Department of CSE Publications
2019-19 (July 01, 2018 to Till Date)
S. No | Name of the Faculty | Title of Paper | Details of Paper Published |
1 | Smart Contracts Using Block Chain | P.Kiran Rao | International Journal of Research in Technological Studies |
2 | Enhancing Social Media Services Using Machine Learning | M.Janardhan | International Journal of Research in Technological Studies |
3 | Blue Brain: The Name Of World’s First Virtual Brain | N.Parashuram | International Journal of Research in Technological Studies |
4 | Ambient Intelligence In Every Day Environment | K.Tarakeshwar | International Journal of Research in Technological Studies |
5 | Cloud Computing : Security Aspects | K.Tarakeshwar | International Journal of Research in Technological Studies |
6 | A Survey On Search Engine Optimization Techniques | R.Anil Kumar | International Journal of P2P Network Trends and Technology |
7 | A Survey On Machine Learning | R.Anil Kumar | International Journal of P2P Network Trends and Technology |
8 | A Comparative Performance Analysis On Various Cryptographic Techniques Based On Multiple Parameters | Dr.K.Sreenivasulu | Journal of Applied Science and Computations |
9 | A Smart Clinical Decision Support System To Predict Diabetes Disease Using Machine Learning Techniques | M,Janardhan | Journal of Applied Science and Computations |
10 | Fraud-Less Voting Using Blockchain | P.Ramarao | International Journal of Research in Technological Studies |
11 | A Comprehensive Study On Query Optimization In Cloud Computing | M.Srilakshmi | Journal of Applied Science and Computations |
12 | Image Processing In Brain Tumor MRI | Dr.K.Seshadri Ramana | International Journal of Research |
13 | Plant Leaf Disease Classification Using Image Processing Techniques | Dr.K.Seshadri Ramana | International Journal of Research |
14 | Dynamic Clustering Approaches In Heterogeneous Sensor Nodes WSN Survey | R.Varaprasad | International Journal of Research |
15 | Attribute Based Encryption Access Control For Cloud Computing | R.Varaprasad |
International Journal of Research ISSN No:2236-6124 Volume 8 Issue 2 February 2019 |
16 | Secure Computing Arthimetic Operations Using Fully Homomorphic Encryption | Dr.S.Prem Kumar | Journal of Applied Science and Computations |
17 | Netspam Classification Using Naive Bayes | N.Parashuram | International Journal of Research |
18 | Qos For Networking | R.Varaprasad | International Journal of Research |
19 | Controlling Traffic Lights Sequence With Python | R.Anil Kumar | International Journal of Research |
20 | Rescue Robot In Coal Mine Using IOT | Dr.K.Sreenivasulu | Journal of Applied Science and Computations |
21 | Energy Efficient Cluster Based Routing Protocols In Large Scale Wireless Sensor Networks | P.Suman Prakash | Journal of Applied Science and Computations |
22 | An Efficient Multi Keyword Search In Cloud Computing | P.Rama Rao | International Journal of Research |
23 | Travel Tour Recommender System | C.Ayesha shariff | Journal of Applied Science and Computations |
24 | Dynamic Routing Approaches Using Machine Learning Techniques In WSN | P.Suman Prakash | International Journal of Research |
25 | Zero Injection: A Collaborative Filtering Recommender System For Exploiting Uninterested Items | C.Ayesha shariff | International Journal of Management Technology and Engineering |
26 | A Scalable Distributed Architecture For IOT | Dr.S.Prem Kumar | Journal of Applied Science and Computations |
27 | Machine Learning Applications For Research To IOT | Dr.K.Seshadri Ramana | International Journal of Research |
28 | Movie Recommendation System | C.Ayesha shariff | International Journal of Management Technology and Engineering |
29 | Industrial IOT In Education | D.jayanarayana Reddy | Journal of Applied Science and Computations |
30 | Network Security In Digitalization | D.jayanarayana Reddy |
International Journal of scientific Research and Review |
31 | Machine Learning For IOT:Smart City | D.jayanarayana Reddy | International Journal of Research |
