Publications List for Last five Years

Department of Computer Science & Engineering

Year

S No

Name of the Faculty

Publication Details

2017-18

1

Dr. T. Sunil Kumar Reddy

Investigation on Deep learning approach for Big Data, DS Rajput, TSK Reddy, DN Raju, Handbook of Research on pattern Engineering System Development for Big Data.

Power Aware Based Work Flow Model of Grid Computing Using Ant Based Heuristic Approach, TSK Reddy, DN Raju, PR Kumar, SRR Kumar in Big Data Analytics pp175-184.

Energy efficient Evolved Node based Station and Relay Station Placement for Green Cellular Networks, SKRT Arthi Murugdass, Vinoth Babu Kumarvelu, Sunil Kumar Reddy Thippayyagari in International Journal of Intelligent Engineering and Systems 11(2), 121-131.

2

Dr.D. Nagaraju

A survey on Communication Issues in Mobile Cloud Computing by Dasari Nagaraju, Vankadara Saritha in Walailak Journal of Science and Technology, Vol 15, No. 1, 2018.

Power Aware Based Work Flow Model of Grid Computing Using Ant Based Heuristic Approach, TSK Reddy, DN Raju, PR Kumar, SRR Kumar in Big Data Analytics pp175-184.

3

Dr Velmurugan J

Hybrid Intelligent Bayesian Model for Analyzing Spatial Data by Velmurugan J, Venkatesan M, in Springer, International Conference of Frontier Computing pp 376-391, 2018.

4

K.Thyagarajan

Design and Analysis of Wallace Tree Multiplier for CMOS and CPL Logic by K.Thyagarajan, S.Nagaraj, D.Srihari, K. Gopi in International Conference on Computation of Power, Energy Information and Communication(ICCPEIC), 2018.

5

G.B.Hima Bindu

Security Cloud Data Using Identity-Based Encryption Scheme under Key Exposure by G.B.Hima Bindu, in International Journal of Scientific Research in Computer Science, Engineering and Information Technology, ISSN: 2456-3307

6

V.Sujatha

Authorized Verification of Retrieving Data in Open Cloud Environment by V.Sujatha, A, SreeJyothsna in International Journal of Advanced Technology and Innovative Research, ISSN 2348-2370,Vol 09, Issue 06, 2017 pp0909-0914.

2016-17

1

Dr. J Janet

"Enabling Geographically distributed Cloud Applications using Key Value Storage Objects" in International Journal of Computational Intelligence Research 13(4),ISSN 0973-1873,pp583-594 , http://www.ripublication.com, by P Jyotheeswari, Dr J Janet and   T. Sunil Kumar Reddy.

"Enhanced Routing mechanisms for energy reduction in wireless sensor networks" in  Contemporary Engineering Sciences, Volume ,2016,No 22,pp1057-1065 http://dx.doi.org/10.12988/ces.2016.66112 by T Sunil Kumar Reddy, Dr J Janet, Dr K N Sivabalan, and Dasari Nagaraju

2

Dr. T. Sunil Kumar Reddy

"Enabling Geographically distributed Cloud Applications using Key Value Storage Objects" in International Journal of Computational Intelligence Research 13(4),ISSN 0973-1873,pp583-594 , http://www.ripublication.com, by P Jyotheeswari, Dr J Janet and   T. Sunil Kumar Reddy.

"Host CPU Load prediction using statistical algorithms:AComparative study" in  International Journal of Computer Technology and Applications"  9(12),pp5577-5582 by  T Sunil Kumar Reddy, shaik Naseera and GK Rajani.

"Enhanced Routing mechanisms for energy reduction in wireless sensor networks" in  Contemporary Engineering Sciences, Volume ,2016,No 22,pp1057-1065 http://dx.doi.org/10.12988/ces.2016.66112 by T Sunil Kumar Reddy, Dr J Janet, Dr K N Sivabalan, and Dasari Nagaraju

"An Efficient Power management  technique for data centers using smart grid" in  International Journal of Smart Grid and Green Communications"  1(2),pp156-165 by MK Nageswari and T Sunil Kumar Reddy

3

P Jyotheeswari

"Enabling Geographically distributed Cloud Applications using Key Value Storage Objects" in International Journal of Computational Intelligence Research 13(4),ISSN 0973-1873,pp583-594 , http://www.ripublication.com, by P Jyotheeswari, Dr J Janet and   T. Sunil Kumar Reddy.

4

Shaik Naseera

"Host CPU Load prediction using statistical algorithms:AComparative study" in  International Journal of Computer Technology and Applications"  9(12),pp5577-5582 by  T Sunil Kumar Reddy, shaik Naseera and GK Rajani.

