Ticker-Summer Training and Internship in Ethical Hacking by Huntmetrics || Prof. Bhiksha Raj, Visiting Professor, Dept. of ECE, UCE (A), OU.|| A Certificate Course in English Communication Skills and Personality Development (offline mode) Feb-2024.|| 2nd INTERNATIONAL SYMPOSIUM ON RECENT CHALLENGES IN ENGINEERING (ISRCE 2023) DURING 30–31 DECEMBER 2023.||

Publications

SCOPUS INDEX PUBLICATIONS (2017-2021)
S.No Title Year Publications Index
1 Secure Encrypted Word Proximity Retrieval Framework for Outsourced Relational Database Backed Applications 2022 Springer Scopus
2 Privacy Preserving Semantic-Aware Multi-keyword Ranked Dynamic Search Over Encrypted Data 2021 Springer Scopus
3 Stateless Key Management Scheme for Proxy-Based Encrypted Databases 2021 Springer Scopus
4 Decentralized Privacy-Preserving Framework for Health Care Record-Keeping Over Hyperledger Fabric 2021 Springer Scopus
5 Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data 2021 Springer Scopus
6 A compact analytical survey on task scheduling in cloud computing environment 2021 IJETT Scopus
7 Cryptographic key management scheme for supporting multi-user SQL queries over encrypted databases 2020 InderScience Scopus
8 A secure, fast insert and efficient search order preserving encryption scheme for outsourced databases 2019 InderScience Scopus
9 Fuzzy-Based Integration of Security and Trust in Distributed Computing 2019 Springer Scopus
10 Privacy Preserving Dynamically Indexed Multi-Phrase Search over Encrypted Data 2018 IEEE Scopus
11 Usage of DHS and De-duplicating Encrypted Data using ABE & ECC for Secured Cloud Environment 2018 IEEE Scopus
12 A study on impact of untrustworthy and older recommendations over T-Grid computational model 2018 Springer Scopus
13 Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs 2018 IEEE Scopus
14 A survey on client side and server side approaches to secure web applications 2017 IEEE Scopus
15 Experimental results on multi-key searchable encryption technique with different elliptic curves and app designing 2017 IJAIT Scopus
16 A novel proximity based searchable encryption scheme using referential dissimilarity 2017 IEEE Scopus
17 Improving network lifetime in WSN s based on maximum residual energy 2021 INCET Scopus
18 Pulmonary CT Images Segmentation using CNN and UNet Models of Deep Learning 2020 IEEE Scopus
19 Analysis and implementation of a parallel computing cluster for solving computational problems in data analytics 2020 ICCCS Scopus
20 Energy efficient load balancing approach for multipath routing protocol in ad hoc network 2019 ICACCP Scopus
21 Comprehensive Review of Automatic Lung Segmentation Techniques on Pulmonary CT Images 2019 ICISC Scopus
22 Design and Implementation of ConvNet for Handwritten Digits Classification on Graphical Processing Unit 2018 ICCSP Scopus
23 Automatic Lung Segmentation on Thoracic CT Scans Using U-Net Convolutional Network 2018 ICCSP Scopus
24 Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs 2018 ICISC Scopus
25 Design and implementation of GPU-based matrix chain multiplication using C++AMP 2017 ICECCT Scopus
26 A Study of Automated Evaluation of Student s Examination Paper using Machine Learning Techniques 2021 ICCCIS Scopus
27 Feature Impact on Sentiment Extraction of TEnglish Code-Mixed Movie Tweets 2021 SIST Scopus
28 Heart Disease Prediction Using Extended KNN (E-KNN) 2021 SIST Scopus
29 Heart disease prediction using extended KNN(E-knn) 2020 IJATCSE Scopus
30 Sentiment Extraction from Bilingual Code Mixed Social Media Text 2020 AISE Scopus
31 Topical and trust based page ranking using automatic seed selection 2017 IEEE Scopus
32 A contextual deep clustering based intrusion detection method for cloud 2019 IJAST Scopus
33 Detection of intrusion using hybrid feature selection and flexible rule based machine learning 2019 IJETT Scopus
34 Analysis on Malware Issues in Online Social Networking Sites (SNS) 2019 ICACCS Scopus
35 Optimized key management scheme for sensor networks using genetic algorithm 2019 Springer Scopus
