Journal Publications

Publications

Sl.No.

Details of Publication

2016-17

2015-16

1

N. Sivaram Prasad, “Feature selection based on term frequency and term document frequency for text clustering,” International Journal of Applied Engineering Research, vol. 10, pp. 26175-26190, 2015.

2

P. A. V. Krishna Rao and K. Sai Prasanth, “Face recognition using Eigen faces and distance classifiers,” International Journal of Engineering and computer science, vol. 4, no. 4, pp. 11597-11601, 2015.

3

N. Sivaram Prasad, “Effective clustering of text documents in low dimension space using semantic association among terms,” International review on Computers and Software, vol. 10, pp. 467-474, 2015.

2014-15

1

N. Sivaram Prasad, “Subspace clustering of text documents using collection and document frequencies of terms,” International review on Computers and Software, vol. 9, pp. 1692-1699, 2014.

2

K. Kiran Kumar, “A 3d graphical password authentication schema,” International Journal of Engineering Research and Technology, pp. 269-272, 2014.

2013-14

1

B. Krishnaiah, “Artificial intelligence-biologically inspired intelligent robots using artificial muscles,” IFRSA’s International Journal of Computing, vol. 3, no. 2, pp. 99-103, 2013.

2

K. Srinivasa Rao, “Literature review on TQM,” International Journal of Computer Science Information and Engineering Technology, vol. 1, no. 3,
pp. 1-6, 2013.

3

K. Kiran Kumar, “An EISRM frame work - a new approach for embedding Information security into the enterprises,” International Journal of Engineering and Advanced Technology, vol. 2, no. 6, pp. 351-355, 2013.

4

K. Srinivasa Rao, “Analysis of critical success factor on total quality management,” International Journal of Computer Science Information and Engineering Technology, vol. 2, no. 4, pp. 1-7, 2013.

5

K. Kiran Kumar, “Enterprise information security risk management,” International Journal of Advances in Soft Computing Technology, pp. 67-72, 2013.

2012-13

1

D. Siva Phanindra, “Classification based image segmentation approach,” IJCST International Journal of Computer Science and Technology, pp. 658-660, 2012.

2

K. Kiran Kumar, “Color image enhancement using fuzzy set theory,” CIIT International Journal of Digital Image Processing, vol. 3, no. 1, 2012.

3

D. Siva Phanindra, “A fuzzy grid clustering algorithm,” JCST, vol. 2, no. 3,pp. 524-526, 2012.

4

K. Kiran Kumar, “A new way to implement steganography by minimizing distortion,” IJARCET International Journal of Advanced Research in Computer Engineering and Technology, vol. 1, no. 7, pp. 33-36, 2012.

5

M. Praveen Kumar, “Multicast authentication using batch signature,” International Journal of Computational Engineering and Management, vol. 15, no. 1, pp. 68-73, 2012.

6

K. Kiran Kumar, “Accessing data from servers in mobile devices without using a middleware,” South Asian Academic Research Journal ACADEMICIA, vol. 2, no. 10, 2012.

2011-12

1

K. Kiran Kumar, “Web security using various CAPTCHA methods,” CIIT International Journal of Software Engineering and Technology, 2011.

2

K. Srinivasa Rao, “Security constraints in cloud computations,” IJACEE International Journal of Advances in Computer, Electrical and Electronics Engineering, vol. 1, no. 1, pp. 75-80, 2011.

3

P. Srinivasa Rao, K. Srinivasa Rao, and K. Kiran Kumar, “An efficient k-means clustering algorithm for large data,” CIIT International Journal of Data Mining Knowledge Engineering, vol. 3, no. 9, pp. 539-543, 2011.

4

K. Srinivasa Rao, “Raw era in cloud computing,” CIIT International Journal of Networking and Communication Engineering, vol. 3, no. 13, pp. 833-836, 2011.

2010-11

1

P. Srinivasa Rao, “Enhancing k-means clustering with improved initial center,” IJCSIT International Journal of Computer Science and Information Technology, vol. 1, no. 2, 2010.