5

Dr K N Sivabalan

"Enhanced Routing mechanisms for energy reduction in wireless sensor networks" in  Contemporary Engineering Sciences, Volume ,2016,No 22,pp1057-1065 http://dx.doi.org/10.12988/ces.2016.66112 by T Sunil Kumar Reddy, Dr J Janet, Dr K N Sivabalan, and Dasari Nagaraju

6

Dasari Nagaraju

"Enhanced Routing mechanisms for energy reduction in wireless sensor networks" in  Contemporary Engineering Sciences, Volume ,2016,No 22,pp1057-1065 http://dx.doi.org/10.12988/ces.2016.66112 by T Sunil Kumar Reddy, Dr J Janet, Dr K N Sivabalan, and Dasari Nagaraju

"Semantic Web Based framework for Scientific workflows in E-Science"in Library IS &T Book Chapter,with 16 pages content in 2017, DOI:10.1048/978-1-5225-2483-0.ch009 by  Nagaraju Dasari, Rajasekhar Reddy, Singanamala Vijay Kumar and Bharath bhushan.

“AN Evolutionary MultiObjective Approach for resource scheduling in Mobile Cloud Computing” in International Journal of Intelligent Engineering & Systems ,Volume 10 , Number 1,2017,DOI:10.22266/ijies2017.0228.02 – by Nagaraju Dasari and Vankadara

“Architecture of Fault Tolerance in Mobile Cloud Computing Using Disease Resistance Approach” in International Journal of Communication Networks and Information Security , Volume 2 , Number 2,August 2016. – by Nagaraju Dasari and Vankadara Saritha

"Cost Optimization approach for cloud based smart grid data management"" in  International Journal of Smart Grid and Green Communications"  Volume 1(issue 2),http://doi.org/10.1504/IJSGGC.2016.078949 by Nagaraju Dasari and Vankadara Saritha

An Enhanced Virtual Backoff Algorithm for wireless sensor networks by Dasari Nagaraju, Vankadara Saritha, Parimala Venkata Krishna, M. Pounambal in International Journal of Wireless and Mobile Computing, Vol 13, Issue 3, 2017.

“Learning Automata Based Decision Making Algorithm For Task Of Loading In Mobile Cloud”, In Computer, Information & Telecommunication System(CITS), 2016 By  Nagaraju Dasari And Vankadara Saritha

“Web Semantics For Textual And Visual Information Retrieval” Published As Book Chapter In The Advances In Data Mining And Database Management(ADMDM) Book Series, ISBN: 978-1-5225-2483-0 By N V Rajasekhar Reddy And  Dasari Nagaraju

“ Semantic Web Based Framework For Scientific Workflows In E- Science”, Published As Book Chapter In The Advances In Data Mining And Database Management (ADMD), Book Series, , ISBN: 978-1-5225-2483-0 By N V Rajasekhar Reddy, Dasari Nagaraju, Bharath Bhusan And S. Vijaya Kumar.

7

Arthi Murugadoss

“Fuzzy Logic Based Coverage and Cost Effective Placement of Serving Nodes for 4G and Beyond Cellular Networks” presented as an research article in International Journal of Electronics and  Communications (AEU)–71( 2017) PP 9-20. http://dx.doi.org//10.1016/j.aeue.2016.11.001  by Arthi Murugadoss , Arulmozhivarman  Pachiyappan,Vinoth Babu Kumaravelu and Emy Marium Geoge

“A Novel Low Complex Antenna Selection Scheme for Beyond 4G (B4G)Systems” in Springer  Wireless pers Commun,Published online 04 February 2017. DOI 10.1007/s11277-017-4005-x by  Arthi Murugadoss  and Arulmozhivarman  Pachiyappan

“Quality of Service aware antennaselection scheme for multi hop relay networks” in International Journal of Wireless Communications and Mobile Computing”– Volume 2017 –,Article Id:8086204,25 pages .http://doi.org//10.1155/2017/8086204 by Arthi Murugadoss  and Arulmozhivarman  Pachiyappan

8

N V Rajasekhar Reddy

“ Semantic Web Based Framework For Scientific Workflows In E- Science”, Published As Book Chapter In The Advances In Data Mining And Database Management (ADMD), Book Series, , ISBN: 978-1-5225-2483-0 By N V Rajasekhar Reddy, Dasari Nagaraju, Bharath Bhusan And S. Vijaya Kumar.

