Admission Notification for Part-Time M.E.M.Tech (CEEP) under Sponsored and Working Professionals for A.Y. 2024-25. || M.E./M.Tech. (Regular) Programme under Sponsored Category for the Academic Year 2024-2025. || CNC CMM Machine operation of Mitutoyo MCOSMOS (GEOPAK) || Training on CNC Lathe Siemens 802 controller and||

Publications

SCOPUS INDEX PUBLICATIONS (2017-2021)
S.No Title Year Publications Index
1 Secure Encrypted Word Proximity Retrieval Framework for Outsourced Relational Database Backed Applications 2022 Springer Scopus
2 Privacy Preserving Semantic-Aware Multi-keyword Ranked Dynamic Search Over Encrypted Data 2021 Springer Scopus
3 Stateless Key Management Scheme for Proxy-Based Encrypted Databases 2021 Springer Scopus
4 Decentralized Privacy-Preserving Framework for Health Care Record-Keeping Over Hyperledger Fabric 2021 Springer Scopus
5 Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data 2021 Springer Scopus
6 A compact analytical survey on task scheduling in cloud computing environment 2021 IJETT Scopus
7 Cryptographic key management scheme for supporting multi-user SQL queries over encrypted databases 2020 InderScience Scopus
8 A secure, fast insert and efficient search order preserving encryption scheme for outsourced databases 2019 InderScience Scopus
9 Fuzzy-Based Integration of Security and Trust in Distributed Computing 2019 Springer Scopus
10 Privacy Preserving Dynamically Indexed Multi-Phrase Search over Encrypted Data 2018 IEEE Scopus
11 Usage of DHS and De-duplicating Encrypted Data using ABE & ECC for Secured Cloud Environment 2018 IEEE Scopus
12 A study on impact of untrustworthy and older recommendations over T-Grid computational model 2018 Springer Scopus
13 Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs 2018 IEEE Scopus
14 A survey on client side and server side approaches to secure web applications 2017 IEEE Scopus
15 Experimental results on multi-key searchable encryption technique with different elliptic curves and app designing 2017 IJAIT Scopus
16 A novel proximity based searchable encryption scheme using referential dissimilarity 2017 IEEE Scopus
17 Improving network lifetime in WSN s based on maximum residual energy 2021 INCET Scopus
18 Pulmonary CT Images Segmentation using CNN and UNet Models of Deep Learning 2020 IEEE Scopus
19 Analysis and implementation of a parallel computing cluster for solving computational problems in data analytics 2020 ICCCS Scopus
20 Energy efficient load balancing approach for multipath routing protocol in ad hoc network 2019 ICACCP Scopus
21 Comprehensive Review of Automatic Lung Segmentation Techniques on Pulmonary CT Images 2019 ICISC Scopus
22 Design and Implementation of ConvNet for Handwritten Digits Classification on Graphical Processing Unit 2018 ICCSP Scopus
23 Automatic Lung Segmentation on Thoracic CT Scans Using U-Net Convolutional Network 2018 ICCSP Scopus
24 Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs 2018 ICISC Scopus
25 Design and implementation of GPU-based matrix chain multiplication using C++AMP 2017 ICECCT Scopus
26 A Study of Automated Evaluation of Student s Examination Paper using Machine Learning Techniques 2021 ICCCIS Scopus
27 Feature Impact on Sentiment Extraction of TEnglish Code-Mixed Movie Tweets 2021 SIST Scopus
28 Heart Disease Prediction Using Extended KNN (E-KNN) 2021 SIST Scopus
29 Heart disease prediction using extended KNN(E-knn) 2020 IJATCSE Scopus
30 Sentiment Extraction from Bilingual Code Mixed Social Media Text 2020 AISE Scopus
31 Topical and trust based page ranking using automatic seed selection 2017 IEEE Scopus
32 A contextual deep clustering based intrusion detection method for cloud 2019 IJAST Scopus
33 Detection of intrusion using hybrid feature selection and flexible rule based machine learning 2019 IJETT Scopus
34 Analysis on Malware Issues in Online Social Networking Sites (SNS) 2019 ICACCS Scopus
35 Optimized key management scheme for sensor networks using genetic algorithm 2019 Springer Scopus
