S.No | Year | Total Number of Publications | Total Number of Journal Publications | Total Number of Conference Publication |
---|---|---|---|---|
1 | 2020 | 24 | 10 | 14 |
2 | 2019 | 28 | 15 | 13 |
3 | 2018 | 40 | 33 | 7 |
4 | 2017 | 50 | 32 | 18 |
5 | 2016 | 32 | 26 | 6 |
6 | 2015 | 18 | 16 | 02 |
publication
S. No | Authors | Title of the paper | Name of the Journal | Indexing | Page Nos |
---|---|---|---|---|---|
1 | Ashwani Kumar,Sonam Srivastava | Object Detection System Based on Convolution Neural Networks Using Single Shot Multi-Box Detector | Procedia Computer Science | Scopus;Google Scholar; | 2610-2617 |
2 | Sonam Srivastava,Ashwani Kumar | Agile Approach as a Universal Remedy for the Usual Failure in the Development of Software Projects | Recent Patents on Engineering | Scopus;Google Scholar; | — |
3 | M A Ranjith,Dr.S.Sai Satynarayana Reddy,Dr.M Babu Reddy | Heterogeneous Distort-Prevention Manifold Resource Distribution Mechanism for Cloud Management | International Journal of Control and Automation | Scopus; | 45-54 |
4 | Gouse baig MD,Prabhakar kandakuri | Detection of position Falsification Attack in VANET Using ACO | Internal journal of control and Automation | Scopus; | 715-724 |
5 | R. Lalu naik,Dr.S. Sai Satyanaryana Reddy,Shrawan Kumar | Implementation of Authenticated Hybrid QKD Protocols for 802.11 LANs | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | Scopus;Google Scholar; | 2278-3075, |
6 | Jatindra Kumar Dash,Thimmapuram Madhuri,Manisha Patro,Sujata Chakravarty | Novel Texture Feature for Content Based Image Retrieval | TEST Engineering & Management | Scopus; | 17788-17800 |
7 | Murlidher Mourya,D. Ganesh | Attribute Selection to Identify Covid-19 Disease by using Data set Condensing and Intersection Pruning | IARJSET | Google Scholar; | 119-124 |
8 | Uma Maheswari V,G Varaprasad,S Viswanadha Raju | Local Directional Maximum Edge Patterns for facial expression recognition | Journal of Ambient Intelligence and Humanized Computing | SCI;ESI;WoS;Scopus;DBLP;Google Scholar;SCIE; | Still to receive (Published online ) |
9 | K.Kishore Kumar,H. Venkateswara Reddy | Comprehensive Models Towards for Feature Extraction and Recognition in Machine Learning | International Journal of Recent Technology and Engineering | Scopus;Google Scholar; | 3638-3641 |
10 | Kotaiah Swamy Kakulla,Dr. K.F.Bharati | Survey on Demographics in Social Media | International Journal of Advanced Science and Technology | Scopus; | 13899-13904 |
S. no. | Authors | Title of the paper | Name of the Conference | Indexing | Page Nos |
---|---|---|---|---|---|
1 | Ashwani Kumar,Dr. S S Sai Satyanarayana Reddy, Vivek Kulkarni | An Object Detection Technique For Blind People in Real-Time Using Deep Neural Network | 2019 Fifth International Conference on Image Information Processing (ICIIP) | Scopus;DBLP;Google Scholar; | 292-297 |
2 | Dr. S. Sai Satyanarayana Reddy, Ashwani Kumar, , | Edge Detection and Enhancement of Color Images Based on Bilateral Filtering Method Using K-Means Clustering Algorithm | 4th International Conference on Information and Communication Technology for Sustainable Development (ICT4SD 2019) | Scopus;DBLP;Google Scholar; | 151-159 |
3 | Syed Aley Fatima, Ashwani Kumar, Ajay Pratap, Syed Saba Raoof | Object Recognition and Detection in Remote Sensing Images: A Comparative Study | 2020 International Conference on Artificial Intelligence and Signal Processing (AISP) | Scopus;DBLP;Google Scholar; | — |
4 | B. Thirumaleshwari Devi , S. Shitharth. | An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks | International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) | Scopus;DBLP;Google Scholar; | 722 – 727 |
5 | Uma Maheswari V, S Viswanadha Raju. | Local Directional Weighted Threshold Patterns (LDWTP) for Facial Expression Recognition | 2019 Fifth International Conference on Image Information Processing (ICIIP) | WoS;Scopus;DBLP;Google Scholar; | 167 – 170 |
6 | D Raman, N Hanuman Reddy, Shrawan Kumar. | Implementation of SCADA Through Cloud Based IoT Devices – Initial Design Steps | Image Information Processing, International Conference | Scopus;DBLP;Google Scholar; | 367 -372 |
7 | Vanaja Malgari, Raman Dugyala, Ashwani Kumar. | A Novel Data Security Framework in Distributed Cloud Computing | Fifth International Conference on Image Information Processing (ICIIP) | Scopus;DBLP;Google Scholar; | 373-378 |
