu N; Samdani S M Gouse; Kiran L Sai INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER SCIENCE 2014 - 2015 9765697
173 Estimation and testing in type-II generalized half logistic distribution Kantam R.R.L., Ramakrishna V., Ravikumar M.S. Journal of Modern Applied Statistical Methods 2014 - 2015 15389472
174 SPM: A fast and scalable model for predicting snow/no-snow Kishor Kumar Reddy C., Rupa C.H., Vijaya Babu B. World Applied Sciences Journal 2014 - 2015 18184952
175 Issues and challenges in advertising on the web Gurram D., Babu B.V., Pellakuri V. International Journal of Electrical and Computer Engineering 2014 - 2015 20888708
176 Inclination and Pressure Based Authentication for Touch Devices Rao K.R., Anne V.P.K., Sai Chand U., Alakananda V., Navya Rachana K. Advances in Intelligent Systems and Computing 2014 - 2015 21945357
177 Multi Objective Particle Swarm Optimization for Software Cost Estimation Siva Nageswara Rao G., Krishna C.V.P., Rao K.R. Advances in Intelligent Systems and Computing 2014 - 2015 21945357
178 Numerical Optimization of Novel Functions Using vTLBO Algorithm Mohankrishna S., Naik A., Satapathy S.C., Rao K.R.S., Biswal B.N. Advances in Intelligent Systems and Computing 2014 - 2015 21945357
179 Privacy Preserving Data Mining Kumari D.A., Rao K.R., Suman M. Advances in Intelligent Systems and Computing 2014 - 2015 21945357
180 SLEAS: Supervised learning using entropy as attribute selection measure Kishor Kumar Reddy C., Vijaya Babu B., Rupa C.H. International Journal of Engineering and Technology 2014 - 2015 23198613
S.No Title Author's Journal Name Publication Year ISSN NO
1 A Comparitive Study On CVNN Index And NIVA Index In Internal Clustering Validation B.Sekhar Babu,P.Lakshmi Prasanna,V.Mahathi,A.Prathusha International Journal of Applied Engineering Research 2013 - 2014 9734562
2 A Relational Analytic Platform With Hadoop Using the Ondemand Integration(ODI)Capability Dr.K.V Daya Sagar,G.Siva Nageswara Rao,T.Srikanth,K.Ragavendra International Journal of Applied Engineering Research 2013 - 2014 9734562
3 A Review of Limitations and Challenges in Wireless Sensor Network For Environmental Research Dr.Syed Umar,B.Balaji Bhanu International Journal of Applied Engineering Research 2013 - 2014 9734562
4 A Survey of QOS aware Mac Protocol for Wireless Sensor Networks Dr.K.Kondiah, Dr.Syed Umar International Journal of Applied Engineering Research 2013 - 2014 9734562
5 A Survey on Assured File Detection in cloud environment pp B.Thirupathi Reddy,M.V.P Chandra Sekhar,Dr.L.S.S Reddy,Dr.V.Krishna Reddy,P.Sai Kiran International Journal of Applied Engineering Research 2013 - 2014 9734562
6 Ajax&Web Service Integrated Geospatial for water Asset Applications Santhosh Dheeraj Y,P.Shyam Sundar ,Ram Prasad Poudal,J.Sasi Bhanu International Journal of Applied Engineering Research 2013 - 2014 9734562
7 Analysis and classification scheme on Risk Assessment Models based on Different Criteria for reducing the risk      K.V.D Kiran,P.Hemanth Krishnan,N.Gopinath,Dr.L.S.S Reddy International Journal of Applied Engineering Research 2013 - 2014 9734562
8 Analyzing the Services and privacy,conflict resolution of shared data in OSN’s D.Manasa,Dr.M.R Narasinga Rao,A.S Lalitha International Journal of Applied Engineering Research 2013 - 2014 9734562
9 Application Maintanence and Support Srinivasa Rao k,Dr.Y.Prashanth,Dr.V.B Narasimham International Journal of Applied Engineering Research 2013 - 2014 9734562
10 Cognitive Radio Wireless Mesh Networks and its challenges T.Pavan Kumar International Journal of Applied Engineering Research 2013 - 2014 9734562
11 Comparative Evaluation Method and Factors of Risk Assessment models for information security " ​      K.V.D Kiran,Bala Venu,P.G Manikanta Varma,Dr.L.S.S Reddy International Journal of Applied Engineering Research 2013 - 2014 9734562
12 Comparision of HAAR, DB, SYM and COIF Wavelet Transforms in the Detection of Earthquakes Using Seismic Signals  Dr.B.Vijay Babu International Journal of Applied Engineering Research 2013 - 2014 9734562
13 Desin and implementation of Integrated testing tool based on metrics and Quality assurance M.Rami Reddy,Dr.Y.Prashanth,J.Vijaya Chandra International Journal of Applied Engineering Research 2013 - 2014 9734562
14 Dynamic Optimization Local Search Offloading Algorithm For Mobile Cloud Computing K.Ravindranath,Dr.K.Rajasekhar Rao International Journal of Applied Engineering Research 2013 - 2014 9734562
15 Dynamically Managing the software Components in deployment based architecture M.Srilakshmi,S.Venkata Krishna,G.Siva Nageswara Rao International Journal of Applied Engineering Research 2013 - 2014 9734562
16 EBCM:Single Encryption,Multiple Decryptions T.Guna sekhar,Dr.K.Thirupathi Rao,Dr.V.Krishna Reddy,Dr.P.Sai Kiran,Dr.B.Thrimula Rao International Journal of Applied Engineering Research 2013 - 2014 9734562
17 Effecicient Framework for Testing cross Cloud Application Sk.Jameela,Dr.K.Thirupathi Rao,Dr.V.Krishna Reddy,Dr.P.Sai Kiran,Dr.B.Thirumala Rao International Journal of Applied Engineering Research 2013 - 2014 9734562
18 Effective Detection of Denial of Service (Dos) Attacks by Using Snort Rules Architecture Riaz,Chandra sekhar Reddy International Journal of Applied Engineering Research 2013 - 2014 9734562
19 Effective Webpage Segmentation Techniques For Information Content Extraction-Review B.Sekhar Babu,P.Lakshmi Prasanna,K.Rajasekhar Rao International Journal of Applied Engineering Research 2013 - 2014 9734562
20 Generating Test Cases for Testing WEB Sites Through Neural Networks and Input Pairs M.Lakshmi Prasad ,J.K.R Sastry,V.Chandra Prakash International Journal of Applied Engineering Research 2013 - 2014 9734562
21 High Dimensional Data Computation using Zinc Experiments K.Venkat Raju,A.Vijaya Kumar,K.Sandeep,Kishan Sai Gondi International Journal of Applied Engineering Research 2013 - 2014 9734562
22 Information Security and Risk Management for Health Care System B.Chaitanya Krishna,Dr.K.Subramanyam,V.Sindhura,Ch.Sai Venkatesh International Journal of Applied Engineering Research 2013 - 2014 9734562
23 LESIPT:Lightweight Enhanced Secure Incentive Protocol with Trusted Value for Multi-hop Wireless Networks Dr.B.Vijay Babu International Journal of Applied Engineering Research 2013 - 2014 9734562