36 A review on application security management using web application security standards 2019 AISC Scopus
37 Survey on design challenges and analysis of service architecture of DRM 2017 ICEI Scopus
38 Prediction of epileptic seizure classification using third-order cumulants and sparse autoencoder 2021 ITAIT Scopus
39 Multi-Objective Feature Selection Method by Using ACO with PSO Algorithm for Breast Cancer Detection 2021 IJIES Scopus
40 Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model 2021 IJICS Scopus
41 Bat-Grey Wolf Optimizer and kernel mapping for automatic incremental clustering 2020 IJMSSC Scopus
42 An efficient cryptanalysis scheme for secure data storage system in cloud using optimal dual encryption algorithm 2020 IJSOI Scopus
43 Particle Grey Wolf Optimizer (PGWO) Algorithm and Semantic Word Processing for Automatic Text Clustering 2019 IJUFKBS Scopus
44 Design and implementation of a hacker detection scheme: A network security measure in heterogeneous WSN 2019 Lecture Notes in Networks and Systems Scopus
45 A secure and computational-efficient multicast key distribution for wireless networks 2019 ICISC Scopus
46 Approving Psycho-Neuro-Computer Systems to prevent (Systemic Vs Individualistic Perspective) Cybercrimes in Information Highway 2018 ICCCS Scopus
47 Estimating software reliability using ant colony optimization technique with salesman problem for software process 2018 IJATCSE Scopus
48 Attacker evidence system in WSN 2018 CCIS Scopus
49 Investigation on email text mining techniques and tools 2018 IJMTT Scopus
50 Automation of component selection process for designing of reusable components using drag and drop mechanism 2017 ICISC Scopus
51 Task-Scheduling Algorithms in Cloud Environment 2017 Springer Scopus

 

OTHER PREREVIEWED JOURNELS(SCI, ELSEWHERE WEB OF SCIENCE)
S.No Title Year Publications Index
1 Optimizing resource scheduling based on extended particle swarm optimization in fog computing environments 2020 WILEY SCI
2 Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSN 2019 Journal of King Saud University – Computer and Information Sciences SCI-E
Research publications by faculty members:
Prof.K.Shyamala
  1. Prof K Shyamala, "Improving Network Lifetime in WSN’s based on Maximum Residual Energy" 2021.
  2. Prof K Shyamala, "Analysis and Implementation of a Parallel Computing Cluster for Solving Computations Problems in Data Analytics 2020.
  3. Prof K Shyamala, "Advances in Decision Sciences, Image Processing, Security and Computer Vision" 2020.
  4. Prof K Shyamala,"Comprehensive Review of Automatic Lung Segmentation Techniques on Pulmonary CT Images" 2019.
  5. Prof K Shyamala, "Energy Efficient Load Balancing Approach for Multipath Routing Protocal in Ad Hoc Networks" 2019.
  6. Prof K Shyamala, "Parallel Implementation of Cryptographic Algorithm: AES Using OpenCL on GPUs" 2018.
  7. Prof K Shyamala,"Design and Implementation of ConvNet for handwritten Digits Classifiaction on Graphical Processing Unit" 2018.
  8. Prof K Shyamala,"Automatic Lung Segmentation on Thoracic CT Scans using U-Net Convolutional Network" 2018.
  9. Mrs.Humera Shaziya , Prof.K.Shyamala and Raniah Zaheer, “ Design and Implementation of ConvNet for Handwritten Digits Classification on Graphical Processing Unit” International Conference on Communication and Signal Processing, April 3-5, 2018, INDIA.
  10. Mrs.Humera Shaziya, Prof.K.Shyamala and Raniah Zaheer, “ Automatic Lung Segmentation on Thoracic CT Scans Using U-Net Convolution Network” International Conference on Communication and Signal Processing, April 3-5, 2018, INDI.
  11. Govardhana Rao Inampudi; K. Shyamala; S. Ramachandram, “Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs” 2018 2nd IEEE International Conference on Inventive Systems and Control (ICISC) Year: 2018 Pages: 984 - 988.
  12. Raj Kiran and Prof.K.Shyamala presented a Paper “ Design and Implementation of GPU-based Matrix Chain Multiplication Using C++AMP", IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 22-24 Feb’2017.