32 | Machine Learning Based Traffic Signal Control | R.Anil Kumar | International Journal of Research |
33 | IOT Based weather monitoring | D.Jayanarayana Reddy | International Journal of scientific research and review |
34 | Smart alert system for garbage clearance using IOT | Dr.K.Seshadri Ramana | International Journal of Research |
35 | Image processing for security | Dr.K.Seshadri Ramana | Journal of Applied Science and Computations |
36 | Load balancing in a Networking | M.Janardhan | Journal of Applied Science and Computations |
37 | Cyber security | P.Ramarao | International Journal of Research |
38 | Fraud-less voting using Blockchain | P.Ramarao | International Journal of Research in Technological Studies |
39 | An efficient multikeyword search in cloud computing | M.Srilakshmi | International Journal of Research in Technological Studies |
40 | Fine grained data access control in cloud computing | K.Lakshmi | Journal of Applied Science and Computations |
41 | Secure in cloud computing | M.Srilakshmi | Journal of Applied Science and Computations |
42 | Role based access control in cloud computing | K.Lakshmi | Journal of Applied Science and Computations |
43 | Bigdata security and privacy issues | K.Tarakeshwar | International Journal of Research in Technological Studies |
44 | Image processing and object detection using OPEN CV | P.Kiran Rao | Journal of Applied Science and Computations |
45 | Secure data deduplication in the cloud frame work | P.Kiranrao | Journal of Applied Science and Computations |
46 | Artificial Intelligence in the field of medicine | M.Janardhan | International Journal of Research in Technological Studies |
47 | Cloud computing with wireless sensor networks | Dr.S.Prem Kumar | International Journal for research on Electronics and Computer science |
48 | Data Management in IOT | Dr.S.Prem Kumar | International Journal of Research |
49 | A study of Heterogenity characteristics over wsn | P.Suman Prakash | International Journal of Research |
50 | A study of quality of service routing techniques for computer network | K.Lakshmi | International Journal of Research |
51 | Overview of Qos routing protocols in MANET | K.Lakshmi | International Journal of Research |
52 | Dynamic routing approaches using Machine learning techniques in WSN | P.Suman Prakash | International Journal of Research |
53 | A Smart Clinical Decision Support System To Predict Diabetes Disease Using Machine Learning Techniques | K.Taraeshwar | Journal of Applied Science and Computations |
54 | Access policy enforcement in a cloud computing environment | R.Varaprasad | International Journal of Research |
55 | EEG Sensors using brainwave for ease of use and better security | C.Ayesha shariff | International Journal of Management Technology and Engineering |
56 | Artificial Intelligence with applications | M.Srilakshmi | Journal of Applied Science and Computations |
56 | Capability of multi keyword investigation in cloud computing | K.Gayathri | International journal of scientific research in science and technology |
57 | A Study of Heterogeneity Characteristics over Wireless sensor networks | K.SandhyaRani | International Journal of Research |
58 | A Study on Query Optimization in Cloud Computing | Y.Supriya Reddy | International journal of scientific research in science and technology |
59 | Selective Ensemble of Internet Traffic Classifiers For improving Malware Detection | A.David Donald | International Conference on energy , Communication, Data Analytics and soft Computing |
2017-18 (July 01, 2017 to June 30,2018)
S. No | Name of the Faculty | Title of Paper | Details of Paper Published |
1 | Dr.S.Prem Kumar | Machine Learning Methods for Refining SLA Based Admission Control and Resource Allocation in Cloud Computing | International Journal of Advanced Research in Computer Science. |
2 | M.Srilakshmi | Machine Learning Methods for Refining SLA Based Admission Control and Resource Allocation in Cloud Computing | International Journal of Advanced Research in Computer Science. |
