Publications by Staff

2016-20172015-20162014-20152013-2014
International Journals1210913
National Journals-31-
International Conferences14163020
National Conferences----

Dr.K V S V N Raju- (3)

An Auto Exposure Algorithm Using Mean Value Based on Secant Method ,Emerging ICT for Bridging the Future Volume 1, Advances in Intelligent Systems and Computing, PP:137,DOI: 10.1007/978-3-319-13728-5_15 ,

Minimum Spanning Tree based k-anonymity, International Conference on Soft Computing for Problem Solving ,SocProS 2011, December 20-22 Roorkee, India and Springer: Advances in Intelligent and Soft Computing Volume 130, 2012, DOI: 10.1007/978-81-322-0487-9; pp405-413 ,

SenSim: Sentence Similarity Based on the Concept of Relevance ,2012 International Conference on Advances in Computing, Communications and Informatics (ICACCI-2012, 3 - 5 August 2012, Chennai, India. ,

S.Ratan Kumar - (2)

Enabling High Performance Computing with Pthreads ,Open source for you magazine January 2016 ,

Secure online Transactions using visual cryptography ,International Conference on Advanced computing and communication Technologies, ICACCT,2012, Panipat ,

B Ravi Kiran- (12)

Edge Detection on an Image Using Ant colony optimization ,Proceedings were published in Advances in Intelligent Systems and Computing, Springer International Publishing. ,

An Auto Exposure Algorithm Using Mean Value Based on Secant Method ,Emerging ICT for Bridging the Future – Volume 1, Advances in Intelligent Systems and Computing, PP:137,DOI: 10.1007/978-3-319-13728-5_15 ,

False Position based Auto Exposure Algorithm for Properly Exposing the Leather Samples in the Leather Industries. ,International Journal of Computer Applications 83(14):7-9, December 2013. Published by Foundation of Computer Science, New York, USA. ,

Implementation of ROI Based Baseline Sequential Adaptive Quantization ,International Journal of Emerging Technology & Advanced Engineering ,

HUMAN EMOTION CLASSIFICATION USING FUZZY AND PCA APPROACH ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2013, PP:75,DOI:10.1007/978-3-319-02931-3_10 ,

A FAST AUTO EXPOSUREALGORITHM FOR INDUSTRIAL APPLICATIONS BASED ON FALSE POSITION METHOD ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2013, PP:509,DOI:10.1007/978-3-319-02931-3_58 ,

An Experimental Based Study on Different Sources of Noise for High Dynamic Range Imaging ,accepted to publish in Springer, FICTA 2012 in BEC, Bhubaneswar, India ,

Quality of Service based Performance Metrics on Routing Strategies in MANET with Few Nodes ,International Journal of Computer Applications (IJCA) , Vol 52-NO 14, August 2012. ,

A Systematic Mapping Study on Value of Reuse ,International Journal of Computer Applications (IJCA) , Vol 34-NO 4, November 2011 Edition. ,

HDR Scene Detection & Capturing Strategy ,Annual IEEE India Conference (INDICON-2011), 16 Dec - 18 Dec 2011 ,BITS, Hyderabad, India ,

Optimal exposure sets for High Dynamic Range Scenes ,ICGIP-2011, SPIE, Egypt, Cairo. ,

A Systematic Mapping Study on Value of Reuse ,Journal of ComputerApplications 34(4):37-44, November 2011. Published by Foundation of Computer Science, New York, USA ,

K Selvani Deepthi- (17)

Fuzzy Type-Ahead Keyword Search In Rdf Data ,Proceedings were published in Advances in Inelligent Systems and Computing, Vol 1, Springer International Publishing. ,

Information Extraction from Research papers based on statistical methods ,Proceedings were published in Advances in Intelligent Systems and Computing, Springer International Publishing. ,

Extractive Text Summarization Using Modified Weighing And Sentence Symmetric Feature Methods ,International Journal of Modern Education and Computer Science, Volume-7 Issue-10, October 2015 ,

Research Domain selection using Naive Bayes Classification ,International Journal of Mathematical Sciences and Computing, Volume-2 Issue-2, April 2016. ,