“Web Semantics For Textual And Visual Information Retrieval” Published As Book Chapter In The Advances In Data Mining And Database Management(ADMDM) Book Series, ISBN: 978-1-5225-2483-0 By N V Rajasekhar Reddy And  Dasari Nagaraju

“ Semantic Web Based Framework For Scientific Workflows In E- Science”, Published As Book Chapter In The Advances In Data Mining And Database Management (ADMD), Book Series, , ISBN: 978-1-5225-2483-0 By N V Rajasekhar Reddy, Dasari Nagaraju, Bharath Bhusan And S. Vijaya Kumar.

9

Velmurugan.J

Velmurugan.J and M. Venkatesan., 2017.Soft Computational Based Feature Selection Model for Landslide Risk Analysis. International Conference onEmerging Innovation in engineering and Technology ICEIET 2017.pp 81-89

Velmurugan.J and M. Venkatesan., (Accepted).Hybrid Intelligent Bayesian Model for Analyzing Large Spatial. 6th International Conference on Frontier Computing (FC 2017). Scopus Indexed

Velmurugan.J and M. Venkatesan., 2017. ” Soft Bayesian Model for Landslide Risk Analysis”. International Journal of Soft Computing, 12(3), pp. . ScopusIndexed

Velmurugan.J and M. Venkatesan., (In Press).” Soft Prediction Model for Spatial Data Analysis”. International Journal of Global Environmental Issues(Inderscience).Scopus Indexed

Velmurugan.J and M. Venkatesan., (In Press).Soft Feature identification method complex Spatial Data. International Journal of Pure and Applied Mathematics. Scopus Indexed

Soft Computational model for identification landslide factor by Velmurugan J, M Venkatesan in Journal of Advanced Research in Dynamical and Control Systems, Vol-9, Sp-6/2017.

Identification of Dipoles in Climate Data By Velmurugan, International Journal of Innovative Technologies, Vol.4 Issue 06, June 2016 Page 0973-0978

10

K.Aravind

“ A Novel approach for Tumour Image set classification based on multi manifold deep metric learning”,Pakistan journal of Bio technology,vol 13(3)205-209(2016),ISSN:2312-7781 by K.Aravind

2015-16

1

T Sunil Kumar Reddy

“Power Aware Framework for Scheduling Tasks in Grid-Based Workflows” in International Journal of Communication Networks and Distributed Systems – Volume 14 – No 1 2015 .P Venkata krishna  and T Sunil Kumar Reddy.

2

Arthi Murugadoss

“Quality of Service Awarwe multi-hop relay networks for green radio communication” in Journal of Green Engineering 5(2) PP 1-21,2015 by Arthi Murugadoss ,  Arulmozhivarman  Pachiyappan and ,KV Babu

“Technical Challenges in Mobile Multi –Hop Relay Networks” in International Journal of Applied Engineering Research– Volume 10 ,ISSN 0973-4562, Number 10(2015) PP 26025- by Arthi Murugadoss , Arulmozhivarman  Pachiyappan,Vinoth Babu Kumaravelu and Emy Mariam Geoge.

"Techniques to enhance the quality of service of Multihop relay Networks" in Procedia Computer Science Volume 46,PP973-980 by Arthi Murugadoss,Arulmozhivarman Pachiyappan and K.V. Babu and G.R.Reddy.

“Fuzzy Logic Based Coverage and Cost Effective Placement of Serving Nodes for 4G and Beyond Cellular Networks” presented as an research article in International Journal of Electronics and  Communications (AEU)–71( 2017) PP 9-20. http://dx.doi.org//10.1016/j.aeue.2016.11.001  by Arthi Murugadoss , Arulmozhivarman  Pachiyappan,Vinoth Babu Kumaravelu and Emy Marium Geoge

“A Flexible and Cost effective Heterogeneous network Deployment Schemefor beyond 4G”  in Arabian Journal of Science and Engineering 41(12)  PP 5093-5109 ,2016 by Arthi Murugadoss and  Arulmozhivarman  Pachiyappan .

“Quality Awarwe relay station  Deployment Scheme  for green radio communication” in Journal of Green Engineering 6(2) PP 1-28,2016 by Arthi Murugadoss ,  Arulmozhivarman  Pachiyappan and  and KV Babu

"An Improved Three Input Fuzzy Based Relay Station Deployment Scheme for beyong 4G Networks " published as book chapter by M.Arthi ,K.Vinoth Babu,Arulmozhivarman  Pachiyappan and Maria Vincent

3

D.Nagaraju

Cost Optimization approach for Cloud-based smart grid data management by Dasari Nagaraju, V. Saritha in International Journal of Smart Grid and Green Communications, Vol 1, Issue 2, 2016.

