8.K.V.Ramana, Replica Placement in Unstable Radio Links, International Journal of Computer Networks (IJCN). Volume (2), Issue (6), February 2011, pages, 227-239., Feb 2011
9.O.SrinivasaRao,Comparative Study of Arithmetic and Huffman Data Compression Techniques for Koblitz Curve Cryptography, International Journal of Computer Applications (0975 – 8887),Volume 14 No.5,, January 2011
10.K.Sahadevaiah, Spanning Tree Based Variable Length Dynamic Address Auto-configuration in Mobile Ad Hoc Wireless Networks, Journal of Theoretical and Applied Information Technology (JATIT), ISSN 1817-3195, Vol. 15, No.2, pp. 156-164, May, 2010
1.Ch.Satyanarayana, A bio-chemical study on liver disorders among Jaundice patients from Coastal Andhra Pradesh, India”, Journal of Hainan Medical University, 2010.
1.JVR Murthy, K.V.N.M. Ramesh, J.K.R.Sastry , “Incorporating Implied volatility in Principle, Options using implied Binomial Tree “,Advanced Data Analysis, Business Analytics and Intelligence, January 8-9 , 2011
2.JVR. Murthy, M Rama Krishna, “Reducing High – Dimensionality by Singular value Decomposition for Text Documents Clustering”, International Conference on Machine Intelligence Application to Power, Signal Processing, Communication and Control, at GMRIT, Rajam on 7th to 9th April- 2011
3.L.Sumalatha, Digital Image Authentication Based on Threshold Values, 1st International Conference on Emerging Trends in Signal Processing and VLSI Design., 2010
1.K.Sahadevaiah, Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks, UbiCC,Vol. 5, No. Spec. Issue CCITA-2010, ISSN 1994-4608, May, 2010.
2.K.Sahadevaiah, Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks, ISBN 978-93-80043-80-7, pp.161-169, AarupadaiVeedu Institute of Technology (AVIT), Vinayaka Missions University, Chennai-603 104, 26-27 February, 2010.
3.K.Sahadevaiah, A Novel Approach for Dynamic Address Auto-configuration in Mobile Ad Hoc Wireless Networks, ISBN 978-81-907677-9-8, pp.327-333, Panimalar Engineering College, Chennai-600 123, 6 February, 2010.
4.K.Sahadevaiah, An Empirical Study of a Self-Organized Public Key Management for Mobile Ad-Hoc Networks, ISBN: 978-81-909789-0-3, pp. 401-405, V.L.B. Janakiammal College of Engineering and Technology, Coimbatore-641042, 21-23, January 2010.
2.A.Krishna Mohan, An Efficient Decision Tree For Uncertain Data, (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 3, May-Jun 2012, pp.1401-1405, May-June 2012
3.JVR Murthy, D.J. Nagendra Kumar , “Some Studies of Expectation Maximization Clustering Algorithm to Enhance Performance”, An International Journal of Engineering Sciences, Vol. 2, pages 254-269, ISBN 2229-6913, July 2011
4.JVR. Murthy, M Rama Krishna, “Text document Classification Based on a Least Square Support Vector Machines with Singular Value Decomposition” international journal of Computer Application (IJCA) (0975-8887) Vol. 27 –No. 7, August 2011.
5.JVR Murthy, Ch.Aparna , M.V.P.Chandra Sekhara Rao , B.Raveendra Babu , “Energy computation for brain computer interface using DCT and moving average window for noise smoothening” Advanced Computing, Networking and Security (Adcons-2011), December 16-18, 2011
6.JVR Murthy, Ch.Aparna , M.V.P.Chandra Sekhara Rao , B.Raveendra Babu , “Energy computation for brain computer interface using DCT and moving average window for noise smoothening” Advanced Computing, Networking and Security (Adcons-2011), December 16-18, 2011
7.JVR.Murthy, Ch.Aparna, B.Raveendra Babu “Energy Computation for BCI using DCT and moving average window for noise smoothening”, International Journal of computer science engineering and applications Vol 2, No.1, February 2012.