24 Minimizing Computation and Communication Overhead using Pattern Based Homomorphism Encryption Bobba Veeramallu,Dr. K. Rajasekhara Rao International Journal of Applied Engineering Research 2013 - 2014 9734562
25 ODCRP-CRWMN: On Demand Cluster Based Routing protocol for cognitive radio wireless mesh networks Pavan Kumar T and Rajasekhar Rao K International Journal of Applied Engineering Research 2013 - 2014 9734562
26 on Demand Cluster Based Routing Protocol for Cognitive Radio Wireless mesh Networks T.Pavan Kumar International Journal of Applied Engineering Research 2013 - 2014 9734562
27 Ontology Based Fuzzy Rule Mining Techniques for Web Usage Analysis T.S.Masthan Rao,Dr.G.Rama Krishna,T.L.Deepika Roy International Journal of Applied Engineering Research 2013 - 2014 9734562
28 Performance Analysis of Intrusion Detection System over Mobile Cloud System Dr.S.Satyanarayana,B.Pavani International Journal of Applied Engineering Research 2013 - 2014 9734562
29 Performance improvement of Horizontal Aggregations in SQL by using Top-Down join enumerations and secondary defaulting Dr.G.Rama krishna, V.P.Krishna anne G.Sameer International Journal of Applied Engineering Research 2013 - 2014 9734562
30 Personalized and Customized WEB Searching within Application Specific WEB sites Dr.J.K.R Sastry,J.Sasi Bhanu International Journal of Applied Engineering Research 2013 - 2014 9734562
31 Privacy preserving for Hospital Data using Earth Mover's Distance P.V.R.D Prasada Rao,E.Rudrani Devi International Journal of Applied Engineering Research 2013 - 2014 9734562
32 Product Reliability in Preferable Top-K Products Using Cronbach's Alpha Procedures J.VenkataRao ,CH.RamyaSri,V.KrishnaReddy,M.Srikanth International Journal of Applied Engineering Research 2013 - 2014 9734562
33 Providing Privacy through search logs Dr.G.Rama krishna, P.Mounika,V.P.Krishna anne International Journal of Applied Engineering Research 2013 - 2014 9734562
34 Risk Assessment in Distributed Banking System Dr.N.Srinivasu,K.V.D Kiran,Dr.Ch.v,Phani Krishna,Dr.L.S.S Reddy International Journal of Applied Engineering Research 2013 - 2014 9734562
35 Risk Management in Information Systems Through Secure Image Authentication using Quick Response Code D.Naga Malleswari,K.Subramanyam,T.S Srinivasa Reddy,T.Vijaya Saradhi International Journal of Applied Engineering Research 2013 - 2014 9734562
36 Secure storage services in Multi-cloud Environment V.P.Krishna Anne, Siva bala Vinod.Puppala. International Journal of Applied Engineering Research 2013 - 2014 9734562
37 Semantic Web in Bio Medicine P.Lakshmi Prasanna,Dr.D.Rajeswara Rao,Yamini,Namratha International Journal of Applied Engineering Research 2013 - 2014 9734562
38 Systematic Study of Avalanche Effect in triple DES Using Various Binary Codes Radhika Rani,Pujya Sri International Journal of Applied Engineering Research 2013 - 2014 9734562
39 The Cloud Programming Paradigms and APIs Dr.K.V Daya Sagar,Dr.K.Raja Ram Mohan Rao,V.Mounica,G.Sravan International Journal of Applied Engineering Research 2013 - 2014 9734562
40 Timing Analysis Attack Based on Hamming Weight D.Radha Rani,Prof.S.Venkateswarlu International Journal of Applied Engineering Research 2013 - 2014 9734562
41 To Dipping the overheads of CCP-ABE ,using pattern based policy with Homomorphism Encryption Mechanism B.Veeramallu,Dr.K.Rajasekhar Rao International Journal of Applied Engineering Research 2013 - 2014 9734562
42 Analysis of gateway relocation stratagies in 802.16 heterogenous networks V.Divya International Journal of Applied Engineering Research 2013 - 2014 9734563
43 Data Assessment Techniques For Handling Misuseability in Publishing Research Documents Dr.D.Rajeswara Rao,S.Sahithya,J.V.R Murthy,Appa Rao Naidu International Journal of Applied Engineering Research 2013 - 2014 9734563
44 Dynamic Authentication for SOA Based Cross Site Application Using Secure Erasure Codes Dr. K. Subrahmanyam, K. Lakshmi Keerthi International Journal of Applied Engineering Research 2013 - 2014 9734563
45 Efficient and Unsupervised Approach for Detection of Duplicate Query Results in Web Scenario Dr.B.Vijay Babu International Journal of Applied Engineering Research 2013 - 2014 9734563
46 Ensuring Secure Storage using Multi Clouds S.Satyanarayana,D.Mounica,B.Pavani International Journal of Applied Engineering Research 2013 - 2014 9734563
47 Issues in Adopting Cloud for IT Services V RaviTeja Kanakala, V.Krishna Reddy, P. Sai Kiran, B.Thirumala Rao, K.Thirupathi Rao International Journal of Applied Engineering Research 2013 - 2014 9734563
48 Multi Agent System for Service Distribution in Wireless Sensor Networks Ch.V.Phani Krishna,Dr.K.Rajasekhar Rao,S.Satyanarayana,K.Rama Krishna Rao International Journal of Applied Engineering Research 2013 - 2014 9734563
49 Multi Attribute Keyword Search over XML Data Dr.D.Rajeswara Rao,Ch.Lavanya Susanna,J.V.R Murthy,Appa Rao Naidu International Journal of Applied Engineering Research 2013 - 2014 9734563
50 Pattern Based Gene/Protein Synonyms identification from Biological Databases Shana Bano,2Dr.K.Rajasekhar Rao International Journal of Applied Engineering Research 2013 - 2014 9734563
51 performance Evaluation at optimum model parameters of constant modulus algorithm in relation to LMS Method For Blind Equalization of Wireless Signals Dr.JKR Sastry,T.Rambabu,Dr.P.Rajesh Kumar International Journal of Systems and Technologies 2013 - 2014 9742107
52 Bayesian Approach for E-mail Spam Filtering Based on the E-Mail Count M.Sheshikala,Dr.D.Rajeswara Rao International Journal of Computer Applications 2013 - 2014 9758887
53 Mining Closed Regular Patterns in Incremental Transactional Databases Using Vertical Data Format M.Sridevi,L.S.S Reddy International Journal of Computer Applications 2013 - 2014 9758887
54 Secure Live VM Migration in Cloud Computing: A Survey Suresh B.Rathod, V.Krishna Reddy International Journal of Computer Applications 2013 - 2014 9758887
55 A Review of Security Mechnisms for detection of malicious tranactions in databases Srinivas,Dr.Syed Umar International Journal of Computer Science and Information Technologies 2013 - 2014 9759646
56 A Suurvey on Denial of Service Attacks T.Gunasekhar,Dr.K.Tirupathi Rao,P.Sai Kiran,P.V.S Lakshmi International Journal of Computer Science and Information Technologies 2013 - 2014 9759646