3 | M.Janardhan | Machine Learning Methods for Refining SLA Based Admission Control and Resource Allocation in Cloud Computing | International Journal of Advanced Research in Computer Science. |
4 | P.Kiran Rao | Machine Learning Methods for Cloud Computing | i-managers journal on Cloud Computing. |
5 | R.Sandeep Kumar | Machine Learning Methods for Cloud Computing | i-managers journal on Cloud Computing. |
6 | N.Parashuram | Secure Data Deduplication using Improved Elliptic Cryptography with Associative Support and Load Balancing |
Journal of Advanced Research in Dynamical and Control Systems. |
7 | D. Jayanarayana Reddy | Secure Data Deduplication using Improved Elliptic Cryptography with Associative Support and Load Balancing |
Journal of Advanced Research in Dynamical and Control Systems. |
8 | R.Varaprasad | Secure Data Deduplication using Improved Elliptic Cryptography with Associative Support and Load Balancing |
Journal of Advanced Research in Dynamical and Control Systems. |
9 | K.Tarakeshwar | Underwater Object Detection and Effective Classification Using Sparse Representation Vasershtein Metric | Journal of Advanced Research in Dynamical & Control Systems. |
10 | K.Gayathri | Machine Learning Methods for Refining SLA Based Admission Control and Resource Allocation in Cloud Computing | International Journal of Advanced Research in Computer Science. |
2016-17 (July 01, 2016 to June 30,2017)
S. No | Name of the Faculty | Title of Paper | Details of Paper Published |
1 | Dr.S.Prem Kumar | Improved Trial Division Algorithm by Lagrange’s Interpolation Function in Trial Division Algorithm by Lagrange’s Interpolation Function | International Journal on Recent and Innovation Trends in Computing and Communication |
2 | N.Parashuram | Improved Trial Division Algorithm by Lagrange’s Interpolation Function in Trial Division Algorithm by Lagrange’s Interpolation Function | International Journal on Recent and Innovation Trends in Computing and Communication |
3 | N.Parashuram | Investigation of Road Accident Data in Traffic system using Data Mining Techniques | International Journal of Computer Engineering In Research Trends |
4 | D.Jayanarayana Reddy | Secure Data Deduplication over distributed cloud server frame work with effective user revocation and load balancing | International Journal of Computer Engineering In Research Trends |
5 | M.Janardhan | Secure Data Deduplication over distributed cloud server frame work with effective user revocation and load balancing | International Journal of Computer Engineering In Research Trends |
6 | M.Srilakshmi | Improved Trial Division Algorithm by Lagrange’s Interpolation Function in Trial Division Algorithm by Lagrange’s Interpolation Function | International Journal on Recent and Innovation Trends in Computing and Communication |
7 | R.Varaprasad | Investigation of Road Accident Data in Traffic system using Data Mining Techniques | International Journal of Computer Engineering In Research Trends |
8 | P.Ramarao | Investigation of Road Accident Data in Traffic system using Data Mining Techniques | International Journal of Computer Engineering In Research Trends |
9 | K.Lakshmi | K-Anonymous Privacy Preserving Technique for Participatory Sensing With Multimedia Data Over Cloud Computing | International journal of Computer Engineering in Research Trends |
10 | D Farooq Basha | K-Anonymous Privacy Preserving Technique for Participatory Sensing With Multimedia Data Over Cloud Computing | International journal of Computer Engineering in Research Trends |
11 | J.Hemalatha | K-Anonymous Privacy Preserving Technique for Participatory Sensing With Multimedia Data Over Cloud Computing | International journal of Computer Engineering in Research Trends |
2015-16 (July 01, 2015 to June 30, 2016)
S.No | Name of the Faculty | Title of Paper | Details of Paper Published |