36 A review on application security management using web application security standards 2019 AISC Scopus
37 Survey on design challenges and analysis of service architecture of DRM 2017 ICEI Scopus
38 Prediction of epileptic seizure classification using third-order cumulants and sparse autoencoder 2021 ITAIT Scopus
39 Multi-Objective Feature Selection Method by Using ACO with PSO Algorithm for Breast Cancer Detection 2021 IJIES Scopus
40 Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model 2021 IJICS Scopus
41 Bat-Grey Wolf Optimizer and kernel mapping for automatic incremental clustering 2020 IJMSSC Scopus
42 An efficient cryptanalysis scheme for secure data storage system in cloud using optimal dual encryption algorithm 2020 IJSOI Scopus
43 Particle Grey Wolf Optimizer (PGWO) Algorithm and Semantic Word Processing for Automatic Text Clustering 2019 IJUFKBS Scopus
44 Design and implementation of a hacker detection scheme: A network security measure in heterogeneous WSN 2019 Lecture Notes in Networks and Systems Scopus
45 A secure and computational-efficient multicast key distribution for wireless networks 2019 ICISC Scopus
46 Approving Psycho-Neuro-Computer Systems to prevent (Systemic Vs Individualistic Perspective) Cybercrimes in Information Highway 2018 ICCCS Scopus
47 Estimating software reliability using ant colony optimization technique with salesman problem for software process 2018 IJATCSE Scopus
48 Attacker evidence system in WSN 2018 CCIS Scopus
49 Investigation on email text mining techniques and tools 2018 IJMTT Scopus
50 Automation of component selection process for designing of reusable components using drag and drop mechanism 2017 ICISC Scopus
51 Task-Scheduling Algorithms in Cloud Environment 2017 Springer Scopus

OTHER PREREVIEWED JOURNELS(SCI, ELSEWHERE WEB OF SCIENCE)
S.No Title Year Publications Index
1 Optimizing resource scheduling based on extended particle swarm optimization in fog computing environments 2020 WILEY SCI
2 Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSN 2019 Journal of King Saud University – Computer and Information Sciences SCI-E
Research publications by faculty members:
Prof.S.Sameen Fatima
  1. Dr. S Padmaja, Prof. S Sameen Fatima, Mr. Sasidhar Bandu, “Textual Analysis of Big Data with Object Knowledge Model: A Knowledge Representation framework”, Visleshana, Vol. 2 No. 2, January - March 2018.
  2. Dr. Padmaja S, Prof. Sameen Fatima S, Sasidhar B, “Associating News Articles to Identify the Scope of Negation and Sentiments of Public Opinion”, EECCMC, 28-29 Jan 2018.
  3. Dr. Sridevi tumula, Prof. S. Sameen Fatima, “Probabilistic Graphical Models for Medical Image Mining Challenges of New Generation”, Knowledge Computing and its Applications, ISBN: 978-981-10-8258-0, 2018.
  4. Firdous Hussaini, Padmaja S and S. Sameen Fatima, “Score-based Sentiment Analysis of Book Reviews in Hindi Language”, 3-4 Nov, regICON 2017.
  5. Smita, Prof. S Sameen Fatima, “Topical and Trust Based Page Ranking Using Automatic Seed Selection”, IEEE 7th International Advanced Computing Conference (IACC 2017), 5-7, Jan 2017.
  6. D. Fatima, Prof. Sameen Fatima, Dr. A. V. Krishna Prasad “Integrating weka into Web Application: Predicting Student s Performance”, International Journal of Engineering Research and Applications, vol 2 Issue 12, December 2017.
  7. R Krishnan, S Sameen Fatima, authored a chapter titled “Future of Artificial Intelligence” in the Book titled “Insights on Global Challenges and Opportunities for the Century Ahead”, B S Publications, 2017.
  8. Dr. S Padmaja, Prof. S Sameen Fatima, B Sasidhar, Vaibhav S L, “Extracting greater semantics from texts with Object Knowledge Model”, IEEE International Conference on Innovative Technologies in Engineering 2018, 11-13 April 2018.
  9. S Padmaja, Prof. S Sameen Fatima, “Extracting Voter Sentiment for Indian General Election Forecast Using NLP Techniques”, ICON 2016 Workshop, IIT – BHU, Varnasi, 17 th December 2016.
