Sei sulla pagina 1di 9

International Journals

1. Dr.T.K.Rama Krishna Rao,“Estimation of Precipitation During the Period of South West


Monsoon Using Numerical Methods Under C-Programming”, IJCET,Vol4,Issue3, 2013,
0976 – 6375.
2. Dr.T.K.Rama Krishna Rao, “Investigation of novel drugs as potential H1N1
neuraminidase, inhibitor”, IJSER, Vol 2, Issue1, 2012, 2249 0523.
3. Dr.T.K.Rama Krishna Rao,“Radial Basis Function of Neural Networks for quantitative
study on Images”,IJSER,Vol2,Issue1,2012,2249 0523.
4. Dr.T.K.Rama Krishna Rao,“Fuzzy and Swarm Intelligence for Software Effort
Estimation”,AITAM,vol2,issue1,2012,2167-6372.
5. Dr.T.K.Rama Krishna Rao,“Takagi-Sugeno and Interval Type-2 Fuzzy Logic for
Software , Effort Estimation “,IJERT,Vol1,Issue7,2012,2278-0181.
6. Dr. Pullela S V V S R Kumar ,“New approaches for the Features Extraction on
Handwritten Digit Image for recognition”, International Journal of Digital Content
Technology and its Applications (JDCTA),2015.
7. Dr. Pullela S V V S R Kumar, “A Novel Method for Rotational and Pose Invariant Child
or Adult Age Classification based On Morphological Pattern Representation
Schemes”,International Journal of Electrical & Computer Sciences(SCOPUS Indexed
Journal),Vol 15,Issue 5,2015,page 5 -14.
8. Dr. Vakulabharan,am VijayaKumar,Dr. Pullela S V V S R Kumar, “Age classification of
facial images using Third Order Neighbourhood Local Binary Pattern”,International
Journal of Applied Engineering Research,Vol 10,Issue 15,2015, 35704-35713.
9. Pullela SVVSR Kumar,V Vijaya Kumar,“Age Classification based on features extracted
from of Third Order Neighborhood Local Binary Pattern”,ICTACT Journal on Image and
Video Processing (IJIVP),Vol 5,Issue 2,2014, 926-931.
10. Pullela S V V S R Kumar,V V Sahiti Srinidhi,“Age Classification Based On Corner Pixel
Grey Level Co-Occurrences Matrix (CP-GLCM) of TN-LBP”,International Journal of
Computer Applications,Vol 90,13,2014, 20-26.
11. Dr. Vakulabharanam Vijaya Kumar,Pullela S V V S R Kumar,“Classification of Facial
Expressions based on Transitions Derived from Third Or Pullela S V V S R
Kumar,Rampay Venkata Rao,“Age Classification Based on Integrated
Approach”,International Journal of Image, Graphics and Signal Processing (IJIGSP),Vol
6, Issue 6,2014,50-57.der Neighborhood LBP”,Global Journal of Computer Science and
Technology (F),Vol 14,Issue 1,2014,page 1- 12.