Text Summarization Basing on Font and Cue-Phrase Feature for a Single Document ,Emerging ICT for Bridging the Future Volume 1, Advances in Intelligent Systems and Computing, PP:537,DOI:10.1007/978-3-319-13731-5_58 ,

Information Tracking from Research Papers Using Classification Techniques ,Emerging ICT for Bridging the Future Volume 1, Advances in Intelligent Systems and Computing, PP:153,DOI: 10.1007/978-3-319-13728-5_17 ,

TOPIC TRACKING BASED ON CLUSTERING OF KEYWORDS ,International Journal of Computer Science Information and Engg.Technologies, ISSN 2277-4408,ISSUE3-VOLUME1-SERIES3 ,

A SURVEY ON FAULT MANAGEMENT TECHNIQUES IN DISTRIBUTED COMPUTING ,International conference on frontiers of intelligent computing, proceeding by Springer AISC 199, pp. 593–602. December 2012 DOI: 10.1007/978-3-642-35314-7_67. ,

AN EMINENT APPROACH OF FAULT MANAGEMENT USING PROACTIVE AND REACTIVE TECHNIQUES IN DISTRIBUTED COMPUTING ,International conference on frontiers of intelligent computing, proceeding by Springer AISC 199, pp. 603-611,December 2012 DOI: 10.1007/978-3-642-35314-7_68. ,

AN AUTOMATIC LEGAL DOCUMENT SUMMARIZATION AND SEARCH USING HYBRID SYSTEM ,International Conference on frontiers of intelligent computing, proceeding by Springer AISC 199, pp. 229–236.December 2012 DOI: 10.1007/978-3-642-35314-7_27. ,

ANALYZING ROUTING ANOMALY OF WIRELESS MESH NETWORKS USING RULE BASED EXPERT SYSTEM ,Joint International Conference on SEMCCO and FANCCO held at ANITS during 19th -21st December 2011. ,

BRAIN INFORMATICS EXPERT SSYTEM USING THE TECHNIQUES OF MACHINE LEARNING ,International Conference on Millennium DevelopmetGoals(MDG):Role of ICT and other appropriate technologies organized by RMK & RMD Engineering College,December 27th-29th 2009. ,

NEUROLOGY EXPERT SYSTEM ,96th Indian Science Congress held at Shillong from January 3-7, 2009. ,

NEURAL NETWROK APPROACH TO DETECT SPAM ,95th Indian Science Congress Organized by Andhra University during 3rd-7th January 2008. ,

NEURAL NETWROK APPROACH TO DETECT SPAM ,National Conference on Soft Computing And its Application, NCSCA-07 held at ANITS during 21st and 22nd December 2007 and received BEST PAPER AWARD. ,

TROUBLE SHOOTING WIRELESS MESH NETWORKS USING RULE-BASED EXPERT SYTEM ,International Journal of Electronics and Communication Technology(IJECT),ISSN:2230-9543 Vol-2 Issue-2 June 2011,PP:22-25. ,

APPLICATION OF BLIND DECONVOLUTION ALGORITHM FOR IMAGE RESTORATION ,International Journal of Engineering Science and Technology(IJEST),ISSN:0975-5462 Vol-3 No-3 March 2011,PP:1878-1884. ,

S.Jayaprada- (5)

A New Approach in Computing Shortest Path for Road Networks ,International Journal of Emerging Technology and Advanced Engineering, Volume 5,Issue 4,April 2014.[2013-14 IJ NO 1.] ,

A new Hybrid Approach for Document Classification using Tabu Search and Particle Swarm Optimization ,Proceedings were published in Advances in Intelligent Systems and Computing, Springer International Publishing. [2015-16 IC] ,

A Secure and Optimal Data Clustering Technique over Distributed Networks ,Emerging ICT for Bridging the Future – Volume 1, Advances in Intelligent Systems and Computing, PP:169,DOI: 10.1007/978-3-319-13728-5_19 ,

HIERARCHICAL BISECTING CLUSTERING WITH MULTI VIEW POINT BASED SIMILARITY MEASURE ,Internaional Journal of Data Warehousing and Mining, VOL:3 ISSUE4 NOV-13 ,

HIERARCHICAL DIVISIVE CLUSTERING WITH MULTIVIEW POINT BASED SIMILARITYMEASURE ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2013, PP:483,DOI:10.1007/978-3-319-02931-3_55 ,

