2020-21
2019-20
Title of paper | Name of the author/s | Name of journal | ISSN number | Link to the recognition in UGC enlistment of the Journal |
Evolution to Big Data Analytics and Techniques and challenging issues in Data Mining with Big Data. | GIDLA VIJAYA KUMARI, | INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND RESEARCH | 2320-5547 | http://www.ijitr.com/index.php/ojs/article/view/2545/pdf |
2018-19
Title of paper | Name of the author/s | Name of journal | ISSN number | Link to the recognition in UGC enlistment of the Journal |
Design of Machine Learning Based suicide Rate Prediction System | Dr.AKILARANI M | International Journal of Scientific Research and Review | 2279-0543 | http://www.dynamicpublisher.org/gallery/62-ijsrr-d-1769.f.pdf |
Design of Machine Learning Based suicide Rate Prediction System | B V RAM KUMAR | International Journal of Scientific Research and Review | 2279-0543 | http://www.dynamicpublisher.org/gallery/62-ijsrr-d-1769.f.pdf |
Client SteadFastness Care ful Perfect Multi-Server Plan | AKELLA SUBHADRA | INTERNATIONAL JOURNAL OF RESEARCH | 2348-6848 | https://journals.pen2print.org/index.php/ijr/article/view/16620 |
ENHANCING THE TELUGU TEXT FEATURE BASED ON AUTHORSHIP ATTRIBUTION USING MACHINE LEARNING TECHNIQUES | Dr.MADDULA PRASAD | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | DOI:16.10089.IJR.2018.V7I10.285311.003450 |
ENHANCING THE TELUGU TEXT FEATURE BASED ON AUTHORSHIP ATTRIBUTION USING MACHINE LEARNING TECHNIQUES | M VENKATA RAJENDRA | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | DOI:16.10089.IJR.2018.V7I10.285311.003450 |
ENHANCING THE TELUGU TEXT FEATURE BASED ON AUTHORSHIP ATTRIBUTION USING MACHINE LEARNING TECHNIQUES | CHEVVAKULA SUMA | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | DOI:16.10089.IJR.2018.V7I10.285311.003450 |
ANALYTICAL STUDY ON SPATIAL DATA MINING TECHNIQUES | YALLA NAGA SATISH | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | DOI:16.10089.JASC.2018.V5I8.453459.0500206 |
ANALYTICAL STUDY ON SPATIAL DATA MINING TECHNIQUES | T SRI RAMA LAKSHMI | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | DOI:16.10089.JASC.2018.V5I8.453459.0500206 |
ANALYTICAL STUDY ON SPATIAL DATA MINING TECHNIQUES | BOkkA DURGA PRASAD | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | DOI:16.10089.JASC.2018.V5I8.453459.0500206 |
Energy Consumption Prediction using Decision Tree Regression model in machine Learning | GIDLA VIJAYA KUMARI | International Journal of Scientific Research and Review | 2279-0543 | http://www.ijsrr.org/pdf/82375.pdf |
A Machine Learning approach for annual rainfall prediction using Linear Regression Model | N SUSHUMA | International Journal of Scientific Research and Review | 2279-0543 | http://www.ijsrr.org/pdf/82381.pdf |
A Machine Learning approach for annual rainfall prediction using Linear Regression Model | K L GANAPATHI REDDY | International Journal of Scientific Research and Review | 2279-0543 | http://www.ijsrr.org/pdf/82381.pdf |
A Machine Learning approach for annual rainfall prediction using Linear Regression Model | VINTI H L MANIKYAMBHA | International Journal of Scientific Research and Review | 2279-0543 | http://www.ijsrr.org/pdf/82381.pdf |
Vitality proficient clustering algorithm in wireless sensor network | POPPOPPULA T S N MURTY | INTERNATIONAL JOURNAL OF RESEARCH | 2235-767X | https://edupediapublications.org/journals |
Vitality proficient clustering algorithm in wireless sensor network | CHINNAM RANJITH KUMAR | INTERNATIONAL JOURNAL OF RESEARCH | 2235-767X | https://edupediapublications.org/journals |