8 | Dr. M. A. Jabbar, Dr. Rajanikanth Aluvalu. | Cyber-security: Future challenge for a safer and secure smart city | 2nd Smart Cities Symposium (SCS 2019) | WoS;Scopus;DBLP;Google Scholar;ISI; | — |
9 | Dr. M. A. Jabbar, M. V. V. PRASAD, Dr. Rajanikanth Aluvalu. | Intrusion Detection System for the IoT: A Comprehensive Review | Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019) | WoS;Scopus;DBLP;Google Scholar;ISI; | 235-243 |
10 | Devi B. Thirumaleshwari, Dr. S. Shitharth , Dr. M. A. Jabbar. | An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks | 2nd International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2020 | WoS;Scopus;DBLP;Google Scholar; | 722-727 |
S. No. | Authors | Title of the paper | Name of the Journal | Volume | Issue | ISSN |
---|---|---|---|---|---|---|
1 | M. Nikhitha, M.A. Jabbar | A Systematic Literature Review on Intrusion Detection System using Machine Learning | Recent Advances in Electrical and Electronic Engineering | 13 | 8 | 2352-0965 |
2 | A. Rajinikanth, M. A. Jabbar | Lung cancer prediction using random forest | Recent Patents on Computer Science | 12 | 4 | 1874-4796 |
3 | Siddharth Selvarajan | Mining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithm | IET Information Security | 9 | 1 | 1751-8717 |
4 | Rajanikanth A, Sangeetha Guptha | Twitter based capital market analysis using cloud statistics | IJSKD | 11 | 2 | 1941-6253 |
5 | Ashwani Kumar | Design of secure image fusion technique using cloud for private preserving and copyright protection | International Journal of Cloud Applications and Computing (IJCAC) | 6 | 4 | 2156-1834 |
6 | Sangeeta Gupta,Ashwani Kumar | Secret Image Digitization Over Public Cloud Through Cbtv Based Image Fusion | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 8 | 10 | 2278-3075 |
7 | Thimmapuram Madhuri,Gouse Baig Mohammad | A Supervised Learning Based Recommender System for Breast Cancer Prognosis in India | International Journal of Control and Automation | 12 | 6 | 2005-4297 |
8 | Vanaja Malgari,Raman Dugyala. | A Survey on Data Security in Distributed Cloud Computing | Journal of Emerging Technologies and Innovative Research | 6 | 5 | 2349-5162 |
9 | V.B.Pravalika,Nageswararao sirisala | Despeckling and Analysing Land Use Land Cover of Synthetic Aperture Radar Image | International Journal of Innovative Technology and Exploring Engineering | 8 | 10 | 2278-3075 |
10 | Nageswararao sirisala | A Machine Learning way to Build Trust on Social Network | International Journal of Engineering & Advanced Technology | 9 | 2 | 2249-8958 |
11 | Nikhitha, M.A,Jabbar | K nearest neighbor based model for intrusion detection system | International Journal of Recent Technology and Engineering | 8 | 2 | 2277-3878 |
12 | V.B.Pravalika,Nageswararao sirisala | A Survey on Despeckling Of Synthetic Aperture Radar Images | International Journal of Computer Sciences and Engineering | 7 | 4 | 2347-2693 |
13 | Khan, Shahebaz Ahmed,M.A. Jabbar | Prediction of by-diseases in diabetic patients using associative classification with improved classifier accuracy for decision support system | International Journal of Engineering and Advanced Technology | 8 | 6 | 2249-8958 |
14 | Shahebaz Ahmed Khan,M.A.Jabbar | Improved classification techniques to predict the co-disease in diabetic mellitus patients using discretization and apriori algorithm | International Journal of Innovative Technology and Exploring Engineering | 8 | 11 | 2278-3075 |
15 | Shahebaz Ahmed Khan,M.A.Jabbar | Co-disease prediction in diabetic patients using ensemble learning for decision support system | International Journal of Recent Technology and Engineering | 8 | 3 | 2277-3878 |
16 | C.Kavitha, Nageswararao Sirsila | Trust Computation in Online Social Networks | International Journal of Computer Science and Engneering | 7 | 4 | 2347-2693 |
17 | Nikitha Kumari, Prabhakar Kandukuri | Dynamic Data Analysis and decision making on twitter data | International Journal of Innovative Technology and Exploring Engineering | 9 | 1 | 4010-4015 |
18 | Nikitha Kumari and Sangeeta Gupta | Comparative Analysis of Pre-Processed Social Media Data Generation in Modern World | International Journal of Emerging Technologies and Innovative Research (JETIR) | 6 | 6 | 199-203 |
19 | Mr. Gouse Baig Mohammad, Dr. Prabhakar Kandukuri | Detection of Position Falsification Attack in VANETs using ACO | International Journal of Control and Automation | 12 | 6 | 715-724 |
