• Eamcet code : BIET
  • COLLEGE CODE : E1
  •   08414 252313
  •   info@biet.ac.in

Publications Summary

S. No.

Assessment Year

No of Publications

Total

Journals

Conferences

National

International

National

International

1

2016-2017

--

5

41

--

46

2015-2016

--

14

1

12

27

2

2014-2015

1

7

11

2

21

ACADEMIC YEAR: 2016-2017

S.No List Of Authors Title of the Paper Name of the Journal/Conference Month & Year of Publication DOI/ISBN/Online ISSN

1

Dr.R Balamurugan

Cuckoo Search with Mutation for Biclustering of Microarray Gene Expression Data

International Arab Journal of Information Technology

May-2017

1683-3198

2

Mr. Vadlamani Veerabhadram

Joint design of energy-efficient clustering for wireless networks

International Journal of Current Engineering And Scientific Research(IJCESR)

May-2017

2393-8374

3

Dr. Indumati Lakshmi Krishnan

Performance Improvement of ProxyMobile IPv6 for the Support of Multi-homing

International Journal of Wireless Network Communication(Springer)

Apr-2017

1572-834X

4

Dr. Biplab Kumar Sarkar,R. Madana Mohana,

VF-ATM: “Biometric Enabled Bank”

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

5

Prof. G. Kumaraswamy Rao

Computer Networking of Information Warfare Systems

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

6

Dr. R. Madana Mohana

Analyzing Internet DNS(SEC) Traffic With “R” For Resolving Platform Optimization

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

7

Mr. N. Sainath

Secured Mechanism For Identifying Malicious Nodes In Wireless Networks

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

8

Mr. Pavan Kumar Pagadala & Farhana Bano

Comparative Analysis of the Fire Bird V Robot Versions

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829-

9

P. Srinivas Rao

A Novel Approach For Service Providers In Cloud Using DoubleQuality Guaranteed Quality of Service (DGQoS)

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

10

Ms. Mubeena Begum

A Mechanism for Message Authenticatio n and Integrity for Hybrid Crypto Algorithm

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

11

Mrs. G. Rashmi

Augmented Reality

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

12

Dr. C. S. Krishna Prasada Rao

CAD Based Retrieval of Data For SRSAM Weapon System

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

13

Dr. R. Madana Mohana

Clustering CategoricalTime Evolving Data From KMeans To Rough Set Theory Using Map-Reduce Technique

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

14

Mr. J. Chandra Sekar

Secured Information Transmission Using Video Steganograph y

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

15

Pavan Kumar Pagadala, Shiva Kumar Vanam

Enhancing the security of the MANETS form DDOS Attacks using Deterministic Bit marking Algorithm

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

16

V.Satyanaraya na

A Novel Approach For Solving The Problems Caused By Search History Using CLIR Tools And Basic Network Security Algorithms

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

17

J. Uma Mahesh, P. Srinivas Reddy, V. Satyanarayana

Data Warehouse Conceptual Schema Modeling and Evaluation

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

18

V. Satyanarayan a, K. Bhaskar

KeyAggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

19

K. Harikrishna

An Overview of Cloud Robotics

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

20

Farhana Bano

Detection of Selfish nodes in Networks using RED Algorithm

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

21

K. Harikrishna

Monitoring Data Using Amazon S3 API

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

22

R. Madana Mohana

Privacy Preserving Applications in Data Mining

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

23

S. Keerthi

Data Analytics:A survey

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

24

Y. Sirisha

Secured Mobile Cloud Using IRIS Recognition

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

25

Hari Krishna K

An Outline And Synopsis Of Cloud Computing

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

26

Hari Krishna K

A Comprehensi ve Review of the Big Data .

