2018-19
UG. B.Tech (CSE):: 2018-19
S.No | Name of Student | Registered Number | Title of the Project Work | URL |
---|---|---|---|---|
1 | ACHANTA VEERA NAGA DEVI | 15H41A0501 | Energy consumption prediction | B4 |
2 | ALLU PRASANNA | 15H41A0502 | Google stock price prediction | B5 |
3 | AMBATI PURNA CHANDRA NAGA SAI | 15H41A0503 | Classic bridge game | B31 |
4 | ANDEY NAGA LAKSHMI ANUSHA | 15H41A0504 | Google stock price prediction | B5 |
5 | APPANA NAGA VINAYAKA RUKMINI MANASA | 15H41A0505 | Google stock price prediction | B5 |
6 | ARIGELA SHANTHI DEVI | 15H41A0506 | House price prediction | B3 |
7 | ASETTY PRASANNA BHARATHI | 15H41A0507 | Car evaluation prediction | B1 |
8 | BALABHADRUNI SUBHADRA SOWMYA | 15H41A0508 | Car evaluation prediction | B1 |
9 | BANDARU VENKATA LALITHA SUSHMA JANAKI | 15H41A0509 | Car evaluation prediction | B1 |
10 | BASAVA NAGA DURGA ANUSHA | 15H41A0510 | Flight delay prediction | B12 |
11 | BOLLA SRI SAI SARANYA | 15H41A0511 | Flight delay prediction | B12 |
12 | BONAM VENKATA RAMYA SRI | 15H41A0512 | Multi – Cloud Confined Catalog for Mathematical allied Diversity Query | B11 |
13 | CHELLUBOINA GEETA MOUNIKA | 15H41A0513 | Credit card fraud detection | B2 |
14 | CHITTIKALA MOHAN KRISHNA | 15H41A0514 | Flight delay prediction | B12 |
15 | DASARI KRISHNA PRIYA | 15H41A0516 | Combat System with Melee Combos and Weapon Tactics | B19 |
16 | DHARMAPURI VANAJA | 15H41A0518 | Car Racer | B23 |
17 | DONTAMSETTI DURGA SIRISHA | 15H41A0520 | Survival in the Forest | B24 |
18 | GANTI SAI SIVA RAMAKRISHNA | 15H41A0521 | Car Racer | B23 |
19 | GOKAVARAPU PRIYANKA | 15H41A0522 | Endless Runner | B20 |
20 | HIMA VANITHA DENDUKURI | 15H41A0523 | Runner | B17 |
21 | JANU JNANA DURGA SATYA SRI | 15H41A0524 | Emerge from Death Land | B18 |
22 | KAILA VENKATA SAI MANASA | 15H41A0525 | Multi – Cloud Confined Catalog for Mathematical allied Diversity Query | B11 |
23 | KANDIKATTI TEJASWI | 15H41A0526 | Endless Runner | B20 |
24 | KESAVARAPU SATYA SURYA DURGA SRILAKSHMI | 15H41A0527 | Credit card fraud detection | B2 |
25 | KONA ANJANEYA SAI PADMA | 15H41A0528 | House price prediction | B3 |
26 | KOTA MARIYAMMA | 15H41A0529 | Google stock price prediction | B5 |
27 | KUDUPUDI SWATHI TEJAS | 15H41A0530 | Credit card fraud detection | B2 |
28 | KUPPALA SATYA VIJAYA LAKSHMI | 15H41A0531 | House price prediction | B3 |
29 | MATTA SRIRAMYA | 15H41A0532 | Multi – Cloud Confined Catalog for Mathematical allied Diversity Query | B11 |
30 | NAGALLA GANGA BHAVANI | 15H41A0533 | Flight delay prediction | B12 |
31 | NAKKA SIREESHA | 15H41A0534 | Energy consumption prediction | B4 |
32 | NANDURI TULASI VARALAKSHMI | 15H41A0535 | Car evaluation prediction | B1 |
33 | NELAPUDI SRAVANI | 15H41A0536 | Runner | B17 |
34 | PAMIREDDY SAIKEERTHI | 15H41A0537 | Emerge from Death Land | B18 |
35 | PANDEY NANDAN | 15H41A0538 | Emerge from Death Land | B18 |
36 | PATHI JAYA SREE DURGA ADI LAKSHMI | 15H41A0539 | Multi – Cloud Confined Catalog for Mathematical allied Diversity Query | B11 |
37 | PEDDINTI PAVANKUMAR | 15H41A0540 | Survival in the Forest | B24 |
38 | PENUMATSA SIREESHA | 15H41A0541 | Energy consumption prediction | B4 |
39 | PIPPARA PRATYUSHA | 15H41A0542 | House price prediction | B3 |
40 | POLAMURI PURNA | 15H41A0543 | Predict future sales | B15 |
41 | POLISETTY ADITYA PHANEENDRA VENKATA PAVAN | 15H41A0544 | Survival in the Forest | B24 |
42 | POPPOPPULA APARNA | 15H41A0545 | Graduate admission prediction | B13 |
43 | RANKIREDDY RUPAVATHI | 15H41A0546 | Classic bridge game | B31 |
44 | RAVANAM SRI DEVI BHAVANI | 15H41A0547 | Combat System with Melee Combos and Weapon Tactics | B19 |
45 | SAMSANI SRIVALLI | 15H41A0548 | Energy consumption prediction | B4 |
46 | SHAIK ARAFA NAWAZ | 15H41A0549 | Runner | B17 |
47 | SUNKARA DHARANI KRISHNA | 15H41A0550 | Classic bridge game | B31 |
48 | SUNKARA SAI VEERAKUMAR | 15H41A0551 | Endless Runner | B20 |
49 | SUNKARANAM SAI SRI HARI | 15H41A0552 | Combat System with Melee Combos and Weapon Tactics | B19 |
50 | TADI TEJO RAMANI | 15H41A0553 | Car Racer | B23 |
51 | TIRUMALA KALYANI | 15H41A0554 | Combat System with Melee Combos and Weapon Tactics | B19 |
52 | TOLETI SATYASRI | 15H41A0555 | Credit card fraud detection | B2 |
53 | TUNDURI DEVI SRAVANI | 15H41A0556 | Survival in the Forest | B24 |
54 | VETHSA GEETHA SAI LAKSHMI PRAVANYA | 15H41A0557 | Graduate admission prediction | B13 |
55 | VETUKURI SRI VALLI SOWMYA | 15H41A0558 | Emerge from Death Land | B18 |
56 | VITTANALA SRIRAM | 15H41A0559 | Runner | B17 |
57 | KARRI SIVA RAJU | 16H45A0501 | Car Racer | B23 |
58 | PEDAMALLU NAGA VENKATA SUINDIAN | 16H45A0502 | Graduate admission prediction | B13 |
59 | PERABATTULA DURGA NAGA VENKATARAYUDU | 16H45A0503 | Endless Runner | B20 |
60 | ACHANTA SASI HEMA SRI | 15H41A0560 | Annual Rainfall prediction | B7 |
61 | ACHANTA SESHU | 15H41A0561 | Expression monitoring | B14 |
62 | AKETI BHAGYA LAKSHMI | 15H41A0563 | Classic Frog | B29 |
63 | AKUMARTHI RAVITEJA | 15H41A0564 | Suicide rate prediction | B10 |
64 | APPARI HARITHA | 15H41A0565 | Football world cup winner prediction | B9 |
65 | BOKKA GOVINDA VARMA | 15H41A0566 | Chaos engine | B25 |
66 | BOLLOJU DEEPTHI BHAVANA | 15H41A0567 | Grading System | B22 |
67 | CHEBOLU VINAYAKA SAI VIKAS | 15H41A0568 | Cannon Ball | B27 |
68 | CH DIVYA HARIKA | 15H41A0569 | Grocery cart application | B6 |
69 | CHIKKAM KANAKA DURGA | 15H41A0570 | Grading System | B22 |
70 | GEDDAM RAJA VARSHITHA | 15H41A0571 | Escape from the ball | B26 |
71 | GOLLA RATNA MALLIKA | 15H41A0572 | Chaos engine | B25 |
72 | GUBBALA CHANDINI | 15H41A0573 | Ridge Racer | B21 |
73 | GUDIMETLA RENUKA MANI DEEPIKA | 15H41A0574 | Plane crash survival tactics in forest | B30 |
74 | JAMPANA MOUNIKA | 15H41A0576 | Escape from the ball | B26 |
75 | KADALI LAKSHMI DEVI | 15H41A0577 | Predict future sales | B15 |
