Faculty Name | S. No | CONFERENCE AND JOURNAL PUBLICATIONS | SOURCE | MONTH & YEAR |
---|---|---|---|---|
2022-23 | ||||
V. Kavitha |
1 |
Bitcoin, Ethereum and Binance Price Prediction using Social Media Sentiments. |
June,2023. |
|
Shaik Ghour Taj |
2 |
ECG data classification using machine learning approaches |
October,2023 |
|
K.Bala Chandra Reddy |
3 |
A Study of Security Threats and Attacks in Cloud Computing |
November, 2022 |
|
K.Bala Chandra Reddy |
4 |
PNEUMONIA DETECTION IN CHEST X-RAY IMAGES USING DEEP LEARNING MODELS |
June, 2022 |
|
K.Bala Chandra Reddy |
5 |
Analysis of Company Review Data on Glassdoor using NLP |
March, 2023 |
|
K.Bala Chandra Reddy |
6 |
Crop Recommendation System using Machine Learning Algorithms |
December, 2022 |
|
KK.Bala Chandra Reddy |
7 |
A Study of Security Threats and attacks in Cloud |
October,2022 |
|
Dr.S. Radha Krishna. |
8 |
Optimal Fuel Consumption Using Multilevel Inverter Based Anfis Rsc ControlStrategy On Wind DrivenDfig, Dg And Solar Pv Array |
2023 |
|
Dr.S. Radha Krishna. |
9 |
A Security Mechanism for Cloud ComputingService Journal of Data Acquisition and Processing |
2023 |
|
NIRANJAN BABU THANIKANTI |
10 |
STOCK PRICE PREDICTION |
June, 2022 |
|
NIRANJAN BABU THANIKANTI |
11 |
AN APPROACH FOR META LEARNING: MACHINE LEARNING |
July, 2022 |
|
NIRANJAN BABU THANIKANTI |
12 |
Analysis of Company Review data on Glassdoor using NLP |
March, 2023 |
|
C. Prabhavathi |
13 |
Enhancing Energy Efficiency Using RPL Protocol in LLN |
October, 2022 |
|
C. Prabhavathi |
14 |
Instant Voice Recognization of a Persons Emotions |
March, 2022 |
|
C. Prabhavathi |
15 |
Intensificating The Performance Of Mobile Nodes In Low Power And Lossy Networks |
June, 2023 |
|
D. Raghunath Kumar Babu |
16 |
KEYLESS IGNITION SYSTEM FOR MOTORCYCLES |
May, 2023 |
|
D. Raghunath Kumar Babu |
17 |
Implementing cyber security policy for Big Data system |
May, 2022 |
|
D. Raghunath Kumar Babu |
18 |
Deep Ensemble Technique for Cyber Attack Detection in Big Data Environment(SCI Index) |
December, 2022 |
|
D. Raghunath Kumar Babu |
19 |
Hybrid classification model with tuned weight for cyber attack detection: Big data perspective (SCI Index) |
March, 2023 |
|
2021-22 | ||||
B. Muni Lavanya |
1 |
Traffic Sign Recognition system |
December, 2022 |
|
B. Muni Lavanya |
2 |
DLM technique for QoS improvement in MANETS |
April, 2021 |
|
B. Muni Lavanya |
3 |
Network simulation tools performance comparison for wireless networks |
July, 2021 |
|
B. Muni Lavanya |
4 |
AUTOMATIC FACIAL RECOGNITION ATTENDANCE SYSTEM |
September, 2021 |
|
M.Chenna Keshava |
5 |
Youtube Transcript Summarizer Using Flask and NLP |
August, 2022 |
|
V. Kavitha |
6 |
AI Virtual Mouse using Hand Gestures |
May, 2022 |
|
V. Kavitha |
7 |
Missing Person Identification System using Deep Learning Algorithm (CNN) and Machine Learning Classifier |
December, 2021 |
|
Shaik Ghour Taj |
8 |
Deepfake detection using LSTM and CNN |
December, 2021 |
|
Shaik Ghour Taj |
9 |
Deepfake detection using LSTM and CNN |
April, 2022 |
|
Shaik Ghour Taj |
10 |
Instant Voice Recognization of a Persons Emotions |
March, 2022 |
|
P. VIJAYA KUMARI |
11 |
Traffic Sign Recognition System |
April, 2022 |
|
P. VIJAYA KUMARI |
12 |
Youtube Transcript Summarizer Using Flask and NLP |
August, 2022 |
|
Dr.S. Radha Krishna |
13 |
1Meta Learning Approach For Placement Prediction System |
August, 2021 |
|
Dr.S. Radha Krishna |
14 |
Application Of Predictive Analytics In Healthcare Using Machine Learning Algorithms - An Experimental Approach |
January, 2022 |
|
Dr.S. Radha Krishna |
15 |
Iot Based E-Healthcare System To Remote Patient Care By Using Cloud Server |
November, 2021 |
|
Dr.S. Radha Krishna |
16 |
Diabetic Disease Prediction In Women Using Deep Learning Techniques |
October, 2021 |
|
Dr.S. Radha Krishna |
17 |
Meta Learning Approach For Placement Prediction System |
June, 2021 |
|
C. Prabhavathi |
18 |
Malware Prediction Using XGBOOST and CATBOOST |
May, 2022 |
|
C. Prabhavathi |
19 |
IoT Based e-Healthcare system to Remote Patient care by using Cloud Serve |
April, 2022 |
|
2020-21 | ||||
B. Muni Lavanya |
1 |
DLM technique for QoS improvement in MANETS |
April, 2021 |
|
B. Muni Lavanya |
2 |
Recognition of different Voice Pathologies with data augmentation strategies |
September, 2020 |
|
B. Muni Lavanya |
3 |
Recognition of different Voice Pathologies with data augmentation strategies |
September, 2020 |
|
B. Muni Lavanya |
1 |
A Machine Learning Model for Recommending Restaurants based on User Ratings |
May, 2020 |
|
B. Muni Lavanya |
2 |
Fuzzy Logic based Channel Selection Algorithm for Wireless Mesh Networks |
September,October, 2019 |
|
B. Muni Lavanya |
3 |
Internet Traffic based Channel Selection in MultiRadio Multi-Channel Wireless Mesh Networks |
August, 2019 |
|
B. Muni Lavanya |
4 |
User Throughput based Channel assignment Method for IEEE 802.11 Multi-Channel Multi-Radio Wireless Mesh Networks |
November, 2019 |
|
M.Chenna Keshava |
5 |
A Machine Learning Model for Prediction of Crop Yield |
May, 2020 |
|
M.Chenna Keshava |
6 |
Machine Learning Model for Movie Recommendation System |
April, 2020 |
|
V. Kavitha |
7 |
Churn Prediction of Customer in Telecom Industry using Machine Learning Algorithms |
May, 2020 |
|
Shaik Ghour Taj |
8 |