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

27

A. Lakshmi

Full Disk Encryption for analyzing the protection scheme

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

28

K. S. Parimala

Digital Locker-Push APIs to move URIs into digital locker and PULL APIs to search documents from repositories by using the XML structure format

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

29

N. Aruna Jyothi

Issues on Cloud Computing Security and Threats

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

30

J. Chandra Sekar

Collective Details Mining on top of Big Data with Mutual Adaptive Information Distribution

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

31

K. Srihari Babu

A Review on Efficient Data Storage for Mobile Cloud Computing and security issues with challenges

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

32

P. Srinivas Rao

Self Protective Cloud Service Providers (CSP) in the Vicinity of Stealthy Denial of Service Strategy

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

33

K. Hari Krishna

KNN Range Query Services Designed for Protecting Data in the Cloud

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

34

N. Sainath

A Study on Top of Cloud Storage Confidentialit y Preserve Public Auditing for Regenerating Code

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

35

N. Sainath

Exposure of Attribution Imitation and Packet- Drop Attacks in WSN

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

36

Dr. P. Padmanabham

Cloud Storage Design to Facilitate Care for User Privacy

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

37

N. Sainath

Energetic directionfinding for Data reliability and wait differentiate Services in WSN

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

38

K. Hari Krishna

Data Dissemination and Origin in Online Social Media Networks.

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

39

K. Hari Krishna

Outlay Useful Reliable and Unknown Data Allocation with Further Security.

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

40

P. Lalitha Surya Kumari

A novel Authenticatio n and Confidentialit y Scheme Based on Zero Knowledge

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

41

B. Madhu, K. Bhaskar

Research and Analysis on Vulnerability Assessments in Cyber Security

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

42

Dr. P. Padmanabham

A KDD Framework for Multi Dimensional Home Interview Survey Data .

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

43

Dr. P. Padmanabham

Information Warehouse - A Paradigm shift

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

44

K. Srinivas Rao

Isolated Subcarrier Modulation Schemes Approach for LTE System with Effective PAPR Bandwidth Application in UPLINK and DOWNLINK.

National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS),

Dec-2016

978-93- 82829- 58-4

45

Dr.M.Pandi

Group nearest query search in multi-dimensional in spatial data

International Journal of Recent Trends in Engg & Research

Nov-2016

2455-1457

46

Indumati Lakshmi Krishnan

A Novel Approach to reduce handover latency in proxy mobile IPv6 based on multi homing

International Journal of Scientific Research and Technology

Jul-2016

2530-2541

ACADEMIC YEAR: 2015-2016

S.No List Of Authors Title of the Paper Name of the Journal/Conference Month & Year of Publication DOI/ISBN

1

P.PAVAN KUMAR

JOIN OPERATIONS TO ENHANCE PERFORMANCE IN HADOOP MAP REDUCE

SPRINGER LECTURE SERIES

Nov-2016

ISBN:9 78- 981- 103155 7

2

P.PAVAN KUMAR

AN EFFICIENT PLACEMENT OF ELECTRONIC COMPONENTS USING GENETIC ALGORITHM

SPRINGER: INTERNATIONAL CONFERENCE ON INNOVATIVE IN ENGG. TECHNOLOG Y.

Aug-2016

ISBN:9 78-1- 5090- 1285-5

3

K.Hari Krishna

Comparison of network topological routings in wireless sensor networks

International journal of computer applications (International conference on communication, computing and visualization)

Aug-2016

0975 – 8887

4

K.Hari Krishna

A Sort of review about strength productive clustering conventions with regard to wireless sensor network

3 rd International conference on electrical,

electronics

,engineering trends, Communication, optimization and sciences

Jun-2016

--

5

K.Hari Krishna

Data integrity and delay differentiated

routing(IDDR) Services in Wireless Sensor Networks

International journal for research in applied science & engineering technology

May-2016

978-81-930654-7-1

6

N.SAINATH

An Effective Approach for controlling Dynamic Functions on Document Collection in cloud computing