12. Dr.G.Jaya Suma,R.V.S.Lalitha,“Vehicular Ad hoc Networks: A hybrid approach to data


dissemination in exigency situations”,Wireless Networks (WINE)Springer,Volume
21,Issue6,2015,ISSN 1022-0038.
13. Dr.G.Jaya Suma,R.V.S.Lalitha,“A Novel Approach to Assimilate VANET
communication Using (WAVE)Wireless Access Vehicular Environment protocol”, IJCA,
Volume 129,Issue 5,2015,0975 – 8887.
14. Dr.G.Jaya Suma,R.V.S.Lalitha,“Gauging the performance of VANET using moments”,
IOSR Journal of Computer Engineering IOSR(JCE),Vol.17,Issue 5,2015,e-ISSN:2278-
8727.
15. Dr.G.Jaya Suma,R.V.S.Lalitha,“V2V communication using RFID tags and optimizing
through Ant-Colony algorithm”,International Journal of Engineering Research in
Computer Science and Engineering (IJERCSE) IFERP,Vol 2,Issue 7,2015.
16. Dr.G.Jaya Suma,R.V.S.Lalitha,”Vehicular Ad Hoc networks:Trimming up pileups in data
dissemination”, Advances in Intelligent Systems and Computing,Advances in Intelligent
Systems and Computing(AISC) Springer,Voume381, Issue 3,2015,ISSN 2194-5357,
ISBN 978-81-322-2525-6, ISSN 2194-5365(electronic), ISBN978-81-322-2526-3 (e-
Book).
17. R.V.S.Lalitha,R.Sri Divya“MARKOV MODEL: Analyzing its behavior for Uncertainty
conditions”,Computer Engineering and Intelligent Systems,Vol 2,issueNo.5,2012,ISSN
2224-6096 (print) ISSN 2225-0581 (online).
18. B.Murali Krishna,R.V.S.Lalitha,“Secure Cloud Transactions using Two Phase Validation
Commit Protocol”,International Journal of Computer Science Information and
Engineering Technologies (IJCSIET), Volume 1, Issue 5,2015,ISSN:2277-4408.
19. M.Anil Kumar, An Efficient Leaf(Texture) Classification using Local Binary Pattern
with Noise Correction;paper will be published in Journal of Engineering and Applied
Sciences (Online) - SCOPUS INDEXED.
20. M.Anil Kumar, A Completed Modelling of Local Binary Pattern Operator for Wood
recognition System;International Journal of Innovations & Advancement in Computer
Science IJIACS;ISSN 2347 – 8616;Volume 6, Issue 6;June 2017.
21. M ANIL KUMAR,Y SRINIVASA RAO,“Audio Time Stamp Based
Authentication”,International Journal of Innovative Research and Practices,Vol
2,Issue10(1),2014.
22. Dantu Satya Srinivas,M Anil Kumar,“Attribute and Information Gain Based Feature
Selection Technique for Cluster Ensemble: Hybrid Majority Voting Based Variable
Importance Measure”,“International Journal of Innovative Technology and
Research.”,Vol 1,Issue 6,2013,2320-5547.
23. Shabuddin Sheik,B Nandana Kumar,“A Study and Implementation on User Search
Histories”,International Journal of Engineering Trends & Technology,Volume 4,Issue -
7,Jul-13,2231-5381,3186-3190.

24. D SRINU,M ANIL KUMAR,“Attribute and Information Gain Based Feature Selection
Technique for Cluster Ensemble: Hybrid Majority Voting Based Variable Importance
Measure”,“International Journal of Innovative Technology and
Research.”,Vol1,issue6,2013,2320-5547.
25. G. KALYANA CHAKRAVARTHY,K.GOPI KRISHNA, “RS: Assessing Collaborative
Filtering Recommender Systems for Social Networks”,IJRECS, Vo,l-5,Issue-1,Aug –
Sep 2015,ISSN-2321-5485,ISSN-2321-5784.
26. J.Divya Lalita Sri,G.Sruthi,“Maintaining Data Integrity In Cloud
Databases”,International Journal Of Electronic Communication and Computer
Engineering,Vol-6,Issue-5,2015.
27. Dr.G.Jaya Suma,R.V.S.Lalitha, “A Contemporary Solution to Ferret Out and Obviate the
Fake Messages in Vehicular Ad Hoc Networks by not Percolating through Web Server
“Procedia Computer Science (Elsevier),Vol.45, 2015,ISSN: 1877-0509.
28. Dr.G.Jaya Suma,R.V.S.Lalitha,“Alleviating the effect of Security Vulnerabilities in
VANETs Through Proximity Sensors”, Advances in Intelligent Systems and Computing
(AISC) Springer, Volume 337,Issue 1, ISSN: 2194-557,Pp 31-41.
29. Darisi Haritha,R.V.S.Lalitha,“Cluster Based Neighbor Coverage Relaying(CBNCR)-A
Novel Broadcasting Mechanism for Dissemination of Data in VANETs”,IJARCSMS,Vol
2,Issue 9,2014,ISSN: 2321-7782,9.
30. Nagireddi Suryakala,R.V.S.Lalitha,“A Novel Approach to Reliable Message
Broadcasting in Vehicular Ad hoc Networks by Prioritizing both Messages and Density
Based Regions”,IJARCSMS,Vol2,Issue9,2014,ISSN: 2327782,8.
31. Ch.S.V.V.S.N.Murty,K.Sudheer Kumar,“Artificial Intelligence an Essential Expected
Computer World Surveillance”, Global Journal of Computer Science and Technology,
Volume 12 ,Issue 10,17th July 2012. ,Online ISSN : 0975-4172Print ISSN : 0975-
4350Page 11-16.