76 | KAKILETI NAGA VENKATA SURYA TULASI | 15H41A0578 | Graduate admission prediction | B13 |
77 | KANDIKATLA PAUL BENSON | 15H41A0579 | Grocery cart application | B6 |
78 | KARRI SAI SUBHASHINI | 15H41A0580 | Ridge Racer | B21 |
79 | KATAKAM HEMA | 15H41A0581 | Grocery cart application | B6 |
80 | KATTA SAKINA | 15H41A0582 | Chaos engine | B25 |
81 | KESAVADASU LAKSHMI SOWJANYA | 15H41A0583 | Annual Rainfall prediction | B7 |
82 | KOLLABATHULA RAMYA SRI | 15H41A0584 | Predict future sales | B15 |
83 | KOLLU SURYA SARADHI | 15H41A0585 | Bridge Jumper | B28 |
84 | KOMMAJOSYULA N V SATYA DURGA KAMALA SRIDEVI | 15H41A0586 | Suicide rate prediction | B10 |
85 | KORLAPATI SATYA SAI VENKATA DURGA LAKSHMI | 15H41A0587 | Grocery cart application | B6 |
86 | KORUMILLI BALA NAGA KRISHNA CHAITANYA | 15H41A0588 | Security evaluation of patterns | B8 |
87 | KUDUPUDI SAI SIREESHA | 15H41A0589 | Classic Frog | B29 |
88 | KUMMARAGUNTLA PADMA SATYA RATNA ALEKHYA | 15H41A0590 | Grading System | B22 |
89 | KUMPATLA VIJAYA BRAMARAMBIKA | 15H41A0591 | Bridge Jumper | B28 |
90 | KURMA NAGA MOUNIKA | 15H41A0592 | Plane crash survival tactics in forest | B30 |
91 | KUSUMA MANEESHA | 15H41A0593 | Ridge Racer | B21 |
92 | LAKKIMSETTI JAYA LAKSHMI | 15H41A0594 | Plane crash survival tactics in forest | B30 |
93 | MANCHIKANTI KUSUMA SRI LAKSHMI MOUNIKA | 15H41A0595 | Cannon Ball | B27 |
94 | MEDA BABU SAI RAM | 15H41A0597 | Expression monitoring | B14 |
95 | MAHAMMAD FARIDA | 15H41A0598 | Annual Rainfall prediction | B7 |
96 | MUDDALA SANDHYA | 15H41A0599 | Bridge Jumper | B28 |
97 | MUDDANA MOHANA PALAKONDA | 15H41A05A0 | Security evaluation of patterns | B8 |
98 | NAKKA SANDHYA RANI | 15H41A05A1 | Chaos engine | B25 |
99 | NEELAKANTRAVU MANJU RAJYA LAKSHMI | 15H41A05A2 | Annual Rainfall prediction | B7 |
100 | NIMMAGADDA RAJI | 15H41A05A3 | Football world cup winner prediction | B9 |
101 | NIMMAKAYALA NAGA SOWJANYA SUDHAKSHINI | 15H41A05A4 | Classic Frog | B29 |
102 | NAGA VENKATA LAKSHMI SWETHA | 15H41A05A5 | Security evaluation of patterns | B8 |
103 | NUNNA JHANSI LAKSHMI DURGA | 15H41A05A6 | Suicide rate prediction | B10 |
104 | PANANGIPALLI VENKATA RATNA SUDHA | 15H41A05A7 | Cannon Ball | B27 |
105 | PUNNAM DEEPAK NARESH | 15H41A05A8 | Grading System | B22 |
106 | SATHI SRI RAJA MANIKANTA REDDY | 15H41A05A9 | Football world cup winner prediction | B9 |
107 | SRIGHAKOLAPU NAGA VENKATA LAKSHMI NAVEENA | 15H41A05B0 | Security evaluation of patterns | B8 |
108 | TADI SUMA DEEPIKA | 15H41A05B1 | Classic Frog | B29 |
109 | THOTE SHALINI LAKSHMI | 15H41A05B2 | Football world cup winner prediction | B9 |
110 | VANARASI SATYA KEDARI | 15H41A05B3 | Ridge Racer | B21 |
111 | VANGALA PRASANNA | 15H41A05B4 | Cannon Ball | B27 |
112 | VASAMSETTI ANUSHA | 15H41A05B5 | Classic bridge game | B31 |
113 | VONTEDDU VENKATA SATYA LAKSHMI BHAVANI | 15H41A05B6 | Suicide rate prediction | B10 |
114 | YEDIDA SANDHYA NAGA DEVI | 15H41A05B8 | Expression monitoring | B14 |
115 | YERUBANDI SAI APOORVA | 15H41A05B9 | Plane crash survival tactics in forest | B30 |
116 | DULAM KRANTHI REKHA | 16H45A0504 | Escape from the ball | B26 |
117 | KATTA BHARGAVESH | 16H45A0506 | Seedling Species Using Image Analytics | B16 |
1 | R.N.D.S.S.LAKSHMI | 17H41D5802 | The secured data sharing for multi authority Access in cloud storage | Mtech Project |
2017-18
S.No | Roll No | Name of the student | Project Title | Batch |
1 | 14H41A0501 | ADABALA DEEPTHI | Energy-efficient Query Processing in Web Search Engines | B10 |
2 | 14H41A0502 | ADABALA UMA RAMA LINGESWARASWAMY | Big Scholarly Data A Survey | B15 |
3 | 14H41A0504 | ARAVA SUNANDA SRI | Privacy Policy Inference of User Uploaded Images on Content Sharing Sites | B4 |
4 | 14H41A0505 | BADDE USHA | Booster in High Dimensional Data Classification | B14 |
5 | 14H41A0506 | BADRI SRISANDHYA | Cleaning Framework for Big Data | B5 |
6 | 14H41A0507 | BASAVA RADHA VASUNDHARA | Content-aware Partial Compression for Textual Big Data Analysis in Hadoop | B7 |
7 | 14H41A0508 | BOKKA GEETHIKA | Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder | B3 |
8 | 14H41A0509 | BOKKA NAGA SURYA KUMARI | Content-aware Partial Compression for Textual Big Data Analysis in Hadoop | B7 |
9 | 14H41A0510 | BONAM SUMA | l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items | B12 |
10 | 14H41A0511 | CHALUMURI TRIVENI | Bucket Based Data Reduplication Technique for Big Data Storage System | B9 |
11 | 14H41A0512 | CHITNEEDI SINDHU | Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder | B3 |
12 | 14H41A0513 | CHOLLANGI PUSHPALATHA | Search Rank Fraud and Malware Detection in Google Play | B6 |
13 | 14H41A0514 | GANGA BHAVANI CHIRUKURI | A Data Reusing Strategy Based On Hive | B13 |
14 | 14H41A0515 | GANGUMALLA LAKSHMI PRASANNA | Weakly-supervised deep embedding for product review sentiment analysis | B11 |
15 | 14H41A0516 | GANISETTI MOUNIKA SRI SURYA PRABHA | Cleaning Framework for Big Data | B5 |
16 | 14H41A0517 | GOKAVARAPU NAGA SURYA GOWRI SUSHMA | Booster in High Dimensional Data Classification | B14 |
17 | 14H41A0518 | GOKAVARAPU SASI BHAVANI DEVI | Booster in High Dimensional Data Classification | B14 |
18 | 14H41A0519 | GORTHI N S S D S DEVI PRIYANKA | Weakly-supervised deep embedding for product review sentiment analysis | B11 |
19 | 14H41A0520 | GOWRISETTI KAVYA ANU SATYA SRI | Collaborative Filtering-Based Recommendation of Online Social Voting | B2 |
20 | 14H41A0521 | GUDIMETLA VENKATA MANI N R M SIVA SOWJANYA | H2-Hadoop Improving Hadoop Performance using the Ecosystem | B16 |
21 | 14H41A0522 | ILLA ANUSHA | Content-aware Partial Compression for Textual Big Data Analysis in Hadoop | B7 |
22 | 14H41A0523 | IRUKU SAI SUSMITHA | SocialQ&A An Online Social Network Based Question and Answer System | B8 |
23 | 14H41A0524 | KADALI SRI KANAKA MAHALAKSHMI | Search Rank Fraud and Malware Detection in Google Play | B6 |