"Architecture of Fault tolerance in Mobile Cloud Computing Using Disease Resistance Approach" in International Journal of Communication Networks and Information Security,Volume 2,Numer 2,August 2016 by Nagaraju Dasari and Vankadara saritha.

4

J.Janet

"Protected Admission Control with Secret Verificatuion for Active groups in the Cloud" in International Journal of Advanced Computational Engineering and Networking Vol 3, Issue 6 June 2015 ISSN -2320-2106 by Dr.J.Janet and R.S.Geethanjali.

5

S.Balakrishnan

"An Effective Two way Classification of Breast Cancer Images " in International Journal of Applied Engineering Research,Vol-10,Issue 21,pp42472-42475,2015 by S.Balakrishnan,P.Palani Kumar and S.Geofrin Shirly.

"An Agent Based Collaborative Spam Filtering System Assistance using JADE " in International Journal of Applied Engineering Research ,Vol-10,Issue 21 pp42476-42479,2015 by S.Balakrishnan , Dr.K.L.Shanmuganathan.

"MultiAgent Based Secured Video Authentication Scheme using JADE"in International Journal of Applied Engineering Research ,Vol-10,Issue 4,pp9857-9863,2015 by S.Balakrishnan ,K.L.Shanmuganathan and Shanmuga Priya.

2014-15

1

Dr. Shaik Naseera

P. Leelavathi and Dr. Shaik Naseera, “QoS Grading Calculation for Cloud Services”, International Journal of Science, Engineering and Technology,” ISSN : 2278 – 7798,  vol. 3, Issue 9, Sep 2014.

2

T. Sunil Kumar Reddy

“A Study of Asynchronous Routing Protocols in Peer to Peer Networks” in International Journal of P2P Network Trends and Technology (IJPTT) – Volume 5 – February 2014 ISSN: 2249-2615.D Arun Kumar Reddy and T Sunil Kumar Reddy

Updating the Routing Position in Adhoc Networks by using Adaptive Position” on International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Issue 3- April 2014 sited at CORNELL UNIVERSITY,U.K. P. Ravi Kumar, T.Sunil Kumar Reddy and D.Nagaraju

“Distributed Utility-Based Energy Efficient Cooperative Medium Access Control in MANETS” in International Journal of Modern Engineering Research (IJMER) Vol. 4  Iss. 5 May. 2014  17. ISSN: 2249–6645.Mr. M. Naresh, Mr. Gudditti.Viswanath, Mr. T. SunilKumarReddy

“An Adaptive Consistency and Top Caching Schemes for Distributed Data Sharing in Hybrid Peer-to-Peer Systems” in International Journal of P2P Network Trends and Technology (IJPTT) – Volume 8 – May 2014, ISSN: 2249-2615, mahaboob Basha, D. Arun Kumar Reddy, T.Sunil Kumar Reddy

“Power aware for Scheduling Tasks in Grid based work flows” International Journal of Communication Networks. Inderscience Publishers.ISSN 0974-3154, 2015, (SCOPUS INDEXED), T Sunil Kumar Reddy, P. Venkata Krishna, P.Chenna Reddy

“Fuzzy bee optimization for resources allocation in Grid Computing” International Journal of Engneering Research and Technology, Vol. 7, No. 1, pp. 17-27, 2014.ISSN 0974-3154 (SCOPUS INDEXED), T Sunil Kumar Reddy, P. Venkata Krishna, P.Chenna Reddy

“Power aware based work flow model optimization using  Fuzzy bee colony method ” APRN  Journal of Engneering  and Applied sciences, Vol. 9, No. 4,  2014. ISSN 1819-6608 (SCOPUS INDEXED) T Sunil Kumar Reddy, P. Venkata Krishna, P.Chenna Reddy

“Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets”International Journal of Engineering Inventionse-ISSN: 22787461, p-ISSN: 2319-6491 Volume 4, Issue 2  2014, PP: 08-12 G.Viswanath, G.Sreenivasulu, T.Sunil kumar Reddy

3

Janet. J

Janet, “A Genetic Optimized Neural Network for Image Retrieval in telemedicine” EURASIP Journal on image and video processing,2014:9, doi:10.1186/1687-5281-2014-9,published date:11/2/2014.

Janet, Design and implementation of a novel web page ranking algorithm for improved web search, International journal of inventions in computer science and engineering, Volume 1, issue 3,2014

Janet J, “Advanced Mining Technique for Improving the order of web data Search in online communication”, IJSER ISSN 2347-3878, Volume 2 issue 8 ,2014 PP32-36.