Marine Plastic Debris Detection Using CNN |
May, 2020 |
|
K. Bala Chandra Reddy |
9 |
A Machine Learning Model for eye Gaze Tracking |
February, 2020 |
|
L.Bhavya |
10 |
Chest X-ray Pneumonia Prediction using Machine Learning Algorithms |
November, 2019 |
|
L.Bhavya |
11 |
Women Safety Prediction using Logistic Regression Model |
March, 2020 |
|
L.Bhavya |
12 |
Credit Card Fraud Detection using Classification, Unsupervised, Neural Networks Models |
April, 2020 |
|
NIRANJAN BABU THANIKANTI |
13 |
Hospital Management using Machine Learning and Digital Assistance |
March, 2020 |
|
NIRANJAN BABU THANIKANTI |
14 |
Dengue Disease Detection |
March, 2020 |
|
C. Prabhavathi |
15 |
An Ensemble Learning Based Model for Flood Prediction |
May, 2020 |
|
C. Prabhavathi |
16 |
Machine Learning Model for Classifying L_Text using NLP(Amazon Product Reviews) |
April, 2019 |
|
C. Prabhavathi |
17 |
Context-Aware V2X for 5G LTE Millimeter Wave Vehicular Communication Using FML Algorithm |
February, 2019 |
|
D.Raghunath Kumar Babu |
18 |
PREDICTING HEART DISEASE USING MACHINE LEARNING TECHNIQUES |
April, 2019 |
|
D.Raghunath Kumar Babu |
19 |
CLASSIFYING HEART DISEASE DATASET USING MACHINE LEARNING |
May, 2019 |
|
D.Raghunath Kumar Babu |
20 |
Deep Learning Model for Plant Disease Detection |
May, 2020 |
|
D.Raghunath Kumar Babu |
21 |
Deep Ensemble Technique for Cyber Attack Detection in Big Data Environment(SCI Index) |
July, 2019 |
|
D.Raghunath Kumar Babu |
22 |
Hybrid classification model with tunedweight for cyber attack detection: Big data perspective (SCI Index) |
September, 2019 |
|
2018-19 | ||||
NIRANJAN BABU THANIKANTI. |
1 |
Predicting Burned area of Forest Fires. |
April, 2019 |
|
NIRANJAN BABU THANIKANTI. |
2 |
An effective secure mechanism for Big data Privacy protection using various authentication Methodologies. |
April,2019 |
|
NIRANJAN BABU THANIKANTI |
3 |
An approach for Security and privacy enhancing by making use of distinct clouds |
November-2018. |
|
B.Muni Lavanya |
4 |
Diagnosis of Indian Patients Liver Disease using Machine Learning Techniques |
April 2019 |
|
B. Muni Lavanya. |
5 |
Providing the Resources by Using Scheduling algorithm in Cloud computing |
Nov,2018. |
|
M.Chenna Keshava. |
6 |
Predictive Analysis on Bank Marketing Campaign Using Machine Learning Algorithms. |
April 2019. |
|
M.Naga Seshudu. |
7 |
Providing Privacy for Numeric Range SQL Queries Using Two-Cloud Architecture. |
April,2019. |
|
M.Naga Seshudu. |
8 |
An Effective Secure Mechanism For Big Data Privacy Protection Using Various Authentication Methodologies. |
April 2019. |
|
M.Naga Seshudu. |
9 |
Smart Home Appliance Energy Prediction using Machine Learning Techniques. |
April 2019. |
|
S.G. Taj. |
10 |
Context-Aware V2X for 5G LTE Millimeter Wave Vehicular Communication Using FML Algorithm . |
April 2019. |
|
S.G. Taj. |
11 |
DETECTION OF DISTRACTED DRIVER. |
April,2019. |
|
S.G. Taj. |
12 |
Machine Learning Model for Classifying L_Text using NLP. |
April,2019. |
|
P. VIJAYA KUMARI. |
13 |
Predictive Online News popularity. |
April,2019. |
|
P. VIJAYA KUMARI. |
14 |
Advances in Signal processing, Power, Embedded soft computing communications and control systems Modifications . |
May,2018. |
|
2017-18 | ||||
L.Bhavya. |
1 |
High Security to mails by using Thumb. |
November,2017 |
|
NIRANJAN BABU THANIKANTI. |
2 |
Improving Security of Network Services against WSDL Threats |
May,2017 |
|
C. Prabhavathi. |
3 |
Application of Cloud Security Services for the Secured Vendor Registration |
Dec,2017 |
|
C. Prabhavathi. |
4 |
Smart Agriculture using Internet of Things |
May,2017 |
|
B. Muni Lavanya. |
5 |
A Bird’s Eye View of Crypto Currency (Bitcoin) |
March,2018. |
|
B. Muni Lavanya. |
6 |
Efficient Data Processing for Balancing Performance and Power consumption with Big Data. |
April 2018. |
|
B. Muni Lavanya. |
7 |
Blockchain Technology Beyond Bitcoin:An Overview. |
April 2018. |
|
B. Muni Lavanya. |
8 |
Blockchain Technology Beyond Bitcoin:An Overview. |
April 2018. |
|
B. Muni Lavanya. |
9 |
Blockchain Technology Beyond Bitcoin:An Overview. |
April 2018. |
|
B. Muni Lavanya. |
10 |
Blockchain Technology Beyond Bitcoin:An Overview. |
April 2018. |
|
M.Naga Seshudu. |
11 |
An Approach for Providing Technological Strategy for Human Body Healthify. |
May,2018. |
|
S.G. Taj. |
12 |
Application of Cloud Security Services for the Secured Vendor Registration. |
DEC,2017. |
|
S.G. Taj. |
13 |
Testing Web Application using Selenium Testing Tool with Respect to Testing. |
April,2018. |
|
S.G. Taj. |
14 |
A study of Ransomware and its latest Attack. |
May,2018. |
|
P. VIJAYA KUMARI. |
15 |
Cloud Storage Auditing by Utilizing Provable Data Possession Method”
|
April,2018. |
|
P. VIJAYA KUMARI. |
16 |
Cloud Storage Auditing by Utilizing Provable Data Possession Method . |
Feb,2018. |
|
2016-17 | ||||
G.Murali |
1 |
K.Lavanya, G.Murali, Efficeient Analytical Architecture for Sensor Networks Using Hadoop,Proc. International Conference on Communication and Electronics systems(ICCES-2016), PPG Institute, Coiambatore , Tamil Nadu, OCT 21-22, 2016.Page No.322-327, 2016 IEEE. |
ICCES |
Oct 21-22,2016 |
G.Murali |
2 |
E.Chandana Priya, G.Murali, Effective Data Sharing using Advanced Ring Signature with Forward Security,Proc. International Conference on Communication and Electronics systems(ICCES-2016), PPG Institute, Coiambatore , Tamil Nadu, OCT 21-22, 2016.Page No.192-196, 2016 IEEE. |
