(CSE) Publications
Faculty Publications
2020 – 2021S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 497 | Mr. Sreedhar Boya | Improved Ids To Prevent Online Cyber Pirates Attacks On Web-Based Applications. | Journal | International | IJAST |
2 | 757 | Dr. C. Sasikala | The Challenges, Technologies and Role of Fog Computing in the Context of Industrial Internet of Things. | Book Chapter | International | IGI Global |
3 | 729 | Mrs. K. Sudha Kumari | DNA encrypting rules with chaotic maps for medical image encryption. | Conference | International | ICICCS |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 176 | Dr. G. K. V. Narasimha Reddy | An Efficient Cryptographic Mechanism to Defend Collaborative Attack Against DSR Protocol in Mobile Ad hoc Networks. | Journal | International | Springer |
2 | 484 | Mrs. M. Soumya | Protecting Big Data Mining Association Rules using Fuzzy System. | – | – | Telekomnika |
3 | 176 | Dr. G. K. V. Narasimha Reddy | Integrating Wireless Sensor Networks with Cloud Computing. | Journal | International | IJITEE |
4 | 547 | Dr. B. Lakshmi Narayana Reddy | Integrating Wireless Sensor Networks with Cloud Computing. | Journal | International | IJITEE |
5 | 34 | Mr. P. Veera Prakash | Integrating Wireless Sensor Networks with Cloud Computing. | Journal | International | IJITEE |
8 | 5 | Dr. M. Ranjith Reddy | A Secured Framework to Protect Associate Rules in the Big Data Environment using Fuzzy Logic. | Journal | International | IIETA |
9 | 176 | Dr. G. K. V. Narasimha Reddy | Powering the Next Billion Devices with Iot Security. | Journal | International | IJITEE |
10 | 547 | Dr. B. Lakshmi Narayana Reddy | A Novel Implementation of information Security Policy Modeling for enterprise Networks. | Journal | International | IJAST |
11 | 5 | Dr. M. Ranjith Reddy | Recognition of Different Voice Pathologies with Data Augmentation Strategies. | Journal | International | IJAST |
12 | 582 | Mr. T. Venkata Naga Jayudu | Design & Development of Efficient IOT based Machine Learning Model to monitor Shrimp Aquaculture. | Journal | International | IJAST |
13 | 43 | Mr. G. Chinna Pullaiah | Character recognition on old copper transcripts using complex deep learning strategies. | Journal | International | IJAST |
14 | 29 | Mr. L Suman | Character recognition on old copper transcripts using complex deep learning strategies. | Journal | International | IJAST |
15 | 258 | Mr. C. Sudheer Kumar | Character recognition on old copper transcripts using complex deep learning strategies. | Journal | International | IJAST |
16 | 582 | Mr. T. Venkata Naga Jayudu | Wireless sensor systems (As a Reviewer). | Journal | International | IET |
17 | 761 | Mr. T. Murali Krishna | Machine Learning Approach for E-Mail spam filtering. | – | – | – |
18 | 29 | Mr. L. Suman | Machine Learning Approach for E-Mail spam filtering. | – | – | – |
19 | 670 | Ms.Sujana Bacchu | Machine Learning Approach for E-Mail spam filtering. | – | – | – |
20 | 258 | Mr. C. Sudheer Kumar | Improved Ids To Prevent Online Cyber Pirates Attacks On Web-Based Applications. | Journal | International | IJAST |
21 | 757 | Dr. C. Sasikala | Performance of Different Hadoop Clusters with Map Reducing Techniques. | Journal | International | IJAST |
22 | 771 | Mr. P. Chitralingappa | Trending Software Tools for Business Analytics in a nutshell, Volume – I. | Book | International | Buuks |
23 | 771 | Mr. P. Chitralingappa | Trending Software Tools for Business Analytics in a nutshell, Volume – II. | Book | International | Buuks |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 74 | Dr.T. Hitendra Sarma | Design and Analysis of a Tweet Alert System for Identifying Real Time Traffic Using K-Means Clustering Algorithm | Journal | International | IJITEE |
2 | 74 | Dr.T. Hitendra Sarma | A Tunable Particle Swarm Size Optimization Algorithm for Feature Selection | Conference | International | IEEE Congress on Evolutionary |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 547 | Dr. B.Lakshmi Narayana Reddy | Fibonacci Series Based Cryptography | Conference | International | EECCMC |
2 | 5 | Mr. M. Ranjit Reddy | Missing Values Imputation Using Genetic Algorithm for the Analysis of Traffic Data | Conference | International | Springer |
3 | 13 | Mr. P. Praneel Kumar | Inter image element loss less image compression with delimiter and folding. | Conference | International | ICPCSI |