S. No. | Authors | Title of the paper | Name of the Conference | Sponsered by | Place |
---|---|---|---|---|---|
1 | Ashwani Kumar | A Secure Technique of Image Fusion using Cloud based Copyright Protection for Data Distribution | IEEE 8th International Advance Computing Conference (IACC) | IEEE | Greater Noida |
2 | M. A. Jabbar, Rajanikanth A | Cyber security: Future Challenge for a safer and secure smart city | 2nd Smart cities Symposium (SCS 2019) | IET | Bahrain |
3 | B Suresh Kumar | Facial Recognition using Aggregation and random classification method | ICEAT | Indonasia | |
4 | A Rajini, M. A. Jabbar | A Survey on Lung Cancer prediction system using machine learning | ICECA | IEEE | Coimbatore |
5 | D. Raman, S. Shrawan | A Novel Architecture to cloud based SCADA Systems | CON-RACS 2019 | DST | Hyderabad |
6 | G. S. Prasada Reddy | Data Analytics on Railway Disasters Information using python analytics library pandas | International Conference on Engineering and Advancement in Technology (ICEAT) | IEEE | Hyderabad |
7 | P. B. Shailaja Rani,Ashwani Kumar | Digital Image Forgery Detection Techniques: A Comprehensive Review | 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA) | IEEE | Coimbatore |
8 | Ramu Kuchipudi,Ahmed Abdul Moiz Qyser, | An Enhanced Efficiency of Key Management Method for Wireless Sensor Networks Using Mobile Agents | Springer Advanced in Intelligent Systems and Computing | springer | Hyderabad |
9 | B MahaLakshmi,Ganesh Deshmukh, V.N.L.N Murthy | Image Encryption Method Using Differential Expansion Technique, AES and RSA Algorithm | 2019 Fifth International Conference on Image Information Processing (ICIIP) | IEEE | Shimla |
10 | Shrawan Kumar,S.Rajeswari,M Srikanth | A New Approach for Authorship Verification Using Information Retrieval Features | Lecture Notes in Networks and Systems Volume 74, 2019, Pages 23-29 | Springer | Hyderabad |
11 | Raghavendra Rao Sankaramanchi,V Kamakshi Prasad,Kumar chandra Singarapu,shrawan kumar | Integrating and introducing CERN and NCBI data science to understand quantum realm computations | Applied Nanotechnology and Nanoscience International Conference – ANNIC 2018 , Berlin Germany | IOP Conf. Series: Journal of Physics: Conf. Series 1310 (2019) 012010 | Berlin, Germany |
12 | Sai Satyanarayana Reddy Seelam,Shrawan kumar,Chand M Gopi | A New Term Weight Measure for Gender and Age Prediction of the Authors by analyzing their Written Texts | 2018 IEEE 8th International Advance Computing Conference (IACC), Noida India | IEEE | Noida |
13 | Dr Raman Dugyala,N Hanuman Reddy,Shrawan Kumar | A Novel Architecture to Cloud based SCADA systems | CONRACS 2019 | Hyderabad | |
14 | K. Aishwarya, B. Suresh Kumar, Dr. S. Viswanadha Raju | Facial Recognition using Aggregation and random forest classification method | International Conference on Physics and Photonics Processes in Nano Sciences | IOP Conf. Series: Journal of Physics: Conf. Series 1310 (2019) 012010 | Berlin, Germany |
S. No. | Authors | Title of the paper | Name of the Journal | Volume | Issue | ISSN |
---|---|---|---|---|---|---|
1 | D.Vaishnavi | LBP and GLCM based Image forgery recognition | Internatinal Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
2 | Raman Dugyala,N.Hanuman Reddy | Decentralized Secure Online Digital Data Registrations | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
3 | B.Suresh Kumar,Dr.H.Venkateswara Reddy | Data labeling method based on Cluster similarity using Rough Entropy for Categorical Data Clustering | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
4 | M.A.Jabbar | Data Plane Security Slutions in a Mobile Adhoc Network:A Survey | Journal of Engineering and Applied Sciences | 13 | 6 | 1818-7803 |
5 | Dr.Akhil Jabbar | Co-Disease Prediction using Multileyer Perception and Classification from Diabetic Medical data sets | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
6 | M.A.Jabbar | The Future of Health care:Machine Learning | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
7 | Seelam Sai Satyanarayana Reddy,M.A.Jabbar | Framework for Safe Direction -Finding for Protected Multimedia contents in Clud computing Emvironment | International Journal of Pure and Applied Mathematics | 118 | 16 | 1314-3395 |