  10. Ayesha Banu, Syeda Sameen Fatima, Khaleel Ur Rahman Khan, “Information Content Based Semantic Similarity Measure for Concepts Subsumed by Multiple Concepts”, International journal web Applications, Sept 2015, volume 7, Number 3, pg 85-94.
  11. Badr Mohammed, S. Sameen Fatima, “Using Skipgrams, Bigrams, and Part of Speech Features for Sentiment Classification of Twitter Messages”,International Conference on Natural Language Processing (ICON)-2015, pg 1-8.
  12. Padmaja, S Sameen Fatima, SasidharBandu, “Comparing and Evaluating the Sentiment on Newspaper Articles: A Preliminary Experiment”, Science and Information Conference 2014, London, UK.
  13. S Padmaja, Prof. S Sameen Fatima, Sasidhar Bandu, “Comparing and evaluating the sentiment on newspaper articles: A preliminary experiment”, IEEE CONFERENCE PUBLICATIONS, Science and Information Conference (SAI), 2014, London, UK, on DOI: 10.1109/SAI.2014.6918276, ISBN: 978-0-9893-1933-1, pages: 789 – 792, date – August 29, 2014.
  14. S Padmaja, Prof. S Sameen Fatima, Sasidhar Bandu, B Sowmya, “Comparison of the Scope of Negation in Online News Articles”, IEEE Conference Publications, INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (ICCCT- 2014), 11-13 December 2014, Hyderabad.
  15. S Padmaja, Prof. S Sameen Fatima, Sasidhar Bandu, “Evaluating Sentiment Analysis Methods and Identifying Scope of Negation in Newspaper Articles”, International Journal of Advanced Research in Artificial Intelligence, (IJARAI), The Science and Information (SAI) Organization, Pg. 1-6,Volume 3 Issue 11 November 2014.

Prof.S.Ramachandram
  1. PS Kumar, S Ramachandram, “Fuzzy-Based Integration of Security and Trust in Distributed Computing”,coinvigilator Ms.P.V.Sudha Soft Computing for Problem Solving, 899-912, 2019.
  2. Harsoor, Bharati and Ramachandram, S “Single Phase Reliable Timeout Based Commit Protocol”, GSTF Journal on Computing (JOC), volume={1}, number={4}, 2018.
  3. Mallaiah, Kurra and Pande, Prateek and Ramachandram, S “A novel proximity based searchable encryption scheme using referential dissimilarity”, International Conference on Inventive Systems and Control (ICISC), 2017.
  4. Srivani, P., Ramachandram, S. and Sridevi, R., “A survey on client side and server side approaches to secure web applications”, International conference of Electronics, Communication and Aerospace Technology (ICECA), 2017.
  5. S Pelluri, R Sirandas - Energy Saving in Cloud by Using Enhanced Instance Based Learning (EIBL) for Resource Prediction - Sustainable Cloud and Energy Services, 2018.
  6. P Srivani, S Ramachandram, R Sridevi- Experminetal Results On Multi-Key Searchable Encryption Technique With Different Elliptic Curves and APP Designing.- Journal of Theoretical & Applied Information Technology, 2017.
  7. GM Kumar, S Ramachandram, J Gyani - Parameterized Reliable Trust Model in Grid Computing using Regression - International Journal of Advanced Research in Computer Science, 2017.
  8. Srinivasa Reddy, K. and Ramachandram, S. (in press) “Cryptographic key management scheme for supporting multi-user SQL queries over encrypted databases”, International Journal of Computer Aided Engineering and Technology, 2018.
  9. Govardhana Rao Inampudi, Kurra Mallaiah and S. Ramachandram “ A Security Frame Work for Protecting Confidentiality of Medical Data hosted in an Un-Trusted Service Environment” at IEEE International Conference on Innovative Technologies in Engineering, Hyderabad, 11-13th April, 2018.
  10. Swetha Nagendla, Govardhana Rao Inampudi and S. Ramachandram “ Supporting Multiplication Operation using ElGamal Algorithm on Encrypted Data” IEEE International Conference on Inventive Computing and Informatics (ICICI) Nov, 2017.
  11. Swetha Nagendla, Govardhana Rao Inampudi and S. Ramachandram “ Supporting Subtraction Operation using Residue Number Systems on Encrypted Data” IEEE International Conference on Recent Advances in Engineering and Technology(ICRAET), Dec- 2017.