4 | 34 | Mr. P. Veera Prakash | Permutation Dependent Symmetric Key Cipher | Conference | International | EECCMC |
5 | 547 | Dr. B.Lakshmi Narayana Reddy | Inter image element loss less image compression with delimiter and folding. | Conference | International | ICPCSI |
6 | 592 | Mr. G. Hemanth Kumar Yadav | A Survey on SLA Based Resource Allocation Strategies in Cloud Computing Environment | Conference | International | EECCMC |
7 | 74 | Dr.T. Hitendra Sarma | Improved k-means for Big Data clustering | Conference | International | IEEE |
8 | 74 | Dr.T. Hitendra Sarma | Consistent and Composite Key Cryptosystem for Secure Data Storage and Access in Cloud | Conference | International | IEEE |
9 | 547 | Dr. B.Lakshmi Narayana Reddy | Permutation Dependent Symmetric Key Cipher | Conference | International | EECCMC |
10 | 5 | Mr. M. Ranjit Reddy | CLUSTER DETECTION SCHEMES IN SPATIO TEMPORAL NETWORKS. | Journal | International | IJDKP |
11 | 34 | Mr. P. Veera Prakash | Fibonacci Series Based Cryptography | Conference | International | EECCMC |
12 | 5 | Mr. M. Ranjit Reddy | Smart Vehicular System based on the Internet of Things. | Journal | International | JOEUC |
13 | 5 | Mr. M. Ranjit Reddy | Clustering trajectory-based objects in spatio networks | Journal | International | IJDKP |
14 | 176 | Dr. G. K. Venkata Narasimha Reddy | Permutation Dependent Symmetric Key Cipher | Conference | International | EECCMC |
15 | 176 | Dr. G. K. Venkata Narasimha Reddy | Fibonacci Series Based Cryptography | Conference | International | EECCMC |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 13 | PRANEEL KUMAR PERURU | Confrontation and Opportunities of Big Data – A Survey | Conference | International | IEEE Xplore |
2 | 176 | Dr. G K Venkata Narasimha Reddy | A Data Allocation Stratagy for Dyanamic Groups in Cloud Based On Protected Anti Collision | Journal | International | IJR |
3 | 74 | T Hitendra Sarma | Speeding-up the prototype based kernel k-means clustering method for large data sets | Conference | International | IJCNN |
4 | 375 | S L Sailaja | Confrontation and Oppurtunities of Big data-A Survey | Conference | International | IEEE Xplore |
5 | 582 | T. Venkata Naga Jayudu | Detecting Truthfulness of Packet dropping Attacks using Public Auditing System in Wireless Ad hoc Networks | Journal | International | IJR |
6 | 585 | K. Varun Kumar Reddy | Improving URL Analysis Model for Focused Crawler | Journal | International | IJARCSSE |
7 | 585 | K. Varun Kumar Reddy | A Dual Encryption is providing a Better Security on the Public Cloud Security Mechanism | Journal | International | IJIRCCE |
8 | 585 | K. Varun Kumar Reddy | An Analytical Study and Implementation of Multi-Path File Sharing On Distributed Network | Journal | International | IJIRSET |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 13 | PRANEEL KUMAR PERURU | Confrontation and Opportunities of Big Data – A Survey | Conference | International | IEEE Xplore |
2 | 176 | Dr. G K Venkata Narasimha Reddy | A Data Allocation Stratagy for Dyanamic Groups in Cloud Based On Protected Anti Collision | Journal | International | IJR |
3 | 74 | T Hitendra Sarma | Speeding-up the prototype based kernel k-means clustering method for large data sets | Conference | International | IJCNN |
4 | 375 | S L Sailaja | Confrontation and Oppurtunities of Big data-A Survey | Conference | International | IEEE Xplore |
5 | 582 | T. Venkata Naga Jayudu | Detecting Truthfulness of Packet dropping Attacks using Public Auditing System in Wireless Ad hoc Networks | Journal | International | IJR |
6 | 585 | K. Varun Kumar Reddy | Improving URL Analysis Model for Focused Crawler | Journal | International | IJARCSSE |
7 | 585 | K. Varun Kumar Reddy | A Dual Encryption is providing a Better Security on the Public Cloud Security Mechanism | Journal | International | IJIRCCE |
8 | 585 | K. Varun Kumar Reddy | An Analytical Study and Implementation of Multi-Path File Sharing On Distributed Network | Journal | International | IJIRSET |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 497 | Sreedhar B | An Enhanced Multi layered Crypto System Based Secure and Authorized Deduplication Model in Cloud Storage System | Journal | International | IJIT |
2 | 547 | B Lakshmi Narayana Reddy | MAC Authentication for Compressed Image using Diffie-Hellman Key Exchange Algorithm | Journal | International | IJSETR |
3 | 547 | B Lakshmi Narayana Reddy | Lossy Image Compression Using Multi Dimensional Redundancy Replacement and Substitution with Delimiter | Journal | International | IJCTA |