1 | Dr.S.Prem kumar | Investigation on revocable fine-grained access control scheme for multi-authority cloud storage systems | International Journal of Computer Engineering in Research Trends vol 2 issue 8 Aug 2015 pp 486-491 |
2 | G.Somasekhar | Secure redundant data avoidance over multi-cloud architecture | International Journal of Computer Engineering in Research Trends vol 2 issue 8 Aug 2015 pp 470-474 |
3 | G.Somasekhar | A secure mullti-cloud data sharing scheme for dynamic group in public cloud | International Journal of Computer Engineering in Research Trends vol 2 issue 8 Aug 2015 pp 475-480 |
4. | M.srilakshmi | Investigation on revocable fine-grained access control scheme for multi-authority cloud storage systems | International Journal of Computer Engineering in Research Trends vol 2 issue 8 Aug 2015 pp 486-491 |
5 | Dr.S.Prem kumar | Review on watermarking approach in the compressive sensing scenario | International Journal of Computer Engineering in Research Trends, vol-2, issue 9, Sep 2015, pp-547-551 |
6 | Dr.S.Prem kumar | Survey on collaborative filtering content based recommending | International Journal of Computer Engineering in Research Trends, vol-2, issue 9, Sep 2015, pp-594-599 |
7 | D.Jayanarayana reddy | Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data | International Journal of Computer Engineering in Research Trends vol 2 issue 12 dec 2015 pp 919-923 |
8 | U.Veeresh | A Secure and dynamic multi keyword ranked search scheme over encrypted | International Journal of Computer Engineering in Research Trends vol 2 issue 12 dec 2015 pp 1137-1141 |
9 | U.Veeresh | Provable multicopy dynamic data possession in cloud computing systems | International Journal of Computer Engineering in Research Trends vol 3 issue 1 Jan 2016 pp 6-12 |
10 | U.Veeresh | Multi cloud architecture to provide data privacy and integrity | International Journal of Computer Engineering in Research Trends vol 2 issue 9 sep 2015 pp 556-564 |
11 | U.Veeresh | Optimal meeting location privacy on mobile device users using privacy preserving algorithm | International Journal of Computer Engineering in Research Trends vol 2 issue 9 sep 2015 pp 565-569 |
12 | Dr.S.Prem Kumar | Protected Cloud computing Design via Homomorphic encryption | International Journal of Computer Engineering in Research Trends vol 3 issue 6 june 2016 pp 352-359 |
13 | M.Srilakshmi | Protected Cloud computing Design via Homomorphic encryption | International Journal of Computer Engineering in Research Trends vol 3 issue 6 june 2016 pp 352-359 |
14 | K.Lakshmi | Protected Cloud computing Design via Homomorphic encryption | International Journal of Computer Engineering in Research Trends vol 3 issue 6 june 2016 pp 352-359 |
2014-15 (July 01, 2014 to June 30, 2015)
S.No | Name of the Faculty | Title of Paper | Details of Paper Published |
1. | DR.S.PREMKUMAR | Estimation of Ranking score for Database Query Results | International Journal of Advanced Research in Computer Science and Software Engineering vol 4 issue 6 june 2014 |
2. | DR.S.PREMKUMAR | Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing | International Journal Of Engineering And Computer Science |
3. | DR.S.PREMKUMAR | Location – Based Privacy against Attacks in Mobile Communications | International Journal of Engineering Research – online |
4 | DR.S.PREMKUMAR | An Approach to make Digital Forenscics Easier on Cloud Computing | International Journal of Engineering Research – online |
5 | DR.S.PREMKUMAR | Migration of Cloud through a Decision Support System | International Journal of Engineering Research – online |
6 | DR.S.PREMKUMAR | A Generic Privacy Model for Social Networks SYstems | International Journal of Engineering Research – online |
7 | DR.S.PREMKUMAR | The migration to Meta Cloud from Vendor Lockin | International Journal of Computer Science and Information Technologies |
8 | N.PARASHURAM | Fog Computing Reducing Data Theft Activities | International Journal of Computer Engineering in Research Trends vol 2 issue 2 November 2014 |