International Journal of Reviews on Recent Electronics & Computer Science

Apr-2016

ISSN : 2321- 5461 Vol-4 , Issue-4

7

K.Hari Krishna

Wireless Sensor Network Topology Control Using Clustering

International Conference on Communication ,Computing and Virtualization

Apr-2016

ISBN 1877- 0509

8

K.Hari Krishna

Wireless Network Topological Routing in Wireless Sensor Networks

International Conference on Communication ,Computing and Virtualization

Apr-2016

ISSN 1877- 0509

9

P.PAVAN KUMAR

PARALLELIZATION OF SIMULATED ANNEALING ALGORITHM

SPRINGER:FI CTA

Mar-2016

ISBN:9 78- 981- 10- 04483

10

K.Hari Krishna -

Event Influenced grouping plan and vitality effective steering for wireless sensor networks

International Conference on Innovations and Advancements in Computing

Mar-2016

2319-1163

11

K.Hari krishna -

Enterprise facts safety possibility supervision

International Conference on Innovations and Advancements in Computing(ICIAC-2016)

Mar-2016

--

12

K.Hari Krishna

Significance of Information Security in Risk Management

International Journal of Advanced Technology in Engineering and Science

Feb-2016

ISSN:2 348 -7500 2.87

13

K.Hari Krishna

A Generic Algorithm to improve the Performance of Wireless Sensor Network Protocol

International Conference on Computation al Modeling and Security(CM S 2016)

Feb-2016

ISSN 1877- 0509

14

K.Hari Krishna

Significance of Information Security in Risk Management

3rd International Conference on Recent Innovations in Science Engineering and Management

Feb-2016

ISBN:9 78-81- 932074

15

S.Keerthi

Article on Structure Padding in C language

International Journal of Computer Science & Communication Networks

Feb-2016

ISSN:2 249- 5789 Vol 6 Iss 1 5.09

16

S.Keerthi

Accommodate Negative Requirement Model for Security Testing in Cloud Computing

International Journal of Computer Science and Mobile Computing

Feb-2016

ISSN 2320- 088X, Vol 5 Iss 2 feb 2016

17

V.Swetha

Accommodate Negative Requirement Model for Security Testing in Cloud Computing

International Journal of Computer Science and Mobile Computing

Feb-2016

ISSN 2320- 088X Vol 5 Iss 2 feb

18

K.Hari krishna

Information Mining Procedures in Wireless Sensor Networks

International Conference on Innovative research in engineering ,science and management

Feb-2016

2347-8616

19

V.Swetha,B.Ravi

Article on Structure Padding in C language

International Journal of Computer Science & Communication Networks

Feb-2016

ISSN:2 249- 5789 Vol 6 Iss 1 5.09

20

K.Hari Krishna

A Performance study of metric on wireless sensor network routing protocols

6th IEEE International Advance Computing Conference ACC

Feb-2016

978-1- 4673- 8285-4

21

K.Hari Krishna

A Study about data exploration strategies for wireless intrusion detection system(IDS)

International Journal of Advances in Engineering Science & Technology

Jan-2016

2319- 1112

22

J.UMAMAHESH,P .SRINIVAS REDDY

DATA ANALYTICS AND PERFORMANCE OF MOBILEAPPS USING R LANGUAGE

JOURNAL OF COMPUTER SCIENCE & APPLICATIONS

2016

ISSN:2 231- 1270

23

V. Satyanarayana

An Approach to Predict Soil Nutrients and Efficient Irrigation for Agriculture with Spatial Data Mining

International journal for scientific research development

2016

ISSN 2321 0613

24

K. Hari Krishna

A Survey on wireless sensor networks:

Applications & Design Issues of routing protocols SS

International Journal of Multidisciplinary research 2015

Dec-2015

issn:23 95- 7964 1.4395

25

K.Hari Krishna

New study about wireless intrusion discovery applying data exploration strategies

National conference on IPR: Challenges in Digital Environment(NCICDE)

Nov-2015

ISSN: 2319-1112

26

K.Hari Krishna

A Comparative Study on Various Wireless Sensor Network tools

International Conference on Emerging Trends in Engineering Research

Oct-2015

ISBN:9 78- 151478 2-128

27

K.Hari Krishna

A Comparative Study on Various Wireless Sensor Networks Tools

International Journal Of Engineering And Computer Science

Oct-2015

ISSN : 2319- 7242

ACADEMIC YEAR: 2014-2015

S.No List Of Authors Title of the Paper Name of the Journal/Conference Month & Year of Publication DOI/ISBN