4

D. Nagaraju

"Binary Protector: Intrusion Detection in Multi tier Web applications" in International Journal of Engioneering Trends and Technology(IJETT), Volume 10, Issue 2, April 2014 by D Nagaraju, C. Venkatesh and T Sunil Kumar Reddy.

"A survey on Communication Issues in Mobile Cloud Computing" in Walailak Journal of Science and Technology, Volume 14, Issue 10, 2016, by D.Nagaraju and V.Saritha.

5

S.Balakrishnan

"Amerlioration of Artificial Intelligence using Game Techniques for an imperfect information board game geister" in International Journal of Applied Engineering Research, Volume 9, Issue 22, pp-11849-11860, 2014 by S.Balakrishnan, K.L.Shanmuganathan and RajaSrinivasan.

"Intrusion Fault Tolerant and Secure Commitment of OS levell virtual machine" in International Journal of Advanced Research in Engineering and Technology, Volume 2, Issue 1, Jan 2014, ISSN-2320:6802 by S.Balakrishnan and T.Srinivasan.

"An Agent Based Prioritized E-Mail Co-Ordination Using JADE" in International Journal of Advanced Computers and Communications, Volume 3, Issue 1, Jan- 2014 by S.Balakrishnan.

6

K.Thyagarajan

K. Thyagarajan,A Efficient Approach of Network Intrusion Detection and Counter Measures in Virtual  Network Systems,IJSR, impact factor 3.38, Volume 3, Issue 8 ,Auguest ,2014.

“K. Thyagarajan, Document Clustering For Digital Devices: An Approach to Improve Forensic Analysis , International Journal Of Engineering Research & Management Technology ,ISSN: 2348-4039  Volume 1, Issue-4 ,2014 PP-208-212

7

P Jyotheeswari

P Jyoteeswari, ”Rational secure computation and ideal mechanism design”, International Journal of Computer science, Vol‐11, Issue.1, August 2014.

P.Jyotheeswari,”A Reliable cloud data sharing scheme Ensuring security for Frequent change of membership”, International Journal of Innovative Research in Computer and Communication Engineering,Vol 2,Issue 7 ,July 2014.

P.Jyotheeswari,” A Privacy-Preserving Unpadded RSA based-Third Party Auditing Protocol for Cloud Storage Secure” The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Vol. 2, No. 5, July 2014.

P.Jyotheeswari” Secure Pre Key Sharing System for Wireless sensore Networks”,IJCSONLINE,Vol 11,issue 1, August 2014

P.Jyotheeswari,”An Efficient Mobile Configuration for Data Intensive in WSN’s”,IJCS,Volume  10,july 2014

8

S Vasu

S Vasu,“Distributed Detection of Node Replication Attacks in disruption tolerant Networks” a research paper published in International Journal & Magazine of Engineering Technology Management & Research,ISSN:2348-4845,Volume 1,Issue No:9,September 2014.

S Vasu,”A new Approach of Node Clone Detection Protocols in Wireless Sensore  Networks”.IJIRCCE,Vol 2, Issue July 2014

9

J VelMurugan

J Velmurugan, “Extraction of Knowledge from Online Database ”, IJSER,  Vol 2 Issue 8.August 2014  Page 43-46

J Velmurugan, “Reducing Electronic Provisioning Cost In Social Wireless Network”, IJCSONLINE, Vol 11 Issue 1.August 2014  Page 01-06.

J Velmurugan, “ Efficient Estimate String Search In Spatial Database”, IJCSONLINE, Vol 11 Issue 1.August 2014  Page 01-09

10

K. Dasaradharami Reddy

K Dasaradharami Reddy,” Document Clustering For Digital Devices: An Approach to Improve Forensic Analysis , International Journal Of Engineering Research & Management Technology ,ISSN: 2348-4039  Volume 1, Issue-4 ,2014 PP-208-212

11

G.Sateesh

G.Sateesh, “Obviation of secluded information on Social networks from Inference Assails” International Journal of Emerging Research in Management & Technology, ISSN:2278-9359(Volume-3, Issue-8),August 2014. PP 57-63

G.Sateesh,”Depletion of Energy Attacks in wireless Sensor networks’. International journal of Engineering and Computer science, Volume 3, Issue 8 August 2014, PageNo 7664-7667. PP 7665-7667

G.Sateesh,”Design A Novel Mobiles Social Tv Using Paas And Iaas Service Clouds”, International Journal of Computer Science,Vol-11,Issue.1,August 2014, PP -1-6

G.Sateesh,”Collaborative Authorization Framework for Security and Privacy in Social Networks” ,International Journal Of Engineering Research & Management Technology July- 2014 Volume 1, Issue-4, ISSN: 2348-4039. PP 195-201

G.Sateesh,” Intelligent Traffic Management Service (ITMS) for High Speed Networks Using Intel Rate Control”, International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 431-439.

