M.C.A Reserach & Development

S.No Name of the faculty Title of the paper journal paper vol&issue number ISSN NO page number(s) year
1 Y . SHANKAR RAO Woral : A Witness Oriented Secure Location Attribution Framework for Cellular Phone Devices IJSRCSEIT Volume 2 Issue 4 2456-3307 213  -  220 2017
2 Y . SHANKAR RAO Traffic De-Correlation Techniques for Countering A World Eavesdropper in Wireless Sensor Networks IJSRCSEIT Volume 2 Issue 4 2456-3307 241  -  249 2017
3 Y . GOPI Circuit Cipher Text-Policy Attribute-Based Hybrid Cryptography With Demonstrable Delegation In Cloud Computing IJSRCSEIT Volume 2 Issue 4 2456-3307 197  -  201 2017
4 Y . GOPI Data Activity in Homomorphically Encryptedcal Pictures for Corroboratory  their Reliableness in Each EnCrypted and Special Domains IJSRCSEIT Volume 2 Issue 4 2456-3307 294  -  299 2017
5 Y . GOPI Contributory Broadcast Coding with Efficient Coding and Short Ciphertext IJSRCSEIT Volume 2 Issue 4 2456-3307 229  -  234 2017
6 Y . GOPI Analysis  of pseudony mization approaches for  providing security in electronic healih record system IJTRE Volume 4  ISSUE 10 2347-4718 2163 - 2165 2017
7 Y. GOPI RESEARCH ON IMPROVEMENTS OF EDUCATIONAL SYSTEM IN EDUCATIONAL DATA MINING IJTRE Volume 4  ISSUE 10 2347 - 4718 2160 - 2162 2017
8 Y. GOPI PERMITTING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES IJSRCSEIT Volume   4  ISSUE   2 2456-3307 451-453 2017
9 G . BHARATHI Automatic Irrigation System for Smart City Using PLC AND SCADA IJSRCSEIT Volume 2 Issue 4 2456-3307 309  -  314 2017
10 G . BHARATHI SPLAYNET : Towards Nearby Self-Adjusting Wireless Networks IJSRCSEIT Volume 2 Issue 4 2456-3307 221  -  228 2017
11 G . BHARATHI IDENTIFYING NODE FAILURES IN CELLULAR WIRELESS NETWORK
SYSTEMS: A PROBABILISTIC APPROACH
IJSRCSEIT Volume 2 Issue 4 2456-3307 462-465 2017
12 G . BHARATHI SUPERIOR-GRAINED DUAL-FACTOR ACCESS CONTROL DESIGNED FOR WEB-BASED CLOUD COMPUTING SERVICES IJSRCSEIT Volume 1 Issue 1 2456-3307 438-440 2017
13 G . BHARATHI Identity-based cryptography with Outsourced Revocation in Cloud Computing IJSRCSEIT Volume 2 Issue 4 2456-3307 268  --  273 2017
14 B . ANKAMMARAO Cross-Domain Opinion Classification Exploitation Enhanced Sentiment Sensitive Thesaurus Aware Embeddings IJSRCSEIT Volume 2 Issue 4 2456-3307 315  -  318 2017
15 B . ANKAMMARAO REASONABLE ESTIMATED K NEAREST NEIGHBOUR QUERIES WITH LOCALITY AND QUERY PRIVACY IJSRCSEIT Volume 2 Issue 4 2456-3307 424-433 2017
16 B . ANKAMMARAO SECURITY ANALYZE OUTSOURCED ASSOCIATION RULE MINING ON VERTICALLY PARTITIONED DATABASES IJSRCSEIT Volume 2   Issue 4 2456-3307 441-446 2017
17 B . ANKAMMARAO CLUSTERING WITH MULTI-POINT OF VIEW BASED COMPARISON EVALUATE IJSRCSEIT Volume 2  Issue 4 2456-3307 434-437 2017
18 B . ANKAMMARAO Secure Improvement Computation Outsourcing In Cloud Computing : A Case Study of Linear Programming IJSRCSEIT Volume 2 Issue 4 2456-3307 235  -  240 2017
19 B . ANKAMMARAO Security and Privacy Issues in Cloud Computing IJSRCSEIT Volume 2 Issue 4 2456-3307 274  -  279 2017
20 S . SANKEERTHI Dynamic and Public Auditing with truthful Arbitration for Cloud Knowledge IJSRCSEIT Volume 2 Issue 4 2456-3307 250  -  256 2017
21 S . SANKEERTHI Hidden Ciphertext Policy Attribute-Based encoding below customary Assumptions IJSRCSEIT Volume 2 Issue 4 2456-3307 257  -  262 2017
22 S . SANKEERTHI Towards Achieving Knowledge Security with the Cloud Computing Implementation Framework IJSRCSEIT Volume 2 Issue 4 2456-3307 202  -  212 2017
23 S . SANKEERTHI A PROTECTED AND ACTIVE MULTI-KEYWORD RANKED EXPLORE SCHEME OVER ENCRYPTED CLOUD DATA SYSTEMS IJSRCSEIT Volume 1 Issue 1 2456-3307   2017
24 S . SANKEERTHI Dynamic Routing For knowledge Integrity and Delay differentiate Services in WSN IJSRCSEIT Volume 2 Issue 4 2456-3307 263  --  267 2017
25 G.bharathi "Generating Efficiency and robustness dynamic query forms for advanced database  quries” URIT volume 3 issues 11 2001-5569 25-29 2015
26 Y . SHANKAR RAO Generating Efficiency and robustness dynamic query forms for advanced database  quries”     volume 3 issue 11 IJRIT Volume 3  ISSUE 11  2001-5569 25-29 2015
27 Y . SHANKAR RAO An approach towards  pricing under control in acces network. IJRRECS Volume 2  ISSUE 3 2321-5461 2134-2139 2014
28 Y . SHANKAR RAO Efficient service of video sharing and streaming over the could IJATIR Volume 6  ISSUE 7 2348-2370 669-672 2014
29 Y . SHANKAR RAO Mona an infulence: vendor locking in meta cloud IJCST Volume 5  ISSUE 4 0976-8491   2014
30 B . ANKAMMARAO Semantic Keywords Extraction Mechanism in Mobile Agent for Cloud Computing in Internet Environment IJSETR journal Volume 3 2319-8885 6246-6250 2014
31 M . NIRIKSHAN  KUMAR Analysis of authentication schemas for filtering injected false data in WSN IJRCSE VLOUME 2 ISSUE 2 IJRCSEV2/2-202 :10-23 2013
32 Y . SHANKAR RAO Enhancing security  by broading nymble system in anonymizing network. JGRCS Volume 3  ISSUE 6 2229-371X 121-125 2013
33 Y . SHANKAR RAO Gusture based communication A Gesture Human OID IRNET       2011