57 Implementation of power analysis attack using SASEBO-W D.Radha Rani,Prof.S.Venkateswarlu International Journal of Computer Science and Information Technologies 2013 - 2014 9759646
58 Testing of Cloud Applications in the Cross Cloud Environment Sk.Jameela,Dr.K.Tirupathi Rao,Dr.V.Krishna Reddy,A.Harita International Journal of Computer Science and Information Technologies 2013 - 2014 9759646
59 Cloud Based Platfrom as a Services of Panoramic Approach of Graphical 3D Wireframe Dr.S.Satyanarayana Computer Sciences and Telecommunications 2013 - 2014 15121232
60 Cloud Based Platfrom as a Services of Panoramic Approach of Graphical Boundary Value Differential Equation Solutions Dr.S.Satyanarayana Computer Sciences and Telecommunications 2013 - 2014 15121232
61 Estimating and Testing in Type -II Generalized Half Logistic Distribution R.R.L Kantham,V.Rama Krishna,M.S Ravi Kumar Journal of Modern Applied Statistical Methods 2013 - 2014 15389472
62 A Secure and Optimized proximity Mobile Payment Framework with Formal Verification Dr.Shaik Shakeel Ahmad,V.N Sastry,Siba K Udgata International journal of E-Service and Mobile applications 2013 - 2014 19416288
63 An Efficient Algorithm and a Generic Approach to reduce Page Fault Rate and Access Time Cost Sk.Riaz,Pasha Advances in Intelligence systems and computing 2013 - 2014 21945357
64 A Novel Approach for People Interaction in Meeting K.V.Raju,K Aparna International Journal of Computer Science and Technology 2013 - 2014 22294333
65 Hadoop Mapreduce Framework in Big Data Analytics Vidyullatha,Dr.D.Rajeswara Rao INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
66 Risk Assessment in E-Banking K.V.D.Kiran,Sk.Sharmila,T.Abhishek International Journal of Latest Trends in Engineering and Technology (IJLTET) 2013 - 2014 22312803
67 Ameliorative Effectives of Alchohol on Human Diabetic Volunteers -A Prospective Study Dr.V.Chandra Prakash,A.Naga Vamsi Krishna,B.Venkat Raman,Pardha saradhi British Journal of Pharmaceutical Research 2013 - 2014 22312919
68 Data Base Hacking:SQL Injection Method and its Prevention SK.Riaz International Journal of Engineering Trends and Technology 2013 - 2014 22315381
69 Strategizing Power Utilization within intelligent tags Dr.JKR Sastry,Dr.A.Vinaya Babu International Journal of P2P Network Trends and Technology 2013 - 2014 22492615
70 M Score and K-Anonymity:A M odel For Detection and Protection of Data Dr.D.Rajeswara Rao,S.Sahithya The International Journal of Emerging Technology and Advanced Engineering 2013 - 2014 22502459
71 Privacy and Groups Maintaing in Social Networks Dr.D.Rajeswara Rao,A.Raghuveer The International Journal of Emerging Technology and Advanced Engineering 2013 - 2014 22502459
72 Risk management in mobile banking K.V.D.Kiran,M.V.R Sri Vastava,K.Gayatri Devi International Journal of Engineering Research & Technology 2013 - 2014 22780181
73 Analysis on Virtualization Technologies in Cloud V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao International Journal of Advanced Research in Computer Engineering & Technology 2013 - 2014 22781323
74 A Study of Mining Frequent Subgraphs Using Graph Classification Algorithms Naga Jyothi P, Rajya lakshmi D, Chandra Prakash V  Discovery 2013 - 2014 22785450
75 Risk management in online banking K.V.D.Kiran,P.Sruthi,P.S Naseema,G.V.S Manju Vani,Rishikesh Sahu International Journal of Computer Trends & Technology (IJCTT) 2013 - 2014 23193778
76 Adaptive Query Planning to support continuous Aggregate Queries T.Hema Latha,J.R.Rajesh International Journal for Development of Computer Science & Technology 2013 - 2014 23207884
77 Implementating in cloud security for Effecting secured communication between intelligent tags and mobile devices Dr.JKR Sastry,Dr.A.Vinaya Babu International Journal of Innovative Research in Computer and Communication Engineering 2013 - 2014 23209801
78 The Survey of Congestion control protocols for smart transport system koushik reddy,Dr.Syed Umar,Seelam eswar Reddy International Journal of Innovative Research in Computer and Communication Engineering 2013 - 2014 23209801
79 Directional Location Finding of Intelligent Tags Dr.JKR Sastry,Dr.A.Vinaya Babu International Journal of Recent Development in Engineering and Technology 2013 - 2014 23476435
80 Software and Hardware Defense Methods against Cache based side channel attacks D.Radha Rani,Prof.S.Venkateswarlu Journal of engineering science and technology research 2013 - 2014 23480513
81 survey:Attack on cognitive radio networks T.Pavan Kumar INTERNATIONAL JOURNAL OF ADVENT RESEARCH IN COMPUTER AND ELECTRONICS 2013 - 2014 23485523
82 Literature Review on Risk and their components K.V.D.Kiran, Ramesh.Rayala, Sameer.Bodepudi and Uday.Dommaraju International Journal for Research in Emerging Science and Technology 2013 - 2014 23497610
83 Survey on EEG Signal Processing Methods M.Rajya Lakshmi,Dr.T.V Prasad Dr.V.Chandra Prakash International journal of advanced research in computers and software engineering 2013 - 2014 2277128X
84 Inferences From the ADME Analysis of predicted inhibitors to DPPIV M.R Narasinga Rao IJB 2013 - 2014 2278778X
85 Effeciently Retrieving Top K Search Results over XML Data Dr.D.Rajeswara Rao,Lavanya Susanna IJRCEE 2013 - 2014 2319376X
86 Effective Bandwidth Allocation Approach on Users Billing in Cloud Environment Dr.S.Satyanarayana IJCSMC 2013 - 2014 2320088X
87 Password   Based Scheme and Testing for Defending DDOS   Attacks G Dayanandam,T V Rao, S Pavan Kumar Reddy, and Ravinuthala Sruthi International Journal of Network Security & Its Applications 2013 - 2014 105121
88 Comparision of two methods cost and reliability for components in architecture based software system using Dynamic Programming S.Srinivasa Rao,K.Rajasekhar Rao International Journal of Computer Applications 2013 - 2014 975887
89 Performance Evaluation of Fractionally Spaced constant modulus algorithms in relation to cma method blind equalization of wireless signals Dr.JKR Sastry,T.Rambabu,Dr.P.Rajesh Kumar The International Journal of Advanced Networking and Applications 2013 - 2014 9750290
90 Mining closed regular patterns in data streams Sreedevi M; Reddy L SS INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & INFORMATION TECHNOLOGY 2013 - 2014 9753826