ICCES |
Oct 21-22,2016 |
G.Murali |
3 |
An Enhanced Approach for Securing Authorized Deduplication in Hybrid Clouds ,Proc. International Conference on Communication and Electronics systems(ICCES-2016), PPG Institute, Coiambatore , Tamil Nadu, OCT 21-22, 2016.Page No.363-367, 2016 IEEE. |
ICCES |
Oct 21-22,2016 |
G.Murali |
4 |
K.Hemalatha, G.Murali, A Novel Technique Using Slot Configuration on Hadoop Clusters ,Proc. International Conference on Communication and Electronics systems(ICCES-2016), PPG Institute, Coiambatore , Tamil Nadu, OCT 21-22, 2016.Page No.222-225, 2016 IEEE. |
ICCES |
Oct 21-22,2016 |
G.Murali |
5 |
Tejaswi T, G.Murali, Semantic Inference Method Using Ontologies ,Proc. International Conference on Communication and Electronics systems(ICCES-2016), PPG Institute, Coiambatore , Tamil Nadu, OCT 21-22, 2016.Page No.770-775, 2016 IEEE. |
ICCES |
Oct 21-22,2016 |
G.Murali |
6 |
N.Himaja, G.Murali, Social Network Analysis for Efficient Cloud Data Acess ,Proc. International Conference on Communication and Electronics systems(ICCES-2016), PPG Institute, Coiambatore , Tamil Nadu, OCT 21-22, 2016.Page No.368-371, 2016 IEEE. |
ICCES |
Oct 21-22,2016 |
G.Murali |
7 |
N.Moses Babu, Sri G.Murali, Malware Detection for Cloud Servers using Intermediate Monitoring Server, International conference on Energy, Communications, Data Analytics and Soft Computing (ICEDS 2017) Page no-466 of 496-469 of 496 |
ICEDS |
2017 |
G.Murali |
8 |
I.Raja Sekhar Reddy, G.Murali, " A Novel Triple DES to Enhance E-Governance security. International conference on Energy, Communications, Data Analytics and Soft Computing (ICEDS 2017) Page no-266 of 496-269 of 496, 978-1-5386-1887-5/17/$31.00 2017IEEE |
ICECDS |
2017 |
G.Murali |
9 |
I.Raja Sekhar Reddy, G.Murali, "Quantum Key Distribution in E-Governance using Novel Triple Des and QKD Simulator, Proceedings of WRFER International conference on 9th July-2017, Pune, India. 978-1-5386-1887-5/17/$31.00 |
ICECDS |
Jul-17 |
G.Murali |
10 |
B.Chandra Sekhar, G.Murali, "Acess control for cloud forensics through secure logging services" International conference on Energy, Communication, Data Analytics and soft computing( ICECDS-2017)- Page no-416 of 496-421 of 496 |
ICECDS |
2017 |
G.Murali |
11 |
K.Venkata Ravi kumar, G.Murali, " Enhanced Security for Data Sharing in clouds through ploicy and Access control Managemnet,International conference on Energy, Communication, Data Analytics and soft computing( ICECDS-2017)- Page no-447 of 496-450 of 496 |
ICECDS |
2017 |
G.Murali |
12 |
Published the paper" Malware detection for Multi Cloud using Intermidieate Monitoring Server with paper code: SKR-IEEE-ECDS-1283 in International Conference on Energy, Communication, Data Analytics and soft computing (ICECDS)-2017, with catalog "CFP17M%%-PRJ :978-1-5386-1886-8" organized by SKR Engineering College, Poonamallee, Tamil Nadu, during 1st-2nd August-2017. |
ICECDS |
2017 |
Lavanya |
13 |
Lavanya,Systematic Literature Review on Resource allocation And Resource Scheduling in Cloud Compution |
SLRRA |
|
S. RadhaKrishna |
14 |
S. RadhaKrishna,Exploring Robust Spectral Features for Emotion Recognition using Statistical Approaches |
ERSFERUSA |
|
Vijaya |
15 |
Vijaya,Performance Evaluation of IEE 802.11e EDCA using QUALNET |
PEO IEE802.11 |
|
2015-16 | ||||
Smt S.J.Saritha |
1 |
S.Jessica Saritha, P.Govindarajulu, A Grid Computing Approch for Text Mining the Biomedical Doccuments, IJERMT, ISSN No: 2278-9359, Volume -4, issue 11.November-2015,Page no-90-94. |
IJERMT |
Nov-15 |
Smt S.J.Saritha |
2 |
S.Jessica Saritha,Prof P.Govindarajulu, Emerging Statistical Models for the Analysis of Genomic Data, IJARCSSE, ISSN No: 2277-128X, Volume -5, issue 11.November-2015,Page no-283-288. |
IJARCSSE |
Nov-15 |
B.Harikrishna |
3 |
N.Anusha, B.Harikrishna, Y.Annie Jerusha, P.Prathyusha, URC: Unified Record and Viscosity Compassionate in P2P Systems, International Conference on Communication, signal Processing, Computing and information Technologies, ISBN:978-93-83038-27-5, Page no:86-91. |
ICCSPCIT |
2015 |
B.Harikrishna |
4 |
B.Harikrishna, N.Anusha, G.Murali,Green computing Tended: Energy Involution in the It Commerce and By Domestic Computers in five Foremost Andhra Pradesh Smart-Cities, International Journal of Moderan Engineering Research (IJMER), ISSN No:2249-6645.Page No:89-94. |
IJMER |
2016 |
C.Ramakrishna |
5 |
Springer International Conference on soft Computing Systems, Presented paper on "Analysis of starvation problem in wireless Lans in the international conference, Organized by the Department of Electrical and Electronics Engineering held on 19th - February 2016. NOORUL ISLAM CENTRE FOR HIGHER EDUCATION Nooral Islam University(Deemed to be University Under Section 3 of UGC Act 1956), Kumaracoil, Kanyakumari, Tamilnadu-629180. |
Nooral Islam University |
19th Feb-2016 |
Sri G.Murali |
6 |
Presented a paper titled CLOUDQKDP: QUANTUM KEY DISTRIBUTION PROTOCAL FOR CLOUD COMPUTING in the 5th IEEE International Conference on INFORMATION, COMMUNICATION & EMBEDDED SYSTEMS ( ICICES 2016) organized by S.A.Engineering College, Poonamallee- Avadi Main Road, thiruverkadu, chennai-6000 077. |
ICICES |
25th -26th Feb 2016 |