24 | 14H41A0525 | KAMUJU GEETANJALI | Bucket Based Data Reduplication Technique for Big Data Storage System | B9 |
25 | 14H41A0526 | KANKIPATI VENKATA KOTESH | A Data Reusing Strategy Based On Hive | B13 |
26 | 14H41A0527 | KAPPAGANTULA LAKSHMI LAVANYA | Energy-efficient Query Processing in Web Search Engines | B10 |
27 | 14H41A0528 | KOLA JAYA LAKSHMI SUREKHA | SocialQ&A An Online Social Network Based Question and Answer System | B8 |
28 | 14H41A0529 | KONDAPALLI SAI TEJA | l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items | B12 |
29 | 14H41A0530 | KOTTURI SAI TEJASWINI | Search Rank Fraud and Malware Detection in Google Play | B6 |
30 | 14H41A0531 | MANGENA BABY SAMHITHA | A Data Reusing Strategy Based On Hive | B13 |
31 | 14H41A0532 | MEDIDA PADMINI | Energy-efficient Query Processing in Web Search Engines | B10 |
32 | 14H41A0534 | MOHAMMAD RAHI MUNNISA | Search Rank Fraud and Malware Detection in Google Play | B6 |
33 | 14H41A0535 | MOHAMMAD ZAHRA YASMIN | l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items | B12 |
34 | 14H41A0536 | MUDDANA NAVEENA | Distributed Top-k Keyword Search over Very Large Databases with MapReduce | B1 |
35 | 14H41A0537 | MUNUKOTI SRI RAMYA | Collaborative Filtering-Based Recommendation of Online Social Voting | B2 |
36 | 14H41A0540 | NAKKA NAVYASRI | l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items | B12 |
37 | 14H41A0541 | NALLA LALITHA | Booster in High Dimensional Data Classification | B14 |
38 | 14H41A0542 | OLETI KUMARI | Weakly-supervised deep embedding for product review sentiment analysis | B11 |
39 | 14H41A0543 | PAIDIPARTHI HEMANTH NAGA SAI GANESH | SocialQ&A An Online Social Network Based Question and Answer System | B8 |
40 | 14H41A0544 | PATHI LAVANYA | Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder | B3 |
41 | 14H41A0545 | PERABATHULA GIRIJATHAYARU | Collaborative Filtering-Based Recommendation of Online Social Voting | B33 |
42 | 14H41A0546 | POTTUPOTHU S L SIREESHA | Bucket Based Data Reduplication Technique for Big Data Storage System | B9 |
43 | 14H41A0548 | RAJAMAHENDRAVARAPU VENKATA DEVI SOWJANYA | Privacy Policy Inference of User Uploaded Images on Content Sharing Sites | B4 |
44 | 14H41A0549 | RALLAPALLI SURYA SOMESWARA MANI KOUSALYA | Distributed Top-k Keyword Search over Very Large Databases with MapReduce | B1 |
45 | 14H41A0550 | SHAIK SHAHERA BANU | Bucket Based Data Reduplication Technique for Big Data Storage System | B9 |
46 | 14H41A0551 | TALATAM RASHMITHA | Content-aware Partial Compression for Textual Big Data Analysis in Hadoop | B7 |
47 | 14H41A0552 | TALLA PAUL MANOHAR | H2-Hadoop Improving Hadoop Performance using the Ecosystem | B16 |
48 | 14H41A0553 | TSAVATAPALLI SAI LAKSHMI | Privacy Policy Inference of User Uploaded Images on Content Sharing Sites | B4 |
49 | 14H41A0554 | TSAVATAPALLI SAI SITALAKSHMI | Cleaning Framework for Big Data | B5 |
50 | 14H41A0555 | VARDHINEEDI DEVI | SocialQ&A An Online Social Network Based Question and Answer System | B8 |
51 | 14H41A0556 | VUDDISA VIKAS | Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder | B3 |
52 | 14H41A0557 | VUNDAVALLI DIVYA SRI | Distributed Top-k Keyword Search over Very Large Databases with MapReduce | B1 |
53 | 14H41A0559 | YEDIDA BHARATHI DEVI | Collaborative Filtering-Based Recommendation of Online Social Voting | B2 |
54 | 14H41A0560 | YEDIDA DURGANGA SATYAMANI | Distributed Top-k Keyword Search over Very Large Databases with MapReduce | B1 |
55 | 14H41A0561 | YERUBANDI SRI SUDHA RANI | Weakly-supervised deep embedding for product review sentiment analysis | B11 |
56 | 14H41A0562 | ADABALA ANURADHA DEVI | SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors | B28 |
57 | 14H41A0563 | ADABALA VIDYA SRAVANTHI | Understand Short Texts by Harvesting and Analyzing Semantic Knowledge | B19 |
58 | 14H41A0564 | ADAPA SRI RAMA RAGHAVA SANKEERTHANA | Crime analysis using R | B17 |
59 | 14H41A0567 | ANYAM HEMA LALITHA | A BigData Approach for Classification and Prediction of Student Result Using MapReduce | B29 |
60 | 14H41A0568 | BEJAVADA VIJAYA DURGA | Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information | B24 |
61 | 14H41A0569 | BHAVARAJU SAI SRI SIVANI | Crowd sourcing for Top-K Query Processing over Uncertain Data | B22 |
62 | 14H41A0571 | BUDITHI SUPRIYA | Crime analysis using R | B17 |
63 | 14H41A0572 | CHINTALAPUDI SATYA NAGA SAI | Disease Prediction by Machine Learning over Big Data from Healthcare Communities | B20 |
64 | 14H41A0573 | CHODAPANEEDI RAJESWARI | Detecting Stress Based on Social Interactions in Social Networks | B30 |
65 | 14H41A0574 | DARA AMITHA | Practical Privacy- Preserving MapReduce Based K-means Clustering over Large scale Dataset | B33 |
66 | 14H41A0575 | DEVADA SANDEEP KUMAR | Resolving Multi-party Privacy Conflicts in Social | B18 |
67 | 14H41A0576 | DOONABOYINA GEETHA | A BigData Approach for Classification and Prediction of Student Result Using MapReduce | B29 |
68 | 14H41A0577 | EETHAKOTA SIREESHA | SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING BY USING ATTRIBUTE BASED ENCRYPTION | B31 |
69 | 14H41A0579 | GEDDADA SIVESWARA RAO | SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING BY USING ATTRIBUTE BASED ENCRYPTION | B31 |
70 | 14H41A0580 | GOKAVARAPU NAGA VENKATA SAI SRIJA | Efficient Cache-Supported Path Planning on Roads | B25 |
71 | 14H41A0581 | GUDIMETLA SUPRIYA | Analysis of illegal activities which has been raised over the state in USA | B27 |
72 | 14H41A0582 | KANCHARLA SESHA SAI SREE RAMA SWEATHA | Understand Short Texts by Harvesting and Analyzing Semantic Knowledge | B19 |
73 | 14H41A0583 | KANDREGULA OMSAI | A BigData Approach for Classification and Prediction of Student Result Using MapReduce | B29 |
74 | 14H41A0584 | KANKIPATI V NAGA SURYA CHANTI RAMA RAJU | Resolving Multi-party Privacy Conflicts in Social | B18 |
75 | 14H41A0586 | KATHINOKKULA AKSHAY NAGESWARA RAO | ANALYSIS OF SHORTEST PATH ROUTING FOR LARGE MULTIHOP WIRELESS NETWORK | B30 |