91 A New Method for Gray Level Image Thresholding Using Spatial Correlation Features and ultrafuzzy Measures Dr.M S R Prasad,CH.V.Narayana,E.Srinivasa Reddy Global Journal of Computer Science and Technology 2013 - 2014 9754172
92 Benchmark Algorithms and Models of frequent item set mining over data streams:contemporary affirmation of state of art V.Sidda Reddy,Dr.T.V Rao,Dr.A.Govardhan Global Journal of Computer Science and Technology 2013 - 2014 9754350
93 A Novel q-parameter Automation in Tsallis Entropy for Image Segmentation Dr.M S R Prasad,P.Radha Krishna International Journal of Computer Applications 2013 - 2014 9758887
94 AComparative Analysis on Risk Assessment Information Security Models K.V.D Kiran International Journal of Computer Applications 2013 - 2014 9758887
95 Assessment of Architecture Based Software System Reliability Allocation on Components Using a Dynamic Programing S.Srinivasa Rao,K.Rajasekhar Rao International Journal of Computer Applications 2013 - 2014 9758887
96 Cluster based Routing Protocol for Cognitive Radio Wireless Mesh Networks T.Pavan Kumar International Journal of Computer Applications 2013 - 2014 9758887
97 Virtual Screening of HIV-RT Inhibitors Using Zinc Database P.V.R.D Prasada Rao,K.Lakshmi Sunitha,K.Srinivas,Dr.A.Govardhan International Journal of Computer Applications 2013 - 2014 9758887
98 A Comprehensive Study on Making food using Rice cooker with Fuzzy logic technique Dr.D.Rajeswara Rao,K.Rajesh,K.Venkat Reddy International Journal of Computer Science and Information Technologies 2013 - 2014 9759646
99 A Graspable Learning system for the classification of XML documents G.Sivanageswara rao,Navya Sree,J.Venkat Rao International Journal of Computer Science and Information Technologies 2013 - 2014 9759646
100 Extreme programing Verification using unified process G.Sivanageswara rao,CH.V Phani Krishna,Dr.K.Rajasekhar Rao International Journal of Computer Science and Information Technologies 2013 - 2014 9759646
101 Survey on Different types of attacks and counter Measures in wireless networks Dr.V.Srikanth,N.Venu Gopal,M.Mohan Chandra International Journal of Computer Science and Information Technologies 2013 - 2014 9759646
102 Unobtrusive Technique for the detection of data seepage G.Sivanageswara rao,J.Venkat Rao,K.Anusha International Journal of Computer Science and Information Technologies 2013 - 2014 9759646
103 Media access protocol for a coexisting cognitive femtocell network Meerja K.A., Ho P.-H., Wu B., Yu H.-F. Computer Networks 2013 - 2014 13891286
104 Estimation and testing in Type I generalized half logistic distribution Kantam R.R.L., Ramakrishna V., Ravikumar M.S. Journal of Modern Applied Statistical Methods 2013 - 2014 15389472
105 Estimation of Reliability Allocation on components using a dynamic Programmimg S.Srinivasa Rao,K.Raja Sekhar Rao International journal cybernetics and informatics 2013 - 2014 16940784
106 Zone based effective location aided routing protocol for MANET Chavan G.T., Srikanth V. Communications in Computer and Information Science 2013 - 2014 18650929
107 SEMSuS: Semantic middleware for dynamic service-oriented sensor network Sangeetha V., Rao L.J. Lecture Notes in Electrical Engineering 2013 - 2014 18761100
108 Restoration Capacity Effeciency for Multi Protocol Label Switching Fast Rerote Network Sk Riaz,K.V.S.S Rama Krishna International Journal of Communications, Network and System Sciences 2013 - 2014 19133715
109 Comparative Study of Artificial neural network based classification for liver patient Dr.G.Rama Krishna,Anil Kumar Tiwari,Lokesh Kumar Sharma Journal of Information Engineering and Applications 2013 - 2014 22250506
110 Datawarehouse as a Service V.Srinivas,T.Srikanth,KVD Kiran INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22287844
111 Effective Use of HTML5 for Developing Offline web Application V.Srinivas,KVD Kiran,Ram Sandilya,R.sudheer INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22287844
112 Optimizing Aggregation Query Processing V.Srinivas,Pratheek Singel,KVD Kiran INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22287844
113 Closed Regular Pattern Mining using Vertical Format M.Sreedevi,L.S.S Reddy International Journal of Computer Science & Engineering Technology 2013 - 2014 22293345
114 Multi Clouds Model For Service Avalability And Security Dr.K.Subramanyam,S.Jaya Prakash,U.D.S.V.Prasad International Journal of Computer Science & Engineering Technology 2013 - 2014 22293345
115 High Integrity System using Extreme programing G.Sivanageswara rao,Dr.K.Raja Sekhar Rao,Ch.V.phani Krishna INTERNATIONAL JOURNAL OF ADVANCES IN SOFT COMPUTING TECHNOLOGY 2013 - 2014 22293515
116 A Novalty Approach on E-Studio Calender V.Bhavani Himaja,S.Satyanarayana,P.V.R.D Prasada Rao International Journal of Computer Science and Technology 2013 - 2014 22294333
117 A Panoramic View of Hands on Practice of AOL Calender K.Naga Gopi,S.Satyanarayana,P.V.R.D Prasada Rao International Journal of Computer Science and Technology 2013 - 2014 22294333
118 An insilco Approach to Restrain Hiv Replication Through Clustering and Virtual Screening P.V.R.D Prasada Rao,K.Lakshmi Sunitha,K.Ram Mohan Rao,A.Govardhan International Journal of Computer Science and Technology 2013 - 2014 22294333
119 Detection of error prone software modules using neural network Dr.M.R Narasinga Rao,U.Ankaiah,V.Rama Krishna International Journal of Computer Science and Technology 2013 - 2014 22294333
120 Assessment of the risk Associated with Paths in the Usage Model using bSoftware Based Fault Trees D.Bala Krishna Kamesh,Dr.A.K Vasishta,Dr.JKR Sastry,Dr.V.Chandra Prakash International Journal of Computer Information Systems  2013 - 2014 22295208
121 Assessing the Probability of Failureand Distribution of Test Cases Among Pths in the Usage Model D.Bala Krishna Kamesh,Dr.A.K Vasishta,Dr.JKR Sastry,Dr.V.Chandra Prakash International Journal of Advances in Science and Technology 2013 - 2014 22295216
122 Developing Usage Models Through Stimulus Response Sequences D.Bala Krishna Kamesh,Dr.A.K Vasishta,Dr.JKR Sastry,Dr.V.Chandra Prakash International Journal of Advances in Science and Technology 2013 - 2014 22295216