8.JVR Murthy, D. J. Nagendra Kumar, N.B.Venkateswarlu, “A Critical Study of Efficient Multi-core EM Clustering”, International Journal of Computer Applications, Vol. 43, No. 23, ISBN 0975 – 8887, pages 41-44, April 2012
9.JVR.Murthy,Uttam Mande,Y.Srinivas, “Criminal mapping based on forensic evidences using generalised gaussian mixture model”,TIJCSA,Vol 1,No.4,June 2012
10.K.V.Ramana, Performance of Various Mobile IP Protocols and Security Considerations, International Journal of Computer Networks (IJCN), Volume (3), Issue (4), October 2011, pages 222-238., October 2011
11.K.V.Ramana, Traffic Control System by Incorporating Message Forwarding Approach, International Journal of Computer Networks (IJCN), Volume (3), Issue (4), October 2011, pages 209-221., October 2011
12.K.V.Ramana, Efficient Traducer Tracing System Using Traffic Volume Information, International Journal of Advanced Computer Science and Applications, (IJACSA), Special Issue on Wireless & Mobile Networks, August 2011, pages 40-49, Aug 2011
13.K.V.Ramana, A Prototype System using Lexical Chains for Web Images Retrieval Based on Text Description and Visual Features, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, pages 846-852., May 2012
14.K.V.Ramana, Attack Detection and Classification of Heterogeneous Wireless Sensors Using Co-Clustering, International Journal of Engineering and Technology (IJET), Vol 4 No 1 Feb-Mar 2012, pages 11-14., Feb-Mar 2012
15.Ch.Satyanarayana,Software Reliability Growth Model with Logistic Testing effort Function Considering Log-Logistic Testing effort and Imperfect Debugging”,, Vol.2, No.2, 2011.
16.Ch.Satyanarayana, Genetic Variation of ABO and RH(D) Blood Groups Among the Brahmins of Coastal Andhra Pradesh, India”,, Medical Bulletin of Shanghai Jiaotong University, Vol.23, No.1, 2011.
17.Ch.Satyanarayana, Influence of moieties for the phase stability, spontaneous polarization and dielectric relaxations in an achiral ferroelectric bent liquid crystal, PBUOB”,, Physica-B, 406, ELSEVIER, 2011.
18.Ch.Satyanarayana, Perimeter Clustering Algorithm to Reduce the Number of Iterations”,, International Journal of Computer Applications, Volume 35, No. 8, 2011.
19.Ch.Satyanarayana, Dynamic Resource Allocation in Computing Clouds through Distributed Multiple Criteria Decision Analysis using PROMETHEE Method”, Int. J. Advanced Networking and Applications”,, Volume 3, Issue. 2, 2011.
20.Ch.Satyanarayana, Image Segmentation Based on a Finite Generalized New Symmetric Mixture Model with K- Means,, Intl Journal of Computer Science Issues, Vol.8, issue 3, No.2, 2011.
21.Ch.Satyanarayana, Studies on Image Segmentation Method Based on a New Symmetric Mixture Model with K- Means”,, Global Journal of Computer Science and Technology, Vol.11, 2011.
22.Ch.Satyanarayana, Hotel Management system an E-Commerce application using Resource Description Framework (RDF),, International Journal of Computer Science and Information Technology, Vol. 2(5), 2011.
23.O.SrinivasaRao, Comparative study of Arithmetic and Huffman Compression techniques for enhancing security and effective bandwidth utilization in the context of ECC for Text”, International Journal of Computer Applications (0975 – 8887),Volume 29 No.6,, September 2011
24.O.SrinivasaRao, “Huffman compression technique in the context of ECC for enhancing the security and effective utilization of channel Bandwidth for Images”, International Journal of Science and Advanced Technology (ISSN 2221-8386) Volume 1 No 8, October 2011
25.O.SrinivasaRao, “ Huffman compression technique in the context of ECC for enhancing the security and effective utilization of channel Bandwidth for Large Text”, International Journal of Science and Advanced Technology (ISSN 2221-8386) Special issue on Network Security and Cryptography, November 2011
26.O.SrinivasaRao, ”A Routing-Driven Public-Key Cryptosystem Based Key Management Scheme for a Sensor Network”, International Journal of Computer Trends and Technology-, Sep to Oct Issue 2011 pages 11-14.
