Academic Year (2016-17)

S. No. Name of the Faculty Title
1 V.Janaki A Survey On Key Authentication Schemes in Public Key Cryptography. ISBN: 178-1-5396-2645-9, ICRIEAT-2016.
2 V.Janaki Key Authentication Scheme- based on Discrete Logarithms and Chinese Remainder Therom. Defence Science Journal, vol 66, no. 6, November 2016 . Impact factor: 0.500.
3 V.Janaki Empirical Study Of A Key Authentication Scheme in Public Key Cryptography. ISSN-2248-9622, Vol 7,Issue 3, March 2017 . IJERA. Impact factor: 5.169
4 V.Janaki A Survey on User Authentication Techniques. ISSN-0974-6471, Vol 10, June 2017 . Oriental Journal of Computer Science & Technology. Impact factor: 0.786.
5 V.Janaki Looking into the Possibility of Novel Dissimilarity Measure to Discover Similarity Profiled Temporal Association Patterns in IoT. . ICEMIS 2016. DOI:10.1109/ICEMIS.2016.7745353.IEEE Conference Publication
6 V.Janaki A Similarity Measure for Outlier Detection in Timestamped Temporal Databases. . ICEMIS 2016. DOI:10.1109/ICEMIS.2016.7745347.IEEE Conference Publication
7 V.Janaki A Computationally Optimal Approach For Extracting Similar Temporal Patterns. . ICEMIS 2016. DOI:10.1109/ICEMIS.2016.7745344.IEEE Conference Publication
8 V.Janaki A Computationally Efficient Approach for Temporal Pattern Mining in IoT. ICEMIS 2016. DOI:10.1109/ICEMIS.2016.7745354. IEEE Conference Publication
9 V.Janaki Mining of Outlier Temporal Patterns. . ICEMIS 2016. DOI:10.1109/ICEMIS.2016.7745343.IEEE Conference Publication
10 V.Janaki A Similarity Measure for Temporal Pattern Discovery in Time Series Data Generated by IoT. . ICEMIS 2016. DOI:10.1109/ICEMIS.2016.7745355. IEEE Conference Publication
11 V.Janaki G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things. Elsevier. Jan 2017. 2016 Journal Citation Reports (Clarivate Analytics, 2017) 5 Yr Impact Factor: 4.787 .JCR Impact factor (2016): 3.997
12 V.Janaki A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining. . Elsevier. Mar 2017. Journal Citation Reports (Clarivate Analytics, 2017) 5 Yr Impact Factor: 4.787 .JCR Impact factor (2016): 3.997.
13 V.Janaki Normal Distribution Based Similarity Profiled Temporal Association Pattern Mining (N-SPAMINE). Database Systems Journal vol. VII, no. 3/2016
14 V.Janaki An Efficient Approach to find Similar Temporal Association Patterns Performing Only Single Database Scan. doi:10.21311/001.39.1.25.
15 S.S.V.N Sarma Genetic - ZHLS Routing Protocol For Fault Tolerance And Load Balancing. ISSN: 1992-8645. JATIT.Jan 2016. Vol.83. No.1.
16 S.S.V.N Sarma Implementation Of MANET Control Packet Drop Using BAIT Detection Approach. IJESRT. March, 2016. ISSN: 2277-9655. Impact Factor: 3.785
17 S.S.V.N Sarma SHA-ZHLS: Security Enhancement in MANETs using SHA Algorithm. IJRCCE.
18 K. Srinivas Automatic Variable Length Key Generation from Image and CRT. IACC-2017. Jan 2017. published in IEEE Explorer.
19 K.Pavani A Combination Cloud Commanding for protected certified De-Replicate. ISSN-2348-6848, Vol 3,Issue 18, Dec 2016. IJR. Impact factor: 3.541
20 K.Pavani Permission Active Multi-Keyword Rated Exploration Over Encrypted Portable Gloom Evidence through Blind Cache. ISSN: 2348-6848, Vol 3, Issue Dec 2016. IJR. Impact factor: 3.541
21 Rakesh Nayak A Mathematical Model for Perishable Resource Management. ISBN: 978-93-81899-77-9. ICCAMEET 2017.
22 K. Rajesh Khanna Data mining framework using provision for community Health care decision- making. ISSN: 2348-6848 ,Vol 3, Issue 18, Dec 2016. IJR.Impact factor: 3.541
23 K. Rajesh Khanna A Big Data Framework Approach in Health Care Industry. ISSN: 2348-6848, Vol 4, Issue 5, April 2017. IJR. Impact factor: 3.541
24 N. Satyavathi Mining Borrowing Patterns from Library Transactional Database Using Incremental Mining Algorithm. CRACS -2017.
