UG. B.Tech (CSE)::  2018-19   

S.NoName of StudentRegistered NumberTitle of the Project WorkURL
1ACHANTA VEERA NAGA DEVI15H41A0501Energy consumption prediction B4
2ALLU PRASANNA15H41A0502Google stock price predictionB5
3AMBATI PURNA CHANDRA NAGA SAI15H41A0503Classic bridge gameB31
4ANDEY NAGA LAKSHMI ANUSHA15H41A0504Google stock price predictionB5
5APPANA NAGA VINAYAKA RUKMINI MANASA15H41A0505Google stock price predictionB5
6ARIGELA SHANTHI DEVI15H41A0506House price predictionB3
7ASETTY PRASANNA BHARATHI15H41A0507Car evaluation predictionB1
8BALABHADRUNI SUBHADRA SOWMYA15H41A0508Car evaluation predictionB1
9BANDARU VENKATA LALITHA SUSHMA JANAKI15H41A0509Car evaluation predictionB1
10BASAVA NAGA DURGA ANUSHA15H41A0510Flight delay predictionB12
11BOLLA SRI SAI SARANYA15H41A0511Flight delay predictionB12
12BONAM VENKATA RAMYA SRI15H41A0512Multi – Cloud Confined Catalog for Mathematical allied Diversity QueryB11
13CHELLUBOINA GEETA MOUNIKA15H41A0513Credit card fraud detectionB2
14CHITTIKALA MOHAN KRISHNA15H41A0514Flight delay predictionB12
15DASARI KRISHNA PRIYA15H41A0516Combat System with Melee Combos and Weapon TacticsB19
16DHARMAPURI VANAJA15H41A0518Car RacerB23
17DONTAMSETTI DURGA SIRISHA15H41A0520Survival in the Forest B24
18GANTI SAI SIVA RAMAKRISHNA15H41A0521Car RacerB23
19GOKAVARAPU PRIYANKA15H41A0522Endless RunnerB20
20HIMA VANITHA DENDUKURI15H41A0523RunnerB17
21JANU JNANA DURGA SATYA SRI15H41A0524Emerge from Death LandB18
22KAILA VENKATA SAI MANASA15H41A0525Multi – Cloud Confined Catalog for Mathematical allied Diversity QueryB11
23KANDIKATTI TEJASWI15H41A0526Endless RunnerB20
24KESAVARAPU SATYA SURYA DURGA SRILAKSHMI15H41A0527Credit card fraud detectionB2
25KONA ANJANEYA SAI PADMA15H41A0528House price predictionB3
26KOTA MARIYAMMA15H41A0529Google stock price predictionB5
27KUDUPUDI SWATHI TEJAS15H41A0530Credit card fraud detectionB2
28KUPPALA SATYA VIJAYA LAKSHMI15H41A0531House price predictionB3
29MATTA SRIRAMYA15H41A0532Multi – Cloud Confined Catalog for Mathematical allied Diversity QueryB11
30NAGALLA GANGA BHAVANI15H41A0533Flight delay predictionB12
31NAKKA SIREESHA15H41A0534Energy consumption prediction B4
32NANDURI TULASI VARALAKSHMI15H41A0535Car evaluation predictionB1
33NELAPUDI SRAVANI15H41A0536RunnerB17
34PAMIREDDY SAIKEERTHI15H41A0537Emerge from Death LandB18
35PANDEY NANDAN15H41A0538Emerge from Death LandB18
36PATHI JAYA SREE DURGA ADI LAKSHMI15H41A0539Multi – Cloud Confined Catalog for Mathematical allied Diversity QueryB11
37PEDDINTI PAVANKUMAR15H41A0540Survival in the Forest B24
38PENUMATSA SIREESHA15H41A0541Energy consumption prediction B4
39PIPPARA PRATYUSHA15H41A0542House price predictionB3
40POLAMURI PURNA15H41A0543Predict future salesB15
41POLISETTY ADITYA PHANEENDRA VENKATA PAVAN15H41A0544Survival in the Forest B24
42POPPOPPULA APARNA15H41A0545Graduate admission prediction B13
43RANKIREDDY RUPAVATHI15H41A0546Classic bridge gameB31
44RAVANAM SRI DEVI BHAVANI15H41A0547Combat System with Melee Combos and Weapon TacticsB19
45SAMSANI SRIVALLI15H41A0548Energy consumption prediction B4
46SHAIK ARAFA NAWAZ15H41A0549RunnerB17
47SUNKARA DHARANI KRISHNA15H41A0550Classic bridge gameB31
48SUNKARA SAI VEERAKUMAR15H41A0551Endless RunnerB20
49SUNKARANAM SAI SRI HARI15H41A0552Combat System with Melee Combos and Weapon TacticsB19
50TADI TEJO RAMANI15H41A0553Car RacerB23
51TIRUMALA KALYANI15H41A0554Combat System with Melee Combos and Weapon TacticsB19
52TOLETI SATYASRI15H41A0555Credit card fraud detectionB2
53TUNDURI DEVI SRAVANI15H41A0556Survival in the Forest B24
54VETHSA GEETHA SAI LAKSHMI PRAVANYA15H41A0557Graduate admission prediction B13
55VETUKURI SRI VALLI SOWMYA15H41A0558Emerge from Death LandB18
56VITTANALA SRIRAM15H41A0559RunnerB17
57KARRI SIVA RAJU16H45A0501Car RacerB23
58PEDAMALLU NAGA VENKATA SUINDIAN16H45A0502Graduate admission prediction B13
59PERABATTULA DURGA NAGA VENKATARAYUDU16H45A0503Endless RunnerB20
60ACHANTA SASI HEMA SRI15H41A0560Annual Rainfall predictionB7
61ACHANTA SESHU15H41A0561Expression monitoringB14
62AKETI BHAGYA LAKSHMI15H41A0563Classic FrogB29
63AKUMARTHI RAVITEJA15H41A0564Suicide rate predictionB10
64APPARI HARITHA15H41A0565Football world cup winner predictionB9
65BOKKA GOVINDA VARMA15H41A0566Chaos engineB25
66BOLLOJU DEEPTHI BHAVANA15H41A0567Grading SystemB22
67CHEBOLU VINAYAKA SAI VIKAS15H41A0568Cannon BallB27
68CH DIVYA HARIKA15H41A0569Grocery cart applicationB6
69CHIKKAM KANAKA DURGA15H41A0570Grading SystemB22
70GEDDAM RAJA VARSHITHA15H41A0571Escape from the ballB26
71GOLLA RATNA MALLIKA15H41A0572Chaos engineB25
72GUBBALA CHANDINI15H41A0573Ridge RacerB21
73GUDIMETLA RENUKA MANI DEEPIKA15H41A0574Plane crash survival tactics in forestB30
74JAMPANA MOUNIKA15H41A0576Escape from the ballB26
75KADALI LAKSHMI DEVI15H41A0577Predict future salesB15
76KAKILETI NAGA VENKATA SURYA TULASI15H41A0578Graduate admission prediction B13
77KANDIKATLA PAUL BENSON15H41A0579Grocery cart applicationB6
78KARRI SAI SUBHASHINI15H41A0580Ridge RacerB21
79KATAKAM HEMA15H41A0581Grocery cart applicationB6
80KATTA SAKINA15H41A0582Chaos engineB25
