• Eamcet code : BIET
  • COLLEGE CODE : E1
  •   08414 252313
  •   info@biet.ac.in

Publications Summary

S. No. Assessment Year No. of Publications in the Journals notified on UGC website
1 2016-2017 20
2 2015-2016 18
3 2014-2015 16
4 2013-2014 10
5 2012-2013 8

Academic Year: 2016-2017

S.No List Of Authors Title of the Paper Name of the Journal/Conference Month & Year of Publication DOI/ISBN/Online ISSN
1 Dr.R Balamurugan Cuckoo Search with Mutation for Biclustering of Microarray Gene Expression Data International Arab Journal of Information Technology May-2017 1683-3198
2 Mr. Vadlamani Veerabhadram Joint design of energy-efficient clustering for wireless networks International Journal of Current Engineering And Scientific Research(IJCESR) May-2017 2393-8374
3 Dr. Indumati Lakshmi Krishnan Performance Improvement of ProxyMobile IPv6 for the Support of Multi-homing International Journal of Wireless Network Communication(Springer) Apr-2017 1572-834X
4 Dr. Biplab Kumar Sarkar,R. Madana Mohana, VF-ATM: “Biometric Enabled Bank” National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
5 Prof. G. Kumaraswamy Rao Computer Networking of Information Warfare Systems National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
6 Dr. R. Madana Mohana Analyzing Internet DNS(SEC) Traffic With “R” For Resolving Platform Optimization National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
7 Mr. N. Sainath Secured Mechanism For Identifying Malicious Nodes In Wireless Networks National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
8 Mr. Pavan Kumar Pagadala & Farhana Bano Comparative Analysis of the Fire Bird V Robot Versions National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829-
9 P. Srinivas Rao A Novel Approach For Service Providers In Cloud Using DoubleQuality Guaranteed Quality of Service (DGQoS) National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
10 Ms. Mubeena Begum A Mechanism for Message Authenticatio n and Integrity for Hybrid Crypto Algorithm National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
11 Mrs. G. Rashmi Augmented Reality National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
12 Dr. C. S. Krishna Prasada Rao CAD Based Retrieval of Data For SRSAM Weapon System National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
13 Dr. R. Madana Mohana Clustering CategoricalTime Evolving Data From KMeans To Rough Set Theory Using Map-Reduce Technique National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
14 Mr. J. Chandra Sekar Secured Information Transmission Using Video Steganograph y National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
15 Pavan Kumar Pagadala, Shiva Kumar Vanam Enhancing the security of the MANETS form DDOS Attacks using Deterministic Bit marking Algorithm National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
16 V.Satyanaraya na A Novel Approach For Solving The Problems Caused By Search History Using CLIR Tools And Basic Network Security Algorithms National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
17 J. Uma Mahesh, P. Srinivas Reddy, V. Satyanarayana Data Warehouse Conceptual Schema Modeling and Evaluation National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
18 V. Satyanarayan a, K. Bhaskar KeyAggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
19 K. Harikrishna An Overview of Cloud Robotics National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
20 Farhana Bano Detection of Selfish nodes in Networks using RED Algorithm National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
21 K. Harikrishna Monitoring Data Using Amazon S3 API National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
22 R. Madana Mohana Privacy Preserving Applications in Data Mining National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