27.O.SrinivasaRao, Efficient implementation of Data aggregation in WSNs by Mobile Agent paradigm”, International Journal on Computer Science and Engineering-, Sep to Oct Issue 2011
28.O.SrinivasaRao, “Hybrid Broadcast Routing with Dynamic Security Considerations”, International Journal of Computer Science and Information Technologies,, Vol. 2 (5) , 2011, 2091-2094
29.O.SrinivasaRao,“Effectively Utilizing the Unused Bandwidth”,, Advances in Computational Sciences and Technology, ISSN 0973-6107, Volume 4 Number 4 (2011) pp. 379-387
30.O.SrinivasaRao, Stateless Multi Hop Optimization in Mobile Ad Hoc Networks International Journal of Computer Trends and Technology, International Journal of Computer Trends and Technology, volume2Issue2- 2011,PP.75-78
31.O.SrinivasaRao, Mitigating Congestion Aware routing Protocol in Wireless Sensor Networks, International Journal of Computer Trends and Technology, volume2Issue1- 2011
32.O.SrinivasaRao, Analyzing CSMA and TDMA scheduling in wireless sensor networks- Volume 4 Number 4 (2011) pp, Advances in Computational Sciences and Technology, ISSN 0973-6107, Volume 4 Number 4 (2011) 2011
33.O.SrinivasaRao, Associative Classification techniques for predicting e-banking phishing website, International Journal of Computer Trends and Technology, volume2Issue2- 2011,pp 124-127
34.O.SrinivasaRao, Integration of Bin Rank and Hub Rank by executing Hub Rank on MSGs of Bin Rank generates, International Journal of Computer Trends and Technology, volume2Issue2- 2011,pp 157-160
35.L.Sumalatha, Fuzzy Based Chaotic and Logistic Method for Digital Watermarking Systems, International Journal of Scientific & Engineering Research. Vol. 3, Issue 6. 1- 6., June 2012
36. Hazarath Munaga, Mounica M D R Sree and J V R Murthy “DenTrac: A Density based Trajectory Clustering Tool”, International Journal of Computer Applications, Vol (1), July 2011,pp.17-21.
37. Srinivasa Rao Dammavalam, Seetha Maddala, M.H.M. Krishna Prasad “Quality assessment of pixel-level image fusion using fuzzy logic”, International Journal on Soft Computing ( IJSC ), Vol.3, No.1, February 2012, pp. 11-23
38. Srinivasa Rao D, Seetha M and Krishna Prasad Mhm “Comparison of Fuzzy and Neuro Fuzzy Image Fusion Techniques and its Applications”, International Journal of Computer Applications,Vol. 43, No.20, April
39.Rao R K Ananthavaram, O.Srinivasa Rao and MHM Krishna Prasad” Automatic Defect Detection of Patterned Fabric by using RB Method and Independent Component Analysis”, International Journal of Computer Applications ,Volume 39– No.18, February 2012,pp.52-56.
40.Srinivasa Rao Dammavalam, Seetha Maddala, and Krishna Prasad MHM ” Quality Assessment Of Pixel-Level Image Fusion Using Fuzzy Logic”, International Journal on Soft Computing ( IJSC) Vol.3, No.1, February 2012
41. Indu.y and M H M Krishna Prasad ” Fabrication of Spatial- Temporal Patterns by Refining High Density RFID Datasets with Spatial Granularity”, International Journal of Computational Intelligence Research (IJCIR), pp: 237-246 December 2011
42.S. James Robert and M H M Krishna Prasad “A Composite Clustering Algorithm” International Journal of Computational Intelligence Research (IJCIR), pp: 255-262 December 2011
43.K.Sahadevaiah, Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks, ISSN: 1943-3581, Vol. 3, No.4, pp. 122-140, 31 December, 2011.
1.K. Naga Krishnaja and M H M Krishna Prasad “Quantitative Measurement of Scores by Ranks”, International Conference on Advancements in Information Technology 2011 – ICAIT 2011 (IPCSIT), 17th – 18th Dec 2011, Chennai, India,Pp:99-103
2. Kartheek Srungaram and M H M Krishna Prasad “Enhanced Cluster Based Routing Protocol for MANETS”, 2nd International Conference on CCSIT, Jan 2012, pp: 346 – 352
3.Kartheek Srungaram and M H M Krishna Prasad “Enhanced Cluster Based Routing Protocol For Manets”, Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012 pp 346-352