G V Gayathri- (3)

A Short Survey on Teaching Learning Based Optimization ,Emerging ICT for Bridging the Future – Volume 1, Advances in Intelligent Systems and Computing, PP:173,DOI:10.1007/978-3-319-13731-5_20 ,

HIERARCHICAL BISECTING CLUSTERING WITH MULTI VIEW POINT BASED SIMILARITY MEASURE ,Internaional Journal of Data Warehousing and Mining, VOL:3 ISSUE4 NOV-13 ,

HIERARCHICAL DIVISIVE CLUSTERING WITH MULTIVIEW POINT BASED SIMILARITYMEASURE ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2013, PP:483,DOI:10.1007/978-3-319-02931-3_55 ,

G.Jagadish- (11)

Analysis of Existing Text Hiding Algorithms For Image Steganography Using TLNUS and AES ,SCI 2017 ,

Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN's and Mobile Devices ,International Journal of Computer Applications(IJCA) ,

Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN's and Mobile Devices ,International Journal of Computer Applications(IJCA), Volume 146-No.8, July 2016. ,

A Novel Approach of Cluster based Routing in Mobile Ad hoc Networks ,IJCA journal , Volume 107 - Number 2, Year of Publication: 2014, DOI: 10.5120/18721-9402. ,

Enhanced Three Tier Security Scheme for Data Transfer in Mobile Sensor Networks by Using Mobile Sinks ,Journal of Computing Technologies ,

CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET ,International Journal of Engineering Research and Development- e-ISSN: 2278-067X, p-ISSN: 2278-800X, Volume 2, Issue 9 (August 2012), PP. 17-27 ,

OPTIMAL COVERING PROBLEM FOR A MANET THROUGH GEOMETRIC THEORY ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2013, PP:475,DOI:10.1007/978-3-319-02931-3_54 ,

HUMAN EMOTION CLASSIFICATION USING FUZZY AND PCA APPROACH ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2013,PP:75,DOI:10.1007/978-3-319-02931-3_10 ,

A Novel Approach To Troubleshoot Security Attacks In Local Area Networks Vol.11 No.9 Ppno:116-123 ,International Journal Of Computer Science And Network Security(IJCSNS) ,

Unconstrained Optimization For Maximizing Ultimate Tensile Strength Of Pulsed Current Micro Plasma Arc Welded Inconel 625 Sheets Pp.No:345-352 ,Springer International Conference On India-2012 ,

Quality of Service based Performance Metrics on Routing Strategies in MANET with Few Nodes ,International Journal of Computer Applications, 2012 by IJCA Journal Volume 52 - No 14 ,

T.Kranthi- (1)

Information Tracking from Research Papers Using Classification Techniques ,Emerging ICT for Bridging the Future – Volume 1, Advances in Intelligent Systems and Computing, PP:153,DOI: 10.1007/978-3-319-13728-5_17 ,

S.A.Bhavani- (3)

Enhancement of Stream Ciphers Security using DNA ,Advances in Intelligent Systems and Computing, Springer International Publishing. ,

Implementation Of Deblurring Images Using Blind Deconvolution Technique ,International Journal Of Science And Research(IJSR), Volume-4 Issue-8, August 2015 ,

WEB SEARCH ENGINE:ANEW CRAWLING TOOL FOR MINING WEB PAGES OVER INTERNETBASED ON PAGE USAGE ,Journal of Computing Technologies, ISSN 2278-3814,Volume 3 Issue 8 September 2014 ,

A.N.R.Latha- (2)

Personalized Web Search using Ontology And Page Ranking ,International Journal Of Science And Research(IJSR), Volume-4 Issue-7, July 2015. ,

Personalised Image Search using Ontological Knowledge base User Profiles and Ontology Mining ,International Journal of Science and Research(IJSR), Volume 5, Issue 8, Aug 2016, ISSN 2319-7064, Index Copernicus=6.14, ,

M Kranthi Kiran - (4)

Applying NLP Techniques to Semantic Document Retrieval Application for Personal Desktop ,Emerging ICT for Bridging the Future Volume 1, Advances in Intelligent Systems and Computing, PP:385,DOI:10.1007/978-3-319-13728-5_43 ,