23 S. Keerthi Data Analytics:A survey National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
24 Y. Sirisha Secured Mobile Cloud Using IRIS Recognition National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
25 Hari Krishna K An Outline And Synopsis Of Cloud Computing National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
26 Hari Krishna K A Comprehensi ve Review of the Big Data . National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
27 A. Lakshmi Full Disk Encryption for analyzing the protection scheme National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
28 K. S. Parimala Digital Locker-Push APIs to move URIs into digital locker and PULL APIs to search documents from repositories by using the XML structure format National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
29 N. Aruna Jyothi Issues on Cloud Computing Security and Threats National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
30 J. Chandra Sekar Collective Details Mining on top of Big Data with Mutual Adaptive Information Distribution National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
31 K. Srihari Babu A Review on Efficient Data Storage for Mobile Cloud Computing and security issues with challenges National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
32 P. Srinivas Rao Self Protective Cloud Service Providers (CSP) in the Vicinity of Stealthy Denial of Service Strategy National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
33 K. Hari Krishna KNN Range Query Services Designed for Protecting Data in the Cloud National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
34 N. Sainath A Study on Top of Cloud Storage Confidentialit y Preserve Public Auditing for Regenerating Code National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
35 N. Sainath Exposure of Attribution Imitation and Packet- Drop Attacks in WSN National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
36 Dr. P. Padmanabham Cloud Storage Design to Facilitate Care for User Privacy National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
37 N. Sainath Energetic directionfinding for Data reliability and wait differentiate Services in WSN National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
38 K. Hari Krishna Data Dissemination and Origin in Online Social Media Networks. National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
39 K. Hari Krishna Outlay Useful Reliable and Unknown Data Allocation with Further Security. National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
40 P. Lalitha Surya Kumari A novel Authenticatio n and Confidentialit y Scheme Based on Zero Knowledge National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
41 B. Madhu, K. Bhaskar Research and Analysis on Vulnerability Assessments in Cyber Security National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
42 Dr. P. Padmanabham A KDD Framework for Multi Dimensional Home Interview Survey Data . National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
43 Dr. P. Padmanabham Information Warehouse - A Paradigm shift National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
44 K. Srinivas Rao Isolated Subcarrier Modulation Schemes Approach for LTE System with Effective PAPR Bandwidth Application in UPLINK and DOWNLINK. National Conference on Innovative Technologies in Big Data, Cloud, Mobile and Security (ITBCMS), Dec-2016 978-93- 82829- 58-4
45 Dr.M.Pandi Group nearest query search in multi-dimensional in spatial data International Journal of Recent Trends in Engg & Research Nov-2016 2455-1457
46 Indumati Lakshmi Krishnan A Novel Approach to reduce handover latency in proxy mobile IPv6 based on multi homing International Journal of Scientific Research and Technology Jul-2016 2530-2541