Sri G.Murali |
7 |
R.Sivaram Prasad,G.Murali," Quantum Cryptography based solution for secure and efficient key management for e-governance in india.date of conference 29-31 oct-2015,published in IEEE.pages 18-26. |
iCATccT |
Jul-05 |
T.Niranjan Babu |
8 |
T.Niranjan Babu, K.Balachandra reddy Presented a paper in national conference on " Developments, Advances & Trends in Engineering Science[NC-DATES 2k16] organised by CMR Engineering College, Hyderabad. International journal of model Engineering Research. |
IJMER |
8-9 th January-2016. |
K.Balachandra Reddy |
9 |
T.Niranjan Babu, K.Balachandra reddy Presented a paper in national conference on " Developments, Advances & Trends in Engineering Science[NC-DATES 2k16] organised by CMR Engineering College, Hyderabad. International journal of model Engineering Research. |
IJMER |
8-9 th January-2016. |
G.Murali |
10 |
In Recognization of the publication of /manuscript entitled Green computing Tended: Energy Involution In the It commerce and by Domestic computers in IJMER Journal, Special issue/ Presented at the 2nd National Conference on " Developments, Advances & Trends in Engineering Science[NC-DATES2K16] organized CMR Engineering College, Hyderabad. |
IJMER |
8th-9th January-2016. |
2014-15 | ||||
Dr.P.Chenna Reddy | 1 | J. Geetha, N. UdayBhaskar, P. ChennaReddy, and Neha Sniha, “Hadoop Scheduler with Deadline Constraint”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol. 4, No. 5, October 2014, DOI: 10.5121/ijccsa.2014.4501, ISSN: 2231-5853. | IJCCSA | Oct-14 |
2 | P. Chenna Reddy, “New Routing Metrics for Adhoc Network Routing Protocols”, Journal of Institution of Engineers (India): Series. B (Springer), DOI 10.1007/s40031-014-0116-x, Vol. 95, No. 4, Oct-Dec 2014, Pg: 351-361, ISSN 2250-2106. | SPRINGER | Dec-14 | |
Smt.S.J.Saritha | 1 | Website Structure Transformation by Page Access Connectivity Mining for Optimal User Navigation | IJARCSSE | Oct-14 |
2 | Context Aware Relative Support Service Information Extraction from Big Data | IJARCSSE | Oct-14 | |
3 | Parallel Graph Protection and Pruning for Frequent Item Set Mining | IJARCSSE | Oct-14 | |
4 | FABAH: Fault Abide Byzantine Attack Handler for Mapreduce | IJARCSSE | Oct-14 | |
2013-14 | Jul-13 | |||
Dr.P.Chenna Reddy | 1 | T. Surya prakash Reddy, P. Chenna Reddy, “EOCTC: Energy Efficient Ordered Congestion Tolerant and Control Routing for Mobile Adhoc Networks”, International Journal of Computer Science Issues, Vol. 10, Issue. 2, No. 1, July, 2013, Impact Factor: 0.242, ISSN: 1694-0784, Impact Factor: 0.242, Citations: 1. | IJCSI | Jul-13 |
2 | B. Jagadessh, P. Rajesh kumar, P. Chenna Reddy, “Robust Digital Image Water Marking Scheme in Discrete Wavelet Transform Domain using Support Vector Machines”, International Journal of Computer Applications, Volume 73– No.14, July, 2013, ISSN: 0975 – 8887, Impact Factor: 0.821. | IJCA | Sep-13 | |
3 | 39. A.L. Sreenivasulu, P. Chenna Reddy, “Comparative Assay of the Overhead of Efficient Version of CPDA Protocol to Original CPDA Protocol”, International Journal of Engineering and Innovative Technology, Vol. 3, Issue. 3, Sept. 2013. ISSN: 2277-3754. | IJEIT | Nov-13 | |
4 | P. Jammulaiah, P. Chenna Reddy, “Simulation and Comparison of AOMDV, AODV and DSR in MANETS”, International Journal of Networks and Systems, Vol. 2, No. 6, Oct-Nov, 2013, ISSN: 2319 – 5975, Global Impact Factor: 0.378. | IJNS | Nov-13 | |
5 | Soni Shaik, P. Chenna Reddy, “An Evaluation Study of AntHocNet”, International Journal of Networks and Systems”, Vol. 2 No. 6, Oct-Nov, 2013, ISSN: 2319-5975, Global Impact Factor: 0.378. | IJNS | Dec-13 | |
6 | A. Swetha, P. Chenna Reddy, “Authentication of an Image over Wireless Channels based on Secure Digital Signature Scheme”, International Journal of Science and Research, Vol. 2, Issue. 12, Dec. 2013, ISSN: 2319-7064, Impact Factor: 0.3317 | IJSR | Dec-13 | |
7 | P. Sreenivasa Rao, M. Janani, P. Chenna Reddy, “TFRC for Congestion control in Wired Environment”, International Journal of Inventive Engineering and Sciences, Vol. 2, Issue. 1, Dec. 2013, ISSN: 2319-9598. | IJIES | Dec-13 | |
8 | P. Sreenivasa Rao, M. Janani, P. Chenna Reddy, “TFRC for Congestion control in Wireless Environment”, International Journal of Science and Modern Engineering, Vol. 2, Issue. 1, Dec. 2013, ISSN: 2319-6386. | IJSME | ||
9 | Dr. P. Chenna Reddy, “Use of Self-organization in Computer Network”, in Proc. Of International Conference on Mathematical Computer Engineering, Nov. 29-30, 2013, VIT, Chennai, ISBN: 978-93-82338-90-1. | ICMCE | Dec-13 | |
10 | T.Sunil Kumar Reddy, Dr.P.Venkat Krishna, Dr P. Chenna Reddy, “Power Aware based Workflow Model Optimization using Fuzzy Bee Colony Method”, ARPN Journal of Engineering and Applied Sciences, Vol. 9, No. 4, April, 2014, pg. 593-598, ISSN 1819-6608. | ARPN | May-14 | |
11 | B. Jagadessh, P. Rajesh kumar, P. Chenna Reddy, “Digital Image Water Mark Extraction in Discrete Wavelet Transform Domain using Support Vector Machines”, International Journal of Recent Trends in Engineering & Technology, Vol. 11, June. 2014, Pg: 170-176, ISSN 2158-5563. | IJRTET | ||
Sri.M.Munibabu | 12 | A Comparative Study of Elliptic Curve Cryptography and RSA kerberos Authentication Protocol | IJASET | Dec-13 |