12

A.Bhanu Prakash

A.Bhanu Prakash, “Obviation of Secluded Information on Social Networks from Inference Attacks”,IJERMT,Vol 3,Issue 8,Aug 2014,ISSN:2278 9359.

13

R Kumaran

R Kumaran, “ A Novel Frame work for mitigating routing attaches in MANETS”,IJCS, Vol 10,July,2014 ,1-5

R Kumaran, “ Cloud information Accountability frame work based on the Notion of information Accountability “,IJCST,Vol 2 issue 4 ,July-Aug,2014 , Page 132-137

14

S Suresh Kumar

S Suresh Kumar ,“Cross –Sphere confidentiality Preserving Supportively fire partition optimization “ IJCS, Volume 11,Issue 1 Aug-2014, Page 1-6

15

S Himabindu

S Himabindu, Depletion of energy attacks in wireless sensor Networks, International Journal of Electrical and Computer Science ISSN :2319-7242 ,Volume 3 Issue 8 August,2014,PP 7664-7667.

16

S Laasiya Priya

S Laasiya Priya, A Generalized Flow-based method for analysis of Implict Relationships on Wikipedia, National Conference on recent trends in Advanced Computing,April 2014, SVCET

17

G Nandini

G Nandini,”A Generalized flow-based method for analysis of Implicit Relationships on Wikipedia.”Proceedings of National Conference on Recent Trends in Advanced Computing”.SVCET, 25th April, 2014.

2013-14

1

J Janet

J Janet,“ Discrete Shearlet Transform Based Classification of Micro calcification in Digital Mammograms”,  Journal of Computer Applications (JCA) ISSN: 0974-1925, Volume VI, Issue 1, 2013.

J.Janet, “A Segmentation based Retrieval of Medical MRI Images in Telemedicine” Journal of Scientific and Industrial Research, JSIR, Vol 72(02),pp. 107- 113,2013.

J.Janet, “joint medical image compression Based on Wavelets “.proceeding of ICST conference,2013

J Janet, Securing Mobile Ant Agent Using Chinese Remainder Theorm, Journal of Computer Sceince, ISSN 1549-3636,1211-1216,2013

J Janet, Improved energy efficiency using distributed swarm intelligence(DSI) in wireless mobile networks, IFSN, CIIT International Journal of Networking and Communication Engineering, issue , January ,2013

J Janet, An Efficient Classification  Approach for Microcalcification in Digital Mammograms based on Discrete Shearlet Transformation, Journal of Computer Applications, ISSN: 0974-1925, Volume VI, Issue 1, 2013.

2

Shaik Naseera

Shaik Naseera and K.V. Madhumurthy, “Prediction based job Scheduling Strategy in a volunteer Desktop Grid,” Springer Verlag’s Communications in Computer and Information Science, vol. 361, pp. 25-38, 2013. Impact Factor 1.25.

Shaik Naseera and K.V. Madhumurthy, “A New Approach for Dynamic Job Scheduling in a Volunteer Desktop Grid,” International Journal of Computer Applications 61(18): pp. 6-11, 2013. Impact Factor 0.821.

Shaik Naseera “Behavior Monitoring of a Process in a Computational Grid Using Hidden Markov Model,” Imanager’s Journal on Computer Science, vol. 1(3), Sep – Nov 2013.

3

P Neelakantan

P Neelakantan ,An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System".International Journal of Research in Computer Science, 3 (3): pp. 9-15, March 2013. doi:10.7815/ijorcs.33.2013.063

4

T. Sunil Kumar Reddy

“Security issues in dynamic Topological Peer to Peer Networks”. On IJCAE, Vol.4 ISSUE 3, Sep 2013. T. Sunil Kumar Reddy and D.Nagaraju

5

K Thyagarajan

K Thyagarajan,”A Model for an Optimal Approach for Job Scheduling in Cloud Computing” International Journal of Engineering Research & Technology Vol. 2 Issue 10, October – 2013  ISSN: 2278-018 Page 3561-3564

K. Thyagarajan, ”Enhancement of Java Access Control using Spring with AOP and AspectJ” International Journal of Engineering Research & Technology Vol. 2 Issue 10, October – 2013  ISSN: 2278-018,Page 3665-3669

K Thyagarajan, ”Comparison of Mobility Management in Mobile IP V 4  & Mobile IP V6  Networks   ” International Journal of Engineering Research & Technology  Vol. 2 Issue 5, May – 2013  ISSN: 2278-018, Page 479-486.