Academic Year: 2015-2016

S.No List Of Authors Title of the Paper Name of the Journal/Conference Month & Year of Publication DOI/ISBN
1 P.PAVAN KUMAR JOIN OPERATIONS TO ENHANCE PERFORMANCE IN HADOOP MAP REDUCE SPRINGER LECTURE SERIES Nov-2016 ISBN:9 78- 981- 103155 7
2 P.PAVAN KUMAR AN EFFICIENT PLACEMENT OF ELECTRONIC COMPONENTS USING GENETIC ALGORITHM SPRINGER: INTERNATIONAL CONFERENCE ON INNOVATIVE IN ENGG. TECHNOLOG Y. Aug-2016 ISBN:9 78-1- 5090- 1285-5
3 K.Hari Krishna Comparison of network topological routings in wireless sensor networks International journal of computer applications (International conference on communication, computing and visualization) Aug-2016 0975 – 8887
4 K.Hari Krishna A Sort of review about strength productive clustering conventions with regard to wireless sensor network 3 rd International conference on electrical, electronics ,engineering trends, Communication, optimization and sciences Jun-2016 --
5 K.Hari Krishna Data integrity and delay differentiated routing(IDDR) Services in Wireless Sensor Networks International journal for research in applied science & engineering technology May-2016 978-81-930654-7-1
6 N.SAINATH An Effective Approach for controlling Dynamic Functions on Document Collection in cloud computing International Journal of Reviews on Recent Electronics & Computer Science Apr-2016 ISSN : 2321- 5461 Vol-4 , Issue-4
7 K.Hari Krishna Wireless Sensor Network Topology Control Using Clustering International Conference on Communication ,Computing and Virtualization Apr-2016 ISBN 1877- 0509
8 K.Hari Krishna Wireless Network Topological Routing in Wireless Sensor Networks International Conference on Communication ,Computing and Virtualization Apr-2016 ISSN 1877- 0509
9 P.PAVAN KUMAR PARALLELIZATION OF SIMULATED ANNEALING ALGORITHM SPRINGER:FI CTA Mar-2016 ISBN:9 78- 981- 10- 04483
10 K.Hari Krishna - Event Influenced grouping plan and vitality effective steering for wireless sensor networks International Conference on Innovations and Advancements in Computing Mar-2016 2319-1163
11 K.Hari krishna - Enterprise facts safety possibility supervision International Conference on Innovations and Advancements in Computing(ICIAC-2016) Mar-2016 --
12 K.Hari Krishna Significance of Information Security in Risk Management International Journal of Advanced Technology in Engineering and Science Feb-2016 ISSN:2 348 -7500 2.87
13 K.Hari Krishna A Generic Algorithm to improve the Performance of Wireless Sensor Network Protocol International Conference on Computation al Modeling and Security(CM S 2016) Feb-2016 ISSN 1877- 0509
14 K.Hari Krishna Significance of Information Security in Risk Management 3rd International Conference on Recent Innovations in Science Engineering and Management Feb-2016 ISBN:9 78-81- 932074
15 S.Keerthi Article on Structure Padding in C language International Journal of Computer Science & Communication Networks Feb-2016 ISSN:2 249- 5789 Vol 6 Iss 1 5.09
16 S.Keerthi Accommodate Negative Requirement Model for Security Testing in Cloud Computing International Journal of Computer Science and Mobile Computing Feb-2016 ISSN 2320- 088X, Vol 5 Iss 2 feb 2016
17 V.Swetha Accommodate Negative Requirement Model for Security Testing in Cloud Computing International Journal of Computer Science and Mobile Computing Feb-2016 ISSN 2320- 088X Vol 5 Iss 2 feb
18 K.Hari krishna Information Mining Procedures in Wireless Sensor Networks International Conference on Innovative research in engineering ,science and management Feb-2016 2347-8616
19 V.Swetha,B.Ravi Article on Structure Padding in C language International Journal of Computer Science & Communication Networks Feb-2016 ISSN:2 249- 5789 Vol 6 Iss 1 5.09
20 K.Hari Krishna A Performance study of metric on wireless sensor network routing protocols 6th IEEE International Advance Computing Conference ACC Feb-2016 978-1- 4673- 8285-4
21 K.Hari Krishna A Study about data exploration strategies for wireless intrusion detection system(IDS) International Journal of Advances in Engineering Science & Technology Jan-2016 2319- 1112
22 J.UMAMAHESH,P .SRINIVAS REDDY DATA ANALYTICS AND PERFORMANCE OF MOBILEAPPS USING R LANGUAGE JOURNAL OF COMPUTER SCIENCE & APPLICATIONS 2016 ISSN:2 231- 1270
23 V. Satyanarayana An Approach to Predict Soil Nutrients and Efficient Irrigation for Agriculture with Spatial Data Mining International journal for scientific research development 2016 ISSN 2321 0613
24 K. Hari Krishna A Survey on wireless sensor networks: Applications & Design Issues of routing protocols SS International Journal of Multidisciplinary research 2015 Dec-2015 issn:23 95- 7964 1.4395
25 K.Hari Krishna New study about wireless intrusion discovery applying data exploration strategies National conference on IPR: Challenges in Digital Environment(NCICDE) Nov-2015 ISSN: 2319-1112
26 K.Hari Krishna A Comparative Study on Various Wireless Sensor Network tools International Conference on Emerging Trends in Engineering Research Oct-2015 ISBN:9 78- 151478 2-128
27 K.Hari Krishna A Comparative Study on Various Wireless Sensor Networks Tools International Journal Of Engineering And Computer Science Oct-2015 ISSN : 2319- 7242