76 | 14H41A0587 | KOLA LAKSHMI PRASANNA | Continuous Top – K Monitoring Document Stream | B23 |
77 | 14H41A0588 | KORLAPATI LAKSHMI THARUNI | Crowd sourcing for Top-K Query Processing over Uncertain Data | B22 |
78 | 14H41A0589 | KORLAPATI MOHANA VIDYA | Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information | B24 |
79 | 14H41A0590 | MADDULA RAJITHA | SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING BY USING ATTRIBUTE BASED ENCRYPTION | B31 |
80 | 14H41A0591 | MAMIDISETTI SATYA SRI | QD: A Query-Driven Approach to Entity Resolution | B26 |
81 | 14H41A0592 | MANDAPALLI SATYANANDAM | SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors | B28 |
83 | 14H41A0594 | MATTA PRASANTHI | Resolving Multi-party Privacy Conflicts in Social | B18 |
84 | 14H41A0595 | MEDIDI JAYASRI VENKATA BHARGAVI SUMA | Detecting Stress Based on Social Interactions in Social Networks | B21 |
85 | 14H41A0596 | MEDISETTI NAGA VENKATA SAI DURGA | Mining Competitors from Large Unstructured Datasets | B32 |
86 | 14H41A0597 | MUDDANA KRISHNA PHANI KUMAR | Mining Competitors from Large Unstructured Datasets | B32 |
87 | 14H41A0598 | NEDUNURI HARITHA | Continuous Top – K Monitoring Document Stream | B23 |
88 | 14H41A0599 | NEREDIMELLI RAGINI | Efficient Cache-Supported Path Planning on Roads | B25 |
89 | 14H41A05A0 | NIMMAKAYALA V V NAGA RATNA GIRIJA SIVA SRI | Detecting Stress Based on Social Interactions in Social Networks | B21 |
90 | 14H41A05A1 | PABOLU SOWNDARYA JYOTHI | Mining Competitors from Large Unstructured Datasets | B32 |
91 | 14H41A05A2 | PACHIMALA SOWJANYA | Efficient Cache-Supported Path Planning on Roads | B25 |
92 | 14H41A05A3 | PACHIMALLA BHARATHI | Disease Prediction by Machine Learning over Big Data from Healthcare Communities | B20 |
93 | 14H41A05A4 | PAPPULA TRIPURA SATYA | Continuous Top – K Monitoring Document Stream | B23 |
94 | 14H41A05A5 | PEDAMALLU PADMA AMRUTHA | QD: A Query-Driven Approach to Entity Resolution | B26 |
95 | 14H41A05A6 | PILLI BHARATHI | Efficient Cache-Supported Path Planning on Roads | B25 |
96 | 14H41A05A7 | PITCHIKA SRAVANI | Understand Short Texts by Harvesting and Analyzing Semantic Knowledge | B19 |
97 | 14H41A05A9 | RAVI BHIMASHANKARAM | ANALYSIS OF SHORTEST PATH ROUTING FOR LARGE MULTIHOP WIRELESS NETWORK | B30 |
98 | 14H41A05B0 | SANABOYINA BALAMADHAVI | Disease Prediction by Machine Learning over Big Data from Healthcare Communities | B20 |
99 | 14H41A05B1 | SHEIK MAHABOOB MUNNISHA | Crime analysis using R | B17 |
100 | 14H41A05B2 | SRUNGARAPU KESAVA NAGA SATYA SAI SUMA | SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors | B28 |
101 | 14H41A05B3 | SUNDARANEEDI RAMA SAI SATYA VARENDRA NAIDU | Mining Competitors from Large Unstructured Datasets | B32 |
102 | 14H41A05B4 | TALABHATHULA JYOTHI MANIMALA | Analysis of illegal activities which has been raised over the state in USA | B27 |
103 | 14H41A05B5 | TATAVARTHI SATYA SANDHYA | Disease Prediction by Machine Learning over Big Data from Healthcare Communities | B20 |
104 | 14H41A05B6 | VATTURI SRI VENKATA SIVA JYOTHI | Crowd sourcing for Top-K Query Processing over Uncertain Data | B22 |
105 | 14H41A05B7 | YALLAMELLI MADHAVA KRISHNA VAMSY | Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information | B24 |
106 | 14H41A05B8 | YARRAMSETTI ADI SAI BABU | Analysis of illegal activities which has been raised over the state in USA | B27 |
107 | 14H41A05B9 | YEDLA ABHISHEK | Crime analysis using R | B17 |
108 | 15H45A0501 | ANKANI SAI KIRAN | Privacy Policy Inference of User Uploaded Images on Content Sharing Sites | B4 |
109 | 15H45A0502 | ANNAMDEVULA L G KRISHNA | Big Scholarly Data A Survey | B15 |
110 | 15H45A0503 | BORUSU RAJESH | Energy-efficient Query Processing in Web Search Engines | B10 |
111 | 15H45A0504 | CHAVATAPALLI SAI RAMAM | Cleaning Framework for Big Data | B5 |
112 | 15H45A0505 | GOLLAPALLI KIRAN KUMAR | Big Scholarly Data A Survey | B15 |
113 | 15H45A0506 | GUTHULA MALLESWARA RAO | A Data Reusing Strategy Based On Hive | B13 |
114 | 15H45A0507 | MATTAPARTHI S N V PRASAD | Big Scholarly Data A Survey | B15 |
116 | 15H45A0509 | GOWRISETTI ANU SRAVANI | Resolving Multi-party Privacy Conflicts in Social | B18 |
118 | 15H45A0511 | JANGA BHASKARA SIVA SUBRAHMANYAM | ANALYSIS OF SHORTEST PATH ROUTING FOR LARGE MULTIHOP WIRELESS NETWORK | B30 |
119 | 15H45A0512 | KOMBATHULA CHANTI BABU | A BigData Approach for Classification and Prediction of Student Result Using MapReduce | B29 |
120 | 15H45A0513 | KUSUM RAJESWARI PRASAD | SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors | B28 |
121 | 15H45A0514 | KUSUMA RAMYA | Practical Privacy- Preserving MapReduce Based K-means Clustering over Large scale Dataset | B33 |
123 | 15H45A0516 | MATTAPARTHI G S KUMAR | Continuous Top – K Monitoring Document Stream | B23 |
124 | 15H45A0517 | MULAPARTHI HARISHA | QD: A Query-Driven Approach to Entity Resolution | B26 |
125 | 15H45A0518 | NAKKA RAJESH | QD: A Query-Driven Approach to Entity Resolution | B26 |
126 | 15H45A0519 | NAMANA RAMESH | SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING BY USING ATTRIBUTE BASED ENCRYPTION | B31 |
127 | 15H45A0520 | PALIVELA K KUMAR | Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information | B33 |
128 | 15H45A0521 | PEDDIREDDY SVV SIVAPRASAD | Understand Short Texts by Harvesting and Analyzing Semantic Knowledge | B19 |
129 | 15H45A0522 | SANKARASETTI LAKSHMI NEELIMA | Detecting Stress Based on Social Interactions in Social Networks | B21 |
2016-17
S no | Regd No | Student Name | Project Title | Batch |
1 | 12H41A0514 | DARLANKA LALITHA | Secluded authoritative deduplication in hybrid cloud draft | B6 |
2 | 12H41A0519 | MUNGARA SIMHACHALAM | Assurance on data storage security in cloud computing | B3 |
3 | 13221A0586 | THOTA SANDHYA | collision attacks techniques for wireless sensor networks | B30 |