81KESAVADASU LAKSHMI SOWJANYA15H41A0583Annual Rainfall predictionB7
82KOLLABATHULA RAMYA SRI15H41A0584Predict future salesB15
83KOLLU SURYA SARADHI15H41A0585Bridge JumperB28
84KOMMAJOSYULA N V SATYA DURGA KAMALA SRIDEVI15H41A0586Suicide rate predictionB10
85KORLAPATI SATYA SAI VENKATA DURGA LAKSHMI15H41A0587Grocery cart applicationB6
86KORUMILLI BALA NAGA KRISHNA CHAITANYA15H41A0588Security evaluation of patternsB8
87KUDUPUDI SAI SIREESHA15H41A0589Classic FrogB29
88KUMMARAGUNTLA PADMA SATYA RATNA ALEKHYA15H41A0590Grading SystemB22
89KUMPATLA VIJAYA BRAMARAMBIKA15H41A0591Bridge JumperB28
90KURMA NAGA MOUNIKA15H41A0592Plane crash survival tactics in forestB30
91KUSUMA MANEESHA15H41A0593Ridge RacerB21
92LAKKIMSETTI JAYA LAKSHMI15H41A0594Plane crash survival tactics in forestB30
93MANCHIKANTI KUSUMA SRI LAKSHMI MOUNIKA15H41A0595Cannon BallB27
94MEDA BABU SAI RAM15H41A0597Expression monitoringB14
95MAHAMMAD FARIDA15H41A0598Annual Rainfall predictionB7
96MUDDALA SANDHYA15H41A0599Bridge JumperB28
97MUDDANA MOHANA PALAKONDA15H41A05A0Security evaluation of patternsB8
98NAKKA SANDHYA RANI15H41A05A1Chaos engineB25
99NEELAKANTRAVU MANJU RAJYA LAKSHMI15H41A05A2Annual Rainfall predictionB7
100NIMMAGADDA RAJI15H41A05A3Football world cup winner predictionB9
101NIMMAKAYALA NAGA SOWJANYA SUDHAKSHINI15H41A05A4Classic FrogB29
102NAGA VENKATA LAKSHMI SWETHA15H41A05A5Security evaluation of patternsB8
103NUNNA JHANSI LAKSHMI DURGA15H41A05A6Suicide rate predictionB10
104PANANGIPALLI VENKATA RATNA SUDHA15H41A05A7Cannon BallB27
105PUNNAM DEEPAK NARESH15H41A05A8Grading SystemB22
106SATHI SRI RAJA MANIKANTA REDDY15H41A05A9Football world cup winner predictionB9
107SRIGHAKOLAPU NAGA VENKATA LAKSHMI NAVEENA15H41A05B0Security evaluation of patternsB8
108TADI SUMA DEEPIKA15H41A05B1Classic FrogB29
109THOTE SHALINI LAKSHMI15H41A05B2Football world cup winner predictionB9
110VANARASI SATYA KEDARI15H41A05B3Ridge RacerB21
111VANGALA PRASANNA15H41A05B4Cannon BallB27
112VASAMSETTI ANUSHA15H41A05B5Classic bridge gameB31
113VONTEDDU VENKATA SATYA LAKSHMI BHAVANI15H41A05B6Suicide rate predictionB10
114YEDIDA SANDHYA NAGA DEVI15H41A05B8Expression monitoringB14
115YERUBANDI SAI APOORVA15H41A05B9Plane crash survival tactics in forestB30
116DULAM KRANTHI REKHA16H45A0504Escape from the ballB26
117KATTA BHARGAVESH16H45A0506Seedling Species Using Image AnalyticsB16
1R.N.D.S.S.LAKSHMI17H41D5802The secured data sharing for multi authority Access in cloud storageMtech Project

S.NoRoll NoName of the studentProject TitleBatch
114H41A0501ADABALA DEEPTHIEnergy-efficient Query Processing in Web Search EnginesB10
214H41A0502ADABALA UMA RAMA LINGESWARASWAMYBig Scholarly Data A SurveyB15
314H41A0504ARAVA SUNANDA SRIPrivacy Policy Inference of User Uploaded Images on Content Sharing SitesB4
414H41A0505BADDE USHABooster in High Dimensional Data ClassificationB14
514H41A0506BADRI SRISANDHYACleaning Framework for Big DataB5
614H41A0507BASAVA RADHA VASUNDHARAContent-aware Partial Compression for Textual Big Data Analysis in HadoopB7
714H41A0508BOKKA GEETHIKACyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-EncoderB3
814H41A0509BOKKA NAGA SURYA KUMARIContent-aware Partial Compression for Textual Big Data Analysis in HadoopB7
914H41A0510BONAM SUMAl-Injection: Toward Effective Collaborative Filtering Using Uninteresting ItemsB12
1014H41A0511CHALUMURI TRIVENIBucket Based Data Reduplication Technique for Big Data Storage SystemB9
1114H41A0512CHITNEEDI SINDHUCyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-EncoderB3
1214H41A0513CHOLLANGI PUSHPALATHASearch Rank Fraud and Malware Detection in Google PlayB6
1314H41A0514GANGA BHAVANI CHIRUKURIA Data Reusing Strategy Based On HiveB13
1414H41A0515GANGUMALLA LAKSHMI PRASANNAWeakly-supervised deep embedding for product review sentiment analysisB11
1514H41A0516GANISETTI MOUNIKA SRI SURYA PRABHACleaning Framework for Big DataB5
1614H41A0517GOKAVARAPU NAGA SURYA GOWRI SUSHMABooster in High Dimensional Data ClassificationB14
1714H41A0518GOKAVARAPU SASI BHAVANI DEVIBooster in High Dimensional Data ClassificationB14
1814H41A0519GORTHI N S S D S DEVI PRIYANKAWeakly-supervised deep embedding for product review sentiment analysisB11
1914H41A0520GOWRISETTI KAVYA ANU SATYA SRICollaborative Filtering-Based Recommendation of Online Social VotingB2
2014H41A0521GUDIMETLA VENKATA MANI N R M SIVA SOWJANYAH2-Hadoop Improving Hadoop Performance using the EcosystemB16
2114H41A0522ILLA ANUSHAContent-aware Partial Compression for Textual Big Data Analysis in HadoopB7
2214H41A0523IRUKU SAI SUSMITHASocialQ&A An Online Social Network Based Question and Answer SystemB8
2314H41A0524KADALI SRI KANAKA MAHALAKSHMISearch Rank Fraud and Malware Detection in Google PlayB6
2414H41A0525KAMUJU GEETANJALIBucket Based Data Reduplication Technique for Big Data Storage SystemB9
2514H41A0526KANKIPATI VENKATA KOTESHA Data Reusing Strategy Based On HiveB13
2614H41A0527KAPPAGANTULA LAKSHMI LAVANYAEnergy-efficient Query Processing in Web Search EnginesB10
2714H41A0528KOLA JAYA LAKSHMI SUREKHASocialQ&A An Online Social Network Based Question and Answer SystemB8