Academic Year: 2014-2015

S.No List Of Authors Title of the Paper Name of the Journal/Conference Month & Year of Publication DOI/ISBN
1 P. Lalitha Surya Kumari An Alternative methodology for authentication based on Zero Knowledge Protocol (ZKP) using Lagange interpolation International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSS E) Aug-2015 2319:268 2 2.5 ISO
2 R.Madana Mohana Hybrid Learning Model and Acoustic Approach to Spoken Language Identification Using Machine Learning International Review on Computer s and Software (IRECOS) May-2015 ISSN 1828- 6003
3 P.Lalitha Surya Kumari An Authentication methodology for electronic mail security based on Zero Knowledge Protocol International Journal of advanced research in computer science and software engineering May-2015 2277- 128x
4 R. Madana Mohana, V. Satyanara yana ` Performance Evaluation of Classification Approaches for Single Label Learning Using R and WEKA National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978-93- 82829-43- 0
5 R. Madana Mohana ASL Efficient Classification Techniques for Information Retrieval and Recognition: National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978- 93- 82829- 43-0
6 J. Uma Mahesh and V. Satyanarayana Predicting the usage of smart products using R language by building a classification model using data mining technique s National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978- 93- 82829- 43-0
7 J. Uma Mahesh Abroad education and Indian education system using data mining classification and prediction model technique s by R language National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978- 93- 82829- 43-0
8 J. Uma Mahesh Using data mining technique s to build a classification model for predicting usage of mobile apps using R language National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978- 93- 82829- 43-0
9 Sai Charan Dhatrika A new approach for image encryption using modified AES algorithm National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978- 93- 82829- 43-0
10 P. Prashanti Probabilistic aspect mining model for drug reviews National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978- 93- 82829- 43-0
11 Nirupama Survey On Enhancement of Quality Service in WiMAX National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978- 93- 82829- 43-0
12 Nirupama Security Issues and Challenge s for Wireless Sensor Network Survey National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978- 93- 82829- 43-0
13 Nirupama Design and Implementation of a Wireless Sensor Networks National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978- 93- 82829- 43-0
14 V. Satyanara yana, M. Shiva Prasad Empower Different Levels of Confide Concealment in Preventive Data Mining National Conference on Fast Emerging Trends in Engineering and Technology (NCOFEE T-2K15) Mar-2015 ISBN 978- 93- 82829- 43-0
15 J.Uma Mahesh Analysis of Transpire 5G Wireless Technology(WWWW ) IJSRD Jan-2015 IJSRDV2I1 0335 1.8263 for year
16 J.Rethna Virgil Jeny EERRSCR-Energy Efficient Level Based Robust Reliable and Clustered Routing Protocol for WSN International Journal of Applied Engineering Research Jan-2015 19289-19304
17 J.Rethna Virgil Jeny FRRSCR-Fuzzy Based Robust Reliable and Scalable Clustered Routing Protocol for WSN International Journal of Applied Engineering Research Jan-2015 34024-34028
18 R. Madana Mohana CCBIR: A Cloud Based Implementation of Content Based Image Retrieval” WSEAS Transactions on Computer s 2015 ISSN: 2224- 2872 SJR 0.22 SCImago: 0,038
19 J Uma Mahesh, D r. K.V.Naga njaneyulu Internet of Things International Journal of Innovations & Advancement in Computer Science Oct-2014 2347- 8616 DIIF Impact Facto r Value 2.65,
20 J.Uma Mahesh, K .V.Naganj aneyulu Analysis of J48 Algorithm in Classification-Ebola Virus International journal of Emerging Trends in Science and Technology Oct-2014 2348- 9480 2.838
21 CH.M.H.Saibaba Mining Frequent Itemsets from Cloud by using Hash Table Technique(HTT) International Conference on Innovations in Computer Science & Engineering(ICICS E) Aug-2014 978-93- 82163-44- 2 2.16