Semantic Web Services Discovery Using Logic Based Method ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2014, PP:623,DOI: 10.1007/978-3-319-11933-5_70 ,

HAND GESTURE DETECTION AND RECOGNITION USING AFFINE-SHIFT,BAG-OF-FEATURES AND EXTREME LEARNING MACHINE TECHNIUES ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2013, PP:181,DOI:10.1007/978-3-319-02931-3_22 ,

A Systematic Mapping Study on Value of Reuse ,International Journal of Computer Applications 34(4):37-44, November 2011. Published by Foundation of Computer Science, New York, USA ,

V Srinivasa Raju - (2)

Applying NLP Techniques to Semantic Document Retrieval Application for Personal Desktop ,Emerging ICT for Bridging the Future Volume 1, Advances in Intelligent Systems and Computing, PP:385,DOI:10.1007/978-3-319-13728-5_43 ,

Semantic Web Services Discovery Using Logic Based Method ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2014, PP:623,DOI: 10.1007/978-3-319-11933-5_70 ,

S R Mishra - (4)

Human Emotion Classification Using Fuzzy And Pca Approach ,Proceedings were published in Advances in Inelligent Systems and Computing, Vol 1, Springer International Publishing ,

A Novel Approach of Cluster based Routing in Mobile Adhoc Networks ,Internal Journal of Computing Applications, Volume 107 December 2014. ,

Object Recognition with Discriminately Trained Part-Based Model on HOG(Histogram of Oriented Gradients) ,Advances in Intelligent Systems and Computing, Springer International Publishing. ,

Pedestrian with Direction Detection Using the Combination of Decision Tree Learning and SVM ,Emerging ICT for Bridging the Future – Volume 1, Advances in Intelligent Systems and Computing, PP:249,DOI: 10.1007/978-3-319-13728-5_28 ,

G.Praneetha- (4)

Improving Security of Digital Signature by using Steganography ,International Journal Of Science And Research(IJSR), Volume-4 Issue-8, August 2015. ,

Personalised Image Search using Ontological Knowledge base User Profiles and Ontology Mining ,International Journal of Science and Research(IJSR), Volume 5, Issue 8, Aug 2016, ISSN 2319-7064, Index Copernicus=6.14 ,

MULTIFACTOR AUTHENTICATION BY USING IMAGE PROCESSING TECHNIQUES , Journal of Computing Technologies, Volume 3 Issue 8 September 2014. ,

SECURITY ANALYSIS OF DIGITAL STEGNO IMAGES USING GENETIC ALGORITHM ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2013, PP:277,DOI:10.1007/978-3-319-02931-3_31 ,

G.Gowri Pushpa- (3)

Tracking and speed Estimation of Moving vehicle for Traffic Surveillance System ,Proceedings were published in Advances in Intelligent Systems and Computing, Springer International Publishing. ,

Detect Pedestrain Orientation by Integrating Multiclass SVM Utilizing Binary Decision Tree ,International Journal Of Advanced Research in computer and communication Engineering, Volume-4 Issue-11 November 2015. ,

Implementation of ROI Based Baseline Sequential Adaptive Quantization ,International Journal of Emerging Technology & Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal), Volume 4, Issue 2, February, 2014 ,

G.Santoshi- (6)

Novel Approach of DNA Sequencing Algorithm to Image Security ,International Conference on Signal Processing, Communication,Power and Embedded Systems(SCOPES 2016) ,

Tracking and speed Estimation of Moving vehicle for Traffic Surveillance System ,Proceedings were published in Advances in Intelligent Systems and Computing, Springer International Publishing. ,

Detect Pedestrain Orientation by Integrating Multiclass SVM Utilizing Binary Decision Tree ,International Journal Of Advanced Research in computer and communication Engineering, Volume-4 Issue-11 November 2015 ,

Novel Approach of DNA Sequencing Algorithm to Image Security ,International Conference on Signal Processing, Communication,Power and Embedded Systems(SCOPES 2016) ,

Pedestrian with Direction Detection Using the Combination of Decision Tree Learning and SVM ,Emerging ICT for Bridging the Future – Volume 1, Advances in Intelligent Systems and Computing, PP:249,DOI: 10.1007/978-3-319-13728-5_28 ,