2814H41A0529KONDAPALLI SAI TEJAl-Injection: Toward Effective Collaborative Filtering Using Uninteresting ItemsB12
2914H41A0530KOTTURI SAI TEJASWINISearch Rank Fraud and Malware Detection in Google PlayB6
3014H41A0531MANGENA BABY SAMHITHAA Data Reusing Strategy Based On HiveB13
3114H41A0532MEDIDA PADMINIEnergy-efficient Query Processing in Web Search EnginesB10
3214H41A0534MOHAMMAD RAHI MUNNISASearch Rank Fraud and Malware Detection in Google PlayB6
3314H41A0535MOHAMMAD ZAHRA YASMINl-Injection: Toward Effective Collaborative Filtering Using Uninteresting ItemsB12
3414H41A0536MUDDANA NAVEENADistributed Top-k Keyword Search over Very Large Databases with MapReduceB1
3514H41A0537MUNUKOTI SRI RAMYACollaborative Filtering-Based Recommendation of Online Social VotingB2
3614H41A0540NAKKA NAVYASRIl-Injection: Toward Effective Collaborative Filtering Using Uninteresting ItemsB12
3714H41A0541NALLA LALITHABooster in High Dimensional Data ClassificationB14
3814H41A0542OLETI KUMARIWeakly-supervised deep embedding for product review sentiment analysisB11
3914H41A0543PAIDIPARTHI HEMANTH NAGA SAI GANESHSocialQ&A An Online Social Network Based Question and Answer SystemB8
4014H41A0544PATHI LAVANYACyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-EncoderB3
4114H41A0545PERABATHULA GIRIJATHAYARUCollaborative Filtering-Based Recommendation of Online Social VotingB33
4214H41A0546POTTUPOTHU S L SIREESHABucket Based Data Reduplication Technique for Big Data Storage SystemB9
4314H41A0548RAJAMAHENDRAVARAPU VENKATA DEVI SOWJANYAPrivacy Policy Inference of User Uploaded Images on Content Sharing SitesB4
4414H41A0549RALLAPALLI SURYA SOMESWARA MANI KOUSALYADistributed Top-k Keyword Search over Very Large Databases with MapReduceB1
4514H41A0550SHAIK SHAHERA BANUBucket Based Data Reduplication Technique for Big Data Storage SystemB9
4614H41A0551TALATAM RASHMITHAContent-aware Partial Compression for Textual Big Data Analysis in HadoopB7
4714H41A0552TALLA PAUL MANOHARH2-Hadoop Improving Hadoop Performance using the EcosystemB16
4814H41A0553TSAVATAPALLI SAI LAKSHMIPrivacy Policy Inference of User Uploaded Images on Content Sharing SitesB4
4914H41A0554TSAVATAPALLI SAI SITALAKSHMICleaning Framework for Big DataB5
5014H41A0555VARDHINEEDI DEVISocialQ&A An Online Social Network Based Question and Answer SystemB8
5114H41A0556VUDDISA VIKASCyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-EncoderB3
5214H41A0557VUNDAVALLI DIVYA SRIDistributed Top-k Keyword Search over Very Large Databases with MapReduceB1
5314H41A0559YEDIDA BHARATHI DEVICollaborative Filtering-Based Recommendation of Online Social VotingB2
5414H41A0560YEDIDA DURGANGA SATYAMANIDistributed Top-k Keyword Search over Very Large Databases with MapReduceB1
5514H41A0561YERUBANDI SRI SUDHA RANIWeakly-supervised deep embedding for product review sentiment analysisB11
5614H41A0562ADABALA ANURADHA DEVISociRank Identifying and Ranking Prevalent News Topics Using Social Media FactorsB28
5714H41A0563ADABALA VIDYA SRAVANTHIUnderstand Short Texts by Harvesting and Analyzing Semantic KnowledgeB19
5814H41A0564ADAPA SRI RAMA RAGHAVA SANKEERTHANACrime analysis using RB17
5914H41A0567ANYAM HEMA LALITHAA BigData Approach for Classification and Prediction of Student Result Using MapReduceB29
6014H41A0568BEJAVADA VIJAYA DURGAConnecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging InformationB24
6114H41A0569BHAVARAJU SAI SRI SIVANICrowd sourcing for Top-K Query Processing over Uncertain DataB22
6214H41A0571BUDITHI SUPRIYACrime analysis using RB17
6314H41A0572CHINTALAPUDI SATYA NAGA SAIDisease Prediction by Machine Learning over Big Data from Healthcare CommunitiesB20
6414H41A0573CHODAPANEEDI RAJESWARIDetecting Stress Based on Social Interactions in Social NetworksB30
6514H41A0574DARA AMITHAPractical Privacy- Preserving MapReduce Based K-means Clustering over Large scale DatasetB33
6614H41A0575DEVADA SANDEEP KUMARResolving Multi-party Privacy Conflicts in SocialB18
6714H41A0576DOONABOYINA GEETHAA BigData Approach for Classification and Prediction of Student Result Using MapReduceB29
6814H41A0577EETHAKOTA SIREESHASCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING BY USING ATTRIBUTE BASED ENCRYPTIONB31
6914H41A0579GEDDADA SIVESWARA RAOSCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING BY USING ATTRIBUTE BASED ENCRYPTIONB31
7014H41A0580GOKAVARAPU NAGA VENKATA SAI SRIJAEfficient Cache-Supported Path Planning on RoadsB25
7114H41A0581GUDIMETLA SUPRIYAAnalysis of illegal activities which has been raised over the state in USAB27
7214H41A0582KANCHARLA SESHA SAI SREE RAMA SWEATHAUnderstand Short Texts by Harvesting and Analyzing Semantic KnowledgeB19
7314H41A0583KANDREGULA OMSAIA BigData Approach for Classification and Prediction of Student Result Using MapReduceB29
7414H41A0584KANKIPATI V NAGA SURYA CHANTI RAMA RAJUResolving Multi-party Privacy Conflicts in SocialB18
7514H41A0586KATHINOKKULA AKSHAY NAGESWARA RAOANALYSIS OF SHORTEST PATH ROUTING FOR LARGE MULTIHOP WIRELESS NETWORKB30
7614H41A0587KOLA LAKSHMI PRASANNAContinuous Top – K Monitoring Document StreamB23