8 | Haripriya,M.A.Jabbar | A Novel Intrusion Detection System Using Artificial Neural Networks and Feature subset selection | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
9 | RajiniKanth Aluvalu,M.A.Jabbar | Riskaware Access control model for trust based collaborative organizations in cloud | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
10 | D.Vaishnavi | Towards Cloud of Things frm Internet of Things | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
11 | D.Vaishnavi | Visual Feature Based Image Forgery Detection | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
12 | V.Uma Maheswari | Local Directional Threshold based Binary Patterns for Facial Expression Recognition and Analysis | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
13 | V.Uma Maheswari | A Survey on Local Textural Patterns for Facial feature Extraction | international Journal of Computer vision and Image Processing | 8 | 2 | 2155-6997 |
14 | V.Muni Sekhar | Content-Aware Reversible Data Hiding:URHS | Springer | |||
15 | B.Seetharamulu,M.A.Jabbar | Prediction of Breast Cancer using Big Data Analytics | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
16 | A.Bhanu prasad | Cmparative Study n Modern Approaches of Recommender System | International Journal of Engineering & Technology | 7 | 4 | 2394-6962 |
17 | Rajanikanth Aluvalu | Risk aware Access Control model for Trust Based collaborative organizations in cloud | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
18 | Jabbar Akhil | Risk aware Access Control model for Trust Based collaborative organizations in cloud | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
19 | G.Prased Reddy | R-Language Based Analytics System For Monitoring Railway Disasters | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
20 | Vemula Harish | R-Language Based Analytics System For Monitoring Railway Disasters | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
21 | M.A Jabbar | cyber Pysical System For Smart Cities Development | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
22 | Rajanikanth Aluvalu | cyber Pysical System For Smart Cities Development | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
23 | shobarani | Travel data sequence from Multi-Source recommendation system | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
24 | Ravullan arun kumar | Travel data sequence from Multi-Source recommendation system | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
25 | Dr.Anandam | Travel data sequence from Multi-Source recommendation system | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
26 | shobarani | a study on techniques of facial recognization and IOT cam vulnerabilites :A survey | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
27 | Ravullan arun kumar | a study on techniques of facial recognization and IOT cam vulnerabilites :A survey | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
28 | seelam nagarjuna reddy | a study on techniques of facial recognization and IOT cam vulnerabilites :A survey | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
29 | Rajanikanth Aluvalu | An Recursiveor k fEffivient Parametric Model-Based Framework for recursive frequency/spectrum estimation of nonstionary signal | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
30 | mvv prasad | An Recursiveor k fEffivient Parametric Model-Based Framework for recursive frequency/spectrum estimation of nonstionary signal | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
31 | Dr.Suresh | An Recursiveor k fEffivient Parametric Model-Based Framework for recursive frequency/spectrum estimation of nonstionary signal | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
32 | Nagesware Rao Sirisala | fuzzyic logic Aware QoS Multicadting in MANETs with load balance | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
33 | M.A Jabbar | sensors In IoE | International Journal of Engineering & Technology | 7 | 4.6 | 2394-6962 |
S. No. | Authors | Title of the paper | Name of the Conference | Sponsered by | Place |
---|---|---|---|---|---|
1 | M.A.Jabbar | A Novel Intelligent ensemble Classifier | Soft Cmputing and Pattern Recognition | Springer | Hyderabad |
2 | Ramesh Shahabadkar | Secure Framework of Authentication Mechanism Over Cloud Environment | Advances in Intelligent Systems and computing | Springer | Lviv, Ukraine |
3 | RajiniKanth Aluvalu | A Survey on Access control Models in Cloud Computing | Advances in Intelligent Systems and computing | Springer | Lviv, Ukraine |