  12. Kurra Mallaiah, S Ramachandram, Rishi kumar Gandhi, “Word and Phrase Proximity Searchable Encryption Protocols for Cloud Based Relational Databases”, ACM International Conference on Internet of things and Cloud Computing, 2016, United Kingdom.
  13. Kurra Mallaiah, S Ramachandram “Outsourcing of data but not Control: A novel approach for protection of outsourced organizational sensitive data in un-trusted service environment”, Journal of Defence Spectrum, DRDO, New Delhi.
  14. Srinivasa Reddy, K. and Ramachandram, S. (in press) “A Secure, Fast Insert and Efficient Search Order Preserving Encryption Scheme for Outsourced Databases”, International Journal of Advanced Intelligence Paradigms, 2016.
  15. Kurra Mallaiah, S Ramachandram, “A Stateless Key Management Technique for Protection of Sensitive Data at Proxy Level for SQL Based Databases Using NIST Recommended SP800-132”, International Conference on Applied Physics, Simulation and Computers, Vienna, Austria, 2015.
  16. Kurra Mallaiah, S Ramachandram, Rishi kumar Gandhi, “ Multi User Searchable Encryption Schemes using Trusted Proxy for Cloud based Relational Databases”, IEEE International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, Greater Noida, India.
  17. Nagaraju, S. Ramachandram, “Reduce redundant broadcasting in MANETs using rough sets,” International Journal of Wireless and Mobile Computing (IJWMC), vol. 7, no. 2, pp. 103-122, 2014.
  18. Swetha Tera, S. Ramachandram, and P. Shankar Murthy “Computational Analysis of Encrypted Database to Provide Confidentiality,” International Journal of Computer Theory and Engineering, Vol. 7, No. 2, April 2015,pp.108-112.
Prof.K.Shyamala
  1. Prof K Shyamala, "Improving Network Lifetime in WSN’s based on Maximum Residual Energy" 2021.
  2. Prof K Shyamala, "Analysis and Implementation of a Parallel Computing Cluster for Solving Computations Problems in Data Analytics 2020.
  3. Prof K Shyamala, "Advances in Decision Sciences, Image Processing, Security and Computer Vision" 2020.
  4. Prof K Shyamala,"Comprehensive Review of Automatic Lung Segmentation Techniques on Pulmonary CT Images" 2019.
  5. Prof K Shyamala, "Energy Efficient Load Balancing Approach for Multipath Routing Protocal in Ad Hoc Networks" 2019.
  6. Prof K Shyamala, "Parallel Implementation of Cryptographic Algorithm: AES Using OpenCL on GPUs" 2018.
  7. Prof K Shyamala,"Design and Implementation of ConvNet for handwritten Digits Classifiaction on Graphical Processing Unit" 2018.
  8. Prof K Shyamala,"Automatic Lung Segmentation on Thoracic CT Scans using U-Net Convolutional Network" 2018.
  9. Mrs.Humera Shaziya , Prof.K.Shyamala and Raniah Zaheer, “ Design and Implementation of ConvNet for Handwritten Digits Classification on Graphical Processing Unit” International Conference on Communication and Signal Processing, April 3-5, 2018, INDIA.
  10. Mrs.Humera Shaziya, Prof.K.Shyamala and Raniah Zaheer, “ Automatic Lung Segmentation on Thoracic CT Scans Using U-Net Convolution Network” International Conference on Communication and Signal Processing, April 3-5, 2018, INDI.
  11. Govardhana Rao Inampudi; K. Shyamala; S. Ramachandram, “Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs” 2018 2nd IEEE International Conference on Inventive Systems and Control (ICISC) Year: 2018 Pages: 984 - 988.
  12. Raj Kiran and Prof.K.Shyamala presented a Paper “ Design and Implementation of GPU-based Matrix Chain Multiplication Using C++AMP", IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 22-24 Feb’2017.
  13. K.Shyamala, Raj Kiran and Rajeshwari, "Design and Implementation of GPU-based Matrix Chain Multiplication Using C++AMP", IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 22-24 Feb, 2017.
  14. Shyamala Kattula and Mallesham Dasari, “ On the Adaptive Motion Estimation in Video Coding, based on Video Content Analysis”, IEEE International Conference on “ Advances in Computing, Communications and Informatics” (ICACCI)-2016.