7714H41A0588KORLAPATI LAKSHMI THARUNICrowd sourcing for Top-K Query Processing over Uncertain DataB22
7814H41A0589KORLAPATI MOHANA VIDYAConnecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging InformationB24
7914H41A0590MADDULA RAJITHASCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING BY USING ATTRIBUTE BASED ENCRYPTIONB31
8014H41A0591MAMIDISETTI SATYA SRIQD: A Query-Driven Approach to Entity ResolutionB26
8114H41A0592MANDAPALLI SATYANANDAMSociRank Identifying and Ranking Prevalent News Topics Using Social Media FactorsB28
8314H41A0594MATTA PRASANTHIResolving Multi-party Privacy Conflicts in SocialB18
8414H41A0595MEDIDI JAYASRI VENKATA BHARGAVI SUMADetecting Stress Based on Social Interactions in Social NetworksB21
8514H41A0596MEDISETTI NAGA VENKATA SAI DURGAMining Competitors from Large Unstructured DatasetsB32
8614H41A0597MUDDANA KRISHNA PHANI KUMARMining Competitors from Large Unstructured DatasetsB32
8714H41A0598NEDUNURI HARITHAContinuous Top – K Monitoring Document StreamB23
8814H41A0599NEREDIMELLI RAGINIEfficient Cache-Supported Path Planning on RoadsB25
8914H41A05A0NIMMAKAYALA V V NAGA RATNA GIRIJA SIVA SRIDetecting Stress Based on Social Interactions in Social NetworksB21
9014H41A05A1PABOLU SOWNDARYA JYOTHIMining Competitors from Large Unstructured DatasetsB32
9114H41A05A2PACHIMALA SOWJANYAEfficient Cache-Supported Path Planning on RoadsB25
9214H41A05A3PACHIMALLA BHARATHIDisease Prediction by Machine Learning over Big Data from Healthcare CommunitiesB20
9314H41A05A4PAPPULA TRIPURA SATYAContinuous Top – K Monitoring Document StreamB23
9414H41A05A5PEDAMALLU PADMA AMRUTHAQD: A Query-Driven Approach to Entity ResolutionB26
9514H41A05A6PILLI BHARATHIEfficient Cache-Supported Path Planning on RoadsB25
9614H41A05A7PITCHIKA SRAVANIUnderstand Short Texts by Harvesting and Analyzing Semantic KnowledgeB19
9714H41A05A9RAVI BHIMASHANKARAMANALYSIS OF SHORTEST PATH ROUTING FOR LARGE MULTIHOP WIRELESS NETWORKB30
9814H41A05B0SANABOYINA BALAMADHAVIDisease Prediction by Machine Learning over Big Data from Healthcare CommunitiesB20
9914H41A05B1SHEIK MAHABOOB MUNNISHACrime analysis using RB17
10014H41A05B2SRUNGARAPU KESAVA NAGA SATYA SAI SUMASociRank Identifying and Ranking Prevalent News Topics Using Social Media FactorsB28
10114H41A05B3SUNDARANEEDI RAMA SAI SATYA VARENDRA NAIDUMining Competitors from Large Unstructured DatasetsB32
10214H41A05B4TALABHATHULA JYOTHI MANIMALAAnalysis of illegal activities which has been raised over the state in USAB27
10314H41A05B5TATAVARTHI SATYA SANDHYADisease Prediction by Machine Learning over Big Data from Healthcare CommunitiesB20
10414H41A05B6VATTURI SRI VENKATA SIVA JYOTHICrowd sourcing for Top-K Query Processing over Uncertain DataB22
10514H41A05B7YALLAMELLI MADHAVA KRISHNA VAMSYConnecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging InformationB24
10614H41A05B8YARRAMSETTI ADI SAI BABUAnalysis of illegal activities which has been raised over the state in USAB27
10714H41A05B9YEDLA ABHISHEKCrime analysis using RB17
10815H45A0501ANKANI SAI KIRANPrivacy Policy Inference of User Uploaded Images on Content Sharing SitesB4
10915H45A0502ANNAMDEVULA L G KRISHNABig Scholarly Data A SurveyB15
11015H45A0503BORUSU RAJESHEnergy-efficient Query Processing in Web Search EnginesB10
11115H45A0504CHAVATAPALLI SAI RAMAMCleaning Framework for Big DataB5
11215H45A0505GOLLAPALLI KIRAN KUMARBig Scholarly Data A SurveyB15
11315H45A0506GUTHULA MALLESWARA RAOA Data Reusing Strategy Based On HiveB13
11415H45A0507MATTAPARTHI S N V PRASADBig Scholarly Data A SurveyB15
11615H45A0509GOWRISETTI ANU SRAVANIResolving Multi-party Privacy Conflicts in SocialB18
11815H45A0511JANGA BHASKARA SIVA SUBRAHMANYAMANALYSIS OF SHORTEST PATH ROUTING FOR LARGE MULTIHOP WIRELESS NETWORKB30
11915H45A0512KOMBATHULA CHANTI BABUA BigData Approach for Classification and Prediction of Student Result Using MapReduceB29
12015H45A0513KUSUM RAJESWARI PRASADSociRank Identifying and Ranking Prevalent News Topics Using Social Media FactorsB28
12115H45A0514KUSUMA RAMYAPractical Privacy- Preserving MapReduce Based K-means Clustering over Large scale DatasetB33
12315H45A0516MATTAPARTHI G S KUMARContinuous Top – K Monitoring Document StreamB23
12415H45A0517MULAPARTHI HARISHAQD: A Query-Driven Approach to Entity ResolutionB26
12515H45A0518NAKKA RAJESHQD: A Query-Driven Approach to Entity ResolutionB26
12615H45A0519NAMANA RAMESHSCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING BY USING ATTRIBUTE BASED ENCRYPTIONB31
12715H45A0520PALIVELA K KUMARConnecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging InformationB33
12815H45A0521PEDDIREDDY SVV SIVAPRASADUnderstand Short Texts by Harvesting and Analyzing Semantic KnowledgeB19
12915H45A0522SANKARASETTI LAKSHMI NEELIMADetecting Stress Based on Social Interactions in Social NetworksB21
S noRegd NoStudent NameProject TitleBatch
112H41A0514DARLANKA LALITHASecluded authoritative deduplication in hybrid cloud draftB6
212H41A0519MUNGARA SIMHACHALAMAssurance on data storage security in cloud computingB3