4 | 13221A0587 | UNGARALA NAGA LAKSHMI | Secluded authoritative deduplication in hybrid cloud draft | B21 |
5 | 13H41A0501 | ADABALA LAKSHMI DURGA PRASANNA | transparent and continuous user ID verification for safe internet services | B29 |
6 | 13H41A0502 | ARAVA MOUNICA | Smart certification system | B9 |
7 | 13H41A0503 | BADUGU TEJA SRI | DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments | B11 |
8 | 13H41A0504 | BANDARU PRIYA DARSHINI | Secluded authoritative deduplication in hybrid cloud draft | B6 |
9 | 13H41A0505 | BANDARU SIVA SAI DURGA SRIHITH | Progressive duplicate detection | B1 |
10 | 13H41A0506 | BANDIGUPTAPU JNANA PRASANNA RAJESWARI | Secluded authoritative deduplication in hybrid cloud draft | B6 |
11 | 13H41A0507 | BAVANA VEERA VENKATA NAGA MALLESWARI | Message filter | B13 |
12 | 13H41A0508 | BHADRI UMA SATYA LAKSHMI ANNAPURNA | causative broadcast encryption for short cipher texts | B26 |
13 | 13H41A0509 | BOKKA HARISH | Fine-Grained two factor access control system for web-based cloud computing services | B5 |
14 | 13H41A0510 | BONAM ANUSHA | image retrieval system for online multimodal metric learning | B28 |
15 | 13H41A0511 | BUNGA REVATHI | Fine-Grained two factor access control system for web-based cloud computing services | B5 |
16 | 13H41A0512 | CHALLAGALA SANGEETHA | Progressive duplicate detection | B2 |
17 | 13H41A0513 | CHITNEEDI PRAVEEN KUMAR | Protected internet services through continuous user identity verification | B7 |
18 | 13H41A0514 | DASARI SRIDEVI | Novel resource renting scheme in cloud | B4 |
19 | 13H41A0515 | DOMMETI MANISHA | Message filter | B13 |
20 | 13H41A0516 | DOMMETI SANDEEPTHI | Protected internet services through continuous user identity verification | B7 |
21 | 13H41A0517 | GARAPATI HIMA NAGA CHANDRIKA | Dynamic and Public Auditing with Fair Arbitration for Cloud Data | B10 |
22 | 13H41A0518 | GOLAKOTI SATYA SAI RUPA | DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments | B11 |
23 | 13H41A0519 | GOLLAKOTI RATNA KALYANI | DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments | B11 |
24 | 13H41A0520 | GUNISETTY MANI DEEPIKA | web based cloud services using two factor access control | B27 |
25 | 13H41A0521 | JAKKAMPUDI SRI SIRI CHANDANA | Dynamic and Public Auditing with Fair Arbitration for Cloud Data | B10 |
26 | 13H41A0522 | JOGI ANITHA | Smart certification system | B9 |
27 | 13H41A0523 | KANCHUSTHAMBHAM SANDEEP | Novel resource renting scheme in cloud | B4 |
28 | 13H41A0524 | KANDREGULA DEVIKA SURYA SAI SREE | Assurance on data storage security in cloud computing | B3 |
29 | 13H41A0526 | KARRA VALLIGAYATHRI | Online medical equipment | B8 |
30 | 13H41A0527 | KONIDALA DIVYA | Smart certification system | B9 |
31 | 13H41A0529 | LAKKIMSETTI N V V S V MANIKANTA | DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments | B11 |
32 | 13H41A0530 | LAKKIMSETTI SRAVYA | Online multi model distance metric learning | B2 |
33 | 13H41A0531 | MANGENA SRI VENI SIREESHA | a routing framework for video traffic in wireless multihop network | B25 |
34 | 13H41A0532 | MEDICHARLA NITHIHASS | collision attacks techniques for wireless sensor networks | B10 |
35 | 13H41A0533 | MOPURI SUPRITA | causative broadcast encryption for short cipher texts | B26 |
36 | 13H41A0534 | NEMANI SATYA SHARADA | Integrated blood bank system | B12 |
37 | 13H41A0535 | PATCHA RAMYA | Online multi model distance metric learning | B2 |
38 | 13H41A0536 | PEKETI HEMA DEVI | Assurance on data storage security in cloud computing | B3 |
39 | 13H41A0537 | PENDIKATLA LAKSHMI PRASANNA | web based cloud services using two factor access control | B27 |
40 | 13H41A0538 | PERI LAKSHMI KAMESWARI | Progressive duplicate detection | B1 |
41 | 13H41A0539 | POTHULA SESHAVENI | Novel resource renting scheme in cloud | B4 |
42 | 13H41A0540 | RAAVI SUSMITHA | Fine-Grained two factor access control system for web-based cloud computing services | B5 |
43 | 13H41A0541 | RAMBALA GANGA SHANKARA RAO | Integrated blood bank system | B12 |
44 | 13H41A0542 | RANKIREDDI NAGA SATTIRAJU | Online medical equipment | B8 |
45 | 13H41A0543 | RAVURI VENKATA LAVANYA | Online multi model distance metric learning | B2 |
46 | 13H41A0544 | REDDY DURGA NAGA VALLI | Message filter | B13 |
47 | 13H41A0545 | RUDRA VENKATA PADMAVATHI ANUSHA | Integrated blood bank system | B12 |
48 | 13H41A0546 | SAMSANI ADI LAKSHMI | Integrated blood bank system | B10 |
49 | 13H41A0547 | SISTA N V V BHADRA LAKSHMI RAMYA | a routing framework for video traffic in wireless multihop network | B25 |
50 | 13H41A0548 | SOMAYAJULA MANGA MOUNIKA | causative broadcast encryption for short cipher texts | B26 |
51 | 13H41A0549 | TADALA PRAVEENA DURGA | web based cloud services using two factor access control | B27 |
52 | 13H41A0550 | THOTA VEERA SATYA ANUSHA | Novel resource renting scheme in cloud | B4 |
53 | 13H41A0551 | THUMMALAPALLI PRIYANKA | Protected internet services through continuous user identity verification | B7 |
54 | 13H41A0552 | TIKKA SRI RAMYA | Fine-Grained two factor access control system for web-based cloud computing services | B5 |
55 | 13H41A0553 | TOLETI VYSHNAVI | Online medical equipment | B8 |
56 | 13H41A0554 | VATTAM NAGA MALLESH | Message filter | B13 |
57 | 13H41A0555 | VIPPARTHI SAI RAMA SRI | Protected internet services through continuous user identity verification | B7 |
58 | 13H41A0556 | YALANGI AJAYKUMAR | Progressive duplicate detection | B1 |
59 | 13H41A0557 | YELLAMILLI UDAYA MOHAN | Smart certification system | B9 |
60 | 13H41A0558 | YARRAMSETTI SHANTHI SRI | transparent and continuous user ID verification for safe internet services | B29 |
61 | 13H41A0559 | YERUBANDI MOHANA SAI JYOTHI | Secluded authoritative deduplication in hybrid cloud draft | B6 |
62 | 13H41A0560 | ABBIREDDY NIKHITHA | Detecting malicious Facebook applications | B18 |