13 | A Comparative Study of Elliptic Curve Cryptography and RSA kerberos Authentication Protocol | ICITCSM | Dec-13 | |
14 | Information At Your Fingertips Anywhere,Anytime,Anyway (A3) MCC Survey | IJPTT | May-14 | |
15 | Link Analysis Extension for Mining Relational Databases Oct-Dec-2013 | IJCCN | Dec-13 | |
16 | Simulation Based Performance Analysis of ZRP,FSR and AODV Routing Protocols in MANET | ICITCSM | Dec-13 | |
17 | Simulation Based Performance Analysis of ZRP,FSR and AODV Routing Protocols in MANET | IJACEN | Dec-14 | |
Smt.S.J.Saritha | 18 | An Efficient and Effective Ranking on Spatial Data by Quality Preferences | IJRCCT | Nov-13 |
19 | A QoS Oriented Conginitive Radio Based VHOM scheme for WIMAX /WIFI overlay Networks | IJSR | Nov-13 | |
20 | Image Edge Detection using Ant Colony Optimization Algorithm | IJRCCT | Nov-13 | |
21 | Link Analysis Extension for Mining Relational Databases | IJCCN | Dec-13 | |
Sri G.Murali | 22 | Relative Investigation of DSDV,DSR and TORA in MANETS | ICETEM | Nov-14 |
23 | Authentication of Gray Scale Document Images Via the use of PNG image with Data Repairing | IJSR | Nov-14 | |
24 | Vehicle Detection with Video Streaming in Dynamic Bayesian Networks | ICICSE | Sep-14 | |
25 | Preserving Privacy and Integrity in Wireless Sensor Networks | ICICSE | Sep-14 | |
26 | Link independent and node independent Algorithms for Efficient Multipath Routing | IJACST | Nov-14 | |
Sri.S.MP.Qubeb | 27 | A Comparative Study of Elliptic Curve Cryptography and RSA kerberos Authentication Protocol | ICITCSM | Dec-13 |
28 | A Comparative Study of Elliptic Curve Cryptography and RSA kerberos Authentication Protocol | IJASET | Dec-13 | |
Sri.V.Sunilbabu | 29 | A Comparative Study of Elliptic Curve Cryptography and RSA kerberos Authentication Protocol | ICITCSM | Dec-13 |
30 | A Comparative Study of Elliptic Curve Cryptography and RSA kerberos Authentication Protocol | IJASET | Dec-13 | |
Sri.A.Naresh | 31 | Enhancing Security for staas by utilizing Mass and juju in the Cloud | IJWCNT | Jan-14 |
Smt.C.Suneetha | 32 | A robust color filter array interpolation technique for color image enhancement | IJETTCS-2013 | Aug-14 |
Miss. P. Prathyusha | 33 | A Better Approach for Cloud Storage Auditing by Utilizing Provable Data | ICCC 2013 | Nov-13 |
Sri G. Hareesh Kumar | 34 | Design and Implementation of Ranking Model Adoptation for Domain Specific Search | ICEECS – 2014 | Jun-14 |
Smt. B. Muni Lavanya | 35 | Parallel Prefix Scan with Compute Unified Device Architecture | ICEECE-2014 | May-14 |
2012-13 | ||||
Dr.P.Chenna Reddy | 1 | B. Reshma Yusuf, Dr. P. Chenna Reddy,”Mining data streams using Option trees“, International Journal of Computer Network and Information Security, Aug. 2012, pp. 49-54, ISSN: 2074-9104. | IJCNIS | Aug-12 |
2 | S. Vishnu Vardhan, Dr. P. Chenna Reddy, ”Congestion Control in Real Time Applications”, International Journal of Computer Applications, Vol. 51, No. 3, pp 33-37, Aug. 2012, ISSN: 0975-8887, Impact factor: 0.821. | IJCA | Aug-12 | |
3 | R. Siva Sankara Reddy, Dr. P. Chenna Reddy, “K-Means Algorithm with different Measurements in Clustering Approach”, International Journal of Engineering and Advanced Technology, Vol. 1, Issue 6, Aug. 2012, pp: 269-271, ISSN: 2249-8958, Impact Factor: 1.0. | IJEAT | Aug-12 | |
4 | M. Jagadeeswara Reddy, P. Suman Prakash, Dr. P. Chenna Reddy,”Homogeneous and Heterogeneous Energy Schemes for Hierarchical Cluster based Routing Protocols in WSN: A Survey”, in Proc. Of ITC 2012, Lecture Notes on Electrical Engineering published by Springer, Vol. 150, ISBN: 178-1-4614-3362-0, Aug. 3-3, 2012, pp: 456-459, Citations: 1. | SPRINGER | Aug-12 | |
5 | T. Nishitha, Dr. P. Chenna Reddy, “Performance Evaluation of AntHocNet Routing Algorithm in Adhoc Networks”, in Proc. Of Turing 100 – IEEE International Conference on Computing Sciences, ISBN: 978-1-4673-2647, DOI: 10.1109/ICCS.2012.58, 14-15 Sept, 2012, Lovely Professional University, Phagwara, Punjab, citations: 1. | IEEE | Sep-12 | |
6 | V.Lokeswar Reddy, Dr A.Subhramanyam, Dr P. Chenna Reddy, “Implementation of Least Significant Bit Steganography and Statistical Steganalysis”, in Proc. of ACM CCSEIT-12, Oct. 26-28, 2012, Coimbatore. | ACM | Oct-12 | |
7 | B. Reshma Yusuf, Dr. P. Chenna Reddy,”Evolving Efficient Algorithms using Option trees for Stream Data Mining”, in Proc. Of Elsevier International Conference on Emerging trends in Electrical, Communication and Information Technologies, ICECIT-12, 21-23 Dec, 2012, SRIT, Anantapur, pp: 193-202 | ELSEVIER | Dec-12 | |
8 | R.Lalu Naik, Dr.P.Chenna Reddy, “Secure Authentication of BB84 Quantum Key Distribution Protocols”, International Journal of Computer Engineering and Technology, Vol. 3, Issue 2, pp. 280-287, July-Sept,2012, ISSN: 0976-6375, Impact Factor: 6.1302. | IJCET | Sep-12 | |
9 | R.Lalu Naik, Dr.P.Chenna Reddy, “Secure Authentication of BB84 Quantum Key Distribution Protocols”, International Journal of Computer Engineering and Technology, Vol. 3, Issue 2, pp. 280-287, July-Sept,2012, ISSN: 0976-6375, Impact Factor: 6.1302. | IJCA | Sep-12 | |
10 | Y. Ravi, V. Venkata Ramana, M.V. Rathnamma, Dr. P. Chenna Reddy, ”Position based Routing in Mobile Adhoc Networks”, International Journal of Computer Applications, Volume 55– No.7, October, 2012, ISSN: 0975 – 8887, Impact factor: 0.821. | IJCA | Oct-12 | |