313221A0586THOTA SANDHYAcollision attacks techniques for wireless sensor networksB30
413221A0587UNGARALA NAGA LAKSHMI Secluded authoritative deduplication in hybrid cloud draftB21
513H41A0501ADABALA LAKSHMI DURGA PRASANNAtransparent and continuous user ID verification for safe internet servicesB29
613H41A0502ARAVA MOUNICASmart certification systemB9
713H41A0503BADUGU TEJA SRIDeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User EnvironmentsB11
813H41A0504BANDARU PRIYA DARSHINISecluded authoritative deduplication in hybrid cloud draftB6
913H41A0505BANDARU SIVA SAI DURGA SRIHITHProgressive duplicate detectionB1
1013H41A0506BANDIGUPTAPU JNANA PRASANNA RAJESWARISecluded authoritative deduplication in hybrid cloud draftB6
1113H41A0507BAVANA VEERA VENKATA NAGA MALLESWARIMessage filterB13
1213H41A0508BHADRI UMA SATYA LAKSHMI ANNAPURNAcausative broadcast encryption for short cipher textsB26
1313H41A0509BOKKA HARISHFine-Grained two factor access control system for web-based cloud computing servicesB5
1413H41A0510BONAM ANUSHAimage retrieval system for online multimodal metric learningB28
1513H41A0511BUNGA REVATHIFine-Grained two factor access control system for web-based cloud computing servicesB5
1613H41A0512CHALLAGALA SANGEETHAProgressive duplicate detectionB2
1713H41A0513CHITNEEDI PRAVEEN KUMARProtected internet services through continuous user identity verificationB7
1813H41A0514DASARI SRIDEVINovel resource renting scheme in cloudB4
1913H41A0515DOMMETI MANISHAMessage filterB13
2013H41A0516DOMMETI SANDEEPTHIProtected internet services through continuous user identity verificationB7
2113H41A0517GARAPATI HIMA NAGA CHANDRIKADynamic and Public Auditing with Fair Arbitration for Cloud DataB10
2213H41A0518GOLAKOTI SATYA SAI RUPADeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User EnvironmentsB11
2313H41A0519GOLLAKOTI RATNA KALYANIDeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User EnvironmentsB11
2413H41A0520GUNISETTY MANI DEEPIKAweb based cloud services using two factor access controlB27
2513H41A0521JAKKAMPUDI SRI SIRI CHANDANADynamic and Public Auditing with Fair Arbitration for Cloud DataB10
2613H41A0522JOGI ANITHASmart certification systemB9
2713H41A0523KANCHUSTHAMBHAM SANDEEPNovel resource renting scheme in cloudB4
2813H41A0524KANDREGULA DEVIKA SURYA SAI SREEAssurance on data storage security in cloud computingB3
2913H41A0526KARRA VALLIGAYATHRIOnline medical equipmentB8
3013H41A0527KONIDALA DIVYASmart certification systemB9
3113H41A0529LAKKIMSETTI N V V S V MANIKANTADeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User EnvironmentsB11
3213H41A0530LAKKIMSETTI SRAVYAOnline multi model distance metric learningB2
3313H41A0531MANGENA SRI VENI SIREESHAa routing framework for video traffic in wireless multihop networkB25
3413H41A0532MEDICHARLA NITHIHASScollision attacks techniques for wireless sensor networksB10
3513H41A0533MOPURI SUPRITAcausative broadcast encryption for short cipher textsB26
3613H41A0534NEMANI SATYA SHARADAIntegrated blood bank systemB12
3713H41A0535PATCHA RAMYAOnline multi model distance metric learningB2
3813H41A0536PEKETI HEMA DEVIAssurance on data storage security in cloud computingB3
3913H41A0537PENDIKATLA LAKSHMI PRASANNAweb based cloud services using two factor access controlB27
4013H41A0538PERI LAKSHMI KAMESWARIProgressive duplicate detectionB1
4113H41A0539POTHULA SESHAVENINovel resource renting scheme in cloudB4
4213H41A0540RAAVI SUSMITHAFine-Grained two factor access control system for web-based cloud computing servicesB5
4313H41A0541RAMBALA GANGA SHANKARA RAOIntegrated blood bank systemB12
4413H41A0542RANKIREDDI NAGA SATTIRAJUOnline medical equipmentB8
4513H41A0543RAVURI VENKATA LAVANYAOnline multi model distance metric learningB2
4613H41A0544REDDY DURGA NAGA VALLIMessage filterB13
4713H41A0545RUDRA VENKATA PADMAVATHI ANUSHAIntegrated blood bank systemB12
4813H41A0546SAMSANI ADI LAKSHMIIntegrated blood bank systemB10
4913H41A0547SISTA N V V BHADRA LAKSHMI RAMYAa routing framework for video traffic in wireless multihop networkB25
5013H41A0548SOMAYAJULA MANGA MOUNIKAcausative broadcast encryption for short cipher textsB26
5113H41A0549TADALA PRAVEENA DURGAweb based cloud services using two factor access controlB27
5213H41A0550THOTA VEERA SATYA ANUSHANovel resource renting scheme in cloudB4
5313H41A0551THUMMALAPALLI PRIYANKAProtected internet services through continuous user identity verificationB7
5413H41A0552TIKKA SRI RAMYAFine-Grained two factor access control system for web-based cloud computing servicesB5
5513H41A0553TOLETI VYSHNAVIOnline medical equipmentB8
5613H41A0554VATTAM NAGA MALLESHMessage filterB13
5713H41A0555VIPPARTHI SAI RAMA SRIProtected internet services through continuous user identity verificationB7
5813H41A0556YALANGI AJAYKUMARProgressive duplicate detectionB1
5913H41A0557YELLAMILLI UDAYA MOHANSmart certification systemB9
6013H41A0558YARRAMSETTI SHANTHI SRItransparent and continuous user ID verification for safe internet servicesB29
6113H41A0559YERUBANDI MOHANA SAI JYOTHISecluded authoritative deduplication in hybrid cloud draftB6