4 | M.A.Jabbar | A Novel Intelligent ensemble Classifier for Network Intrusion Detection System | Soft Cmputing and Pattern Recognition | Springer | Hyderabad |
5 | Sai Satyanarayana Reddy | A New Term Weight measure for Gender and Age Prediction of the Authors by analyzing their Written texts | 2018 IEEE 8th International Advance Computing Conference (IACC) | IEEE | Greater Noida, India |
6 | Ashwani kumar | A Secure Technique of Image Fusion Using Cloud Based Cpyright Protection for Data Distribution | 2018 IEEE 8th International Advance Computing Conference (IACC) | IEEE | Greater Noida, India |
7 | A.BhanuPrasad | Author Verification Using Rich Set of Linguistic Features | Advances in Intelligent Systems and computing | Springer | Lviv, Ukraine. |
S. No. | Authors | Title of the paper | Name of the Journal | Volume | Issue | ISSN |
---|---|---|---|---|---|---|
1 | K. Srinivas | Improved Image Tamper localisation using chaotic maps and self-recovery | J. Vis. Commun. Image R. | 68 | 1 | 1047-3203 |
2 | S. Sai Satyanayana Reddy, Ch. Mamatha | Contemporary supply chain and inventory data management using data analytics | International Journal of Machanical Engineering and Technology | 8 | 12 | 0976-6340 |
3 | Y Vijayabhaskar Reddy | Efficient web- information retrieval systems and web search engines: A Survey | International Journal of Machanical Engineering and Technology | 8 | 12 | 0976-6340 |
4 | S. Sai Satyanayana Reddy, G. S. Prasada Reddy | Drone control vehicle for prospective protective protected shipping | International Journal of Civil Engineering and Technology | 8 | 8 | 0976-6308 |
5 | S. Sai Satyanayana Reddy, S. Nagarjuna Reddy | Framework for efficient authentication mechanism for genuine users payload transmission in cybernetic locations | International Journal of Civil Engineering and Technology | 8 | 8 | 0976-6308 |
6 | B Suresh Kumar | Cooperative coaching in remote P2P network frameworks | International Journal of Applied Engineering Research | 12 | 21 | 0973-4562 |
7 | S. Ramesh Shahbadkar | Enhanced query expansion for web information retrieval | International Journal of Civil Engineering and Technology | 8 | 8 | 0976-6308 |
8 | S. Ramesh Shahbadkar, S. Sai Satyanayana | Sensor based vehicle motion recognition in portable computing machines for wireless networks | International Journal of Machanical Engineering and Technology | 8 | 12 | 0976-6340 |
9 | S. Ramesh Shahbadkar | Stratum based approach for securing multimedia content transmission over large scale P2P | International Journal of Computer Applications | 42 | 1 | 1206-212X |
10 | M. A. Jabbar | Prediction of heart disease using k-nearest neighbor and particle swarm optimization | Biomed Res-India | 28 | 9 | 0970-938X |
11 | M. A. Jabbar | Improved Image Tamper localisation using chaotic maps and self-recovery | Imperial Journal of Interdiciplinary Research (IJIR) | 3 | 7 | 2454-1362 |
12 | S. Ramesh Shahbadkar | E-Market revolution using Internet of Things device in cloud payment management | International Journal of Machanical Engineering and Technology | 8 | 12 | 0976-6340 |
13 | S. Nageshwar Rao Sirisala | preserving user privacy in location - based services on mobile applications | International journal of research | 4 | 14 | 2348 - 6848 |
14 | S. Nageshwar Rao Sirisala | Significantly extending the network lifetime by using secure and energy efficient protocol | IJSRSET | 3 | 8 | 2394-4099 |
15 | K. srinivas | Fragile watermwrking schemes for image authentication: a survey | Int. J. Mach. Learn. & Cyber | |||
16 | Rajanikanth Aluvalu | Handling classrooms with students having heterogeneous learning abilities | Journal of engineering education transformations | 30 | 3 | 2349-2473 |
17 | M Pravarsha Reddy | Policies, processes, procedures and measurement in software quality assurance: A State-of-art survey | IJISET | 4 | 7 | 2348-7968 |
18 | A Ramesh | Load balancing technique in cloud computing environment | IJMET | 8 | 12 | 0976-6340 |
19 | Raman Dugyala | A Road map to security in IoT | IJAER | 12 | 19 | 0973-4562 |
20 | Vaishnavi Darmalingam | Illusion map based image splicing detection | International Journal of Control Theory Applications | 2 | 9745-572 | |
21 | G. S. Prasada Reddy | R - Language based analytics system for monitoring railway disasters | International Journal of Engineering and Technology | 9 | 1 | 2227-524X |