  13. K.Shyamala, Raj Kiran and Rajeshwari, "Design and Implementation of GPU-based Matrix Chain Multiplication Using C++AMP", IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 22-24 Feb, 2017.
  14. Shyamala Kattula and Mallesham Dasari, “ On the Adaptive Motion Estimation in Video Coding, based on Video Content Analysis”, IEEE International Conference on “ Advances in Computing, Communications and Informatics” (ICACCI)-2016.
  15. P. Vijaya Vardhan Reddy, K. Shyamala, “New scoring formula to rank hypervisors’ performance complementing with statistical analysis using DOE”, ELSEVIER’s Future Generation Computer Systems (FGCS), vol. 61, pp.54-65, 2016.
  16. P. Vijaya Vardhan Reddy, K.Shyamala, and A. Venugopal Reddy. “Optimization of Hypervisors Performance Using DOE”, AICIT’s Journal of Next Generation Information Technology (JNIT), vol. 6, no. 4, pp.63-74, 2015.
  17. Ravi Babu P, Shyamala K, Srinivasa Rao K ,“ Monte Carlo Simulation on GPGPU using Prefix Computation Method”, IEEE International Conference on Electrical, Computer and Communication Technologies,2015.
  18. Ravi Babu P, Shyamala K, Srinivasa Rao K “Monte Carlo Simulation on GPGP using Prefix Computation Method” IEEE International Conference on Electrical, Computer and Communication Technologies, 5-7 March 2015.
  19. Shyamala K and V Kamakoti “ReMap: A Novel peephole optimization technique for LUT-based FPGAs” International Journal of Low power Electronics, Vol 10, No.1, pp 20-31, March 2014.
  20. Deep Learning based Super-Resolution for Accurate COVID – 19 diagnosis in chest CT Images“ International Conferences on Smart Systems fir Applications in Electrical Sciences”
  21. Testbed Implementation of MAX LEACH Routing Protocol and Sinkhole Attack in WSN“ Proceedings of third international conferences on advanced in Computer Engineering and Communication System (ICACECS)
  22. Secure EELB-AOMDV Protocol to Mitigate Blackhole Attack9th International Conference on Advanced Computing and Communication System (ICACCS System
 
L.K.Suresh Kumar
  1. Kumar has presented a IEEE paper entitled “Localized Encryption and Authentication Protocol (LEAP) to Prevent Injection of Malicious Nodes in a Wireless Sensor Network (WSN)” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018.
  2. Mr.L.K.Suresh Kumar has presented a IEEE paper entitled “Credit Card Fraud Prevention for Financial Institutions : Use of Anomaly Detection Method” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018.
  3. Mr.L.K.Suresh Kumar has presented a paper entitled “Comparative Study of Cluster Based Data Aggregation Protocols” at International Conference on Trends in Engineering, Management, Pharmacy & Sciences (ICTEMPS-2018) on 21st April, 2018, GCET, Cheeryala(V), Keesara (M), Hyderabad.
  4. Mr.L.K.Suresh Kumar has presented a IFERP paper entitled “A Survey on Algorithms Solving ECDLP (Elliptic Curve Discrete Log Problem)” at International Conference on Internet of Things for Future Smart Cities (ICIOTSC-2017) organized by GIST&IERP on 21st – 22nd July, 2017, Nellore.
  5. Mr.L.K.Suresh Kumar has presented a IEEE paper entitled “Comparative Study of LEACH and EECDA Protocols” at International Conference on Power, Control, Signals & Instrumentation Engineering (ICPCSI) - 2017 organized by Saveetha Engineering College, Thandalam, Chennai, Tamil Nadu, India on 21st – 22nd September, 2017.
  6. Mr.L.K.Suresh Kumar has presented a IEEE paper entitled “Localized Encryption and Authentication Protocol (LEAP) to Prevent Injection of Malicious Nodes in a Wireless Sensor Network (WSN)” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018.
  7. Mr.L.K.Suresh Kumar has presented a IEEE paper entitled “Credit Card Fraud Prevention for Financial Institutions : Use of Anomaly Detection Method” at Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM) IEEE, New Delhi 12th INDIACom; 2018 5th International Conference on Computing for Sustainable Global Development on 14 – 16th March, 2018.