9 | CH.SHASIKALA | Data sharing in clouds with unicast Message Authentication | International Journal for Research on Electronics and Computer Science vol 2 issue 1 Oct 201 |
10 | CH.SHASIKALA | Overcome information implication Attacks and defending public data in OSN | International journal of research Vol 1 issue 10 Nov 2014 |
11 | R.SANDEEPKUMAR | Enhance the Qos Capablity of Hybrid Networks using Qos-oriented Distributed Routing Protocol | International Journal of Engineering Research – online vol 1 issue 4 Oct 2014 pp 178-182 |
12 | R.VARAPRASAD | High Utility Item Set Mining | Global Journal of Teacher Education vol 1 issue 4 Nov 2014 |
14 | K.TARAKESHWAR | Security for Collaboration in Multi – cloud Computing Environment Using Cloud Brokering Algorithm | International Journal for Research on Electronics and Computer Science vol 2 issue 2 Nov 2014 |
15 | K.TARAKESHWAR | Two Layer Encryption be Imminent to Protected Data Sharing in Cloud Computing | International Journal of Computer Engineering in Research Trends vol 1 issue 5 Nov 2014 pp 266-270 |
16 | G.SOMASEKHAR | Cloud Computing with Bigdata as a service | International Journal of Computer Science & Engineering Technology vol 4 issue 8 |
17 | N.PARASHURAM | A Study of Hybrid Competitive Genetic Algorithm Models in Stock Exchange Exptectation | International Journal of Computer Engineering in Research Trends |
18 | R.VARAPRASAD | Cloud Supported Personal Health Records with security and audit ability | International Journal of Computer Engineering in Research Trends vol 1 issue 4 Oct 2014 pp 230-234 |
19 | K.LAKSHMI | A Hybrid cloud move toward for certified deduplication | International Journal of Computer Engineering in Research Trends vol 1 issue 4 October 2014 pp 204-208 |
20 | I.S.RAGHURAM | Web Mining : Day-to-Day | International Journal of Emerging Trends & Technology in Computer Science vol 3 issue 5 October 2014 |
21 | B.DEVENDRA NAIK | Privacy Augmenting for Fingerprint detection using RSA | International journal of research vol 1 issue 10 Nov 2014 |
22 | B.DEVENDRA NAIK | Two sided Data Hiding in ciphred images by reversible data hiding | International Journal of Emerging Trends & Technology in Computer Science vol 2 Issue 2 Nov 2014 |
23 | N.PARASHURAM | Study on common profile alike on Mobile Social networks | International journal of research vol 1 issue 10 Nov 2014 |
24 | P.SUMAN PRAKASH | Distributed cooperative caching in social wireless networks | International journal of science and research vol 3 issue 8 August 2014 |
25 | R.ANILKUMAR | Encouraging effective client system by enhance website structure | International Journal of Computer Engineering in Research Trends vol 1 issue 4 Oct 2014 pp 209-213 |
2013-14 (July 01, 2013 to June 30, 2014)
S.No | Name of the Faculty | Title of Paper | Details of Paper Published |
1 | DR.S.PREMKUMAR | Utilization of Data Mining Techniques for Prediction and Diagnosis of Tuberculosis disease survibability | International Journal of Modern Education and Computer Science Vol 2 issue 8 October 2013 |
2 | DR.S.PREMKUMAR | Performance Comparison of Data Mining Techniques For Prediction and Heart disease survivability | International Journal of Scientific and Research Publication, Vol 3 issue 6 june 2013 |
3 | DR.S.PREMKUMAR | Ethical Hacking Techniques with Penetration Testing | International Journal of Scientific Research in Computer Science vol 3 issue 2 March 2014 |
4 | DR.S.PREMKUMAR | An Efficient Automatic Resource Allocation Approach for Mobile Sink | international journal of science, engineering and technology vol 2 issue 4 April 2014 |
5 | DR.S.PREMKUMAR | A Review on Wireless Network Attacks | International Journal of Computer Science and Information Technologies |
6 | P.KIRANRAO | Development Beagle Bone Webcam server for security and surveillance applications | International Journal of Advance Research and Technology vol 2 issue 11 Nov 2013 |
7 | R.SANDEEP | Consistency Maintenance in Fractious P2P System | International Journal of peer-to-peer networking vol-3 issue 2 2013 |