22 | P. Buddha Reddy | Efficient multifarious plans used in wireless mesh networks | International Journal of Civil Engineering and Technology | 8 | 12 | 0976-6308 |
23 | P. Buddha Reddy | Analysis of big data with neural network | International Journal of Civil Engineering and Technology | 8 | 12 | 0976-6308 |
24 | V. Anandam | Procurement interaction minimize test arrangement formation of software testing using Cuckoo search methods | International Journal of Engineering and Technology | 9 | 1 | 2227-524X |
25 | Ch Sravan | Survey on security issues in platform-as-a-service method | International Journal of Computer Science and Mobile Computing | 6 | 4 | 2320-088X |
26 | S Sai satyanarayana Reddy, S. Ramesh Shahbadkar | Sensor based spontaneous water level recognition in smart cities environment | International Journal of Civil Engineering and Technology | 8 | 12 | 0976-6308 |
27 | S Sai satyanarayana Reddy | A dynamic programming approach to data discovery and analysis of big data | International Journal of Civil Engineering and Technology | 8 | 12 | 0976-6308 |
28 | S. Venogopal | Applying load separation method in structured peer to peer overlay networks | IJESC | 6 | 12 | 2321-3361 |
29 | S. Nageshwar Rao Sirisala | Preserving user privacy in location-based services on mobile applications | International Lournal of research | 4 | 14 | 2348-795X |
30 | G. Mallikarjuna Reddy, V. Harish Kumar | Pre processing in big data analytics usng regular expressions | IJSETR | 6 | 4 | 2278-7798 |
31 | M. A. Ranjith Kumar | Various task scheduling algorithms in clouds | International Journal of Engineering and Management Research | 7 | 2 | 2394-6962 |
32 | V. Anandam | An efficient auditing scheme for shared data with supporting multicloud | International Journal of Advanced research and Innovation | 8 | 2 | 2319-9253 |
S. No. | Authors | Title of the paper | Name of the Conference | Sponsered by | Place |
---|---|---|---|---|---|
1 | M.A.Jabbar, A. Rajanikanth, S. Sai Satyanarayana Reddy | cluster based ensemble classification for intrusion detection system | ICMLC 9th international conference on machine learning and computing | ACM | Singapore |
2 | Sagar Gujjunoori, S. Sai Satyanarayana Reddy, Gouthaman K V | Tracking and size estimation of objects in motion | International conference on machine vision and information technology | IEEE | |
3 | Dr. S. Sai Satyanarayana Reddy | Towards an extensible Web Usage Mining Framework for Actionable Knowledge | International conference on inventive communication and computational technologies | IEEE | |
4 | Prabhakar K, A. Ananda Rao, K. Venu Gopala Rao, S. S. Satyanarayana Reddy, M. Gopichand | Cost effective model based regression testing | World congress on engineering | WCE | London |
5 | Murlidher Mourya, Ganesh Deshmukh | Selecting the factors to predicate school failure by using Data Mining techniques | National conference on emerging trends in computer engineering and technology | MIT AOE Alandi(D) | Pune |
6 | Medha Lohar | Emergency blood requirement system | National conference on emerging trends in computer engineering and technology | MIT AOE Alandi(D) | Pune |
7 | Ganesh Deshmukh, Murlidhar Mourya | Fibonacci search tree of order 'N' construction and implementation | National conference on emerging trends in computer engineering and technology | MIT AOE Alandi(D) | Pune |
8 | M.A.Jabbar, A. Rajanikanth, S. Sai Satyanarayana Reddy | RFAODE: A novel ensemble intrusion detection system | 7th International conference on advances in computing & communications | ELSEVIER | |
9 | Rajanikanth Aluvala , M.A.Jabbar | performance evaluation of clustering algorithms for dynamic VM allocation in cloud computing | 2017 International conference on smart technology for smart nation | IEEE | |
10 | M.A.Jabbar, Rajanikanth Aluvala | Smart cities in india: are we smart enough? | 2017 International conference on smart technology for smart nation | IEEE | |
11 | Indu Yekkala, M.A.Jabbar | prediction of heart disease using ensemble learning and particle swarm optimization | 2017 International conference on smart technology for smart nation | IEEE | |
12 | Bruhadeshwar Bezawada, Kishore kothapalli, Dugyala Raman | symmetric key based secure resource sharing | SPRINGER | singapore | |