Implementation of ROI Based Baseline Sequential Adaptive Quantization ,International Journal of Emerging Technology & Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal), Volume 4, Issue 2, February, 2014 ,

P.Deepika- (3)

Mining Frequent Itemsets from cloud by using HTT ,International Conference on Innovations in Computer Science and Engineering ,

A Novel Approach For AES Algorithm In Image Encryption ,International Journal of Advance Research InScience and Engineering, Volume No-4,Special Issue No-01,April 2015 ,

Network Node Detection System Using Border Patrol ,International Journal of Advanced Technology in Engineering and Sciences, Volume No-3,Special Issue No-01,April 2015. ,

J.Sharmila- (3)

Tracking and speed Estimation of Moving vehicle for Traffic Surveillance System ,Proceedings were published in Advances in Intelligent Systems and Computing, Springer International Publishing ,

Information Tracking from Research Papers Using Classification Techniques ,Emerging ICT for Bridging the Future Volume 1, Advances in Intelligent Systems and Computing, PP:153,DOI: 10.1007/978-3-319-13728-5_17 ,

Implementation of ROI Based Baseline Sequential Adaptive Quantization ,International Journal of Emerging Technology & Advanced Engineering,ISSN 2250-2459, ISO 9001:2008 Certified Journal), Volume 4, Issue 2, February, 2014 ,

Ch.Seshadri Rao- (4)

Cryptography Technique for a Novel Text Using Mathematical Functions ,Advances in Intelligent Systems and Computing, Springer International Publishing ,

A Multilevel Image Encryption based on Duffing map and Modified DNA Hybridization for Transfer over an Unsecured Channel ,International Journal Of Computer Applications, Volume-120 Issue-4 June 2015 NS ,

Generating Digital Signature Using DNA Coding ,Advances in Intelligent Systems and Computing,Springer International Publishing,FICTA 2014PP:21 ,DOI: 10.1007/978-3-319-12012-6_3 ,

A Hybrid Approach for Image Edge Detection Using Neural Network and Particle Swarm Optimization ,Emerging ICT for Bridging the Future – Volume 1, Advances in Intelligent Systems and Computing, PP:1,DOI: 10.1007/978-3-319-13728-5_1 ,

K.Suresh- (2)

Edge Detection on an Image Using Ant colony optimization ,Advances in Intelligent Systems and Computing, Springer International Publishing. ,

Improving Query Processing Performance Using Optimization among CPEL Factors ,Advancesin Intelligent Systems and Computing,Springer International Publishing,FICTA 2014, PP:51,DOI: 10.1007/978-3-319-11933-5_7 ,

P Naga srinivasu- (3)

Generic Iterative Algorithm For Impulse Noise Removal In Remote Sensing Imaginaries ,First International Conference on Machine Intelligence and Research Advancement organized by SMVDU, Katra, India during 21st-23rd December 2013. ,

A Novel Image Enhancement Technique for Ancient Images using Optimal Histogram Equalization and Fuzzy Enhancement Technique ,International Journal of Computer Science and Information Technologies, Vol. 5 (2) ,pg 1196-1199, 2014. ,

A Multilevel Image Encryption based on Duffing map and Modified DNA Hybridization for Transfer over an Unsecured Channel ,International Journal Of Computer Applications, Volume-120 Issue-4 June 2015 ,

Pritee Parwekar- (25)

Evolution of Operating Systems ,DIGITs 2017 ,

Application Trends in Internet of Things ,DIGITS 2017 ,

Comparison between Genetic Algorithm and PSO for Wireless Sensor Networks ,SCI2017 ,

A Study of Clustering Techniques for Wireless Sensor Networks ,SCI 2017 ,

Mobile Sink as Checkpoints for Fault Detection towards Fault Tolerance in Wireless Sensor Networks, ACCEPTED . ,Journal of Global Information Management (JGIM) , Impact Factor: 0.424

Prolonging the Network life in Wireless Sensors Network - using Refined Region of Interest (RROI) ,International Journal of Advanced Intelligence Paradigms. INDERSCIENCE JOURNAL. ,