K Thyagarajan,“Organizing User Search Historie”. PP 102-104,Proceedings of National Conference on  Data Warehousing & Data Mining, SVCET, Chittoor, 2nd April, 2013

K Thyagarajan, Performance Analysis and Evaluation of handover in Mobile”. PP 18-22, “Proceedings of National Conference on Advanced Computing Architecture”, SVCET, Chittoor, 11th-12th March, 2013.

K Thyagarajan,“Organizing User Search Historie”. PP 102-104,Proceedings of National Conference on  Data Warehousing & Data Mining, SVCET, Chittoor, 2nd April, 2013.

6

S Vasu

S Vasu ,”A Model for an Optimal Approach for Job Scheduling in Cloud Computing”      International Journal of Engineering Research & Technology Vol. 2 Issue 10, October – 2013  ISSN: 2278-018

S.Vasu, Performance Analysis and Evaluation of handover in Mobile IPV6. PP 18-22, “Proceedings of National Conference on Advanced Computing Architecture”, SVCET, Chittoor, 11th-12th March, 2013.

S.Vasu, “Live Communication among Client and Server”. PP 23-25, “Proceedings of National Conference on Data Warehousing & Data Mining”, SVCET, Chittoor, 2nd April, 2013.

S.Vasu,”A Survey on Evaluation of preventing selective intentional Interference Attacks in Wireless Networks”. PP 99-101, “Proceedings of National Conference on Data   Warehousing & Data Mining”, SVCET, Chittoor, 2nd April, 2013.

7

J VelMurugan

J VelMurugan, “GEO spatial image retrieval using content based image retrieval technique, IJRCS Vol2 Issue 1.Sep 2013 Page 6-9

8

K Dasaratharami Reddy

K Dasaratharami Reddy,”Risk Management in Software Engineering IJCSC, Vol 4, Number 2 Sep 2013, PP-32-38 ISSN 0973-7391, PP-32-38.

K.Dasaradharami Reddy "Detecting Selfishness in Replica Allocation over A Mobile Adhoc Network", National Conference on Data ware Housing and Data Mining, April 2nd 2013.C.

K.Dasaradharami Reddy, Ensuring Data Storage Security in Cloud Computing", National Conference on Advanced Computing Architecture March, 11th -12th 2013.

9

G.Sateesh

G.Sateesh,”Relative investigation of DSDV, DSR and TORA in Manet”, International Journal of Advanced Trends in Computer Science and Engineering, Vol.2 , No.6, Pages : 124-128 (2013)

G.Sateesh , A MAC Protocol Based on Dual sensing strategy for Ad HOC Networks. PP 50-57, “Proceedings of National Conference on Advanced Computing Architecture”, SVCET, Chittoor, 11th-12th March, 2013

G.Sateesh ,”Managing Selfish Nodes through Node Cooperative Incentives in MANETS”.PP 96- 99,”Proceedings of  National Conference on Advanced Computing Architecture”, SVCET, Chittoor, 11th-12th March, 2013.

G.Sateesh, Evaluating Dynamic Compression to Reduce Transfer Penalty in IaaS Clouds. PP 100-105, Proceedings of   National Conference on Advanced Computing Architecture”, SVCET, Chittoor, 11th-12th March, 2013

G.Sateesh, Retrieving Data through Web graphs. PP 32-35, “Proceedings of National Conference on Data Warehousing & Data Mining”, SVCET, Chittoor, 2nd April, 2013.

10

B.Palgunakumar

B.Palgunakumar,“Evaluations of MAP Reduced-Inspired Processing Jobs on a Cloud System”. ISSN: 2231-5381, December 2013, Volume-6, Number-4, International Journal of engineering trends and technology (IJETT). Page -375-379

B.Palgunakumar ,”A New Method For Improve The Development Activities In Agile Software  in National Conference on Advance Applications in Conjunction with National Workshop on Cloud Computing and its Applications , by Department of computer science at S.V.University, tirupati on 20th & 21st  February, 2013.

11

M. Revathi

M. Revathi, Impressive Order Invention in Pattern Evolution for Text Mining, IJLTET, Vol. 2 Issue 4 July 2013, ISSN: 2278-621X. page :122-127

M Reevathi, Impressive order invention in Pattern Evolution for Text Mining”,National Conference on Advanced Computing Architecture,SVCET,12 March,2013

12

A BhanuPrakesh

A BhanuPrakesh,”.Risk Management in Software Engineering IJCSC, Vol 4, Number 2 Sep 2013, PP-32-38 ISSN 0973-7391, PP-32-38.