4 | 547 | B Lakshmi Narayana Reddy | Exponential growth Equation Short Message Security | Journal | International | CYBERTIMES |
5 | 547 | Mr. B. Lakshmi Narayana Reddy | Lossless Grayscale Image Compression Using Intra Pixel Redundancy | Conference | International | ICCCPT |
6 | 176 | G K Venkata Narasimha Reddy | Facilitate Buffer Minimized Time and Live Video From Cloud to Mobile Networks | Journal | International | IJSETR |
7 | 176 | G K Venkata Narasimha Reddy | RSASSOL Based Spatial Approximate String Search | Journal | International | IJATIR |
8 | 176 | G K Venkata Narasimha Reddy | FoCUS Forum Crawler under Supervision | Journal | International | IJCSITR |
9 | 497 | Sreedhar B | A Secure Load Balancing Technique Based on Cloud Partitioning for Public cloud Infrastructure | Journal | International | IJATIR |
10 | 592 | G Hemanth Kumar Yadav | Fault Routing Node Detection Using DUAL in Wireless Sensor Networks | Journal | International | IJCSIT |
11 | 592 | G Hemanth Kumar Yadav | Virtual Destination Based Void Handling Scheme for Position Based routing in Mobile Ad Hoc Networks | Journal | International | R S Publications |
12 | 592 | G Hemanth Kumar Yadav | A Mobility Management Scheme for Handling Handoffs in Cognitive Radio Networks | Journal | International | IJAIST |
13 | 497 | B Sreedhar | LTI shortest Path Algorithm for Virtual Network Construction of Online Shortest Path Computation | Journal | International | IJSETR |
14 | 582 | T Venkata Naga Jayudu | Multiple Attribute Based Encryption for Secret Key Generations in Disruption Tolerant Networks | Journal | International | IJARCSSE |
15 | 582 | T Venkata Naga Jayudu | Super Node Localization for Time Synchronization in UWSNs | Journal | International | IJCSIT |
16 | 582 | T Venkata Naga Jayudu | Randomly Directed Exploration Protocol for Clone Detection in Wireless Sensor Networks | Journal | International | IJIRCCE |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 547 | B Lakshmi Narayana Reddy | Fast and Secure Image Transmission Using Enhanced Polygram Sunstitution Cipher with Huffman Compression Technique | Journal | International | IJEST |
2 | 547 | B Lakshmi Narayana Reddy | Enhanced Polygram Substitution Algorithm For Image Security | Journal | International | IJERT |
3 | 547 | B Lakshmi Narayana Reddy | Fast and Secure Permutation Dependant Symmetric Key cipher | Conference | International | NCRTWS |
4 | 176 | G.K.VENKATA NARASIMHA REDDY | Identification of packet dropping and modification in Wireless Sensor Networks | Journal | International | IJCER |
5 | 258 | C Sudheer Kumar | Cloud Storage and Secure Data Forwarding Using Forward-Error Correction Codes. | Conference | International | IEECS IRN |
6 | 43 | G Chinna Pullaiah | A Secure Data Forwarding Schema for Cloud Storage System | Journal | International | IJSSAN |
7 | 29 | L Suman | Rapid Reround Pattern | Conference | International | IJETCSE |
8 | 29 | L Suman | IPTV- Streaming Through Virutalization From Cloud | Conference | International | IJETCSE |
9 | 34 | P Veera Prakash | Multiset Generalization for Data Anonymity for high dimensional Dataspace | Conference | International | IJETCSE |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 13 | PRANEEL KUMAR PERURU | Useful Patterns for Mining in the Text Documents | Conference | International | ISN |
2 | 13 | PRANEEL KUMAR PERURU | Secure Framework and Sparcity Structure of Linear Programming in Cloud Computing | Conference | International | Elsevier |
3 | 74 | T Hitendra Sarma | Speeding-up the kernel k-means clustering method: A prototype based hybrid approach | Journal | International | PRL Elsevier |
4 | 74 | T Hitendra Sarma | Single pass kernel k-means clustering method | Journal | International | Sadhana, Springer |
5 | 74 | T Hitendra Sarma | Automatic Decision Supporting System for Universities | Conference | International | Elsevier |
6 | 43 | G Chinna Pullaiah | Linear Programming Computation for framework security and sparsity structure in cloud computation | Conference | National | NCCNIS |
7 | 43 | G Chinna Pullaiah | A Threshold Proxy Re-Encryption Scheme on Code – Based Erasure Cloud Storage System with Secure Data Forwarding | Conference | National | NCRTICT |
8 | 43 | G Chinna Pullaiah | A Secure Data Forwarding Schema for Cloud Storage Systems | Conference | International | ICSIT |