Energy Consumption Prediction using Decision Tree Regression model in machine Learning | GANJI LAXMI | International Journal of Scientific Research and Review | 2279-0543 | http://www.ijsrr.org/pdf/82375.pdf |
A secured Multi keyword Ranked Search Scheme for Encrypted Data in Cloud Storage | PUTI SOWMYA | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | DOI:16.10089.IJMTE.2018.V8I12.17.2727 |
A secured Multi keyword Ranked Search Scheme for Encrypted Data in Cloud Storage | MOTURI SURYA KIRAN | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | DOI:16.10089.IJMTE.2018.V8I12.17.2727 |
A secured Multi keyword Ranked Search Scheme for Encrypted Data in Cloud Storage | SAPPA SURESH | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | DOI:16.10089.IJMTE.2018.V8I12.17.2727 |
Anonymous Authentication of Cloud Data with Decentralized Access | CHILLA SANTHI | UNIVERSAL REVIEW | 2277-2723 | DOI:16.10089.UR.2019.V8I2.18.24188 |
Anonymous Authentication of Cloud Data with Decentralized Access | ADABALA P V D L KUMAR | UNIVERSAL REVIEW | 2277-2723 | DOI:16.10089.UR.2019.V8I2.18.24188 |
Anonymous Authentication of Cloud Data with Decentralized Access | TATAPUDI SIVARAMAKRISHNA | UNIVERSAL REVIEW | 2277-2723 | DOI:16.10089.UR.2019.V8I2.18.24188 |
2017-18
Title of paper | Name of the author/s | Name of journal | ISSN number | Link to the recognition in UGC enlistment of the Journal |
MULTI-CLOUD CONFINED CATALOG FOR MATHEMATICAL ALLIED DIVERSITY QUERY | B V RAM KUMAR | INTERNATIONAL JOURNAL OF RESEARCH | 2348-6848 | https://journals.pen2print.org/index.php/ijr/article/view/15181/14665 |
MULTI-CLOUD CONFINED CATALOG FOR MATHEMATICAL ALLIED DIVERSITY QUERY | VINTI H L MANIKYAMBHA | INTERNATIONAL JOURNAL OF RESEARCH | 2348-6848 | https://journals.pen2print.org/index.php/ijr/article/view/15181/14665 |
Aviator Sustain Scheme: A Machine Learning Access | K L GANAPATHI REDDY | INTERNATIONAL JOURNAL OF RESEARCH | 2348-6848 | https://journals.pen2print.org/index.php/ijr/article/view/15338 |
Aviator Sustain Scheme: A Machine Learning Access | CHINNAM RANJITH KUMAR | INTERNATIONAL JOURNAL OF RESEARCH | 2348-6848 | https://journals.pen2print.org/index.php/ijr/article/view/15338 |
Aviator Sustain Scheme: A Machine Learning Access | POPPOPPULA T S N MURTY | INTERNATIONAL JOURNAL OF RESEARCH | 2348-6848 | https://journals.pen2print.org/index.php/ijr/article/view/15338 |
Game Champion Prediction Using Machine Learning | CHINNAM RANJITH KUMAR | INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS | 2349-5138 | http://www.ijrar.org/viewfull.php?&p_id=IJRAR19J3746 |
SHARING OF SCALABLE DATA IN CLOUD STORAGE USING KEY-AGGREGATE CRYPTOSYSTEM | M JANAKI RAMUDU | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | DOI:16.10089.IJR.2018.V7I1.285311.2622 |
SHARING OF SCALABLE DATA IN CLOUD STORAGE USING KEY-AGGREGATE CRYPTOSYSTEM | YALLA NAGA SATISH | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | DOI:16.10089.IJR.2018.V7I1.285311.2622 |
SHARING OF SCALABLE DATA IN CLOUD STORAGE USING KEY-AGGREGATE CRYPTOSYSTEM | MOTURI SURYA KIRAN | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | DOI:16.10089.IJR.2018.V7I1.285311.2622 |
Utilizations of Contraption Erudition to Resource Supervision in Gloom Gauge | CHINNAM RANJITH KUMAR | INTERNATIONAL JOURNAL OF RESEARCH | 2348-6848 | https://journals.pen2print.org/index.php/ijr/article/view/15373 |
Utilizations of Contraption Erudition to Resource Supervision in Gloom Gauge | K L GANAPATHI REDDY | INTERNATIONAL JOURNAL OF RESEARCH | 2348-6849 | https://journals.pen2print.org/index.php/ijr/article/view/15373 |
Utilizations of Contraption Erudition to Resource Supervision in Gloom Gauge | POPPOPPULA T S N MURTY | INTERNATIONAL JOURNAL OF RESEARCH | 2348-6850 | https://journals.pen2print.org/index.php/ijr/article/view/15373 |