  15. P. Vijaya Vardhan Reddy, K. Shyamala, “New scoring formula to rank hypervisors’ performance complementing with statistical analysis using DOE”, ELSEVIER’s Future Generation Computer Systems (FGCS), vol. 61, pp.54-65, 2016.
  16. P. Vijaya Vardhan Reddy, K.Shyamala, and A. Venugopal Reddy. “Optimization of Hypervisors Performance Using DOE”, AICIT’s Journal of Next Generation Information Technology (JNIT), vol. 6, no. 4, pp.63-74, 2015.
  17. Ravi Babu P, Shyamala K, Srinivasa Rao K ,“ Monte Carlo Simulation on GPGPU using Prefix Computation Method”, IEEE International Conference on Electrical, Computer and Communication Technologies,2015.
  18. Ravi Babu P, Shyamala K, Srinivasa Rao K “Monte Carlo Simulation on GPGP using Prefix Computation Method” IEEE International Conference on Electrical, Computer and Communication Technologies, 5-7 March 2015.
  19. Shyamala K and V Kamakoti “ReMap: A Novel peephole optimization technique for LUT-based FPGAs” International Journal of Low power Electronics, Vol 10, No.1, pp 20-31, March 2014.
Prof. P. Premchand
  1. Prof P Premchand "A Research on Various Scheduling Strategies in Fog Computing Environment" 2019-20.
  2. Prof P Premchand "Design and Implementation of a Hacker Detection Scheme: A Network Security Measure in Heterogeneous WSN" 2018-19.
  3. BS Rao, P Premchand, “Design and Implementation of a Hacker Detection Scheme: A Network Security Measure in Heterogeneous WSN” Innovations in Computer Science and Engineering, 503-511, 2019.
  4. BS Rao, P Premchand, “A Secure and Computational-Efficient Multicast Key Distribution for Wireless Networks” Cognitive Informatics and Soft Computing, 91-101, 2019.
  5. “Designing Code level Reusable Software Components”, International Journal of Software Engineering and Applications, Jan 2012.
  6. “Cryptanalysis of Authenticated Key Exchange 3P-EKE Protocol and Its Enhancement”, IEEE International Conference on Advances in Engineering, Science and Management, 2012.
  7. BS Rao, P Premchand, “A Review on Combined Attacks on Security Systems”, International Journal of Applied Engineering Research 13 (23), 16252-16278, 2018.
  8. BS Rao, P Premchand, “Evaluation of Differential–Linear Cryptanalysis Combined Attack on Cryptographic Security System” International Journal of Applied Engineering Research 13 (23), 16552-16563, 2018.
  9. BS Rao, P Premchand, “Anomalous Attacker Evidence and Detection System in WSN” International Journal of Applied Engineering Research 13 (19), 14313-14322, 2018.
  10. BS Rao, P Premchand,“Cryptographic Tamper Evidence and Detection System” International Journal of Pure and Applied Mathematics 118 (16), 199-211, 2018.
  11. B Jalender, A Govardhan, P Premchand, “Automation of component selection process for designing of reusable components using drag and drop mechanism” International Conference on Inventive Systems and Control (ICISC), 1-5, 2017.
  12. RVSK Dutt, P Premchand, “Generative Adversarial Networks (GAN) Review” CVR Journal of Science and Technology 13, 1-5, 2017.
  13. BS Rao, P Premchand, “Attacker Evidence System in WSN” International Conference on Computing, Analytics and Networks, 166-178, 2017.
  14. A Raghuvamshi, P Parvataneni “Design of a Robust, Computation-Efficient and Secure 3P-EKE Protocol using Analogous Message Transmission” International Journal of Computer Network and Information Security 8 (5), 9, 2016.
  15. A Raghuvamshi, P Parvataneni, “Verifier-based Password Authenticated 3P-EKE Protocol using PCLA Keys” International Journal of Computer Network and Information Security 8 (6), 59, 2016.
  16. C Vidyadhari, N Sandhya, P Premchand, “Particle Grey Wolf Optimizer (PGWO) algorithm and semantic word processing for automatic text clustering” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2016.