63 | 13H41A0561 | ADABALA DEVI SUKANYA | Multiple routing configuration for fast IP network recovery | B19 |
64 | 13H41A0562 | ADAPA SAI RAMAKRISHNA | collision attacks techniques for wireless sensor networks | B30 |
65 | 13H41A0563 | AKULA VENKATA DURGA SWAMY | causative broadcast encryption for short cipher texts | B26 |
66 | 13H41A0564 | CHAVATAPALLI NAGA MANI | Secure data aggregation for wireless sensor network | B20 |
67 | 13H41A0565 | CHOPPALA NIREEKSHANA | Detecting malicious Facebook applications | B18 |
68 | 13H41A0566 | CHUNDURI V M GANGADHARA SASTRY | web based cloud services using two factor access control | B27 |
69 | 13H41A0567 | CHUNDURU P V NISHANT SWAROOP | Secure data aggregation for wireless sensor network | B20 |
70 | 13H41A0568 | DIVVI KALYANI | transparent and continuous user ID verification for safe internet services | B29 |
71 | 13H41A0569 | DONDAPATI DEEPIKA | Detection of masquerade attacks by using DDSGA approach | B22 |
72 | 13H41A0570 | DUNABOYINA JYOTHI | Discovering emerging topics in social streams via link anomaly detection | B16 |
73 | 13H41A0571 | GAMINI N V L R PRASANTHI | Detection of masquerade attacks by using DDSGA approach | B22 |
74 | 13H41A0572 | GHATTEM KARUNA | Detecting malicious Facebook applications | B18 |
75 | 13H41A0573 | GIDUGU SRI VENKATESH | collision attacks techniques for wireless sensor networks | B30 |
76 | 13H41A0574 | GOKAVARAPU NAGA VENKATESWARA RAO | Development of digital campus system based on Android | B23 |
77 | 13H41A0575 | GOKAVARAPUVEERAVENKATASATYADATTAPAVAN | Nearest keyword set search in multidimensional datasets | B24 |
78 | 13H41A0576 | GUDDATI A VVL SHIVANI | Multiple routing configuration for fast IP network recovery | B19 |
79 | 13H41A0577 | JAGATHA VEERA PRABHA PRIYANKA | Multiple routing configuration for fast IP network recovery | B19 |
80 | 13H41A0579 | K HIMAJA SRI RAJANI | Secure data aggregation for wireless sensor network | B20 |
81 | 13H41A0580 | KALAVAKOLANU V D KOTESWARI | Privacy preserving multi keyword ranked search over encrypted cloud data | B15 |
82 | 13H41A0581 | KALIGITHI JESSIRANI | image retrieval system for online multimodal metric learning | B28 |
83 | 13H41A0582 | KALVAKOLANU JYOTHI | Privacy policy inference of user uploaded images on content sharing sites | B17 |
84 | 13H41A0583 | KODAMANCHILI LILLY | Privacy policy inference of user uploaded images on content sharing sites | B17 |
85 | 13H41A0584 | KOMMISETTY MADHAVI | Secure data aggregation for wireless sensor network | B20 |
86 | 13H41A0585 | KUPPALA LALITHA KUMARI | Adaptive mobile video streaming and efficient social video sharing framework using AMES Cloud | B14 |
87 | 13H41A0586 | LINGOLU DEVISRI POOJA | collision attacks techniques for wireless sensor networks | B21 |
88 | 13H41A0587 | MALLESWARAPU DURGA | Secure data retrieval for decentralized disruption tolerant military networks | B21 |
89 | 13H41A0588 | MANDAPATI SATYA SIRISHA DEVI | Multiple routing configuration for fast IP network recovery | B19 |
90 | 13H41A0590 | MANTHA VIJAYA LAKSHMI | collision attacks techniques for wireless sensor networks | B30 |
91 | 13H41A0592 | MURAMALLA KALYANI | Secure data retrieval for decentralized disruption tolerant military networks | B21 |
92 | 13H41A0593 | MUTHABATHULA MOUNIKA | Detecting malicious Facebook applications | B18 |
93 | 13H41A0594 | MUTHYALA YAMINI LAKSHMI PADHMAVATHI | Privacy preserving multi keyword ranked search over encrypted cloud data | B15 |
94 | 13H41A0595 | NALLI SHALOM KUMAR | a routing framework for video traffic in wireless multihop network | B25 |
95 | 13H41A0596 | NANDAMURI SANTHI | Development of digital campus system based on Android | B23 |
96 | 13H41A0597 | NELAPUDI MARGAVI | Nearest keyword set search in multidimensional datasets | B24 |
97 | 13H41A0598 | ODURI DIVYA NAGA SATYA | Privacy policy inference of user uploaded images on content sharing sites | B17 |
98 | 13H41A0599 | PADALA SAIDURGA | Discovering emerging topics in social streams via link anomaly detection | B16 |
99 | 13H41A05A0 | PEDDINTI VENKATA SRIHARI | Adaptive mobile video streaming and efficient social video sharing framework using AMES Cloud | B14 |
100 | 13H41A05A1 | PEDDIREDDY SASI PRIYA | Development of digital campus system based on Android | B23 |
101 | 13H41A05A2 | PEETHALA SOWJANYA | Privacy preserving multi keyword ranked search over encrypted cloud data | B15 |
102 | 13H41A05A3 | PERABATTULA NAGA LAKSHMI | Discovering emerging topics in social streams via link anomaly detection | B16 |
103 | 13H41A05A4 | PIPPARA PARIMALA | Adaptive mobile video streaming and efficient social video sharing framework using AMES Cloud | B14 |
104 | 13H41A05A5 | POLISETTI PHANEENDRA MANI | Secure data retrieval for decentralized disruption tolerant military networks | B21 |
105 | 13H41A05A6 | RAYAPROLU N D S SRI LAKSHMI | Privacy preserving multi keyword ranked search over encrypted cloud data | B15 |
106 | 13H41A05A7 | ROKKAM JEEVAN TEJDEEP HENI | Detection of masquerade attacks by using DDSGA approach | B22 |
107 | 13H41A05A8 | SADANALA SURYA CHANDRA RAO | Discovering emerging topics in social streams via link anomaly detection | B16 |
108 | 13H41A05A9 | SANABOYINA SATISH | Privacy policy inference of user uploaded images on content sharing sites | B17 |
109 | 13H41A05B0 | SOMISETTY SAITEJA | transparent and continuous user ID verification for safe internet services | B29 |
110 | 13H41A05B1 | SUNKARA GOWRISANKARI | Discovering emerging topics in social streams via link anomaly detection | B16 |
111 | 13H41A05B2 | TADIKONDA NAGA MEGHANA | Detection of masquerade attacks by using DDSGA approach | B22 |
112 | 13H41A05B3 | UCHULA MOUNIKA | Nearest keyword set search in multidimensional datasets | B24 |
113 | 13H41A05B4 | UPPALAPATI MOHANA SOWJANYA | Nearest keyword set search in multidimensional datasets | B24 |
114 | 13H41A05B5 | VEERINA MAHATHI NAGAVALLI | Development of digital campus system based on Android | B23 |