123 Cognitive Radio Wireless Mesh Networks:A Survey on Routing Protocols Dr.Ch.V.Phani Krishna,A.Jyosthna,T.Pavan Kumar,K.Rajasekhar Rao,V.Samson Dev Kumar International Journal of Computer Science & Engineering and Technolog 2013 - 2014 22310711
124 A Survey on Energy Aware Offloading Techniques For Mobile Cloud Computing K.Ravindranath,Dr.K.Rajasekhar rao INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
125 An Efficient classification Approach for the XML Documents G.Sivanageswara rao,Navya Sree INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
126 Cloud data Protection For the Masses N.Janardhan,Y.Raja Sree INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
127 Cloud Services Portability for Secure Migration V.Srinivas,K.Bhavya,K.Yamini INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
128 Data Invulnerability and data integrity Verification of multi cloud storage N.Janardhan,Y.Raja Sree,Himaja INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
129 Dependable and Secure Storage services in cloud computing Dr.K.V.V Satyanarayana,D.Veena Sanjitha,T.V.N Sai Sindhura INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
130 Drawing Using Hand Gestures N.Kanal,Pattan Akram,Rishab Kumar Jain,A.Kranthi chandu,P.V Kartheek,M.R Narasinga Rao INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
131 Efficient Framework for Deploying Information in cloud Virtual Datacenter with cryptography algorithms Dr.K.V.V Satyanarayana,G.Radhika,A.Tejaswi INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
132 Enable Open Verifiability and Data Dynamics for Storage Protection in Cloud Computing K.Venkataraju,Raja Mohan,Chaitanya INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
133 Identification of Novel Inhibitors against HIV-RT Through Virtual Screening P.V.R.D Prasada Rao,K.R.R Mohan,Dr.A.Govardhan INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
134 Insilico Identification of Novel Inhibitors Against HIV-1 Reverse transcripitate P.V.R.D.Prasada Rao,Govardhan INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
135 Network Security Using Quantum Cryptography K.V.D.Kiran,N.Kusuma,Sai TejaswiT.Anitha INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
136 Neural network desin in Cloud Computing Dr.S.Satyanarayana,T.Gopi Kiran,B.Raj kumar INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
137 Privacy Preserving Public auditing System for data storage security in cloud computing K.Venkataraju,Raja Mohan INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
138 Providing Cloud Services over mobile cloud data Dr.S.Satyanarayana,sruthi,sri rashmi, INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
139 Ranked Keyword Search in cloud computing Dr.S.Satyanarayana,M.Ramya,M.maha lakshmi,Venkata Naresh INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
140 Reduction of Greedy Forwarding Using Overlay Multicasting in Mobile Ad Hoc Networks Dr.B.Vijay Babu,G.Kiran Kumar INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
141 Secure and Dependable Storage in cloud computing Dr.K.V.V Satyanarayana,T.Bala Keishna,Y.Venkateswara Rao INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
142 Security Through Multiple Unrelated Clods in Cloud Computing V. Akhila, Nikita Mahajan, B.V.SriRam,Dr.N.Srinivas INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY 2013 - 2014 22312803
143 Hybrid Model for Preprocessing & Clustering of Web Service Logs T.Subha Masthan Rao,Thinley Lendup,Thingly Wandi,Sujatha INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN ENGINEERING SCIENCES 2013 - 2014 22314946
144 Deploying Privacy to data for Real World Cloud Environment K.Venkataraju,P.Dinesh,G.Kiran Kumar Global Journal of Computer Science and Technology 2013 - 2014 22491945
145 Multi Deployment AND Multi Snapshoting on clouds Dr.S.Satyanarayana,T.Gopi kiran International Journal of Computer and Organization Trends 2013 - 2014 22492593
146 Data leakage Detection using encrypted fake objects J.Venkat Rao,G.Sivanageswara rao,K.Anusha International Journal of P2P Network Trends and Technology 2013 - 2014 22492615
147 Generating Test Cases Trough Markov Models For Undertaking Comprehensive Testing of Embedded Systems D.Bala Krishna Kamesh,Dr.A.K Vasishta,Dr.JKR Sastry,Dr.V.Chandra Prakash International Journal of P2P Network Trends and Technology 2013 - 2014 22492615
148 Enhancing the Quality of Embedded Systems Through Comparative Reliability Analysis D.Bala Krishna Kamesh,Dr.A.K Vasishta,Dr.JKR Sastry,Dr.V.Chandra Prakash International Journal of Computational Intelligence Systems 2013 - 2014 22495208
149 Damage Detection in Cantilever Beams using Artificial Neural Networks Dr.M.R Narasinga Rao,K.Lokesh Kumar International Journal of Mechanical and Production Engineering Research and Development 2013 - 2014 22496890
150 Assesment of Failure rates of usage paths through Hardware Fault Tree Analysis D.Bala Krishna Kamesh,Dr.A.K Vasishta,Dr.JKR Sastry,Dr.V.Chandra Prakash International Journal of Mobile Computing and Multimedia Communications 2013 - 2014 22498915
151 Enriching The Test Cases For Testing the Critical Regions of Embeded Systems D.Bala Krishna Kamesh,Dr.A.K Vasishta,Dr.JKR Sastry,Dr.V.Chandra Prakash IJRRAMCS 2013 - 2014 22498931
152 Fraud Detection in Banking M.Madhavi,Sri Vastava International Journal of Engineering and Advanced Technology 2013 - 2014 22498958
153 Hand Writen Character Detection By using Fuzzy Logic Techniques Dr.D.Rajeswara Rao,K.Rajesh,K.Venkat Reddy The International Journal of Emerging Technology and Advanced Engineering 2013 - 2014 22502459
154 Study and Scalable eruditries by using Communel activities Dr.K.V.V Satyanarayana,D.Harika,Y.S Lakshmi The International Journal of Emerging Technology and Advanced Engineering 2013 - 2014 22502459
155 Standadization of systems and processes for CDR Based Billing System Dr.K.V.V Satyanarayana,Hashmi,A.Shiva Rama Rao International Journal of Computational Engineering Research 2013 - 2014 22503005
156 An Asymmetric Approach For Coperative Caching in Multi Hop Wireless Adhoc Networks Dr.B.Vijay Babu,M.Sudheer Raja International Journal of Computer Networks and Wireless Communications 2013 - 2014 22503501
157 Improvised K-means Clustering Algorithm in Data Mining Dr.K.Subramanyam,S.Jaya Prakash,U.D.S.V.Prasad Global Journal for Current Engineering Research 2013 - 2014 22652765