11 | T. Nishitha, Dr. P. Chenna Reddy, “Bio-Inspired Routing in Adhoc Networks”, Journal of Engineering, Computers and Applied Sciences, Volume 1, No.1, October 2012, ISSN: 2319-5606, Citations: 1. | JECA | Oct-12 | |
12 | M. Jagadeeswara Reddy, Dr. P. Chenna Reddy, “Energy Conservation Hierarchical Cluster based Routing Protocols for Heterogeneous Wireless Sensor Networks”, International Journal of Engineering Research, Vol.2, Issue 5, Sept-Oct 2012, pp: 939-942, ISSN: 2248-9622. | IJERA | Oct-12 | |
13 | T. Surya prakash Reddy, P. Chenna Reddy, “EOCC: Energy Ordered Congestion control using cross layer support in Mobile Adhoc Network Routing”, International Journal of Scientific and Engineering Research, Vol. 3, Issue. 10, Oct. 2012, ISSN: 2229-5518, Impact Factor: 0.4510, Citations: 1. | IJSER | Oct-12 | |
14 | Pathan Mohd. Shafi, Dr. Abdul Satar, Dr. P. Chenna Reddy, ”Improved Kerberos Authentication Security Protocol for Mobile Devices”, Technical Journal of The Institution of Engineers (India), Vol. 36, Nov. 2012, ISBN: 978-81-924990-0-0. | TJIE | Nov-12 | |
15 | Y. Kishore, V. Venkata Ramana, Dr. P. Chenna Reddy, “Secure routing in adhoc networks using ARAN”, International Journal of Management, IT and Engineering, Vol. 2, Issue. 12, Dec. 2012 , ISSN: 2249-0558. | IJMITE | Dec-12 | |
16 | Geeta Reddy J, Rajeshwari S.B., Dr. N.Uday Bhaskar, Dr. P. Chenna Reddy, “An Efficient Profit-based Job Scheduling Strategy for Service Providers in Cloud Computing Systems”, International Journal of Application or Innovation in Engineering and Management, Vol.2, Issue 1, Jan. 2013, ISSN: 2319-4847, Impact Factor: 2.379 (ISRA:JIF). | ISRA | Jan-13 | |
17 | Provably Protected Nested one time secret Mechanisms for Rapid cert fication and swap in mobile interactions | IJCER | Jan-13 | |
18 | M.Durga Prasad, Dr P.Chenna Reddy, Banoth Samya, “Extended Nymble: Method for tracking Misbehaving Users Anonymously while Blocking “,International Journal of Computer Science & Information Technology, Vol. 5, No. 1, February 2013, ISSN: 0975-3826. | IJCSIT | Feb-13 | |
19 | V. Lokeswara Reddy, Dr. P. Chenna Reddy, Dr. A. Subramanyam, “A Novel Approach for Hiding Data in Image, Audio and Video using Steganography”, International Journal of Computer Applications, Volume 69– No.15, May, 2013, ISSN: 0975 – 8887, Impact Factor: 0.821. | IJCA | May-13 | |
Sri.B.HariKrishna | 20 | Provably Protected Nested One-Time Secret Mechanisms for Rapid Mutual Certification and Key Swap in Mobile Interactions | IJCER | Jan-13 |
21 | Administrating Cloud for Multi-Cultural Systems on Ad-hoc web | IEEE-ICRDPET | Mar-13 | |
22 | Inter Domain Packet Filteres for IP Forgoing Attacks | NCCNS | Apr-13 | |
23 | Theories and Algorithms for extensive XML Tree Sample Identical | NCEITCS | Apr-13 | |
24 | Efficient Resource Allocation Using Series Scheduling inCloud Based Systems | RITS-ICAEM-2012 | Dec-12 | |
25 | National Conference on Emerging Trends in Computer Science | ETCS | Feb-13 | |
Smt.S.J.Saritha | 26 | Multidecision Tree Classification in Master Data Management | IJCST | Sep-12 |
Sri. G. Hareesh Kumar | 27 | MPI Based Cluster Computing for Performance Evaluation of Parallel Applications | ICT 2013 | Apr-13 |
28 | Fuzzy Logic Based Edge Detection and its Dependency on Membership Function | ICACTE-2014 | May-14 | |
Sri D. Mahendra Reddy | 29 | Defect Fore-Casting in COTS Integration: An Adaptive Decision Support System | ICCSE-2012 | Jul-12 |
Smt. B. Muni Lavanya | 30 | Porting Nymble System into Mobiles | ICCSIT-2012 | Jul-12 |
2011-12 | ||||
Dr.P.Chenna Reddy | 1 | T. Srikanth, N. Rajesh, Dr. P. Chenna Reddy, “An Improved Snoop for TCP Reno and TCP SACK in Wired-cum-Wireless Networks”, Indian Journal of Computer Science and Engineering, pg 455-460, Vol.2 No. 3, June-July, 2011, ISSN: 0976-5166, Citations: 2. | IJCSE | Jul-11 |
2 | Dr. P. Chenna Reddy, “Improving Performance of Voice Over IEEE 802.11e”, i-managers Journal on Software Engineering, Vol. 5, No. 1, July-September, 201, ISSN: 0973-51510. | IMJSE | Sep-11 | |
3 | Implementation of FS-DT Algoirthm to Enahance the Performance of Decision Tree | IJERA | Dec-11 | |
4 | R.Lalu Naik, Dr.P.Chenna Reddy, U.Sathish Kumar, Dr.Y.V.Narayana, “Quantum Cryptography with key Distribution in Wireless Networks on Privacy Amplification”, International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, December 2011, ISSN: 2250-3501, Impact Factor: 0.421. | IJCNWC | Dec-11 | |
5 | V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, “Secured File Transmission using LSB Steganography”, in Proc. of AICTE Sponsored National conference on High Performance computing and Networking, Aug. 13-14, 2011, Annamacharya institute of technology & sciences, Rajampet, ISBN: 978-93-81583-00-5. | NCHPCN | Aug-11 | |
6 | B.Jagadeesh, P.Rajesh, Dr P. Chenna Reddy, “An Edge Detection based Oblivious Image Watermarking method using Singular value Decomposition”, in Proc. Of International Conference on Information and Communication Technology, 24th Dec. 2011, InterScience Campus, Chennai | ICICT | Dec-11 | |
7 | Pathan Mohd. Shafi, Dr Abdul Sattar, Dr P. Chenna Reddy, “Extending Public Key Cryptography with Kerberos Authentication Protocol to Location Based Security”, in Proc. of UGC Sponsored 1st National Conference on Communications, Networking and Mobile Computing, Jan. 20-21, 2012, JNTUA College of Engineering, Pulivendula | NCCNMC | Jan-12 | |