6213H41A0560ABBIREDDY NIKHITHADetecting malicious Facebook applicationsB18
6313H41A0561ADABALA DEVI SUKANYAMultiple routing configuration for fast IP network recoveryB19
6413H41A0562ADAPA SAI RAMAKRISHNAcollision attacks techniques for wireless sensor networksB30
6513H41A0563AKULA VENKATA DURGA SWAMYcausative broadcast encryption for short cipher textsB26
6613H41A0564CHAVATAPALLI NAGA MANISecure data aggregation for wireless sensor networkB20
6713H41A0565CHOPPALA NIREEKSHANADetecting malicious Facebook applicationsB18
6813H41A0566CHUNDURI V M GANGADHARA SASTRYweb based cloud services using two factor access controlB27
6913H41A0567CHUNDURU P V NISHANT SWAROOPSecure data aggregation for wireless sensor networkB20
7013H41A0568DIVVI KALYANItransparent and continuous user ID verification for safe internet servicesB29
7113H41A0569DONDAPATI DEEPIKADetection of masquerade attacks by using DDSGA approachB22
7213H41A0570DUNABOYINA JYOTHIDiscovering emerging topics in social streams via link anomaly detectionB16
7313H41A0571GAMINI N V L R PRASANTHIDetection of masquerade attacks by using DDSGA approachB22
7413H41A0572GHATTEM KARUNADetecting malicious Facebook applicationsB18
7513H41A0573GIDUGU SRI VENKATESHcollision attacks techniques for wireless sensor networksB30
7613H41A0574GOKAVARAPU NAGA VENKATESWARA RAODevelopment of digital campus system based on AndroidB23
7713H41A0575GOKAVARAPUVEERAVENKATASATYADATTAPAVANNearest keyword set search in multidimensional datasetsB24
7813H41A0576GUDDATI A VVL SHIVANIMultiple routing configuration for fast IP network recoveryB19
7913H41A0577JAGATHA VEERA PRABHA PRIYANKAMultiple routing configuration for fast IP network recoveryB19
8013H41A0579K HIMAJA SRI RAJANISecure data aggregation for wireless sensor networkB20
8113H41A0580KALAVAKOLANU V D KOTESWARIPrivacy preserving multi keyword ranked search over encrypted cloud dataB15
8213H41A0581KALIGITHI JESSIRANIimage retrieval system for online multimodal metric learningB28
8313H41A0582KALVAKOLANU JYOTHIPrivacy policy inference of user uploaded images on content sharing sitesB17
8413H41A0583KODAMANCHILI LILLYPrivacy policy inference of user uploaded images on content sharing sitesB17
8513H41A0584KOMMISETTY MADHAVISecure data aggregation for wireless sensor networkB20
8613H41A0585KUPPALA LALITHA KUMARIAdaptive mobile video streaming and efficient social video sharing framework using AMES CloudB14
8713H41A0586LINGOLU DEVISRI POOJAcollision attacks techniques for wireless sensor networksB21
8813H41A0587MALLESWARAPU DURGASecure data retrieval for decentralized disruption tolerant military networksB21
8913H41A0588MANDAPATI SATYA SIRISHA DEVIMultiple routing configuration for fast IP network recoveryB19
9013H41A0590MANTHA VIJAYA LAKSHMIcollision attacks techniques for wireless sensor networksB30
9113H41A0592MURAMALLA KALYANISecure data retrieval for decentralized disruption tolerant military networksB21
9213H41A0593MUTHABATHULA MOUNIKADetecting malicious Facebook applicationsB18
9313H41A0594MUTHYALA YAMINI LAKSHMI PADHMAVATHIPrivacy preserving multi keyword ranked search over encrypted cloud dataB15
9413H41A0595NALLI SHALOM KUMARa routing framework for video traffic in wireless multihop networkB25
9513H41A0596NANDAMURI SANTHIDevelopment of digital campus system based on AndroidB23
9613H41A0597NELAPUDI MARGAVINearest keyword set search in multidimensional datasetsB24
9713H41A0598ODURI DIVYA NAGA SATYAPrivacy policy inference of user uploaded images on content sharing sitesB17
9813H41A0599PADALA SAIDURGADiscovering emerging topics in social streams via link anomaly detectionB16
9913H41A05A0PEDDINTI VENKATA SRIHARIAdaptive mobile video streaming and efficient social video sharing framework using AMES CloudB14
10013H41A05A1PEDDIREDDY SASI PRIYADevelopment of digital campus system based on AndroidB23
10113H41A05A2PEETHALA SOWJANYAPrivacy preserving multi keyword ranked search over encrypted cloud dataB15
10213H41A05A3PERABATTULA NAGA LAKSHMIDiscovering emerging topics in social streams via link anomaly detectionB16
10313H41A05A4PIPPARA PARIMALAAdaptive mobile video streaming and efficient social video sharing framework using AMES CloudB14
10413H41A05A5POLISETTI PHANEENDRA MANISecure data retrieval for decentralized disruption tolerant military networksB21
10513H41A05A6RAYAPROLU N D S SRI LAKSHMIPrivacy preserving multi keyword ranked search over encrypted cloud dataB15
10613H41A05A7ROKKAM JEEVAN TEJDEEP HENIDetection of masquerade attacks by using DDSGA approachB22
10713H41A05A8SADANALA SURYA CHANDRA RAODiscovering emerging topics in social streams via link anomaly detectionB16
10813H41A05A9SANABOYINA SATISHPrivacy policy inference of user uploaded images on content sharing sitesB17
10913H41A05B0SOMISETTY SAITEJAtransparent and continuous user ID verification for safe internet servicesB29
11013H41A05B1SUNKARA GOWRISANKARIDiscovering emerging topics in social streams via link anomaly detectionB16
11113H41A05B2TADIKONDA NAGA MEGHANADetection of masquerade attacks by using DDSGA approachB22