9 | 582 | T Venkata Naga Jayudu | A Trivial and Consistent Routing with In-Network Aggregation in WSN’s | Journal | International | IJSR |
10 | 582 | T Venkata Naga Jayudu | Pair Hand: A Pairing Based Cryptography to Secure Hand Over process | Journal | International | IJAEEE |
11 | 582 | T Venkata Naga Jayudu | A Pattern Mining Approach to Determine Correlated Parameters in Memory and Storage Allocations | Conference | International | ICEECS |
12 | 582 | T Venkata Naga Jayudu | OPSE: A Ranked Keyword Search to Improve the Cloud System Utilization | Conference | International | IEECS |
13 | 77 | P Shabana | Secure Framework and Sparsity Structure in Cloud Computing | Conference | International | Elsevier Science Direct |
14 | 77 | P Shabana | Secure Data Forwarding code-based cloud storage | Conference | International | ICAET |
15 | 375 | S L Sailaja | A Presumable Data Retentive Framework for Multi Cloud | Journal | International | IJCER |
16 | 78 | C Rekha | Secure Data Forwarding code-based cloud storage | Conference | International | ICAET |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 5 | Ranjit Reddy M | An Intelligent Approach to Improve the Query Performance using Disjoint Set Theory | Conference | International | IJCA |
2 | 5 | M Ranjit Reddy | A New Dimension to inprove the Query Performance Using Disjoint Set Theory | Conference | International | |
3 | 13 | PRANEEL KUMAR PERURU | Advanced Performance analysis of Transmissoin Control Protocol Collission Control Algorithms | Journal | International | SV Publishers |
4 | 13 | PRANEEL KUMAR PERURU | Optimal routing in multihop wireless Networks using Floyd-Warshall Algorithm | Journal | International | IJART |
5 | 13 | PRANEEL KUMAR PERURU | Optimal Routing in Multihop Wireless Networks using Floyd Warshall Algorithm | Conference | International | ICACM |
6 | 74 | T Hitendra Sarma | A hybrid approach to speed-up the k-means clustering method | Journal | International | IJMLC Springer |
7 | 74 | T Hitendra Sarma | An improvement to k-Nearest Neighbor Classifier | Conference | International | RAICS |
8 | 39 | M Narasimhulu | An Intelligent Approach to Improve the Query Performance using Disjoint Set Theory | Conference | International | IJCA |
9 | 582 | T Venkata Naga Jayudu | D-LAROD: A Density Based LAROD for Geographical Routing in Intermittently Connected MANETs | Journal | International | IJECT |
10 | 582 | T Venkata Naga Jayudu | Implementation of Competent & Scalable Multicasting Over Mobile Ad-hoc Networks | Journal | International | RJET |
11 | 582 | T Venkata Naga Jayudu | Defending DOS Attacks Using A Puzzle-Based Approach and Tracing Bcck to the Attacker | Journal | International | RJET |
12 | 582 | T Venkata Naga Jayudu | Recycling the Rejected Bandwidth in IEEE 802.16 Networks | Conference | International | IEECS |
13 | 582 | T Venkata Naga Jayudu | D-LAROD: A Density Based LAROD for Geographical Routin in Intermittently Connected MANETs | Conference | International | NCCNMC |
14 | 77 | P Shabana | Secure Framework and Organizational Structure of Linear Programming in Cloud Computing (ICSIE) | Conference | International | ICSIE |
15 | 78 | C Rekha | Evolving Groups Identification Multimode Networks | Conference | International | NCSCIT |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 74 | T Hitendra Sarma | A Fast Approximate Kernel k-means Clustering Method For Large Data sets | Conference | International | RAICS-2011 |
2 | 592 | G Hemanth Kumar Yadav | An Optimization Method for Dynamic Channel Allocation with Queues in Cellular Networks | Conference | National | NCECT 12 |
3 | 592 | G Hemanth KUmar Yadav | An Efficient Scheduling Algorithm for TCP/IP Over 3G Wireless Networks | Conference | International | ICIRET |
4 | 29 | L Suman | An Efficient Inter Domain Routing Protocol | Conference | International | ICIRET |
5 | 39 | M Narasimhulu | A New Dimension to Improve the Query Performance using Disjoint Set Theory | Conference | International | IJCA |
S.No | Faculty Id | Faculty Name | Title of Publication | Type | Level | Publisher |
1 | 74 | T Hitendra Sarma | An improvement to k-Nearest Neighbor Classifier | Conference | International | IMT |
2 | 74 | T Hitendra Sarma | k-Nearest Neighbor Mean Classifier: An Improvement Over k-Nearest Neighbor Classifier | Conference | International | ICETCSE |
3 | 74 | T Hitendra Sarma | Speeding-up the k-means clustering method: A prototype based approach | Conference | International | LNCS Springer |
[learn_press_profile]