8 | R.Lalu Naik, Dr P. Chenna Reddy, U.Sathish Kumar, M.L.Gangadhara Rao, “Multiparty Secure Communication by using Quantum Key Distribution Protocols”, in Proc. of UGC Sponsored 1st National Conference on Communications, Networking and Mobile Computing, Jan. 20-21, 2012, JNTUA College of Engineering, Pulivendula | NCCNMC | Jan-12 | |
9 | V.Lokeswar Reddy, Dr A.Subhramanyam, Dr P. Chenna Reddy, “Implementation of LSB Image Stengography”, in Proc. of UGC Sponsored 1st National Conference on Communications, Networking and Mobile Computing, Jan. 20-21, 2012, JNTUA College of Engineering, Pulivendula | NCCNMC | Jan-12 | |
10 | R.Siva Sankara Reddy, Dr P. Chenna Reddy, “Clustering Techniques based on Generalizations of Graph Partitioning”, in Proc. of UGC Sponsored 1st National Conference on Communications, Networking and Mobile Computing, Jan. 20-21, 2012, JNTUA College of Engineering, Pulivendula | NCCNMC | Jan-12 | |
11 | A.L.Srinivasulu, Dr P. Chenna Reddy, “Distributed Data Aggregation with Geographical Routing for Maximizing Lifetime of Wireless Sensor Networks”, in Proc. of UGC Sponsored 1st National Conference on Communications, Networking and Mobile Computing, Jan. 20-21, 2012, JNTUA College of Engineering, Pulivendula | NCCNMC | Jan-12 | |
12 | T.Sunil Kumar Reddy, Dr.P.Venkat Krishna, Dr P. Chenna Reddy, “An Analysis of Various Task Scheduling Algorithms In High Performance Computational Grids”, in Proc. of UGC Sponsored 1st National Conference on Communications, Networking and Mobile Computing, Jan. 20-21, 2012, JNTUA College of Engineering, Pulivendula | NCCNMC | Jan-12 | |
13 | Geeta Reddy J, N.Uday Bhaskar, Dr P. Chenna Reddy, “A Framework for XML Web Services Retrieval With Ranking ”, in Proc. of UGC Sponsored 1st National Conference on Communications, Networking and Mobile Computing, Jan. 20-21, 2012, JNTUA College of Engineering, Pulivendula | NCCNMC | Jan-12 | |
14 | N.Ramanjaneya Reddy, Dr P. Chenna Reddy, Prof M. Padmavatamma, “Design of a new Security Protocol Using Cross-Cipher Stream”, in Proc. of UGC Sponsored 1st National Conference on Communications, Networking and Mobile Computing, Jan. 20-21, 2012, JNTUA College of Engineering, Pulivendula | NCCNMC | Jan-12 | |
15 | B.Jagadeesh, P.Rajesh, Dr P. Chenna Reddy, “An Image Watermarking Scheme Based On Discrete Cosine Transform Using Genetic Algorithm”, in Proc. of UGC Sponsored 1st National Conference on Communications, Networking and Mobile Computing, Jan. 20-21, 2012, JNTUA College of Engineering, Pulivendula. | NCCNMC | Jan-12 | |
16 | B. Jagadessh, P. Rajesh kumar, P. Chenna Reddy, “Genetic algorithm approach for singular value decomposition and quantization based digital water marking“, International journal of Engineering research and applications, Vol. 2, Issue 2, pp.1229-1235, Mar-Apr 2012, ISSN: 2248-9622, IC value: 5.09, Impact Factor: 1.69. | IJERA | Apr-12 | |
17 | Pathan Mohd. Shafi, Dr. Abdul Satar, Dr. P. Chenna Reddy,”Risk Assessment of Authentication protocol”, International Journal of Computer Science and Information security, Vol. 9, No. 6, June, 2011”, ISSN: 1947-5500. | IJCSI | Jun-12 | |
Sri G.Murali | 18 | Graphical simulation of wireless application protocol | IJC | Dec-11 |
19 | Graphical simulation of N Queens problem | IJC | Dec-11 | |
20 | Remote procedure calls implementing distributed algorithm | IJC | Dec-11 | |
21 | Dynamic routing with security considerations | IJC | Dec-11 | |
22 | Network security scanner | IJC | Dec-11 | |
23 | Key distribution for dynamic multicast groups | IJC | Dec-11 | |
24 | Mining association rules from CADASTRE database | Dec-11 | ||
25 | Effective Authentication in Sensor Networks using Quantum Cryptography | ICCCSA | Mar-14 | |
Sri.B.HariKrishna | 26 | Implementation of FS-DT algorithm to enhance the Performance | IJERA | Nov-Dec 2011 |
Smt.S.J.Saritha | 27 | High Processing Genomic Signal Application with Adaptive Region Prediction | IJCIS | Nov-11 |
28 | A Lossless Visible watermarking using Histogram Shifting Algorithm | IJCSIS | Apr-12 | |
2010-11 | ||||
Dr.P.Chenna Reddy | 1 | P. Chenna Reddy, V. Venkata Ramana, A. Rammohan Reddy, “A Survey of QOS with IEEE 802.11e”, International Journal on Computer Science and Engineering, pg 807-813, Vol. 3 No. 2 Feb 2011, ISSN: 0975-3397. | IJCSE | Feb-11 |
2 | N. Ramanjaneya Reddy, M. Hanumanthu, Dr. P. Chenna Reddy, Dr. M. Padmavathamma, “Secure Data Transmission using Hybrid Technique”, in Proc. of International Conference on Recent Advances in Computing Technology, Mar. 30-31, 2011, Bharath University, Chennai | ICRACT | Mar-11 | |
3 | V.Lokeswar Reddy, Dr A.Subhramanyam, Dr P. Chenna Reddy, “SteganPEG Steganography + JPEG”, in Proc. of IEEE International Conference on Ubiquitous Computing and Multimedia Applications, April. 13-15, 2011, Hannam University, Daejeon, Korea, Citations: 3. | ICUCMA | Apr-11 | |
4 | P. Chenna Reddy, “Service differentiation of IEEE 802.11e”, Journal of advances in Computer research, Pg 39-48, Vol. 01, No. 3, March 2011, ISSN: 2008-6148. | JACR | Mar-11 | |
5 | V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for Various File Formats”, International Journal of Advanced Networking and Applications, pg 868-872, Vol. 02 Issue: 05, Mar-Apr 2011, ISSN: 0975-0290, Citations: 19. | IJANA | Apr-11 | |