  17. P Swetha, P Premchand, “Secret Key Sharing Using Homomorphic Commitments and its application to Threshold Cryptography” International Journal of Applied Engineering Research 11 (9), 6598-6602, 2016.
L.K.Suresh Kumar
  1. Kumar has presented a IEEE paper entitled “Localized Encryption and Authentication Protocol (LEAP) to Prevent Injection of Malicious Nodes in a Wireless Sensor Network (WSN)” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018.
  2. Mr.L.K.Suresh Kumar has presented a IEEE paper entitled “Credit Card Fraud Prevention for Financial Institutions : Use of Anomaly Detection Method” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018.
  3. Mr.L.K.Suresh Kumar has presented a paper entitled “Comparative Study of Cluster Based Data Aggregation Protocols” at International Conference on Trends in Engineering, Management, Pharmacy & Sciences (ICTEMPS-2018) on 21st April, 2018, GCET, Cheeryala(V), Keesara (M), Hyderabad.
  4. Mr.L.K.Suresh Kumar has presented a IFERP paper entitled “A Survey on Algorithms Solving ECDLP (Elliptic Curve Discrete Log Problem)” at International Conference on Internet of Things for Future Smart Cities (ICIOTSC-2017) organized by GIST&IERP on 21st – 22nd July, 2017, Nellore.
  5. Mr.L.K.Suresh Kumar has presented a IEEE paper entitled “Comparative Study of LEACH and EECDA Protocols” at International Conference on Power, Control, Signals & Instrumentation Engineering (ICPCSI) - 2017 organized by Saveetha Engineering College, Thandalam, Chennai, Tamil Nadu, India on 21st – 22nd September, 2017.
  6. Mr.L.K.Suresh Kumar has presented a IEEE paper entitled “Localized Encryption and Authentication Protocol (LEAP) to Prevent Injection of Malicious Nodes in a Wireless Sensor Network (WSN)” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018.
  7. Mr.L.K.Suresh Kumar has presented a IEEE paper entitled “Credit Card Fraud Prevention for Financial Institutions : Use of Anomaly Detection Method” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018.
  8. Mr.L.K.Suresh Kumar has presented a paper entitled “Comparative Study of Cluster Based Data Aggregation Protocols” at International Conference on Trends in Engineering, Management, Pharmacy & Sciences (ICTEMPS-2018) on 21st April, 2018, GCET, Cheeryala(V), Keesara (M), Hyderabad.
  9. Mr.L.K.Suresh Kumar, “Multi-Keyed algorithm of Elliptic Curve Cryptography” 5th National Conference on Computer Networks & Information Security (NCCNIS), 2016.
  10. Mr.L.K.Suresh Kumar “A Survey on Homomorphic Encryption Schemes in WSN” 5th National Conference on Computer Networks & Information Security (NCCNIS – 2016), 2016.
  11. Mr.L.K.Suresh Kumar, “Detailed study of MAC Based and Level Based Routing Protocol in Wireless Sensor Networks”, 5th National Conference on Computer Networks & Information Security (NCCNIS) 2016.
  12. Mr.L.K.Suresh Kumar, “ A Survey on Intrusion Detection Techniques in Wireless Sensor Networks” National Conference on Computer Networks & Information Security (NCCNIS), 2016.
Dr.P V Sudha
  1. Sudha Pelluri , Ramachandram Sirandas : Chapter Title-- "Energy efficient Resource Prediction for Cloud" Publisher - Springer International Publishing AG , Editor-- Wilson Rivera, University of Puerto Rico at Mayaguez . Book Title --" Sustainable Cloud and Energy Services: Principles and Practice ".
  2. Dr P V Sudha authored a chapter titled “Energy Saving in Cloud by Using Enhanced Instance Based Learning (EIBL) for Resource Prediction” in the book titled " Sustainable Cloud and Energy Services: Principles and Practice " Springer International Publishers, 2016.
  3. Dr. P V Sudha “Resource Requirements in Cloud environments” International Conference on Emerging Trends in Engineering, Science & technologi3es, ICETEST, March 2017.
  4. Dr. P V Sudha, “Energy Optimization at Cloud Data Centre Using SDN” IJETT- Special Issue, Vol.2, April 2017. Pg.278 – pg. 283 I.F-2.88.