158 Survey of IEEE 802.11 Standards Dr.V.Srikanth,M.Anil Kumar INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH 2013 - 2014 22778179
159 Attacking Cloud Through Cache based Side Channel in Virtualized Environment Prof.S.Venkateswarlu,G.M Deepa,G.Sriteja International Journal of Advanced Research in Computer Science and Electronics Engineering 2013 - 2014 22779043
160 Channel Model Components And Modeling types in wireless systems Prof.S.Venkateswarlu,G.S.Ragavendra,G.Sriteja International Journal of Advanced Research in Computer Science and Electronics Engineering 2013 - 2014 22779043
161 An Overview on Face Aging Graphical Models:Compositional Dynamic Model and Concatenational Graph Evolution Model G.Deepthi,B.Vijaya Babu,Vidul Latha,Dr.D.Rajeswara Rao Interanational journal of engineering research and technology 2013 - 2014 22780181
162 Tosca Enabling Cloud Portability V.Srinivas,Sahithi,P.Yuvaraj,Ravi Kanth International Journal of Advanced Research in Computer Engineering & Technology 2013 - 2014 22781323
163 An extraction Relation of machine learning by identifying disease treatment relations in the research methodologies Dr.V.Ramakrishna,T.Geethika,Sunaina Sultana INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22787844
164 Cloud Business Intelligence Dr.S.Satyanarayana,T.Gopi kiran,B.Raj Kumar INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22787844
165 Cloud Computing:IAAS Dr.S.Satyanarayana,T.Gopi kiran,A.Srinivasa Rao INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22787844
166 Data Retrieval from Cloud With Cache Implementation K.Venkataraju P.Dinesh,Sudheerraja INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22787844
167 Interoperability of Distributed Agents For Health Care Dr.A.Srinivasa rao,P.Santhosh Kumar INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22787844
168 Learning Structure in cloud K.V.D.Kiran,Ambati Nikila,V.Srinivas INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22787844
169 Routing Security Against Flooding Attack In Wireless Adhoc Networks A.Dhana Lakshmi,Dr.V.Srikanth,T.Pavan Kumar INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22787844
170 Wireless Sensor Networks in Cloud Computing Dr.S.Satyanarayana,B.Raj Kumar,V.David,Siva Nagaraju INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2013 - 2014 22787844
171 An overview and analysis of private and public key DNA Cryptography K.Sireesha,V.Srujana The International Journal of Technological Exploration and Learning 2013 - 2014 23192135
172 Quality of service in wireless networks using weighted clustering algorithm Dr.V.Srikanth,M.Anil Kumar,N.Vijay Gopal IJSR 2013 - 2014 23197064
173 A Novel Study on Complex Fuzzy Logic Dr.D.Rajeswara Rao,K.Rajesh International Journal of Science and Research 2013 - 2014 23197064
174 Collectional Activities Forecast via insution using social network sites Dr.K.V.V Satyanarayana,D.Harika,Y.S Lakshmi International Journal of Science and Research 2013 - 2014 23197064
175 Secure Sharing of Personal Health Records in Cloud Computing Dr.S.Satyanarayana,B.Raj kumar International Journal of Science and Research 2013 - 2014 23197064
176 Password Authentication System for Cloud Environment V.Srinivas,Bhavana,V.Alekya,K.Deepa International Journal of Advanced Computer Science and Information Technology 2013 - 2014 23200235
177 Approaching Protected and Reliable Storage Space Services in cloud computing K.Venkataraju,Raja Mohan,Suhasini International Journal of Engineering Associates 2013 - 2014 23200804
178 Survey on Advanced Data Mining Applications K.Venkataraju Santhi Swaroop International Journal of Engineering Associates 2013 - 2014 23200804
179 Transaction Based Prioritizatioh Stratagies for E-mail Applications Dr.V.Ramakrishna,M.R Narasinga Rao,Sk.sunaina Sulthana,T.Geethika INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY 2013 - 2014 23206802
180 A New Clustering Technique Based on user search Histories Dr. J K R Sastry,M.V.B.T Santhi,S.pavani International Journal for Development of Computer Science & Technology 2013 - 2014 23207884
181 Tmaper Proof JAR Client For Distributed Accounrability for Data Sharing in the Cloud Dr.K.Subrhamanyam,Jaya Prakash,U.D.S.V Prasad International Journal for Development of Computer Science & Technology 2013 - 2014 23207884
182 Guilty Agent Detection By using Fake Object Allocation Keerthi,Martha,Dr.D.Rajeswara Rao International Journal for Development of Computer Science & Technology 2013 - 2014 23207884
183 Agile Software Development and Challenges V.Rama Krishna,J.Kiran International Journal of Research in Engineering and Technology 2013 - 2014 23217308
184 Guesstimate of Cost and Reliability for Architecture Based Software S.Srinivasa Rao,K.Rajasekhar Rao International Journal of Research in Advent Technology 2013 - 2014 23219637
185 HIV-1 Reverse Transcriptase Inhibitors By 1vrt Through Docking and Virtual Screening Techniques P.V.R.D Prasada Rao,A.Govardhan International Journal of Biotechnology 2013 - 2014 33527304
186 A Novelty Based Sharing of Personal Healthc E-Records in Cloud Environments B.Raj Kumar,Dr.S.Satyanarayana Indian Journal of Applied Research 2013 - 2014 2249555X
187 Image Retrieval System Using Fuzzy Soft max MLP neural network Dr.M.R Narasinga Rao,G.Ravi Teja Indian Journal of Applied Research 2013 - 2014 2249555X
188 Protecting and Planing Amenable Basic Routing Dr.V.Srikanth,M.Anil Kumar,M.Mohan Chandra Indian Journal of Applied Research 2013 - 2014 2249555X
189 Efficient Framework for Deploying Information in Virtual Datacenter with cloud security Application Dr.K.V. V Satyanaraya,G.Radhika,A.Tejeswi IJETAE 2013 - 2014 2250–2459
190 Distributed Agent Based Expert System in Health Care Dr.A.Srinivasa rao,P.Santhosh Kumar International journal of advanced research in computers and software engineering 2013 - 2014 2277128X
191 Effective Utilization of cache in cloud K.Venkataraju,P.Dinesh,Suhasini International journal of advanced research in computers and software engineering 2013 - 2014 2277128X
192 Hand Writen Character And digit recognition using Artificial Neural Networks Dr.D.Rajeswara Rao,K.Rajesh,K.Venkat Reddy,U.Ankaiah International journal of advanced research in computers and software engineering 2013 - 2014 2277128X