32. N.Durga Deepthi Priya,Ch.S.V.V.S.N.Murty,“Efficient Approximate Algorithms To


Estimate The Sr Score For Queries over Databases”,International Journal of Research in
Computer and Communication Technology,Vol 4,Issue 10,October- 2015, Online: 2278-
5841 Print: 2320- 5156,Pages 814-817.
33. B.Mownika,Ch.S.V.V.S.N.Murty,“An algorithm for normal profile generation and for
attack”,International Journal of Research in Computer and Communication
Technology,Vol-4,Issue 10,October-2015, Online: 2278- 5841 Print: 2320- 5156,Pages
890-894.
34. Ch.S.V.V.S.N. Murty,“Pipeline Base Vibrant & Distributed Skyline Query
Processing”,IJCTR,Vol 1,Issue 8,2013.
35. K.Sudheer Kumar,Ch.S.V.V.S.N.Murty,“Instructive of Ooze Information”,Global
Journal of Computer Science and Technology,Volume 12 ,Issue 13, 10th September
2012.,Online ISSN: 0975-4172 & Print ISSN: 0975-4350,Pages 1-4.
36. K.Sudheer Kumar,Ch.S.V.V.S.N.Murty,“Monitor for Detection and Prevention of Fake
Agents”,International Journal of Computer Trends and Technologies,Volume 3, issue
4,2012,ISSN: 2231-2803,Pages 537-541.
37. D.Srikar,Ch.S.V.V.S.N.Murty,“Cross Reference Strategies for Cooperative
Modalities”,International Journal of Computer Trends and
Technology,Volume3,Issue3,2012,ISSN: 2231-2803,Pages 447-451.
38. N.Nalini Krupa,Ch.S.V.V.S.N. Murty,“UM: A Novel Seclusion Model for Defending
Structural Information of Social Network Data”,International Journal of Research in
Computer and Communication Technology,Vol-3,Issue 9, September – 2014, Online:
2278- 5841Print: 2320- 5156,Pages 1038-1045.
39. R V V N Bheema Rao,Ch S V V S N Murthy,“Pipeline Base Vibrant & Distributed
Skyline Query Processing”,IJCTR,Vol 1,Issue 8,2013.
40. B.Suresh,R.Sailaja,“An Improved Security Approach For User
authentication”,IJRCCT,Vol.4Issue 11,NOV,2015.
41. Deepakkishore Bokam,R.Sailaja,“Learning Ranking Model Adaption in the vector of the
Domain -Specific Search”,IJCTT,Vol 21,Issue 3,march,2015,ISSN: 2231-2803.
42. N.Mary Joycy Deborah,R.Sailaja,“ELIMINATION OF REPEATED DATA COPIES
WITH ENHANCED SECURITY IN HCLOUD”,IJRCCT,Vol.4,Issue 9,2015,ISSN (O)
2278-5841 ISSN (P) 2320-5156.
43. U.Satish,R.Sailaja,“Extensions Of The Crypto Graphic Methods To Provide Efficient
Routing Of Encrypted Events”,IJRCCT,Vol 4,Issue10,NOV,2015,2320-5156.
44. ARJUN.K,R.Sailaja,“Multi-Input–Multi-Output Network Systems using SPID
Algorithm”,IJSETR,Vol 3,Issue26,Sep-14, ISSN 2319-8885,Pages:5276-5278.
45. Sailaja Rayi,Nakkella Madhuri,“A Secure Group Communication Using Mod-Encoder
Compression Algorithm”, IJRSAT,Vol3,Issue2,june-july,2013,ISSN 2319-2690,120-124.
46. R.Sailaja,P.Sujatha,“A N EFFICIENT KEY EXCHANGE PROTOCOL BASED ON
SECRET SHARING”,IJESAT,vol2, issue5,Sep-oct,2012,ISSN: 2250–3676,1264 – 1269.
47. G. KALYANA CHAKRAVARTHY,N.S.L.KANTAM ,“DHT - Reducing Energy Cost
and Identifying Duplicate Nodes in Wireless Sensor Networks”,IJRCCT,Vol 3, Issue
10,Oct-14,ISSN 2320- 5156,ISSN 2278- 5841.
48. A K Chakravarthy, B Durga Anuja, “Trust Based Routing Protocol for Multi-Hop
Wireless Networks”,IJARCSMS,Vol2,Issue10,2014,ISSN: 2321-778.