Scalable and Efficient Key Management Protocol in Defending Against Various Attacks in Wireless Sensor Networks | T SRI RAMA LAKSHMI | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-7-ISSUE-9-2017/ |
Scalable and Efficient Key Management Protocol in Defending Against Various Attacks in Wireless Sensor Networks | AKELLA SUBHADRA | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-7-ISSUE-9-2017/ |
Scalable and Efficient Key Management Protocol in Defending Against Various Attacks in Wireless Sensor Networks | M VENKATA RAJENDRA | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-7-ISSUE-9-2017/ |
An Algorithm to Discover Disconnection and Reconnecting Wireless sensor system partitions | GIDLA VIJAYA KUMARI | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-6-ISSUE-11-2017/ |
An Algorithm to Discover Disconnection and Reconnecting Wireless sensor system partitions | CHILLA SANTHI | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-6-ISSUE-11-2017/ |
An Algorithm to Discover Disconnection and Reconnecting Wireless sensor system partitions | N SUSHUMA | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-6-ISSUE-11-2017/ |
A ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORK | ADABALA P V D L KUMAR | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | DOI:16.10089.JASC.2018.V5I4.453459.04935 |
A ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORK | TATAPUDI SIVARAMAKRISHNA | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | DOI:16.10089.JASC.2018.V5I4.453459.04935 |
A ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORK | SAPPA SURESH | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | DOI:16.10089.JASC.2018.V5I4.453459.04935 |
Performance of reactive and proactive MANET routing protocols with trajectories | Dr.MADDULA PRASAD | IJTRD | ISSN:2394-9333 | http://www.ijtrd.com/papers/IJTRD14782.pdf |
DEVELOPMENT OF DATA STORAGE AND ACCESS CONTROL SCHEME USING MULTI AUTHORITY FRAMEWORK | Dr.MADDULA PRASAD | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | DOI:16.10089.IJR.2017.V6I7.236456.00847 |
DEVELOPMENT OF DATA STORAGE AND ACCESS CONTROL SCHEME USING MULTI AUTHORITY FRAMEWORK | MAHANTHI SRIRAMULU | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | DOI:16.10089.IJR.2017.V6I7.236456.00847 |
DEVELOPMENT OF DATA STORAGE AND ACCESS CONTROL SCHEME USING MULTI AUTHORITY FRAMEWORK | PUTI SOWMYA | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | DOI:16.10089.IJR.2017.V6I7.236456.00847 |
2016-17
Title of paper | Name of the author/s | Name of journal | ISSN number | Link to the recognition in UGC enlistment of the Journal |
Masquerade Attacks Detection using Data Driven Approach | GIDLA VIJAYA KUMARI | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-6-ISSUE-2-2016/ |
Masquerade Attacks Detection using Data Driven Approach | VINTI H L MANIKYAMBHA | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-6-ISSUE-2-2016/ |
Masquerade Attacks Detection using Data Driven Approach | SAPPA SURESH | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-6-ISSUE-2-2016/ |
DEVELOPMENT OF FRAUD APPS USING FRAPPEFOR FACEBOOK IN MOBILE APPS | ADABALA P V D L KUMAR | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-6-ISSUE-1-2017/ |
DEVELOPMENT OF FRAUD APPS USING FRAPPEFOR FACEBOOK IN MOBILE APPS | TATAPUDI SIVARAMAKRISHNA | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-6-ISSUE-1-2017/ |
DEVELOPMENT OF FRAUD APPS USING FRAPPEFOR FACEBOOK IN MOBILE APPS | K L GANAPATHI REDDY | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-6-ISSUE-1-2017/ |
USING THIRD PARTY AUDITOR UNRESTRICTED AUDITING OF PRIVACY-PRESERVING FOR PROTECTED CLOUD STORAGE | AKELLA SUBHADRA | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-6-ISSUE-2-2016/ |