  8. Mr.L.K.Suresh Kumar has presented a paper entitled “Comparative Study of Cluster Based Data Aggregation Protocols” at International Conference on Trends in Engineering, Management, Pharmacy & Sciences (ICTEMPS-2018) on 21st April, 2018, GCET, Cheeryala(V), Keesara (M), Hyderabad.
  9. Mr.L.K.Suresh Kumar, “Multi-Keyed algorithm of Elliptic Curve Cryptography” 5th National Conference on Computer Networks & Information Security (NCCNIS), 2016.
  10. Mr.L.K.Suresh Kumar “A Survey on Homomorphic Encryption Schemes in WSN” 5th National Conference on Computer Networks & Information Security (NCCNIS – 2016), 2016.
  11. Mr.L.K.Suresh Kumar, “Detailed study of MAC Based and Level Based Routing Protocol in Wireless Sensor Networks”, 5th National Conference on Computer Networks & Information Security (NCCNIS) 2016.
  12. Mr.L.K.Suresh Kumar, “ A Survey on Intrusion Detection Techniques in Wireless Sensor Networks” National Conference on Computer Networks & Information Security (NCCNIS), 2016.
  13. “Moving Object Detection using Modified GMM based background subtraction” 
  14. “ A model for Multi-attack classification to improve intrusion detection performance using deep learning approaches”
  15. “ An effective deep learning based Multi-Class classification of DOS and DDOS attack detection
Dr.P V Sudha
  1. Sudha Pelluri , Ramachandram Sirandas : Chapter Title-- "Energy efficient Resource Prediction for Cloud" Publisher - Springer International Publishing AG , Editor-- Wilson Rivera, University of Puerto Rico at Mayaguez . Book Title --" Sustainable Cloud and Energy Services: Principles and Practice ".
  2. Dr P V Sudha authored a chapter titled “Energy Saving in Cloud by Using Enhanced Instance Based Learning (EIBL) for Resource Prediction” in the book titled " Sustainable Cloud and Energy Services: Principles and Practice " Springer International Publishers, 2016.
  3. Dr. P V Sudha “Resource Requirements in Cloud environments” International Conference on Emerging Trends in Engineering, Science & technologi3es, ICETEST, March 2017.
  4. Dr. P V Sudha, “Energy Optimization at Cloud Data Centre Using SDN” IJETT- Special Issue, Vol.2, April 2017. Pg.278 – pg. 283 I.F-2.88.
  5. “Radial Basis Function Neural Network Based Seed Selection”. Taylor and Francis Series, DAPCom 2024, International Conference on Data Acquisition Processing and Communication,
  6. “Hybrid Optimization enabled deep learning for sentiment rating prediction towards text summarization and question answering system” in international journal in Ad Hoc and Ubiquitous Computing, Vol.44,  No.4
Dr.V.B.Narasimha
  1. Dr V B Narsaimha "High Utility Mining of Streaming Itemsets in Data Streams" 2021.
  2. Dr V B Narsaimha "A Research on Online Fake News Detection using Machine Learning Techniques" 2021.
  3. Dr V B Narasimha "Secure and Selective Cloud Data Auditing using Deep Machine Learning" 2020.
  4. Dr V B Narasimha,Dr B Sujatha, "An Efficient Classification Technique for Text Mining and Applications" 2019.
  5. Dr V B Narasimha "A Review on Application Security Management Using Web Application Security Standards" 2019.
  6. Dr V B Narasimha "Analysis on Malware Issues in Online Social Networking Sites(SNS)" 2019.
  7. Dr V B Narasimha "An improved framework for Multicasting in heterogeneous networks" 2018.
  8. Dr V B Narasimha "An Approach to Multi-Cloud Securities" 2018.
  9. Dr V B Narsimha "Big Data Analytics for Humanitarian Causes" 2018.
Mrs B.Sujatha
  1. Dr B Sujatha "Text Summarization using Natural Language Processing" 2021.
  2. Dr B Sujatha "A Literature Review On Feature Selection Using Evolutionary Algorithms" 2021.
  3. Dr B Sujatha "An Efficiently and Secured Data Storage and Integrity Checking for Public Clouds Using MECC" 2020.
  4. Dr B Sujatha "A Literature Review on Feature Selection using Evolutionary Algorithms" 2020.
  5. Dr B Sujatha Dr V B narasimha "An Efficient Classification Technique for Text Mining and Applications" 2019.
  6. Dr B Sujatha "Energy Efficient Data Route In network Aggregation with Secure EEDRINA" 2018.
  7. Dr B Sujatha "Automization of Object Oriented Design Using Back Propagation Neural Network for Better Maintainability of Software" 2018.