6 | V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, “SteganPEG Steganography+JPEG”, International Journal of Computer Graphics, pg 31-42, Vol. 2, No.1, May 2011, ISSN: 2093-9663, Citations: 3. | IJCG | May-11 | |
7 | Dr. P. Chenna Reddy, V. Lokeswara Reddy, Dr. A. Subramanyam, “A Least Significant Bit Embedding Technique of Digital Image Steganography”, Atti Della Foundazione Giorgio Ronchi, No. 4, June-2011, ISSN: 0391-2051. | ADFGR | Jun-11 | |
Smt.S.J.Saritha | 8 | Clustering methods for credit card using Bayesian rules based on K-means classification | IJACS | 1-Oct |
9 | An efficient multilevel and multi dimensional representation of Genomic dataset | IJCIS | Jul-11 | |
10 | A Data preprocessing approach for cleansing of Genomic data | IJCIS | Aug-11 | |
11 | Grid data mining for Genomics and Gridification of Genomic application(GENO Grid) | IJAST | May-11 | |
Sri.A.Naresh | 12 | A Study on FP-Tree algorithms for association rules | IJARCS | Apr-14 |
13 | An Efficient Requirement Elicitation Tool With Pattern Matching Mechanism | IJCIS | May-14 | |
14 | An Efficient Requirements Gathering Tool over Underlying Web Technologies | IJCIS | Jan-14 | |
2009-10 | ||||
Dr.P Chenna Reddy | 1 | V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for Various File Formats”, in Proc. of International Conference on Recent trends in Computing and Communications, Dec. 18-19, 2010, KCG College of Technology, Chennai | ICRTCC | Dec-10 |
2 | V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, “An overview of LSB Image Steganography and its Evaluation for Various Bits”, in Proc. of National Conference on Network Technologies, Dec. 29, 2010, Sri Venkateswara College of Engineering and Technology, Chittoor | NCNT | Dec-10 | |
3 | P. Chenna Reddy, “TCP over IEEE 802.11”, Journal of Annals of Computer Science, Vol. VII, Nov. 2009, ISSN: 2065-7471, IC Value: 4.89. | JACS | Nov-09 | |
2008-09 | ||||
Dr.P Chenna Reddy | 1 | P. Chenna Reddy, and Dr. P. ChandraSekhar Reddy, “Dynamic Vegas”, i-managers Journal Software Engineering, Vol. 3, No.2, Oct-Dec 2008, ISSN: 0973-5151. | IMJSE | Dec-08 |
3 | P. Chenna Reddy, and Dr. P. ChandraSekhar Reddy, “Dynamic RED”, Journal of Engineering Today, Jan 2009, ISSN: 2180-0995. | JET | Jan-09 | |
2006-07 | ||||
Dr.P.Chenna Reddy | 1 | P. Chenna Reddy, and Dr. P. ChandraSekhar Reddy, “Performance analysis of adhoc network routing protocols”, in Proc. of ADCOM 2006 – International Symposium on AdHoc and Ubiquitous Computing (ISAHUC’06), Dec 22-25, 2006, NITK, Surathkal, Citations: 60 | ISAHUC | Dec-06 |
2 | P. Chenna Reddy, and Dr. P. ChandraSekhar Reddy, “Quality of Service using IEEE 802.11e”, in Proc. of 3rd International conference on Mobile Ubiquitous and Pervasive Computing, Dec 18-19, 2006, Vellore Institute of Technology, Vellore | ICMUPC | Dec-06 | |
3 | P. Chenna Reddy, and Dr. P. Chandra Sekhar Reddy, “Performance Comparison of TCP Congestion Control Algorithms”, The Journal of ‘The Institution of Engineers (India) – CP’, Vol. 87, Nov. 2006, , ISSN: 0971-0469, pg 43-48, H index: 4. | IE | Nov-06 | |
2005-06 | ||||
P. Chenna Reddy | 1 | P. Chenna Reddy, and Dr. P. ChandraSekhar Reddy, “Active Queue Management in a QOS Enabled Network”, Journal of Computer Science, Vol. 1, No. 3, Nov-Dec 2005, ISSN: 0973-2926. | CS | Dec-05 |
2 | P. Chenna Reddy, and Dr. P. ChandraSekhar Reddy, “QOS in a Heterogeneous Networking Environment”, in Proc. of National Conference on Emerging Computational Techniques and their Applications, Oct 22-23, 2005, Jai Narain Vyas University, Jodhpur | NCAC | Oct-05 | |
3 | P. Chenna Reddy, and Dr. P. ChandraSekhar Reddy, “Cross Layer Approach for QOS in Mobile Networks”, in Proc. of 5th National Conference on Advanced Computing, Dec. 23-24, 2005, PSG College of Technology, Coimbatore | NCAC | Dec-05 | |
4 | P. Chenna Reddy, and Dr. P. ChandraSekhar Reddy, “Performance analysis of adhoc network routing protocols”, Academic Open Internet Journal, Vol. 17, Available: http://www.acadjournal.com/2006/ V17/part6/p3, April, 2006, ISSN: 1311-4360, Citations: 60. | AOIJ | Apr-06 | |
2004-05 | ||||
P. Chenna Reddy | 1 | C. Shoba Bindu, P. Chenna Reddy, and Dr. P. ChandraSekhar Reddy, “Security in Mobile Adhoc Networks”, in Proc. of National Conference on Mobile Computing and Networking, Sept 30th to Oct 2nd, 2004, VIT, Vellore | NCMC | Oct-04 |
2003-04 | ||||
P.Chenna Reddy | 1 | P. Chenna Reddy, and Dr. P. ChandraSekhar Reddy, “Quality of Service in Routing Protocols for Adhoc Networks”, in Proc. of International Conference on Wireless Communication Networks, June 27-29, 2003, SSN College of Engineering, Chennai | ICWCN | Jun-03 |
2 | P. Chenna Reddy, A. Anil Kumar Reddy, and Dr. P. ChandraSekhar Reddy, “Multimedia in Adhoc Networks”, in Proc. of International Conference on e-Governance and Digital Libraries, Oct. 16-17, 2003, International Institute of Professional Studies, Devi Ahilya University, Indore | Ice-GDL | Oct-03 | |
3 | 6. P. Chenna Reddy, and A. Anil Kumar Reddy, “e_Governance – A Step towards Real Democracy”, in Proc. of National Conference on Role of Engineers in e_Governance, Dec 15-16, 2003, S.V. University College of Engg, Tirupati | NCRE | Dec-03 |