25 A.Swetha Anonymous Authentication Using Cloud Based De-Centralized Access Control Scheme. IJIEMR, Vol 1, Issue 2. Impact factor: 5.812
26 M. Suresh Kumar A Novel Approach for Protecting Location Information in Geosocial Applications. IJIEMR, Vol 1, Issue 2. Impact factor: 5.812
27 R. Varun Reddy Enhancing Downlink performance in Wireless Networks. ISSN: 2348-6848, Vol 4, Issue 2, Feb 2017. IJR. Impact factor: 3.541
28 R. Varun Reddy Augmenting Downlink Enactment in Wireless Networks by Simultaneous Multiple Packet Transmission. ISSN: 2348-6848, Vol 3, Issue 17, Nov 2016. IJR. Impact factor: 3.541
29 P.Mahipal Reddy Bond Decision of Arrangement Classifiers Under Violation. ISSN: 2348-6848, Vol 3, Issue 17, Nov 2016. IJR. Impact factor: 3.541
30 K.Goutham Raju Adaptive Technique for Test Packet Generation. ISSN: 2348-6848, Vol 3, Issue 13, Sept 2016. IJR. Impact factor: 3.541
31 K.Goutham Raju Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks. ISSN: 2348-6848, Vol 3, Issue 17, Nov 2016. IJR. Impact factor: 3.541
32 K.Goutham Raju A Tamper-Proof Delegation of Computational Work to Remote Servers in Cloud With Policy Attribute-Based Encryption. . IJIEMR Vol 1, Issue 2. Impact factor: 5.812
33 A. Ramesh babu Investigation of Accurate and Efficient Query Processing at Location based Services. ISSN: 2348-6848, Vol 3 ,Issue 17, Nov 2016. IJR. Impact factor: 3.541
34 A. Ramesh babu Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation. IJIEMR Vol 1, Issue 2. Impact factor: 5.812
35 N. Rajender Reddy Item Based Re-militarization of Positive and Negative Association Rules. ISSN: 2348-6848, Vol 4, Issue 1, Jan 2017. IJR. Impact factor: 3.541
36 N. Rajender Reddy Statistical Based Refilterziation of Positive and Negative Association Rules from Transactional database. Aug-2016. ISSN: 2348-6848, Vol 3, Issue 12, Jan 2017. IJR. Impact factor: 3.541
37 N. Rajender Reddy A Study on largescale data processing in peer to peer networks. published in IJIEMR Dec-2016. Vol 1, Issue 2.
38 N. Rajender Reddy A Novel based friend Recommandation system of social networks published in IJIEMR Dec-2016. Vol 1,Issue 2.
39 B. Rajitha HLA Based public auditing architecture for Wireless for Wireless Ad-hoc Networks. IJIEMR Vol 1, Issue 2. Impact factor: 5.812
40 B. Rajitha Concerning a Numerical Structure for Expert Anonymity in Sensor Systems. ISSN: 2348-6848, Vol 3, Issue 17, Nov 2016. IJR. Impact factor: 3.541
41 B.Jyothi Swift Warm Acquaintance Exploration with Keywords. ISSN: 2348-6848, Vol 3, Issue 17, Nov 2016. IJR. Impact factor: 3.541
42 B.Jyothi Supporting and Secure Personal Information Search Engine Through With Search. ISSN: 2348-6848, Vol 3, Issue 17, Nov 2016. IJR. Impact factor: 3.541.