11213H41A05B3UCHULA MOUNIKANearest keyword set search in multidimensional datasetsB24
11313H41A05B4UPPALAPATI MOHANA SOWJANYANearest keyword set search in multidimensional datasetsB24
11413H41A05B5VEERINA MAHATHI NAGAVALLIDevelopment of digital campus system based on AndroidB23
11513H41A05B6VINTI SARANAM VEERA AYYAPPAimage retrieval system for online multimodal metric learningB28
11614H45A0501BONAM KOTESWARA RAOOnline medical equipmentB8
11714H45A0502CHITNEEDI SAI PRAVEENOnline multi model distance metric learningB2
11814H45A0503GOLAKOTI SRI RAMANJANEYAimage retrieval system for online multimodal metric learningB28
11914H45A0504MUCHARLA MOHAN VENKATA SATYA VINAYa routing framework for video traffic in wireless multihop networkB25
12014H45A0505MUTYALA SHANMUKHA SRINIVASIntegrated blood bank systemB12
12114H45A0506PALIVELA SRIDHARMANIKANTAAssurance on data storage security in cloud computingB3
SNOROLL NONAME OF THE STUDENTPROJECT TITLEBATCHES
1122Q1A0514MANNE SURYAStudent exam portalB11
2122Q1A0517NUKALA VEERA VENKATA SATYANARAYANAOnline car marketB16
3122Q1A0521PULUSUGANTI JHANSIRANIOnline film AuctionB10
4122Q1A0527VAJRAPU JASWANTHIE-Blood bankB13
5122Q1A0530VEMAVARAPU CHANDRAKALA DURGAKey Aggregate cryptosystem for scalable data sharing in cloud storageB12
6122Q1A0531YALLA RAMYA SRIBottom-up extraction of ontology metadataB2
712H41A0501ADABALA SRIDURGAPrivacy preserving public Auditing for secure cloud storageB4
812H41A0502ADABALA SUBHADRA SHARMILADecentralized access control with anonymous authentication data stored in cloudsB3
912H41A0503ADABALA TARUNA SRIEventuality supervision systemB7
1012H41A0504AKETI SARITHAPrivacy preserving public Auditing for secure cloud storageB4
1112H41A0505AKETI SATYA SAI LAKSHMIEventuality supervision systemB7
1212H41A0506BALLA LAKSHMI SUMEDHACut Detection in wireless sensor networksB6
1312H41A0507BANDARU VARALAKSHMIE-Blood bankB13
1412H41A0508BEERA MADHURICorporate Employee welfare systemB5
1512H41A0509BHIMALA SATYA JYOTHIKey Aggregate cryptosystem for scalable data sharing in cloud storageB12
1612H41A0510BOLISETTI S L S SIVA JYOTHIWireless sensor network security model using zero knowledge protocolB8
1712H41A0511CHELLUBOYINA KARUNA RAJESWARICorporate Employee welfare systemB5
1812H41A0512CHINTA MANIDEEPTHIOnline car marketB16
1912H41A0513CHOPPLA SMILY KRUPABottom-up extraction of ontology metadataB2
2012H41A0515DHARMADI NAGA SAROJAOnline film AuctionB10
2112H41A0516GODAVARTHI MOUNIKA CHOWDARYSmart certification systemB14
2212H41A0517KARRI VENKATA NAGA HIMA BINDUMoan cubicleB17
2312H41A0518KOKA PRASANTHISecure authorized duplication  in hybrid cloud  architectureB9
2412H41A0520MUPPARTHI NAGA SRI NANDINICut Detection in wireless sensor networksB6
2512H41A0521MUPPARTHY YAJNASmart certification systemB14
2612H41A0522MUTYALA SAI SOWJANYAStudent exam portalB11
2712H41A0523NALLA LAKSHMI SUMAAsk an ExpertB1
2812H41A0524NIMMAKAYALA ANJANIDEVIDecentralized access control with anonymous authentication data stored in cloudsB3
2912H41A0525NUNNA GANGADHAR CHOWDARYCut Detection in wireless sensor networksB6
3012H41A0526PASUMARTHI LAKSHMI PRASANNABottom-up extraction of ontology metadataB2
3112H41A0527PATHI SIVA SURYA KUMARWireless sensor network security model using zero knowledge protocolB8
3212H41A0528PEDAMALLU SIRISHASocial prudent serviceB15
3312H41A0529PENMETCHA VENKATA KIRANMAYIOnline film AuctionB10
3412H41A0530PERI NAGA RAMYAKey Aggregate cryptosystem for scalable data sharing in cloud storageB12
3512H41A0531PETTA ANIL SATYANARAYANASecure authorized duplication  in hybrid cloud  architectureB9
3612H41A0532POLISETTI RAMA DEEPTHIOnline car marketB16
3712H41A0533PONNADA P N S SIRISHAE-Blood bankB13
3812H41A0534RAJULAPUDI BHARATH KUMARDecentralized access control with anonymous authentication data stored in cloudsB3
3912H41A0535RAKURTHI SOWJANYAAsk an ExpertB1
4012H41A0536RAPAKA JERUSHAMoan cubicleB17
4112H41A0537RAVURI ANURADHAPrivacy preserving public Auditing for secure cloud storageB4
4212H41A0538RAVURI UMAPARVATHIWireless sensor network security model using zero knowledge protocolB8
4312H41A0539SADHANALA SIRISHASecure authorized duplication  in hybrid cloud  architectureB9
4412H41A0540SAILAJA KANCHUMARTHYCorporate Employee welfare systemB5
4512H41A0541SAKA SAMUEL PINNIOnline film AuctionB10
4612H41A0542SIRIGINEEDI SAILAJAWireless sensor network security model using zero knowledge protocolB8
4712H41A0543SUNDARANEEDI SIREESHASocial prudent serviceB15
4812H41A0544YEERI RANI SUCHARITHAStudent exam portalB11
4912H41A0545VONTEDDU NAGA VENIAsk an ExpertB1
5013H45A0501ADABALA GOWRI SIVANNARAYANASecure authorized duplication  in hybrid cloud  architectureB9
5113H45A0502AKKISETTI VEERA VENKATA DURGA SWAMYCorporate Employee welfare systemB5
5213H45A0503ANISETTI DURGAPRASADBottom-up extraction of ontology metadataB2
5313H45A0504BONTHU SIVANI DEVISmart certification systemB14
5413H45A0505CHIKKALA SRINIVASCut Detection in wireless sensor networksB6
5513H45A0506GEDDAM KIRAN KUMARIMoan cubicleB17
5613H45A0507KARRI NAGA KISHOREKUMARKey Aggregate cryptosystem for scalable data sharing in cloud storageB12