115 | 13H41A05B6 | VINTI SARANAM VEERA AYYAPPA | image retrieval system for online multimodal metric learning | B28 |
116 | 14H45A0501 | BONAM KOTESWARA RAO | Online medical equipment | B8 |
117 | 14H45A0502 | CHITNEEDI SAI PRAVEEN | Online multi model distance metric learning | B2 |
118 | 14H45A0503 | GOLAKOTI SRI RAMANJANEYA | image retrieval system for online multimodal metric learning | B28 |
119 | 14H45A0504 | MUCHARLA MOHAN VENKATA SATYA VINAY | a routing framework for video traffic in wireless multihop network | B25 |
120 | 14H45A0505 | MUTYALA SHANMUKHA SRINIVAS | Integrated blood bank system | B12 |
121 | 14H45A0506 | PALIVELA SRIDHARMANIKANTA | Assurance on data storage security in cloud computing | B3 |
2015-16
SNO | ROLL NO | NAME OF THE STUDENT | PROJECT TITLE | BATCHES |
1 | 122Q1A0514 | MANNE SURYA | Student exam portal | B11 |
2 | 122Q1A0517 | NUKALA VEERA VENKATA SATYANARAYANA | Online car market | B16 |
3 | 122Q1A0521 | PULUSUGANTI JHANSIRANI | Online film Auction | B10 |
4 | 122Q1A0527 | VAJRAPU JASWANTHI | E-Blood bank | B13 |
5 | 122Q1A0530 | VEMAVARAPU CHANDRAKALA DURGA | Key Aggregate cryptosystem for scalable data sharing in cloud storage | B12 |
6 | 122Q1A0531 | YALLA RAMYA SRI | Bottom-up extraction of ontology metadata | B2 |
7 | 12H41A0501 | ADABALA SRIDURGA | Privacy preserving public Auditing for secure cloud storage | B4 |
8 | 12H41A0502 | ADABALA SUBHADRA SHARMILA | Decentralized access control with anonymous authentication data stored in clouds | B3 |
9 | 12H41A0503 | ADABALA TARUNA SRI | Eventuality supervision system | B7 |
10 | 12H41A0504 | AKETI SARITHA | Privacy preserving public Auditing for secure cloud storage | B4 |
11 | 12H41A0505 | AKETI SATYA SAI LAKSHMI | Eventuality supervision system | B7 |
12 | 12H41A0506 | BALLA LAKSHMI SUMEDHA | Cut Detection in wireless sensor networks | B6 |
13 | 12H41A0507 | BANDARU VARALAKSHMI | E-Blood bank | B13 |
14 | 12H41A0508 | BEERA MADHURI | Corporate Employee welfare system | B5 |
15 | 12H41A0509 | BHIMALA SATYA JYOTHI | Key Aggregate cryptosystem for scalable data sharing in cloud storage | B12 |
16 | 12H41A0510 | BOLISETTI S L S SIVA JYOTHI | Wireless sensor network security model using zero knowledge protocol | B8 |
17 | 12H41A0511 | CHELLUBOYINA KARUNA RAJESWARI | Corporate Employee welfare system | B5 |
18 | 12H41A0512 | CHINTA MANIDEEPTHI | Online car market | B16 |
19 | 12H41A0513 | CHOPPLA SMILY KRUPA | Bottom-up extraction of ontology metadata | B2 |
20 | 12H41A0515 | DHARMADI NAGA SAROJA | Online film Auction | B10 |
21 | 12H41A0516 | GODAVARTHI MOUNIKA CHOWDARY | Smart certification system | B14 |
22 | 12H41A0517 | KARRI VENKATA NAGA HIMA BINDU | Moan cubicle | B17 |
23 | 12H41A0518 | KOKA PRASANTHI | Secure authorized duplication in hybrid cloud architecture | B9 |
24 | 12H41A0520 | MUPPARTHI NAGA SRI NANDINI | Cut Detection in wireless sensor networks | B6 |
25 | 12H41A0521 | MUPPARTHY YAJNA | Smart certification system | B14 |
26 | 12H41A0522 | MUTYALA SAI SOWJANYA | Student exam portal | B11 |
27 | 12H41A0523 | NALLA LAKSHMI SUMA | Ask an Expert | B1 |
28 | 12H41A0524 | NIMMAKAYALA ANJANIDEVI | Decentralized access control with anonymous authentication data stored in clouds | B3 |
29 | 12H41A0525 | NUNNA GANGADHAR CHOWDARY | Cut Detection in wireless sensor networks | B6 |
30 | 12H41A0526 | PASUMARTHI LAKSHMI PRASANNA | Bottom-up extraction of ontology metadata | B2 |
31 | 12H41A0527 | PATHI SIVA SURYA KUMAR | Wireless sensor network security model using zero knowledge protocol | B8 |
32 | 12H41A0528 | PEDAMALLU SIRISHA | Social prudent service | B15 |
33 | 12H41A0529 | PENMETCHA VENKATA KIRANMAYI | Online film Auction | B10 |
34 | 12H41A0530 | PERI NAGA RAMYA | Key Aggregate cryptosystem for scalable data sharing in cloud storage | B12 |
35 | 12H41A0531 | PETTA ANIL SATYANARAYANA | Secure authorized duplication in hybrid cloud architecture | B9 |
36 | 12H41A0532 | POLISETTI RAMA DEEPTHI | Online car market | B16 |
37 | 12H41A0533 | PONNADA P N S SIRISHA | E-Blood bank | B13 |
38 | 12H41A0534 | RAJULAPUDI BHARATH KUMAR | Decentralized access control with anonymous authentication data stored in clouds | B3 |
39 | 12H41A0535 | RAKURTHI SOWJANYA | Ask an Expert | B1 |
40 | 12H41A0536 | RAPAKA JERUSHA | Moan cubicle | B17 |
41 | 12H41A0537 | RAVURI ANURADHA | Privacy preserving public Auditing for secure cloud storage | B4 |
42 | 12H41A0538 | RAVURI UMAPARVATHI | Wireless sensor network security model using zero knowledge protocol | B8 |
43 | 12H41A0539 | SADHANALA SIRISHA | Secure authorized duplication in hybrid cloud architecture | B9 |
44 | 12H41A0540 | SAILAJA KANCHUMARTHY | Corporate Employee welfare system | B5 |
45 | 12H41A0541 | SAKA SAMUEL PINNI | Online film Auction | B10 |
46 | 12H41A0542 | SIRIGINEEDI SAILAJA | Wireless sensor network security model using zero knowledge protocol | B8 |
47 | 12H41A0543 | SUNDARANEEDI SIREESHA | Social prudent service | B15 |
48 | 12H41A0544 | YEERI RANI SUCHARITHA | Student exam portal | B11 |
49 | 12H41A0545 | VONTEDDU NAGA VENI | Ask an Expert | B1 |
50 | 13H45A0501 | ADABALA GOWRI SIVANNARAYANA | Secure authorized duplication in hybrid cloud architecture | B9 |
51 | 13H45A0502 | AKKISETTI VEERA VENKATA DURGA SWAMY | Corporate Employee welfare system | B5 |
52 | 13H45A0503 | ANISETTI DURGAPRASAD | Bottom-up extraction of ontology metadata | B2 |
53 | 13H45A0504 | BONTHU SIVANI DEVI | Smart certification system | B14 |
54 | 13H45A0505 | CHIKKALA SRINIVAS | Cut Detection in wireless sensor networks | B6 |
55 | 13H45A0506 | GEDDAM KIRAN KUMARI | Moan cubicle | B17 |
56 | 13H45A0507 | KARRI NAGA KISHOREKUMAR | Key Aggregate cryptosystem for scalable data sharing in cloud storage | B12 |
57 | 13H45A0508 | KORUKONDA V V S NAGA MANIKANTA | E-Blood bank | B13 |
58 | 13H45A0509 | MATTAPARTHI TRILOK | Privacy preserving public Auditing for secure cloud storage | B4 |