49. Balireddi Durga Anuja,R. Srinivas,“Effective Bandwdth utilization through LPE in
anonymous",IJCA,vol4,7,2012, ,ISSN (0975 – 888).
50. Y Manga Devi,K Devi Priya,“Replica Allocation Over A Mobileadhoc
Networks”,IJRCCT,Vol 2,Issue 11,2013,2278 5841,5.
51. B MANIKYALA RAO,CH LATHA,A Collaborative Writing Tool on Cloud
Environment”,International Journal Of Engineering And Computer Science,Volume 2
,Issue 8 ,2013, ISSN:2319-7242.
52. K.Naga Bhargavi,“Scattered Access Control with Seclusion Support in Wireless
Sensor Networks by SecureQ Protocol”,IJRCCT,Vol3,Issue9,2014,2278- 5841.
53. A K Chakravarthy,B Durga Anuja,“Trust Based Routing Protocol for Multi-Hop
Wireless Networks”,IJARCSMS,Vol 2,Issue 10,2014,ISSN: 2321-7782,5.
54. V.V.Subba Rao, N.Venkata Ramana,“Active and Actionable User Profile based Query
Planning over a Network of Data ggregators in Shared Environment“,International
Journal of Advance Research in Computer Science and Management Studies,Volume
2,Issue 2014,ISSN:232 7782,12.
55. M.Chaitanya kumara,P. Nagendra Babu,“Survey On Clustering on the cloud by using
Map Reduce in Large Data Applications”,IJETT,Vol 21,Issue 8,2015,2231-5381,4(392-
395).
56. P. Nagendra Babu,M.Chaitanya kumara,“A Literature Survey On Cloud
Computing”,IJETT,Vol 21,Issue 6,2015,2231-5381,8(305-312).
57. S.Rama Sree,N.V.S.Sowjanya,SNSVSC Ramesh,“Providing Data Confidentiality of
Outsourced Data In Cloud”,International Journal of Research in Computer and
Communication Technology,Vol 3,Issue 9,2014.
58. SHAIK VAHIDA, SATTIBABU,"PRIVACY PRESERVING DATA MINING OVER
DISTRIBUTED DATA BASE USING K-ANONIMITY",2014.
59. Mohammed Karimuddin,M.Prudhvi Ravi Raja Reddy,“Apriori Algorithm for Vertical
Association Rule Mining.”,IJESRT INTERNATIONAL JOURNAL OF ENGINEERING
SCIENCES & RESEARCH TECHNOLOGY,2014.
60. J.Divya Lalita Sri,K.Laxman Rao,“Gait Template Based Huam Identification Using
Temporal Information Preserving “,International Journal Of Communication Network &
Security,Vol-2,Issue-2,2013.
61. D. SUJATHA,M ANIL KUMAR,“Handling of Recurrence Concept Drift in Data Stream
Using Time Stamp of Auxiliary Learning Model”,International Journal of Innovation
Technology and Research(IJITR),Vol1,Issue6,2013.
62. SubbaRaoPolamur,S. Rama Sree,“Fault Prediction OO Systems Using the Conceptual
Cohesion of Classes”,International Journal of Computer Science and Information
Technologies,vol3,Issue4,2012,0975-9646.
63. S.S.R.K.M.GUPTA,K.ARUNBHASKAR,“Integrated Model for test case prioritization of
divergent apps”,International Journal of Emerging Trends in Engineering and
Devlopment,vol6,issue2,2012,2249-6149.
64. N.Raghuram, “Authorised duplicate check in a hybrid cloud architecture for security
analysis” International Journal of Advanced Technology and Innovative Research,ISSN
2348-2370, Vol 9,Issue 1, pp 1-12 Jan 2017.
65. Ch.Sujana, M.Kalyan Ram,”An overview on multimedia data mining and its relevance
today”,IJCST, Vol 5,Issue 3, May-June 2017, ISSN:2347-8578.
66. Ch.Sujana, M.Kalyan Ram,”An overview on Image retrieval using Image processing
techniques”, IJCST, Vol 5,Issue 3, May-June 2017, ISSN:2347-8578.