5713H45A0508KORUKONDA V V S NAGA MANIKANTAE-Blood bankB13
5813H45A0509MATTAPARTHI TRILOKPrivacy preserving public Auditing for secure cloud storageB4
5913H45A0510MOKRALA CHANDRA SEKHAR JAGADESHSmart certification systemB14
6013H45A0511MUCHARLA UDAY SUBHASHEventuality supervision systemB7
6113H45A0512NIMMANA VEERA VENKATA VINODAsk an ExpertB1
6213H45A0513PARALA SARADAStudent exam portalB11
6313H45A0514PEYYALA ANUSHAEventuality supervision systemB7
6413H45A0515SEELAM DURGA GANESHOnline car marketB16
6508H41A0583R CHAITANYA TEJASocial prudent serviceB15
66126M1A0527S PAVANISocial prudent serviceB15
6711JH1A0567K SAIMoan cubicleB17
SNOREGD NOSTUDENT NAMEPROJECTSBATCH
110H41A0533 P SUBHAKARDepartments AutomationB5
210H41A0594TELAGAREDDY SATYA NARAYANADynamic Alert ManagementB14
310H41A0595T NAVEEN SURYAE-Cart managementB15
4117B1A0508RAYUDU NAVEENAE-Cart managementB15
511H41A0501ACHANTA DHANA MRUTHUMJAYA NAIDUVisa Processing Information SystemB1
611H41A0502ACHANTA VAMSIDepartments AutomationB5
711H41A0503ADABALA SARAT KUMAROnline Bus Reservation SystemB17
811H41A0504ADABALA SRI LAKSHMI NEELIMAData sharing among dynamic groups with multi securityB12
911H41A0505ADDEPALLI N V S L G SWETHAOrphan PlatformB7
1011H41A0506AMBATI NARESHVisa Processing Information SystemB1
1111H41A0507ANYAM SUDHEER KUMARDepartments AutomationB5
1211H41A0509ARETI VENKATESHAutomated mobile resultsB2
1311H41A0510ARIGELA KASU GANGA DHANA LAKSHMIDynamic Alert ManagementB14
1411H41A0512BHAVYA VEERA PRAVALLIKA BASINAData sharing among dynamic groups with multi securityB12
1511H41A0513BONAM ANUSHAStudent association of computer applicationB13
1611H41A0514BONAM SRIRAMA DURGA LAKSHMIVisa Processing Information SystemB1
1711H41A0515CHAVALI NAGA SANTOSH DILIPScreenshot hackerB11
1811H41A0516CHALUMURI PAVANIPeoples protection and Information portalB6
1911H41A0517CHEGONDI VEERA VENKATA LAKSHMIMedium expertsB4
2011H41A0518CHELLABOINA RAM PRASADOrphan PlatformB7
2111H41A0519CHINTALAPUDI SATYA SRI V NAGA DEVIReverse engineering on database schemasB8
2211H41A0520DEGALA RESHMAE-Cart managementB15
2311H41A0521DEVALLA VIJAYA DURGAOnline blood donor informationB10
2411H41A0522GANJI LAKSHMISecure communication in weapon systemB3
2511H41A0523GORUGANTU CHANDRA SEKHARText recognition form an image and translationB9
2611H41A0524GUTTULA KISHORE SAIStudent association of computer applicationB13
2711H41A0525INALA SAI CHAKRADHARMedium expertsB4
2811H41A0526KORIPALLI CHINA VENKATA SIREESHStudent association of computer applicationB13
2911H41A0527KANDREGULA PAVAN KUMARScreenshot hackerB11
3011H41A0528KAYALA VIJAYA BALARAM NAIDUVisa Processing Information SystemB1
3111H41A0529KONDREDDY SIVA RAMA DURGA RAOSecure communication in weapon systemB3
3211H41A0531KUDAKA RAMYASREEAutomated mobile resultsB2
3311H41A0532KUPPALA BALA SIVAKUMAROnline blood donor informationB10
3411H41A0533L SATYALAKSHMI ANUSHAPRIYANKAOrphan PlatformB7
3511H41A0534MOGALLAPALLI N V S GANESH RAM SUMANTDynamic Alert ManagementB14
3611H41A0535MOLLETI CHANDINISecure communication in weapon systemB3
3711H41A0536MONDEPULANKA SRINUText recognition form an image and translationB9
3811H41A0537MUNDRU RAMAKRISHNAScalable Distributed Service Integrity Attestation for software as a serviceB16
3911H41A0538NALLA ASHA SRAVANIDepartments AutomationB5
4011H41A0539PADALA V N BRAHMA PHANI KUMAROnline blood donor informationB10
4111H41A0540PALLA RATNA GANGA PRIYAText recognition form an image and translationB9
4211H41A0541PANINGIPALLI L S CHANDANAMedium expertsB4
4311H41A0542PARVATINA MOUNIKADynamic Alert ManagementB14
4411H41A0543PATHI SURESH KUMARReverse engineering on database schemasB8
4511H41A0544PEDDINTI VALLI BHANU TEJASWIPeoples protection and Information portalB6
4611H41A0545PEDDIREDDY SATYA SIREESHAPeoples protection and Information portalB6
4711H41A0546PENDIKATLA SAI SUDHA MADHURIScreenshot hackerB11
4811H41A0547PINDI MANOJReverse engineering on database schemasB8
4911H41A0548PINISETTI VEERA DURGA SAI KUMARIOnline blood donor informationB10
5011H41A0549ROLLA SRIRAMA SUBRAHMANYA VASU NAIDUScreenshot hackerB11
5111H41A0550SAMSANI SURYA KUMARIData sharing among dynamic groups with multi securityB12
5211H41A0551SIDDABATTULA SONICAPeoples protection and Information portalB6
5311H41A0552SIRAM S N D M LAKSHMI DEVIReverse engineering on database schemasB8
5411H41A0554VASAMSETTI SRI RAMYAAutomated mobile resultsB2
5511H41A0555VEERA SUMASRI NEHARIKAText recognition form an image and translationB9
5611H41A0556VEGI VENKATA SATISHMedium expertsB4
5711H41A0557VETSA V N S SURYA VASUDHAStudent association of computer applicationB13
5811H41A0558YADLAPALLI M K GANESHDynamic Alert ManagementB14
5911221A0507A V K CHAITANYAAutomated mobile resultsB2
6011P31A0511CHIKKALA SRI NAGARJUASecure communication in weapon systemB3
6112H45A0501NALLA SUBRAHMANYESWARIOrphan PlatformB7
6212H45A0502PECHETTI VENKATESWARARAOE-Cart managementB15
6312H45A0503YALLAMELLI SRINIVASA RAOData sharing among dynamic groups with multi securityB12
Close Menu
error: Content is protected !!