CSE Publications



1Anil Kumar DasariCost-Effective Duplication Migration Scheme for Distributed Cloud Storage SystemsJournal of Emerging Technologies and Innovative Research (JETIR) Mar,20195.87CSE
2Dr. Srikanth JannuSummarization of legal judgments using gravitational search algorithmNeural Computing and Applications, SpringerSCIDecember 20194.664CSE
3Dr. Srikanth JannuPassage-Based Text Summarization for Legal Information RetrievalArabian Journal for Science and Engineering, SpringerSCINovember, 20191.518CSE
4Ramesh G Network SecurityLulu Press Book Series, ID No: 24651891, ISBN of 978-0-359-59930-1LuluApril, 2019 CSE
5Dr Naveen KumarA Study on Machine Learning Techniques towards the Detection of Distributed Denial of Service Attacks
International Journal of Pure and Applied MathematicsGoogle ScholarICIDSEM-2018  9-10 April 2018.7.19CSE
6Dr Naveen KumarAn improvement to the Role of the Wireless Sensors in Internet of Things.International Journal of Pure and Applied MathematicsGoogle ScholarICIDSEM-20187.19CSE
7Dr. Rakesh NayakWeb of Things: An outlineInternational Journal of Pure and Applied MathematicsGoogle ScholarICIDSEM-20187.19CSE
8Ramesh GAn Overview of Classification Rule and Association Rule MiningInternational Journal of Scientific Research in Computer Science, Engineering and Information TechnologyGoogle ScholarFeb-20184.032CSE
9Ramesh GA Study on Mining Top Utility Item sets In A Single PhaseInternational Journal for Science and Advance Research In TechnologyGoogle ScholarFeb-20185.888CSE
10Dr.Varun RevuriEnquiry Enabled Resolve of Undefined ObjectsInternational Journal of Research (IJR)Google ScholarNov 20185.7CSE
11Dr.Varun RevuriSecurity Provided with Honest Detection of Packet Dropping Attacks in WANETSInternational Journal of Research (IJR)Google ScholarDec 20185.7CSE
12Dr. Enugala RajuDetecting Communities in Dynamic Social Networks using Modularity Ensembles SOMInternational Journal of Rough Sets and Data Analysis (IJRSDA)ACM Digital Library, DBLPJan 2018 CSE
13Dr. Enugala RajuCILPA: a cohesion index based label propagation algorithm for unveiling communities in complex social networksInternational Journal of Information TechnologyDBLP,
Google Scholar INSPEC
Institute of Scientific and Technical Information of China
Japanese Science and Technology Agency (JST)
Dec 20182.862CSE
14Dr. Enugala RajuA Virtual Lab Plugin for Open Source Learning Management Systems for Improving Quality in Blended Learning.Proceedings of the 10th International Conference on Computer Supported Education, {CSEDU} 2018, Funchal, Madeira, Portugal.DBLP,
EI (Elsevier Engineering Village Index), Scopus, Semantic Scholar, Google Scholar and Microsoft Academic.
Mar 2018 CSE
15Dr.Mahipal Reddy PulyalaA Study on the Development of Machine Learning in Health Analysisindian journal of public health research and developmentscopusDec 20182.84CSE
16Dr.Mahipal Reddy PulyalaProtection of Multimedia Content in CloudAnveshana's international journal of research in engineering and applied sciencesGoogle ScholarDec 2018
17K. Sharmila Design of a Privileged, Emergency Fourth Factor Authentication protocol using Chinese Remainder TheoremJournal of Adv Research in Dynamical & Control SystemsScopusJul 2018 CSE
18Dr. Rakesh NayakDynamic User Identity Verification for Secure and Transparent Using Internet ServicesInternational Journal for Research on Electronics and Computer Science (IJRECS) Google ScholarJan 20172.978CSE
19Dr. Rakesh NayakSecure Data Retrieval for Confidential Information by External Storage Nodes in Disruption Tolerant Military Networks,International Journal of Scientific Engineering and Technology Research (IJSETR )Google ScholarMay-20163.59CSE
20Ramesh GA SURVEY ON EVOLUTION OF BIG DATA WITH HADOOPInternational Journal of Research in Science and EngineeringGoogle ScholarDec-20174.293CSE
21Ramesh GSKETCHING-BASED HIGH-PERFORMANCE BIG DATA PROCESSING ACCELERATORJournal of International Research in Science and EngineeringGoogle ScholarNov-20175.016CSE
22Ramesh GTwo Layered Privacy Architecture for Big Data FrameworkInternational Journal of Innovative Research in Computer and Communication EngineeringGoogle ScholarOct-20171.027CSE
23Dr. Rakesh NayakA Mathematical Model for Perishable Resource ManagementInternational Conference on Contemporary Approaches In Mathematics And Emerging Engineering TrendsGoogle Scholar2017 CSE
24Dr.Mahipal reddy Pulyalaexperimental evaluation of association rule in aprori and ant colony aptimizationjournal of advanced reserch in dynamical and control systemsscopus2017 cse
25Dr.Mahipal reddy Pulyalamulti dimensional datasets used for keywords searchjournal for studies in management and planningGoogle Scholar20172.328CSE
26Dr.Mahipal reddy Pulyalabeing a smart sapien with information centric networking and cloud computinginternational journal of pure and applied mathamiticsscopus2017 CSE
27Dr.Varun RevuriA Joint Time Synchronization and LocalizationInternational Journal of Research (IJR)Google ScholarNov 20175.6CSE
28Anil Kumar DasariDetecting Node Failures in Mobile Wireless Sensor Network: A probabilistic ApproachInternational Journal For Technological Research In EngineeringGoogle ScholarJuly 20174.62CSE