1

P. Lalitha Surya Kumari

An Alternative methodology for authentication based on Zero Knowledge Protocol (ZKP) using Lagange interpolation

International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSS E)

Aug-2015

2319:268 2 2.5 ISO

2

R.Madana Mohana

Hybrid Learning Model and Acoustic Approach to Spoken Language Identification Using Machine Learning

International Review on Computer s and Software (IRECOS

May-2015

ISSN 1828- 6003

3

P.Lalitha Surya Kumari

An Authentication methodology for electronic mail security based on Zero Knowledge Protocol

International Journal of advanced research in computer science and software engineering

May-2015

2277- 128x

4

R. Madana Mohana, V. Satyanara yana

` Performance Evaluation of Classification Approaches for Single Label Learning Using R and WEKA

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978-93- 82829-43- 0

5

R. Madana Mohana ASL

Efficient Classification Techniques for Information Retrieval and Recognition:

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978- 93- 82829- 43-0

6

J. Uma Mahesh and V. Satyanarayana

Predicting the usage of smart products using R language by building a classification model using data mining technique s

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978- 93- 82829- 43-0

7

J. Uma Mahesh

Abroad education and Indian education system using data mining classification and prediction model technique s by R language

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978- 93- 82829- 43-0

8

J. Uma Mahesh

Using data mining technique s to build a classification model for predicting usage of mobile apps using R language

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978- 93- 82829- 43-0

9

Sai Charan Dhatrika

A new approach for image encryption using modified AES algorithm

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978- 93- 82829- 43-0

10

P. Prashanti

Probabilistic aspect mining model for drug reviews

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978- 93- 82829- 43-0

11

Nirupama

Survey On Enhancement of Quality Service in WiMAX

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978- 93- 82829- 43-0

12

Nirupama

Security Issues and Challenge s for Wireless Sensor Network Survey

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978- 93- 82829- 43-0

13

Nirupama

Design and Implementation of a Wireless Sensor Networks

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978- 93- 82829- 43-0

14

V. Satyanara yana, M. Shiva Prasad

Empower Different Levels of Confide Concealment in Preventive Data Mining

National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15)

Mar-2015

ISBN 978- 93- 82829- 43-0

15

J.Uma Mahesh

Analysis of Transpire 5G Wireless Technology(WWWW )

IJSRD

Jan-2015

IJSRDV2I1 0335 1.8263 for year

16

J.Rethna Virgil Jeny

EERRSCR-Energy Efficient Level Based Robust Reliable and Clustered Routing Protocol for WSN

International Journal of Applied Engineering Research

Jan-2015

19289-19304

17

J.Rethna Virgil Jeny

FRRSCR-Fuzzy Based Robust Reliable and Scalable Clustered Routing Protocol for WSN

International Journal of Applied Engineering Research

Jan-2015

34024-34028

18

R. Madana Mohana

CCBIR: A Cloud Based Implementation of Content Based Image Retrieval”

WSEAS Transactions on Computer s

2015

ISSN: 2224- 2872 SJR 0.22 SCImago: 0,038

19

J Uma Mahesh,D r. K.V.Naga njaneyulu

Internet of Things

International Journal of Innovations & Advancement in Computer Science

Oct-2014

2347- 8616

DIIF Impact Facto r Value 2.65,

20

J.Uma Mahesh,K .V.Naganj aneyulu (

Analysis of J48 Algorithm in Classification-Ebola Virus

International journal of Emerging Trends in Science and Technology

Oct-2014

2348- 9480 2.838

21

CH.M.H.Saibaba

Mining Frequent Itemsets from Cloud by using Hash Table Technique(HTT)

International Conference on Innovations in Computer Science & Engineering(ICICS E)

Aug-2014

978-93- 82163-44- 2 2.16