USING THIRD PARTY AUDITOR UNRESTRICTED AUDITING OF PRIVACY-PRESERVING FOR PROTECTED CLOUD STORAGE | MOTURI SURYA KIRAN | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-6-ISSUE-2-2016/ |
USING THIRD PARTY AUDITOR UNRESTRICTED AUDITING OF PRIVACY-PRESERVING FOR PROTECTED CLOUD STORAGE | YALLA NAGA SATISH | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-6-ISSUE-2-2016/ |
Filtered Techniques of redundant Messages from Social network Users | B V RAM KUMAR | Journal of Applied Science and Computations | 1076-5131 | http://j-asc.com/Volume-3-Issue-2-June-December-2016/ |
Filtered Techniques of redundant Messages from Social network Users | N SUSHUMA | Journal of Applied Science and Computations | 1076-5131 | http://j-asc.com/Volume-3-Issue-2-June-December-2016/ |
Filtered Techniques of redundant Messages from Social network Users | CHILLA SANTHI | Journal of Applied Science and Computations | 1076-5131 | http://j-asc.com/Volume-3-Issue-2-June-December-2016/ |
DEPENDABLE DE-DUPLICATION IN HYBRID CLOUD CRAFT | M VENKATA RAJENDRA | International Journal of Research | 2236-6124 | DOI:16.10089.IJR.2017.V6I3.236456.000646 |
DEPENDABLE DE-DUPLICATION IN HYBRID CLOUD CRAFT | T SRI RAMA LAKSHMI | International Journal of Research | 2236-6124 | DOI:16.10089.IJR.2017.V6I3.236456.000646 |
DEPENDABLE DE-DUPLICATION IN HYBRID CLOUD CRAFT | CHEVVAKULA SUMA | International Journal of Research | 2236-6124 | DOI:16.10089.IJR.2017.V6I3.236456.000646 |
2015-16
Title of paper | Name of the author/s | Name of journal | ISSN number | Link to the recognition in UGC enlistment of the Journal |
AN ABSTRACT COMPUTING DEVICE & RECENT TRENDS IN AUTOMATION | AKELLA SUBHADRA | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-4-ISSUE-2-2015/ |
AN ABSTRACT COMPUTING DEVICE & RECENT TRENDS IN AUTOMATION | GIDLA VIJAYA KUMARI | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-4-ISSUE-2-2015/ |
AN ABSTRACT COMPUTING DEVICE & RECENT TRENDS IN AUTOMATION | VINTI H L MANIKYAMBHA | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-4-ISSUE-2-2015/ |
DEIGN OF HYBRID CLOUD BASED ON SHELTERED AUTHORIZED DEDUPLICATION | ADABALA P V D L KUMAR | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | http://j-asc.com/Volume-2-Issue-2-June-December-2015/ |
DEIGN OF HYBRID CLOUD BASED ON SHELTERED AUTHORIZED DEDUPLICATION | MOTURI SURYA KIRAN | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | http://j-asc.com/Volume-2-Issue-2-June-December-2015/ |
DEIGN OF HYBRID CLOUD BASED ON SHELTERED AUTHORIZED DEDUPLICATION | M JANAKI RAMUDU | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | http://j-asc.com/Volume-2-Issue-2-June-December-2015/ |
DESIGN OF KEY MANAGEMENT SYSTEM FOR WSN’s TO AVOID VARIOUS ATTACKS | B V RAM KUMAR | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | http://j-asc.com/Volume-2-Issue-2-June-December-2015/ |
DESIGN OF KEY MANAGEMENT SYSTEM FOR WSN’s TO AVOID VARIOUS ATTACKS | CHILLA SANTHI | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | http://j-asc.com/Volume-2-Issue-2-June-December-2015/ |
DESIGN OF KEY MANAGEMENT SYSTEM FOR WSN’s TO AVOID VARIOUS ATTACKS | SAPPA SURESH | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | http://j-asc.com/Volume-2-Issue-2-June-December-2015/ |
SECRECT AUTHENTICATION ACCESS CONTROL SCHEME TO PROTECT DATA STORAGE IN CLOUD | N SUSHUMA | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-5-ISSUE-1-2016/ |
SECRECT AUTHENTICATION ACCESS CONTROL SCHEME TO PROTECT DATA STORAGE IN CLOUD | K L GANAPATHI REDDY | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-5-ISSUE-1-2016/ |