13

K Pavan Kumar

K Pavan Kumar, Presented a paper entitled “Fault Tolerance In Real Time Cloud-computing” in National Conference on Computer Networks and Information Security held at Sree Vidyanikethan Engineering College, Tirupati, in 2013

K Pavan Kumar, Presented a paper entitled “Network Vulnerabilities in clod computing” in National Conference on Advanced Computing Applications held at Sri Venkateswara University, Tirupati, in 2013

K Pavan Kumar Presented a paper entitle"Dos attcks in cloud computing” in National Conference on Advanced Computing Applications held at Sri Venkateswara University, Tirupati, in 2013

14

V Sujatha

V Sujatha “,Research Scholars Evaluation based on Guides View using ID3”, IJRET, Volume 2 Issue 10, Oct 2013,Page s.380-383

V Sujatha, Research Scholars Evaluation Based on guides view using id3,IJRET,Volume 2,Issue 10,Oct 2013

V Sujatha, A Symmetric Routing Algorithm for Mobile Ad Hoc Networks. PP 30-34, “Proceedings of  National Conference on Advanced Computing Architecture”, SVCET, Chittoor, 11th-12th   March, 2013.

15

N Lokesh

N Lokesh,”Evaluations of MAP Reduced-Inspired Processing Jobs on a Cloud System”. ISSN: 2231-5381, December 2013, Volume-6, Number-4, International Journal of engineering trends and technology (IJETT).

16

S Sri Harshna

S Sri harshna,”Efficient Retrieval Of Files From Cluster Based Web Servers. PP 96-98, “Proceedings of National Conference on Data Warehousing & Data Mining”, SVCET, Chittoor, 2nd April,2013.

S Sri Harshna “A Model for an Optimal Approach for Job Scheduling in Cloud Computing”      International Journal of Engineering Research & Technology Vol. 2 Issue 10, October – 2013  ISSN: 2278-018

17

P Govardhan

P Govardhan “. Risk Management in Software Engineering IJCSC, Vol 4, Number 2 Sep 2013, PP-32-38 ISSN 0973-7391, PP-32-38.

18

B. Kishore

B. Kishore Resource Provisioning Cost in Cloud Computing. PP 68-71, “Proceedings of National  Conference on Data Warehousing & Data Mining”, SVCET, Chittoor, 2nd April, 2013.

19

S Himabindu

S Himabindu, Ensuring Data Storage Security in Cloud Computing, National Conference on Advanced Computing Architecture, march 2013,SVCET

20

N. Saravanan

N. Saravanan Layered Approach Using Conditional Random Fields for Intrusion Detection. PP 42-45, “Proceedings of   National Conference on Advanced Computing Architecture”, SVCET, Chittoor, 11th-12th March, 2013

21

J. Manikandan

J. Manikandan ,Routing in Wireless Mesh Networks with Bandwidth Guarantees using Hop-by-Hop Method. PP 35-41, “Proceedings of   National Conference on Advanced Computing  Architecture”, SVCET, Chittoor, 11th-12th March, 2013.

22

M Azhagiri

M Azhagiri, Routing in Wireless Mesh Networks with Bandwidth Guarantees using Hop-by-Hop Method. PP 35-41, “Proceedings of   National Conference on Advanced Computing Architecture”, SVCET, Chittoor, 11th-12th March, 2013.

23

K Ravi

K Ravi,”Revisiting defences against large scale on line password guessing attackes” National Conference on Computing communication and IT,TJS Engineering College,2013

24

B. Kishore

B. Kishore,” Layered Approach Using Conditional Random Fields for Intrusion Detection. PP 42-45, “Proceedings of   National Conference on Advanced Computing Architecture”, SVCET, Chittoor, 11th-12th March, 2013.

25

M Mahesh Kumar

M Mahesh Kumar,”A State full Intrusion Detection System for World-Wide Web Servers. PP 70-74,“Proceedings of   National Conference on Advanced Computing Architecture”, SVCET,Chittoor, 11th-12th March, 2013.

26

M G Dinesh

M G Dinesh. ”An Efficient Intrusion Detection Technique for Multi-tier Web Applications”. PP 7-12, “Proceedings of   National Conference on Advanced Computing Architecture”, SVCET, Chittoor, 11th-12th March, 2013.

27

S Laasiya Priya

S Laasiya Priya, A Symmetic Routing Alogrithm for mobile Ad hoc Networks, National Conference on Advanced Computing Architecture,March 2013,SVCET