193 Reliable Proxy Re encryption in unreliable clouds Dr.S.Satyanarayana,M.Srujana,Y.Divya,Girvani International journal of advanced research in computers and software engineering 2013 - 2014 2277128X
194 An Overview on Big Data :Technologies and their Applications Vidyullatha,Dr.D.Rajeswara Rao IJLTET 2013 - 2014 2278621X
195 Apple Talk K.V.D.Kiran,Gidla John IJCSMR 2013 - 2014 2278733X
196 Game theory :A new Approach for video streaming in mobile networks K.V.D.Kiran,Sitaram chowdary,P.Vittal Kumar IJCSMR 2013 - 2014 2278733X
197 Image Retrieval effective methods in image processing Dr.Ch.V.Phani Krishna,D.Sowmya,A.Suresh,V.Samson Deva Kumar IJCSMR 2013 - 2014 2278733X
198 Computer Aided Design and Molecular Docking Study of 1-N-Substituted-3,5-Diphenyl-2- Pyrazoline Derivates As Cox-2 Inhibitors M.R Narasinga Rao IJB 2013 - 2014 2278778X
199 Xml Document Mining Dr.Rajeswara Rao,Sonawane IJRCEE 2013 - 2014 2319376X
200 A Critical Study of Information Security risk Assessment using Fuzzy and Entropy Methodologies K.V.D.Kiran,Dr.L.S.S Reddy IJCC 2013 - 2014 2319894X
S.No Title Author's Journal Name Publication Year ISSN NO
1 Synthesis and crystal structure analysis of substituted 2-(3-(hydroxymethyl)quinolin-2-yl)phenol derivatives Rambabu D., Rama Krishna G., Basavoju S., Basaveswara Rao M.V., Malla Reddy C., Pal M. Journal of Molecular Structure 2012 - 2013 222860
2 A service administration design pattern for dynamically configuring communication services in autonomic computing systems Mannava V., Ramesh T. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2012 - 2013 3029743
3 An adaptive design pattern for genetic algorithm-based composition of web services in autonomic computing systems using SOA Mannava V., Ramesh T. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2012 - 2013 3029743
4 An adaptive design pattern for invocation of synchronous and asynchronous web services in autonomic computing systems Mannava V., Ramesh T. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2012 - 2013 3029743
5 An aspectual feature module based adaptive design pattern for autonomic computing systems Mannava V., Ramesh T. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2012 - 2013 3029743
6 Analysis on Fuzzy Membership Functions for Image Segmentation using Ultrafusiness M S R Prasad, Kolluri Raju and CH Vekata Narayana. I managers journal on Software Engineering 2012 - 2013 9288910
7 Design on Security of Hybrid Cloud Business Intelligence System Dr S Satyanarayana International Journal of Computational Mathematical Ideas(IJCMI) 2012 - 2013 9748652
8 EncryptedtextPolicy Attribute Based Encryption and Broadcasting using BOD B.Veeramallu International Journal of Computational Mathematical Ideas(IJCMI) 2012 - 2013 9748652
9 Creating Active smart Refuge O perations for complex feeble threats V.Sandeep,V.Srinivas International Journal of Cloud Computing Technological Ideas 2012 - 2013 9748656
10 Performance Analysis of Network Resources in Standard Access Protocols Sasi Veena D , Yojana Y and K V D Kiran. IJCSIT 2012 - 2013 9753826
11 A Study of Psychosocial and Built environment factors for diabetes using MLP Neural networks M.R.Narasinga rao International Journal of Computer Applications 2012 - 2013 9758887
12 Automatic Image Segmentation using Ultrafuzziness CH V Narayana,E Srinivas Reddy and M S R Prasad. International Journal of Computer Applications 2012 - 2013 9758887
13 Secure System of Attack Patterns towards Application Security Metric Derivation K Raja Sekhar, Dr L S S Reddy and U J Kameswari. International Journal of Computer Applications 2012 - 2013 9758887
14 Software Reliability Prediction Using neural networks V.Rama krishna,MR.Narasinga Rao,T.M.Padmaja International Journal of Computer Applications 2012 - 2013 9758887
15 Analysis of clinical databases using data mining techniques Rao L Jagjeevan; Kumar N V S Pavan; Srinivas M INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER SCIENCE 2012 - 2013 9765697
16 A Composite Design Pattern for Service Injection and Composition of Web Services for Peer to Peer Computing with Service Oriented Architecture M.Vishnuvardhan and T Ramesh IJWSC 2012 - 2013 9769811
17 Phase transition, birefringence and orientational order parameter studies in four members of benzylidene aniline liquid crystals Prasad P.V.D., Rani G.P., Pisipati V.G.K.M. Solid State Phenomena 2012 - 2013 10120394
18 A cloud model to implement SaaS Sreenivas V., SriHarsha S., Narasimham C. Advanced Materials Research 2012 - 2013 10226680
19 Load Distribution Composite Design Pattern for Genetic Algorithm Based Autonomic Computing Systems M.Vishnuvardhan and T Ramesh International Journal of Sustainable Construction 2012 - 2013 16470621
20 Energy efficient, scalable and reliable MAC protocol for electromagnetic communication among nano devices Srikanth V., Chaluvadi S., Sandeep, Vani, Venkatesh International Journal of Parallel, Emergent and Distributed Systems 2012 - 2013 17445760
21 Prediction of Surface Roughness in End Milling Of P20 Mould Steel Using Artificial Neural Networks Sidda Reddy B., Jaya Krishna N., Suresh Kumar J., Vijaya Kumar Reddy K. Journal of Engineering Science and Technology Review 2012 - 2013 17912377
22 A design pattern for service injection and composition of web services for unstructured peer-to-peer computing systems with SOA Mannava V., Ramesh T., Quadri M.A.R. Advances in Intelligent and Soft Computing 2012 - 2013 18675662
23 An adaptive design pattern for genetic algorithm based autonomic computing system Naga Srinivas Repuri B., Mannava V., Ramesh T. Advances in Intelligent and Soft Computing 2012 - 2013 18675662
24 An aspectual feature module based service injection design pattern for unstructured peer-to-peer computing systems Mannava V., Ramesh T., Naga Srinivas Repuri B. Advances in Intelligent and Soft Computing 2012 - 2013 18675662
25 Artificial bee colony based image clustering Manda K., Satapathy S.C., Rajasekhara Rao K. Advances in Intelligent and Soft Computing 2012 - 2013 18675662
26 Service composition design pattern for autonomic computing systems using association rule based learning Quadri M.A.R., Mannava V., Ramesh T. Advances in Intelligent and Soft Computing 2012 - 2013 18675662