29Anil Kumar DasariEFFICIENT ALGORITHMS FOR MINING HIGH DIMENSIONAL ITEM SETS.International Conference on Latest Research in Engineering ScienceGoogle ScholarAug 20175.016CSE
30Dr. Enugala RajuCCLPA: A clustering coefficient based label propagation algorithm for unfolding communities in complex networks2nd International Conference on Communication and Electronics Systems (ICCES)IEEE XploreOct 2017 CSE
31Dr. Srikanth JannuEfficient Algorithms for Hotspot Problem in Wireless Sensor Networks: Gravitational Search AlgorithmThe International Symposium on Intelligent Systems Technologies and Applications,Advances in Intelligent Systems and Computing October 2017 CSE
32Dr. Srikanth JannuEfficient algorithms for hotspot problem in wireless sensor networks: gravitational search algorithmThe International Symposium on Intelligent Systems Technologies and ApplicationsScopusSeptember 2017 CSE
33K. SharmilaA Novel Approach for Emergency Backup Authentication Using Fourth FactorInnovations in Computer Science and EngineeringSpringer2017 CSE
34K. SharmilaA Survey on User Authentication TechniquesOriental Journal of Computer Science and Technology 2017 CSE
35Ramesh GAn Overview of Big Data Challenges, Tools and TechniquesInternational Journal of Research and ApplicationsGoogle ScholarDec-20176.719CSE
36Dr. Rakesh NayakBlock cipher in NTRUInternational Journal of Research in Computer and Communication Technology (IJRCCT)Google ScholarJanuary- 2016 CSE
37Dr. Rakesh NayakInternet of things (IoT), Gives life to Non livingInternational Journal of Research in Computer and Communication Technology (IJRCCT)Google ScholarFebruary- 2016 CSE
38Dr. Rakesh NayakThe Safety Framework in Network Security utilizing Cryptographic SystemsInternational Journal of Research in Computer and Communication Technology (IJRCCT)Google ScholarJanuary- 2016 CSE
39Dr. Rakesh NayakSteganography with BSS-RSA-LSB technique: A new approach to SteganographyInternational Journal of Science Engineering and Advance Technology (IJSEAT) Google ScholarMay, 2015 CSE
40Dr. Rakesh NayakA new approach on Rabin based Cryptosystem for specifying correct plain textInternational Journal of Research in Computer and Communication Technology (IJRCCT), Google ScholarMay -2015 CSE
41Ramesh GObjective Quality Metric Design for Wireless Image and Video CommunicationInternational Journal of Information Technology and ManagementGoogle ScholarAug-2018 CSE
42Ramesh GA Security Protocol for mobile-banking and payment using SMS and USSD in EthiopiaInternational Journal of Research and ApplicationsGoogle ScholarJune-2016 CSE
43Dr.Mahipal reddy PulyalaStudy of aprori with regression for evolution of knowledge discovery and dataminingairo international research journalGoogle ScholarMar 20163.19CSE
44Dr.Mahipal reddy PulyalaReviewed study on the concept and algorithm for association rule mininginternational journal of advances in arts ,science and engineeringGoogle ScholarSep 2016 CSE
45Dr.Varun RevuriAugmenting Downlink Enactment in Wireless Networks by Simultaneous Multiple Packet Transmission.International Journal of Research (IJR)Google ScholarNov 20163.541CSE
46Dr.Varun RevuriEnhancing Downlink Performance in Wireless NetworksInternational Journal of Research (IJR)Google ScholarFeb 20175.6CSE
47Dr.Varun RevuriCloud Based Distributed Mobile Healthcare System for Preserving Privacy in Patient through Co-Operative AuthenticationInternational Journal for Innovative Engineering and Management Research (IJIEMR)Google ScholarFeb 20174.035CSE
48Dr.Varun RevuriDetection of Intrusion by Using Behaviour Rule Specification Based Technique for Providing Security to MCPSInternational Journal of Research (IJR)Google ScholarSep 20163.541CSE
49Dr. Enugala RajuIdentifying natural communities in social networks using modularity coupled with self organizing mapsAdvances in Intelligent Systems and Mining Book seiriesSpringer2016 CSE
50Dr. Enugala RajuA Semantic-Based companion suggestion framework to social networks utilizing incorporated feedback approachInternational Journal of Research and ApplicationsGoogle ScholarOct,2016 CSE
51Dr. Enugala RajuDetection of Emerging Areas in Social StreamsInternational Journal of Research and ApplicationsGoogle ScholarDec, 2016 CSE
52Dr. Srikanth JannuA grid based clustering and routing algorithm for solving hot spot problem in wireless sensor networksWireless Networks,                    The Journal of Mobile Communication, Computation and Information, SpringerSCIAugust, 20162.405CSE
53Dr. Srikanth JannuMaximizing Network Lifetime of Wireless Sensor Networks: An Energy Harvesting ApproachProceedings of the International Conference on Signal, Networks, Computing, and Systems, Lecture Notes in Electrical Engineering, SpringerScopusOctober 2016 CSE
54Dr. Srikanth JannuEnergy efficient algorithms to maximize lifetime of wireless sensor networksInternational Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEEScopus2016 CSE
55G Arunakranthi Data mining for big data : A reviewInternational Journal of Research Google scholarSeptember 20163.5CSE
56E Hari KrishnaPromoting Evidence Annotation Using Content and Objection Value
International Journal of ResearchGoogle scholarNovember 20163.5CSE