13 | Dugyala Raman, Bruhadeshwar Bezawada, T.V.Rajinikanth | static program behavior tracing for program similarity quantification | first international conference on computational intelligence and informatics, advances in intelligent systems and computing | SPRINGER | singapore |
14 | M.A.Jabbar, Ghanshyam S. Bopche, B.L.Deekshatulu | diversity-aware, cost-effective network security hardening using attack graph | SPRINGER | singapore | |
15 | M.A.Jabbar, Rajanikanth Aluvala, S.Sai Satyanarayana Reddy | intrusion detection system using bayesian network and feature subset selection | IEEE International conference on computational intelligence and computing research | IEEE | |
16 | CH.Krishna Keerthi, M.A.Jabbar, B.Seetharamulu | cyber physical systems(CPS): Security issues, challenges and solutions | IEEE International conference on computational intelligence and computing research | IEEE | |
17 | M.A.Jabbar | countermeasures for conflicting behavior attack in a trust management framework for a mobile Ad hoc network | IEEE International conference on computational intelligence and computing research | IEEE | |
18 | R. Arun Kumar | Security concerns and Issues in wireless Sensor Networks, Network Attacks and measure using Symmetric and Asymmetric keys: A Technical Review | International Journal of Science and Innovative Engineering & Technology |
S. No. | Authors | Title of the paper | Name of the Journal | Volume | Issue | ISSN |
---|---|---|---|---|---|---|
1 | Nagarjuna Reddy Seelam, Sai satyanarayana Reddy Seelam Babu Reddy Mukkala | Optimal Decision Tree Based Unsupervised Learning Method for Data Clustering | inaas | 10 | 2 | DOI: 10.22266/ijies2017.0430.14 |
2 | Prashanthi Muddam, D.Raman | Graphical Password Authentication for Secure Online Services | irjet | 3 | 8 | 2395-0056 |
3 | Nageswararao Sirisala, C.Shoba Bindu | Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks | IJCNIS | 8 | 3 | NA |
4 | Usha Sree, S.Nageshwara Rao | QoS Based Routing In MANETs | IJCNWC | 6 | 4 | 2250-3501 |
5 | Nageswara Rao Sirisala, C.Shoba Bindu | A Novel QoS Trust Computation in MANETs Using Fuzzy Petri Nets | inaas | 10 | 2 | DOI: 10.22266/ijies2017.0430.13 |
6 | RajaniKanth Aluvalu, Tirthraj Chauhan | Crime Predictive Model Using Big Data Analytics | Anale. Seria Informatica | 14 | 2 | NA |
7 | RajaniKanth Aluvalu, Lakshmi Muddana | Risk Aware Hierarchical Attribute Set-Based Encryption (RA-HASBE) Access Control Model | Anale. Seria Informatica | 14 | 2 | 2349-2473 |
8 | KMVV Prasad, RajaniKanth Aluvalu | Benefits and challenges of Open Book Examination as Assessment Model for Engineering Courses | JEET | 2394-1707 | ||
9 | Dharmalingam Vaishnavi, T.S. Subashini | A Secure Robust Image Watermarking System Using Normalization and Arnold Scrambling | IJONS | 18 | 5 | 832-841 |
10 | CH Sravan Kumar, P Buddha Reddy, K SrinivAS | Storage and Computation on Big Data: A Comparative Study | computerscience | 9 | 1 | 0974-6471 |
11 | P. Buddha Reddy, CH Sravan Kumar, K. Srinivas | A Simplified Data Processing in MapReduce | IJCSIT | 7 | 3 | 0975-9646 |
12 | s Shoba Rani, Dr. D. Nagendra Rao, Dr. S Vastal, R. Chennakeshavulu | A novel approach on memory less BFGS neural network training algorithm | IOSR-JCE | 18 | 6 | 92-94 |
13 | Morthala Sravani, Para Upendar, V. Sudharshan | A Survey on Distortion Resistant Routing Framework in Wireless Multi Hop Networks | IJRECS | 5 | 6 | 2321-5485 |
14 | Dr. V. Anandam | Efficient Study of Domain-Based Transactions Ranges Program Mechanism | IJCST | 7 | 2 | 0976-8491 |
15 | V. Vijaya Bhaskara Reddy, D. Rammohan Reddy, Devarasetti Bikshalu | User Data Pattern Discovery and Pre-Processing and Pattern Analysis | IJSETR | 5 | 14 | 2319-8885 |
16 | B. Seetharamulu, Dr. G. V. Uma | Secure Data Access in P2P Cloud Using ABAC | AIJSH | 6 | 6 | 2249-7315 |
17 | B. Seetharamulu, G.V. Uma | Attribute Base Access Control to Secure the Patient Health Record in Cloud | AJOIT | 15 | 1 | 1682-3915 |
18 | G. Mallikarjuna Reddy, N. AnilBabu, R. ArunKumar, Ganesh Deshmukh | Maintenance and Understandability of Aspect Oriented Programming | IJCTT | 36 | 2 | 2231-2803 |
19 | G. Mallikarjuna Reddy, Ganesh Deshmukh, R. ArunKumar, N. AnilBabu | Enhanced Big Data Quality Ftrame Work | IJCSIT | 7 | 3 | 0975-9646 |
20 | Y.Vijaya Bhaskar Reddy, S. Nagarjuna Reddy, K.Kotaiah Swamy | A Novel Approach to Data Discovery and Analysis of Big Data | ijsetr | 5 | 14 | 2319-8885 |