27 Enhancing the security for information with virtual data centers in cloud Sreenivas V., ArunaKumari B., VenkataRao J. Lecture Notes in Electrical Engineering 2012 - 2013 18761100
28 Design Pattern for Dynamic Reconfiguration of Component based Applications Using Autonomic Computing System and Asynchronous RMI M.Vishnuvardhan and T Ramesh Elsevier: Procedia Technology 2012 - 2013 18770509
29 Design Pattern for Feature Oriented Service Injection and Composition of Web Services for Distributed Computing Systems with SOA M.Vishnuvardhan and T Ramesh Elsevier: Procedia Engineering 2012 - 2013 18777058
30 Load Distribution Design Pattern for Genetic Algorithm Based Autonomic Systems M.Vishnuvardhan and T Ramesh Elsevier: Procedia Engineering 2012 - 2013 18777058
31 A novel adaptive re-configuration compliance design pattern for autonomic computing systems Mannava V., Ramesh T. Procedia Engineering 2012 - 2013 18777058
32 Design pattern for feature-oriented service injection and composition of web services for distributed computing systems with SOA Mannava V., Ramesh T. Procedia Engineering 2012 - 2013 18777058
33 Counter Attacking Fault Injections into Embedded Systems Dr. J K R Sastry,Prof K Subba Rao and Ms J Sasi Bhanu. IJRRAMCS 2012 - 2013 20094612
34 On Integrating Hardware of Distinct Embedded System Boards Dr. J K R Sastry, N Venkatram and V Santhi Chandra. International Journal of Chemical Engineering and Applications 2012 - 2013 20100221
35 Efficient Use of  Cloud Computing in Medical Science Tejaswi Avula, Radhika Gudapati, Manoj Kumar Nela and Sreenivas velagapudi. American Journal of Computational Mathematics 2012 - 2013 21611211
36 Counter Attacking Electromagnetic attacks for securing Embedded Systems Dr. J K R Sastry, Prof Subba Rao and Ms J Sasi Bhanu. International Journal of Advances in Science and Technology 2012 - 2013 22295216
37 Counter attacking the timing attacks on Embedded Systems Dr. J K R Sastry, Prof Subba Rao and Ms J Sasi Bhanu. International Journal of Advances in Science and Technology 2012 - 2013 22295216
38 Iconic Web Retrival System Using Ontologies Dr.T.V.Rao,Chanakya GM,Sk.Salam VSRD  IJCSIT 2012 - 2013 22312471
39 A Novel Class Imbalance Learning Method using Neural Networks K.Nageshwara Rao, D.Rajya Lakshmi, Dr.T.V.Rao International Journal of Applied Information Systems 2012 - 2013 22490868
40 A Novel Approach to deals with multiplr QOS Constrained Scheduling Stratagy of Multi Workflows using decentralized algarithms and network overlays Dr.T.V.RAO,B.Siva Rama Krishna,AMK KannababuSai Satyanarayana reddy Global Journal of Computer Science and Technology 2012 - 2013 22491945
41 Dynamic Evolution of Syntax for Communicating with Embedded Systems J Sasi Bhanu, A Vinay Babu, Dr J K R Satry and Dr P Thrimurthy. International Transactions on Electrical, Electronics and Communication Engineering 2012 - 2013 22498921
42 A Keyless JS Algorithm Jiwan Pokharal, N Sai Sumanth , Dr CH Rupa, T Vijaya Sharadi. International Journal of Engineering Science & Advanced Technology 2012 - 2013 22503676
43 A Novel Interclass Clustering Method for Image Reconstruction S Suneetha,Siva Priya T,Dr C Naga Raju and M S R Prasad. International Journal of Advanced Research in Computer Science and Electronics Engineering 2012 - 2013 22779043
44 Role of Data Mining : A Technical Education Perspective P Ajithand, Dr. K Rajasekhara INTERNATIONAL JOURNAL OF ENGINEERING COMPUTER SCIENCE AND TECHNOLOGY 2012 - 2013 22779337
45 Maintenance of Entropy through Token Parceling and Verification of Error Bumping OFF for Protection in Cloud Computing A V Praveen Krishna, Bhavya Boggavarapu and Sindura Katragadda. International Journal of Advanced Research in Computer and Communication Engineering 2012 - 2013 22781021
46 Application and Protocol Architecture in Wireless Adhoc Networks U Nanaji and Prof Chandan mazumdar. INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2012 - 2013 22787844
47 Effective Key Establishement and Authentication Protocol for Wireless Sensor Networks Using Elliptical Curve Cryptography K S B Deepthi,Uppe Nanaji and Y Swapana. INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2012 - 2013 22787844
48 Improving Utilization of Infrastructure Clouds B Krishna Kishore,Uppe Nanaji and Y Swapana. INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2012 - 2013 22787844
49 Multiviewpoint Based Similarity Measure and Optimality Criteria for Document Clustering Badukonda Madhusudhana Rao,Uppe Nanaji and Y Swapana. INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2012 - 2013 22787844
50 Nymble: Blocking Misbehaving Users in Anonymizing Networks Korada Vasudevarao,Uppe Nanaji and Y Swapana. INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2012 - 2013 22787844
51 Skin Recognition Methods using Explicit Image Filtering R V L S N Sastry, B Srinivas,P.Satheesh and U Nanaji INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2012 - 2013 22787844
52 Spatiotemporal Data Mining : Issues, Tasks and Applications Uppe Nanaji INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH 2012 - 2013 22787844
53 Service Composition Design Pattern for Autonomic Computing Systems Using Association Rule Based Learning and Service Oriented Architecture M.Vishnuvardhan and T Ramesh IJGCA 2012 - 2013 09769404 
54 On dynamic configurability and Adaptability of Intelligent Tags with Handheld Mobile Devices Dr. J K R Sastry, N Venkatram, Ms Sahithy Ramya , Dr L S S Reddy. IIJECS 2012 - 2013  09734589
55 On Locating intelligent Tags Dr. J K R Sastry, N Venkatram, Dr K Srinivas Ravi , Mr G Pradeep, Dr L S S Reddy. IIJECS 2012 - 2013  09734589
56 Composite Design Pattern for Feature Oriented Service Injection and Composition of Web Services for Distributed Computing Systems with Service Oriented Architecture M.Vishnuvardhan and T Ramesh IJWesT 2012 - 2013 0975 9026
57 A Scientific Approach for Segmentation and Clustering Technique of Improved K Means and Neural Networks Dr V Srikanth International journal of advanced research in computers and software engineering 2012 - 2013 2277128X
58 Design of virtual File System in Cloud Environments S.Satyanarayana,T.Gopi Kiran,B.Raj kumar,K.Ashok Chakravarthi International journal of advanced research in computers and software engineering 2012 - 2013 2277128X

Your e-mail ID?

TOP