SECRECT AUTHENTICATION ACCESS CONTROL SCHEME TO PROTECT DATA STORAGE IN CLOUD | TATAPUDI SIVARAMAKRISHNA | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-5-ISSUE-1-2016/ |
EXPLORATION OF MULTI-KEY ORDER FOR RELIABLE AND PROGRESSIVE BLUEPRINT ON CIPHER TEXT IN THE CLOUD | M JANAKI RAMUDU | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-5-ISSUE-1-2016/ |
EXPLORATION OF MULTI-KEY ORDER FOR RELIABLE AND PROGRESSIVE BLUEPRINT ON CIPHER TEXT IN THE CLOUD | Dr.MADDULA PRASAD | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-5-ISSUE-1-2016/ |
EXPLORATION OF MULTI-KEY ORDER FOR RELIABLE AND PROGRESSIVE BLUEPRINT ON CIPHER TEXT IN THE CLOUD | MAHANTHI SRIRAMULU | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-5-ISSUE-1-2016/ |
ANALYSIS, DESIGN & APPLICATIONS OF GREEDY ALGORITHMS | T SRI RAMA LAKSHMI | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-6-ISSUE-1-2016/ |
ANALYSIS, DESIGN & APPLICATIONS OF GREEDY ALGORITHMS | YALLA NAGA SATISH | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-6-ISSUE-1-2016/ |
ANALYSIS, DESIGN & APPLICATIONS OF GREEDY ALGORITHMS | PUTI SOWMYA | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-6-ISSUE-1-2016/ |
2014-15
Title of paper | Name of the author/s | Name of journal | ISSN number | Link to the recognition in UGC enlistment of the Journal |
IMPLEMENTATION OF CLUSTERING ALGORITHM FOR UNIQUE VALUE DISINTEGRATION TO PROBING RESULTS | B V RAM KUMAR | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | http://ijrpublisher.com/VOL-3-ISSUE-1-2014/ |
IMPLEMENTATION OF CLUSTERING ALGORITHM FOR UNIQUE VALUE DISINTEGRATION TO PROBING RESULTS | N SUSHUMA | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | http://ijrpublisher.com/VOL-3-ISSUE-1-2014/ |
IMPLEMENTATION OF CLUSTERING ALGORITHM FOR UNIQUE VALUE DISINTEGRATION TO PROBING RESULTS | K L GANAPATHI REDDY | INTERNATIONAL JOURNAL OF RESEARCH | 2236-6124 | http://ijrpublisher.com/VOL-3-ISSUE-1-2014/ |
ENERGY EFFICIENT AND COST REDUCTION VIRTUAL SERVERS ALLOCATED DYNAMICALLY WITH SUPPORT OF DPS | ADABALA P V D L KUMAR | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-4-ISSUE-2-2014/ |
ENERGY EFFICIENT AND COST REDUCTION VIRTUAL SERVERS ALLOCATED DYNAMICALLY WITH SUPPORT OF DPS | CHILLA SANTHI | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-4-ISSUE-2-2014/ |
ENERGY EFFICIENT AND COST REDUCTION VIRTUAL SERVERS ALLOCATED DYNAMICALLY WITH SUPPORT OF DPS | TATAPUDI SIVARAMAKRISHNA | INTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES | 2249-7455 | http://ijamtes.org/VOL-4-ISSUE-2-2014/ |
Multi-Owner Data Sharing by using Three-dimensional security pattern in cloud computing | GIDLA VIJAYA KUMARI | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-4-ISSUE-1-2015/ |
Multi-Owner Data Sharing by using Three-dimensional security pattern in cloud computing | T SRI RAMA LAKSHMI | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-4-ISSUE-1-2015/ |
Multi-Owner Data Sharing by using Three-dimensional security pattern in cloud computing | SAPPA SURESH | UNIVERSAL REVIEW | 2277-2723 | http://universalreview.org/VOL-4-ISSUE-1-2015/ |
Decentralized Access Control Data Stored in Cloud Using Key Attribute Based Schema | Dr.MADDULA PRASAD | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | http://j-asc.com/Volume-2-Issue-1-January-June-2015/ |
Decentralized Access Control Data Stored in Cloud Using Key Attribute Based Schema | AKELLA SUBHADRA | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | http://j-asc.com/Volume-2-Issue-1-January-June-2015/ |
Decentralized Access Control Data Stored in Cloud Using Key Attribute Based Schema | M VENKATA RAJENDRA | JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS | 1076-5131 | http://j-asc.com/Volume-2-Issue-1-January-June-2015/ |