21 | B.Mahalakshmi, Ch.Sravan Kumar | An Overview in Disrupted Transposition Cipher for Security Enhancement | ijoca | 143 | 23 | 0975-8887 |
22 | S. Nagarjuna Reddy, Y.Vijaya Bhaskar Reddy | A Mechanism for Providing Security to Data in Cloud Based on Range Query Processing | IJCTER | 2 | 5 | 2455-1392 |
23 | K.Samata, A.Bhanu Prasad | An Efficient Scalable System of Botnet Detection for Efficient Transmission of Data | ijsetr | 5 | 20 | 2319-8885 |
24 | Anvesh K, CH Sravan Kumar | Lock based QOS Aware Data Fusion in MANETS | IJCTT | 36 | 2 | 2231-2803 |
25 | Y.Indu, V.Uma Maheswari | Context Aware Similarity Measure Selection: Mining of Wearable Implantable Body Sensor Network Data with Logical Reasoning | IJET | NA | NA | 0975-4024 |
26 | Upendar Paara | Group Key Agreement with Local Connectivity | IJSETR | 5 | 17 | 2319-8885 |
S. No. | Authors | Title of the paper | Name of the Conference | Sponsered by | Place |
---|---|---|---|---|---|
1 | Ramesh Shahabadkar Mukesh Kamath | Diagnosis of Compromised Accounts for Online Social Performance Profile Network | WiSPNET | RNS Institute of Technology | Bangalore |
2 | Dr. H. Venkateswara ReddyB. Suresh KumarDr. S. Viswanadha Raju | Data labeling method based on Cluster similarity using Rough Entropy for Categorical Data Clustering | ITBCMS | India | |
3 | Dr. V. Anandam | Effective Information Retrieval System | NC-DATES2K16 | CMR ENGINEERING COLLEGE | Hyderabad |
4 | D. Vaishnavi Dr. T. S. Subashini | Recognizing Image Splicing Forgeries using Histogram Features | 3rd MEC IC on Big Data and Smart City | ||
5 | RajaniKanth Aluvalu Lakshmi Muddana | A Dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing | Computational Intelligence and Computing Research | ||
6 | Nabila Farnaaz M.A. Jabbar | Random Forest Modeling for Network Intrusion Detection System | Information Processing | India |
S. No. | Authors | Title of the paper | Name of the Journal | Volume | Issue | ISSN |
---|---|---|---|---|---|---|
1 | Prof.V.Anandam | Component Based Software Engineering Systems | IJERA | 2248-9622 | ||
2 | N Maanasa MR D Raman | Defense Against Cross-site Request Forgery Vulnerabilities | IJOEET | 2 | 3 | |
3 | K. Suma Rani D. Raman | A Study of Cross Site Scripting Compulsion Against Web Applications | IJOEET | 2 | 3 | |
4 | Nageswara Rao Sirisala C. Shoba Bindu | Fuzzy Based Quality of Service Trust Model for Multicast Routing in Mobile Adhoc Networks | IJOAER | 10 | 12 | 0973-4562 |
5 | V. Anandam | Software Quality Management | IJARCSSE | 5 | 7 | 2277- 128X |
6 | Manadhi Santhosh Kumar S. Venugopal | Robust Technique For Background Subtraction Using K-Means Algorithm | IJESR | 5 | 5 | 2277-2685 |
7 | V.Sachin S. Venugopal | An Efficient And Delay Tolerant Peer-To-Peer File Sharing In Disconnected MANETS | IJESR | 5 | 5 | 2277-2685 |
8 | D.Mahalakshmi K.Aruna D.Vaishnavi | A Denoising Framework Using Linear And Non-Linear Filters | IJOAER | 10 | 51 | 0973-4562 |
9 | A Nagendraiah, B. Sureshkumar | Allocating The Appliance Dynamically For Cloud Using Virtual Repository | IJESR | 5 | 5 | 2277-2685 |
10 | R.Kireeti S.Shoba Rani | Third Party Auditing For Secure Cloud Storage | IJRCSE | 5 | 2 | 2321-5585 |
11 | Raju, Pooja Srivastvas | Cloud Computing on Virtual Drivers in Cloud Online Services using Data Theft | ijatir | 7 | 12 | 2348-2370 |
12 | Raju S. Shalini, Pooja Srivastvas | Fast Data Collection for High Dimensional Data in Data Mining | IJR | 2 | 8 | 2348-6848 |
13 | B.Seetharamulu, Dr. G.V. Uma | Ranked Query Support in Untrusted Cloud without Reveal Sensitive Data | IJOCEIRT | 2 | 5 | 2349-7084 |
14 | B.Seetharamulu,Dr. G.V. Uma | Cloud Storage Using Convergent Encryption Technique | IJOAER | 10 | 79 | 0973-4562 |
15 | D.Vaishnavi, T.S.Subashini | Fragile Watermarking scheme based on Wavelet Edge Features | JEET | 1975-0102 | ||
16 | Mr. Murlidher Mourya, Mr. J. Phani Prasad | A Study on Market Basket Analysis using Data-set Considering and Intersection Pruning | IJARCCE | 4 | 7 | 2278-1021 |
S. No. | Authors | Title of the paper | Name of the Conference | Sponsered by | Place |
---|---|---|---|---|---|
1 | Nageswararao Sirisala, C.Shoba Bindu | Uncertain Rule Based Fuzzy QoS Trust Model in MANETs | Advanced Computing and Communications | IEEE | India |
2 | Prof. V. Anandam | Component Based Software Engineering Systems | Developments, Advances & Trends in Engineering Sciences | SPRINGER | Hyderabad |