43 B. Sravan Kumar Cost Effective Dynamic Migration for Content into Hybrid Clouds. IJIEMR. Vol 1, Issue 2. Impact factor: 5.812
44 B. Sravan Kumar Packet Classification With Low Memory Consumption. Vol 1,Issue 2. IJIEMR. Impact factor: 5.812
45 B. Sravan Kumar Achieving Data Consistency through Queries. IJIEMR. Vol 1, Issue 2 Impact factor: 5.812.
46 B. Sravan Kumar Efficient and Secure Online Transaction Using Steganography. ISSN: 2348-6848, Vol 3, Issue 13, Sept 2016. IJR. Impact factor: 3.541
47 B. Sravan Kumar Survey Paper On Challenges For Map Reduce In Big Data Analysis.CRACS-2017.
48 K. Shekhar Adaptive Network for IP Back Disclosing from Path Back Scatters in the Locations IP Spoofers. ISSN: 2348-6848, Vol 3, Issue 13, Sept 2016. IJR. Impact factor: 3.541
49 M. Swapna Designing High Performance Web Based Computing Services to Promote Tele Medicine Database Management System. IJIEMR. Vol 1, Issue 2. Impact factor: 5.812
50 E. Goutham A Computaional Active Expectation Model for Custom Approval. ISSN: 2348-6848, Vol 3, Issue 17, Nov 2016. IJR. Impact factor: 3.541
51 E. Goutham Click Guessing for Web Model Re-Arranging process by Using Multi Modal Thin Coding. ISSN: 2348-6848, Vol 3, Issue 17, Nov 2016. IJR. Impact factor: 3.541
52 M.Sukesh Software Defined VANET and Information Propagation System. ISSN: 2348-6848, Vol 4, Issue 3, March 2017. IJR. Impact factor: 3.541
53 M.Sukesh Self Organizing Communication in Vehicular Ad-hoc Networks. ISSN: 2348-6848, Vol 3, Issue 14, Oct 2016. IJR. Impact factor: 3.541
54 P. Chitra Rekha Exploration of Estimating Scam for Movable Apps. ISSN: 2348-6848, Vol 3, Issue 18, Dec 2016. IJR. Impact factor: 3.541
55 Ch. Aravind Key Updating for Leakage Resiliency With Application to AES Modes of Operation. ISSN: 2348-6848, Vol 3, Issue 17, Nov 2016. IJR. Impact factor: 3.541
56 E.Kiran A Stimulus Structure for Nuclear Service off Loading. ISSN: 2348-6848, Vol 3, Issue 17, Nov 2016. IJR. Impact factor: 3.541.
57 V. Murali Krishna A PlamPrint Authentication Based on Local Texture Features. ISSN: 2348-6848, Vol 4, Issue 12, Feb 2017. IJR. Impact factor: 3.541.
58 K. Rekha Devi Secure and Efficient Data Retriveral Over Encrypted Data Using Attribute Based Encryption Cloud Storage. IJIEMR. Vol 1, Issue 2. Impact factor: 5.812
59 M. Shirisha An Improved Privacy Policy Inference Over the Socially Shared Images. IJIEMR. Vol 1, Issue 2. Impact factor: 5.812
60 M. Shirisha Improve K-Means Clustering with Extended View Point Using Clasification. CRACS-2017.
61 P. Shailaja Maximizing P2P File Access Availability in Mobile Ad Hoc Networks through Replication for Efficient File Sharing. IJIEMR. Vol 1, Issue 2. Impact factor: 5.812
62 G.Neelima An Efficient Intrusion Detection Scheme for Mitigating Nodes Using Data Aggregation in Delay Tolerant Network. ISSN: 2348-6848, Vol 3, Issue 13, Sept 2016. IJR. Impact factor: 3.541
63 K.Mahesh Optimal structure of web coding in Ad- Hoc organizations in International Journal of Research. December 2016 Impact factor 5.0. ISSN 2348- 6848
64 K.Mahesh Dynamic Framework for Protection of Location Services. International Journal of Research. December 2016 Impact factor 5.0. ISSN 2348- 6848
65 Ch.Ravinder Content Caching and Scheduling in Wireless Networks. IJIEMR. Vol 1, Issue 2. Impact factor: 5.812.
66 K.Bhanu Prasad Dynamic Guessing Work for Crucial Access of Keyword Objections over the Databases. p-I SSN: 2348-6848 e-I SSN: 2348-795X Volume 04 Issue 02 February 2017. IJR.