Dr.V.B.Narasimha
  1. Dr V B Narsaimha "High Utility Mining of Streaming Itemsets in Data Streams" 2021.
  2. Dr V B Narsaimha "A Research on Online Fake News Detection using Machine Learning Techniques" 2021.
  3. Dr V B Narasimha "Secure and Selective Cloud Data Auditing using Deep Machine Learning" 2020.
  4. Dr V B Narasimha,Dr B Sujatha, "An Efficient Classification Technique for Text Mining and Applications" 2019.
  5. Dr V B Narasimha "A Review on Application Security Management Using Web Application Security Standards" 2019.
  6. Dr V B Narasimha "Analysis on Malware Issues in Online Social Networking Sites(SNS)" 2019.
  7. Dr V B Narasimha "An improved framework for Multicasting in heterogeneous networks" 2018.
  8. Dr V B Narasimha "An Approach to Multi-Cloud Securities" 2018.
  9. Dr V B Narsimha "Big Data Analytics for Humanitarian Causes" 2018.
Mrs B.Sujatha
  1. Dr B Sujatha "Text Summarization using Natural Language Processing" 2021.
  2. Dr B Sujatha "A Literature Review On Feature Selection Using Evolutionary Algorithms" 2021.
  3. Dr B Sujatha "An Efficiently and Secured Data Storage and Integrity Checking for Public Clouds Using MECC" 2020.
  4. Dr B Sujatha "A Literature Review on Feature Selection using Evolutionary Algorithms" 2020.
  5. Dr B Sujatha Dr V B narasimha "An Efficient Classification Technique for Text Mining and Applications" 2019.
  6. Dr B Sujatha "Energy Efficient Data Route In network Aggregation with Secure EEDRINA" 2018.
  7. Dr B Sujatha "Automization of Object Oriented Design Using Back Propagation Neural Network for Better Maintainability of Software" 2018.
  8. Dr B Sujatha "Understanding agile software development process using model-based design in project developement" 2018.
  9. Dr. B. Sujatha, “Understanding agile software development process using model-based design in project development”, IEEE International Conference on Innovative Technologies in Engineering 2018 (ICITE OU).
  10. Dr. B. Sujatha, “Automization of Object Oriented Design Using Back Propagation Neural Network for Better Maintainability of Software ”, International journal of intelligent engineering and systems (INASS), Http://www.inass.org/, March 1, 2018.
  11. B.Sujatha, “Energy efficient data route-in-network aggregation with secure EEDRINA”, Springer International Conference on Computational Intelligent and Data Engineering, July,2017.
  12. B. Sujatha, “ Natural Language Query Parser using first Order Logic for Querying Relational Databases”, International Journal of Computer Applications, (0975-8887) volume 134-No.11, January 2016.
  13. B. Sujatha, “Ontology Based Natural Language Interface for Relational Databases”, International Conference on Intelligent Computing, Communication and Convergence (ICCC), 2016.
  14. B. Sujatha, “ A Generic model for Natural Language Interface To Database”, 6th IEEE International Advanced Computing Conference (IACC), 2016.
  15. B. Sujatha, “ Natural Language Query Processing for Relational Database using EFFCN Algorithm”, IJCSE (International Journal of Computer Science and Engineering), vol.4, Issue- 02, F eb-2016.
Mrs.V.Sukanya
  1. Sukanya Vuppala "Internet of Things- based Smart Classroom Environment" 2019.
  2. E. Vishnu Priya Reddy, V.Sukanya, Abhinava Vinay Kumar M, Anil Kumar M “A Study on effective approach of Science Teaching by IOT Smart Classroom” International Journal of Research Culture Society Volume 2, Issue 3, March-2018.
  3. E. Vishnu Priya Reddy, V.Sukanya, Abhinava Vinay Kumar M, Anil Kumar M “A Study on Expandable latest software feature in bundling of latest hardware with earlier software” International Journal of Scientific Research in Science and Technology Volume 4, Issue 5, March-2018.
  4. Mrs.V.Sukanya, “Performance Optimization of Web Services using Data Mining Techniques”, National Conference on “Information Security” at CBIT, Hyderabad , 2015.
Mrs A.Gayatri
  1. A. Gayatri, “Implementation of AES Algorithm for Area and Power Optimization by the Application of Reversible Logic and Null Conventional Logic”, International Journal of Emerging Engineering Research and Technology , Volume 3, Issue 7, 2015.