59 | 13H45A0510 | MOKRALA CHANDRA SEKHAR JAGADESH | Smart certification system | B14 |
60 | 13H45A0511 | MUCHARLA UDAY SUBHASH | Eventuality supervision system | B7 |
61 | 13H45A0512 | NIMMANA VEERA VENKATA VINOD | Ask an Expert | B1 |
62 | 13H45A0513 | PARALA SARADA | Student exam portal | B11 |
63 | 13H45A0514 | PEYYALA ANUSHA | Eventuality supervision system | B7 |
64 | 13H45A0515 | SEELAM DURGA GANESH | Online car market | B16 |
65 | 08H41A0583 | R CHAITANYA TEJA | Social prudent service | B15 |
66 | 126M1A0527 | S PAVANI | Social prudent service | B15 |
67 | 11JH1A0567 | K SAI | Moan cubicle | B17 |
2014-15
SNO | REGD NO | STUDENT NAME | PROJECTS | BATCH |
1 | 10H41A0533 | P SUBHAKAR | Departments Automation | B5 |
2 | 10H41A0594 | TELAGAREDDY SATYA NARAYANA | Dynamic Alert Management | B14 |
3 | 10H41A0595 | T NAVEEN SURYA | E-Cart management | B15 |
4 | 117B1A0508 | RAYUDU NAVEENA | E-Cart management | B15 |
5 | 11H41A0501 | ACHANTA DHANA MRUTHUMJAYA NAIDU | Visa Processing Information System | B1 |
6 | 11H41A0502 | ACHANTA VAMSI | Departments Automation | B5 |
7 | 11H41A0503 | ADABALA SARAT KUMAR | Online Bus Reservation System | B17 |
8 | 11H41A0504 | ADABALA SRI LAKSHMI NEELIMA | Data sharing among dynamic groups with multi security | B12 |
9 | 11H41A0505 | ADDEPALLI N V S L G SWETHA | Orphan Platform | B7 |
10 | 11H41A0506 | AMBATI NARESH | Visa Processing Information System | B1 |
11 | 11H41A0507 | ANYAM SUDHEER KUMAR | Departments Automation | B5 |
12 | 11H41A0509 | ARETI VENKATESH | Automated mobile results | B2 |
13 | 11H41A0510 | ARIGELA KASU GANGA DHANA LAKSHMI | Dynamic Alert Management | B14 |
14 | 11H41A0512 | BHAVYA VEERA PRAVALLIKA BASINA | Data sharing among dynamic groups with multi security | B12 |
15 | 11H41A0513 | BONAM ANUSHA | Student association of computer application | B13 |
16 | 11H41A0514 | BONAM SRIRAMA DURGA LAKSHMI | Visa Processing Information System | B1 |
17 | 11H41A0515 | CHAVALI NAGA SANTOSH DILIP | Screenshot hacker | B11 |
18 | 11H41A0516 | CHALUMURI PAVANI | Peoples protection and Information portal | B6 |
19 | 11H41A0517 | CHEGONDI VEERA VENKATA LAKSHMI | Medium experts | B4 |
20 | 11H41A0518 | CHELLABOINA RAM PRASAD | Orphan Platform | B7 |
21 | 11H41A0519 | CHINTALAPUDI SATYA SRI V NAGA DEVI | Reverse engineering on database schemas | B8 |
22 | 11H41A0520 | DEGALA RESHMA | E-Cart management | B15 |
23 | 11H41A0521 | DEVALLA VIJAYA DURGA | Online blood donor information | B10 |
24 | 11H41A0522 | GANJI LAKSHMI | Secure communication in weapon system | B3 |
25 | 11H41A0523 | GORUGANTU CHANDRA SEKHAR | Text recognition form an image and translation | B9 |
26 | 11H41A0524 | GUTTULA KISHORE SAI | Student association of computer application | B13 |
27 | 11H41A0525 | INALA SAI CHAKRADHAR | Medium experts | B4 |
28 | 11H41A0526 | KORIPALLI CHINA VENKATA SIREESH | Student association of computer application | B13 |
29 | 11H41A0527 | KANDREGULA PAVAN KUMAR | Screenshot hacker | B11 |
30 | 11H41A0528 | KAYALA VIJAYA BALARAM NAIDU | Visa Processing Information System | B1 |
31 | 11H41A0529 | KONDREDDY SIVA RAMA DURGA RAO | Secure communication in weapon system | B3 |
32 | 11H41A0531 | KUDAKA RAMYASREE | Automated mobile results | B2 |
33 | 11H41A0532 | KUPPALA BALA SIVAKUMAR | Online blood donor information | B10 |
34 | 11H41A0533 | L SATYALAKSHMI ANUSHAPRIYANKA | Orphan Platform | B7 |
35 | 11H41A0534 | MOGALLAPALLI N V S GANESH RAM SUMANT | Dynamic Alert Management | B14 |
36 | 11H41A0535 | MOLLETI CHANDINI | Secure communication in weapon system | B3 |
37 | 11H41A0536 | MONDEPULANKA SRINU | Text recognition form an image and translation | B9 |
38 | 11H41A0537 | MUNDRU RAMAKRISHNA | Scalable Distributed Service Integrity Attestation for software as a service | B16 |
39 | 11H41A0538 | NALLA ASHA SRAVANI | Departments Automation | B5 |
40 | 11H41A0539 | PADALA V N BRAHMA PHANI KUMAR | Online blood donor information | B10 |
41 | 11H41A0540 | PALLA RATNA GANGA PRIYA | Text recognition form an image and translation | B9 |
42 | 11H41A0541 | PANINGIPALLI L S CHANDANA | Medium experts | B4 |
43 | 11H41A0542 | PARVATINA MOUNIKA | Dynamic Alert Management | B14 |
44 | 11H41A0543 | PATHI SURESH KUMAR | Reverse engineering on database schemas | B8 |
45 | 11H41A0544 | PEDDINTI VALLI BHANU TEJASWI | Peoples protection and Information portal | B6 |
46 | 11H41A0545 | PEDDIREDDY SATYA SIREESHA | Peoples protection and Information portal | B6 |
47 | 11H41A0546 | PENDIKATLA SAI SUDHA MADHURI | Screenshot hacker | B11 |
48 | 11H41A0547 | PINDI MANOJ | Reverse engineering on database schemas | B8 |
49 | 11H41A0548 | PINISETTI VEERA DURGA SAI KUMARI | Online blood donor information | B10 |
50 | 11H41A0549 | ROLLA SRIRAMA SUBRAHMANYA VASU NAIDU | Screenshot hacker | B11 |
51 | 11H41A0550 | SAMSANI SURYA KUMARI | Data sharing among dynamic groups with multi security | B12 |
52 | 11H41A0551 | SIDDABATTULA SONICA | Peoples protection and Information portal | B6 |
53 | 11H41A0552 | SIRAM S N D M LAKSHMI DEVI | Reverse engineering on database schemas | B8 |
54 | 11H41A0554 | VASAMSETTI SRI RAMYA | Automated mobile results | B2 |
55 | 11H41A0555 | VEERA SUMASRI NEHARIKA | Text recognition form an image and translation | B9 |
56 | 11H41A0556 | VEGI VENKATA SATISH | Medium experts | B4 |
57 | 11H41A0557 | VETSA V N S SURYA VASUDHA | Student association of computer application | B13 |
58 | 11H41A0558 | YADLAPALLI M K GANESH | Dynamic Alert Management | B14 |
59 | 11221A0507 | A V K CHAITANYA | Automated mobile results | B2 |
60 | 11P31A0511 | CHIKKALA SRI NAGARJUA | Secure communication in weapon system | B3 |
61 | 12H45A0501 | NALLA SUBRAHMANYESWARI | Orphan Platform | B7 |
62 | 12H45A0502 | PECHETTI VENKATESWARARAO | E-Cart management | B15 |
63 | 12H45A0503 | YALLAMELLI SRINIVASA RAO | Data sharing among dynamic groups with multi security | B12 |