  8. Dr B Sujatha "Understanding agile software development process using model-based design in project developement" 2018.
  9. Dr. B. Sujatha, “Understanding agile software development process using model-based design in project development”, IEEE International Conference on Innovative Technologies in Engineering 2018 (ICITE OU).
  10. Dr. B. Sujatha, “Automization of Object Oriented Design Using Back Propagation Neural Network for Better Maintainability of Software ”, International journal of intelligent engineering and systems (INASS), Http://www.inass.org/, March 1, 2018.
  11. B.Sujatha, “Energy efficient data route-in-network aggregation with secure EEDRINA”, Springer International Conference on Computational Intelligent and Data Engineering, July,2017.
  12. B. Sujatha, “ Natural Language Query Parser using first Order Logic for Querying Relational Databases”, International Journal of Computer Applications, (0975-8887) volume 134-No.11, January 2016.
  13. B. Sujatha, “Ontology Based Natural Language Interface for Relational Databases”, International Conference on Intelligent Computing, Communication and Convergence (ICCC), 2016.
  14. B. Sujatha, “ A Generic model for Natural Language Interface To Database”, 6th IEEE International Advanced Computing Conference (IACC), 2016.
  15. B. Sujatha, “ Natural Language Query Processing for Relational Database using EFFCN Algorithm”, IJCSE (International Journal of Computer Science and Engineering), vol.4, Issue- 02, F eb-2016.
  16. A Hybrid Multi-Client Filter Based Feature Clustering and Privacy Preserving Classification Framework on High Dimensional Databases  “Intelligent Systems And Applications In Engineering “
  17. A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security
  18. Feature  max conditional entropy perturbation model  Feature Extraction and Independent Subset Generation Using Genetic Algorithm for Improved Classification“International Journal of Intelligent Systems And Applications In Engineering” 
  19. An efficient database privacy-preserving method using the “Organization development journal”
Mrs.V.Sukanya
  1. Sukanya Vuppala "Internet of Things- based Smart Classroom Environment" 2019.
  2. E. Vishnu Priya Reddy, V.Sukanya, Abhinava Vinay Kumar M, Anil Kumar M “A Study on effective approach of Science Teaching by IOT Smart Classroom” International Journal of Research Culture Society Volume 2, Issue 3, March-2018.
  3. E. Vishnu Priya Reddy, V.Sukanya, Abhinava Vinay Kumar M, Anil Kumar M “A Study on Expandable latest software feature in bundling of latest hardware with earlier software” International Journal of Scientific Research in Science and Technology Volume 4, Issue 5, March-2018.
  4. Mrs.V.Sukanya, “Performance Optimization of Web Services using Data Mining Techniques”, National Conference on “Information Security” at CBIT, Hyderabad , 2015.
  5. Cat and Mouse Based Task Optimization Model for Optimized Data Collection in Smart Agriculture “ International Journal on Recent and Innovation Trends in Computing and Communication”
    Dr. M. A.Hameed
    1. Brain Tumor MRI Images Identification and Classification based on the recurrent conventional neural networks, www.sciencedirect.com/journal / measurements - sensor
    2. Brian Tumor Segmentation of MR Images  using SVM and Fuzzy Classifier in Machine Learning,   www.sciencedirect.com/journal / measurements - sensor
    3. COVID-19 detection and classification for Machine Learning methods using human genomic data, www.sciencedirect.com/journal / measurements - sensor
    4. Developing Heart Stock prediction model using Deep Learning with Combinational of Fixed Row Initial Centroid methods with Navie Bayes Decision Tree and Artificial Neural Networks
    5. Deep Learning Prediction Model for Predicting Heart Stock using the combination of sequential row methods integrate with  Artificial Neural Networks
Mrs A.Gayatri
  1. A. Gayatri, “Implementation of AES Algorithm for Area and Power Optimization by the Application of Reversible Logic and Null Conventional Logic”, International Journal of Emerging Engineering Research and Technology , Volume 3, Issue 7, 2015.