Innovative Teaching Methodologies for Engineering Education ,MOOCs, Innovation and Technology in Education (MITE), 2016 IEEE 4th International Conference on Year: 2016 ,

Optimal instructional methods for engineering studies ,MOOCs, Innovation and Technology in Education (MITE), 2015 IEEE 3rd International Conference on Year: 2015 Pages: 337 - 341, DOI: 10.1109/MITE.2015.73 ,

Detection of Sinkhole Attack in Wireless Sensor Network ,Proceedings of the Second International Conference on Computer and Communication Technologies, 629-636, Springer India publication,2016 ,

Leveraging Bigdata Towards Enabling Analytics Based Intrusion Detection Systems in Wireless Sensor Networks ,CSI Communications,Vol 39,Issue No. 3,pg 12-16,CSI Communications,2015 ,

Survey on cloud data storage security techniques ,Indian Journal of Research in Pharmacy and Biotechnology, ISSN: 2320-3471 (Online); Indian Journal of Research in Pharmacy and Biotechnolo ,

Efficient Data Aggregation Approaches over Cloud in Wireless Sensor Networks ,ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India CSI,2014 Springer ,

DNA Encryption Based Dual Server Password Authentication ,Advances in Intelligent Systems and Computing, Springer International Publishing ,FICTA 2014, PP:29 ,DOI: 10.1007/978-3-319-12012-6_4 ,

Fuzzy rule based check pointing arrangement for fault tolerance in Mobile Grids ,Contemporary Computing (IC3), 2014 Seventh International Conference on DOI:10.1109/IC3.2014.6897188 Publication Year: 2014,Page(s):289- 293 ,

Public auditing: Cloud data storage ,Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference -DOI:10.1109/CONFLUENCE.2014.6949366Publi ,

Comparative Study of Hierarchical Based Routing Protocols: Wireless Sensor Networks ,ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India CSI,2014 Springer ,

Security Issues and Its Counter Measures in Mobile Ad Hoc Networks ,ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India CSI,2014 Springer ,

An Efficient Fuzzy Localization Approach in Wireless Sensor Nework ,Fuzzy Systems (FUZZ), 2013 IEEE International Conference onDigital Object Identifier: 10.1109/FUZZ-IEEE.2013.6622548Publication Year: 2013 , Page(s): ,

Robot Assisted Emergency Intrusion Detection and Avoidance with a Wireless Sensor Network ,Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 Advances in Intelligent System ,

PushNotify: Push Server Application ,Advance Computing Conference (IACC), 2013 IEEE 3rd International Digital Object Identifier: 10.1109/IAdCC.2013.6514254 Publication Year: 2013 , Page( ,

From Internet of Things towards cloud of things ,Computer and Communication Technology (ICCCT), 2011 2nd International Conference on Digital Object Identifier: 10.1109/ICCCT.2011.6075156 Publication ,

A Rule Based Medical Expert System On Cardiology ,IC-AI International Conference on Artificial Intelligence 2009: Las Vegas, Nevada, USA744-749 ,

Application of Data mining in Network Intrusion Detection ,Technical Paper selected for presentation at the Indian Science Congress 2008 ,

Survey on cloud data storage security techniques ,Indian Journal of Research in Pharmacy & Biotechnology ,

Fuzzy Rule based Check pointing Arrangement for Fault Tolerance in Mobile Grids ,Seventh International Conference on Contemporary Computing, Conducted by Jaypee Institute of Information Technology and University of Florida at JIIT, ,

D.Ashwini- (2)

Secure access to ATM services using Strong Password and Biometric Technology ,International Conference on Research Challenges in Engineering and Technology (ICRCET-16 ,

Scene Recognition with Bag of Words ,International Journal of Engineering Applied Sciences and Technology,Vol.1,Issue-4, ISSN No: 2455-2143,Pages 49-51,January 2016. ,

S.V.S.S.Laxmi- (1)

Secure access to ATM services using Strong Password and Biometric Technology ,International Conference on Research Challenges in Engineering and Technology (ICRCET-16) ,

V.Anusha- (1)

Secure access to ATM services using Strong Password and Biometric Technology ,International Conference on Research Challenges in Engineering and Technology (ICRCET-16) ,