National Conferences
1. Jeji Nagendra Kumar Dirisala,V.R. Murthy Jonnalagedda, S.V.V.S.R. Kumar
Pullela,“GA Based Clustering with K-means Clustering Result as Initial Population”,
National Conference on Soft Computing and its Applications (NCSCA07) ANITS,
Visakhapatnam.

2. R.Sailaja,Ch.Rupa,“A Fusion of PLSB and SVD based Image Watermarking


Approach”,IJACCC,Vol 2,Issue 2,Apr-14,89-91.
3. J.Divya Lalita Sri,G.Sruthi,“Maintaining Data Integrity In Cloud Databases”, CMR
NCRTCST - 2K15, 3rd National Conference on Research Trends in Computer Science &
Tech. – 2015,Sep-15.
4. P.Srilatha,“Remote System Visual Monitoring and Control Using Nonce based
Authentication”, Aditya Engineering College –TRACS- 2010.
5. N.Raghuram, “INTELLIGENT SYSTEM FOR MORE CONNECTED WORLD:
INTERNET OF THINGS”, 32nd National Convention of Electronics and
Telecommunication Engineers and National Seminar, 24th,25th Oct, 2016 at Vijayawada.
International Conferences

1. D. J. Nagendra Kumar, J.V.R. Murthy, Suresh Chandra Satapathy, S.V.V.S.R. Kumar


Pullela,“GP Boosting Classification on Concept Drifting Data Streams”, Advances in
Intelligent and Soft Computing (Springer Berlin Heidelberg) S.C. Satapathy et al. (Eds.):
Proceedings of the InConINDIA 2012,132. 2012.
2. Dr.R.V.S.Lalitha,P.Srilatha,” Mitigating Internet of Things(IoT) Services to Public
Health care Systems: Medical Enterpreneurs perspective.”, International Conference on
Entrepreneurship and Management, Aditya Global Business School on june 30 & july 1,
2017.
3. Dr.G.Jaya Suma,R.V.S.Lalitha,”Revitalizing VANET Communication using Bluetooth
Devices”, ,Visakhapatnam,Information System Design and Intelligent Application,
INDIA 2016, ,ANITS(AISC Springer),8th and 9th Jan, 2016.
4. Dr.G.Jaya Suma,R.V.S.Lalitha,Vehicular Ad-hoc Networks: Trimming Pile-Ups in Data
Dissemination using HTPVANET Algorithm”,IC3T 2015,CMR Technical
Campus,dates25th and 26th of July 2015.
5. Dr.G.Jaya Suma,R.V.S.Lalitha,”V2V communication using RFID tags and optimizing
through Ant-Colony algorithm”, International Conference on Emerging trends in
Engineering and Technology”,IFERP,NIER, Bangolore,28th June,2015.
6. Dr.G.Jaya Suma,R.V.S.Lalitha,“A Contemporary Solution to Ferret Out and Obviate the
Fake Messages in Vehicular Ad Hoc Networks by not Percolating through Web
Server”,International Conference on Advanced Computing Technologies and
Applications (ICACTA),Dwarakadas J.Sanghavi College of Engineering, Mumbai,26th
,27th March 2015.
7. Dr.G.Jaya Suma, R.V.S.Lalitha,”Alleviating the effect of Security Vulnerabilities in
VANETs Through Proximity Sensors”,Emerging ICT for bridging the future, JNTUH,
Hyderabad,12-14, December,2014.
8. M.Anil Kumar, Leaf Classification Using Completed Local Binary Pattern Of
Textures;2017 IEEE 7th International Advance Computing Conference.
9. Textured Based Combined Approach for Plant Leaf Classification; International
Conference On Emerging Trends in Science Technology Engineering and Management,
09th &10th, October 2015 pp.387-389.
10. R.Sailaja, “Intensifying the Security of Information by the Fusion of Random
Substitution Technique and Enhanced DES”, First International Conference for Soft
Computing and Informatics(SCI), held on 3-4 March 2017 at ANITS, Vizag.
11. R.Sailaja, Ch,Rupa, “Information Security using Genetic Algorithm with Penultimate and
Least Significant Bits”, Fifth International Conference on Advances in Information
Technology and Mobile Communication – AIM 2015,Aug 01,2015.
12. R.Sailaja,Ch.Rupa,“A Fusion of PLSB and SVD based Image Watermarking
Approach”,NCRTCS-2014,March,2014.
13. R.Sailaja,Ch.Rupa,“Enhanced DES Algorithm”,ICRTRICSE-2015,MAY 2,3-2015.
14. J.Divya Lalita Sri,G.Sruthi,“Maintaining Data Integrity In Cloud Databases”, CMR
NCRTCST - 2K15, 3rd National Conference on Research Trends in Computer Science &
Tech. – 2015,Sep-15.

Potrebbero piacerti anche